meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Tuesday, July 6th, 2021

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 6 July 2021

⏱️ 7 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. Kaseya REvil Update; Printnightmare Update; RPM Key Issues; Node.JS Patches

Transcript

Click on a timestamp to play from that location

0:00.0

Hello, welcome to the Tuesday, July 6, 2021 edition of the Sansonet Storm Center's Stormcast. My name is Johannes Ulrich, and today I'm recording from Jacksonville, Florida.

0:13.3

Kasea and Brent Nightmare are still dominating the news and should be where your attention is focused on today. So I did two special podcasts

0:24.7

this weekend, but do want to do a quick recap of what's kind of new about these two events.

0:33.2

So first let's start with Kasea, the MSP platform that apparently was breached.

0:39.3

Well, it looks now like the entry point was actually a vulnerability in Kasea VSA directly.

0:47.2

So it wasn't something where someone first breached Kesea in order to distribute the Malware,

0:53.3

but it looks like they did hit Kasea

0:56.0

VSA directly, and that's sort of how the malware was deployed. Still, if you are running

1:03.5

Kasea, there appear to be a number of vulnerabilities that Kasea was in the process of

1:09.0

patching. They promised a patch soon.

1:12.4

So keep the system offline until further notice or until you hear differently from Kasea

1:18.2

if you are running their product on premise.

1:21.4

Detection tools have been made available by Sisa and the FBI as well as by Kasea directly and by other third parties.

1:31.3

Wherever you get your detection tool from, get it from a trusted source and of course

1:37.3

verify the integrity of the binary before you run it.

1:41.3

And there is now a ransom demand of $70 million that was directed at

1:47.9

Kasea, and if Kasea pays the ransom, they should receive a key that will work for all affected

1:55.0

victims. The way the are evil or Suna Keebis, as it's sometimes also called Ransomware Works, there is one sort

2:03.5

of master key that's specific to the software itself. That key has never been leaked, and that

2:11.0

key is then used to generate campaign keys, and in this case, the Kasea campaign would use one of these campaign keys.

2:20.5

But then there are additional keys being generated from this campaign key that are unique

2:26.3

to each system and also unique to each file. So there is a chance that down the line maybe

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.