meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Tuesday, June 14th 2016

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 14 June 2016

⏱️ 5 minutes

🧾️ Download transcript

Summary

Daily 5 min infosec news summary. News, patches, vulnerabilities and trends in information security. Flocker Ransomware Locks TVs; Samsumg Updates Update

Transcript

Click on a timestamp to play from that location

0:00.0

Hello, welcome to the Tuesday, June 14th, 2016 edition of the Santernut Storm Center's Stormcast.

0:08.0

My name is Johannes Ulrich, and today I'm recording from Washington, D.C.

0:12.4

Samsung fixed a pretty simple and basic privilege escalation vulnerability in its software update that ships with Samsung laptops.

0:23.6

The vulnerability here is a very typical privilege escalation vulnerability.

0:29.6

An attacker can write to a directory that the update tool will use to load DLs.

0:38.3

So all the attacker has to do is plug DLL with the right name into that directory, and it

0:44.8

will be loaded and executed on the next reboot as the system user.

0:51.7

Whenever you have any process that runs as an elevated user, you have to make sure

0:57.9

that other users can't modify the files this process. Uses has happened a lot, for example,

1:05.9

with Cron scripts on Unix systems as well that run as root but can be written or overwritten by a regular

1:14.7

user.

1:16.0

And Trent Micro is reporting how good old non-crypto ransomware is crossing over from

1:23.4

smartphones to TVs.

1:26.7

This type of ransomware has been around for a couple years, the particular variant that

1:32.3

Trent Micro is talking about is known as flocker.

1:35.3

And what essentially does is it locks your phone and makes it unusable unless you are paying

1:42.3

up the ransom. Typically this comes with a note claiming to be from some kind of law enforcement police organization

1:50.0

that found out that you're performing illegal activity and as a result locked your phone

1:55.0

unless you're paying the fine.

1:58.0

So no files here are encrypted but the phone becomes unusable unless you're doing a hard

2:04.6

reset. Now, what happened recently according to Trend Micro is that they have seen this type

2:11.6

of Malware infect TVs that are running the Android operating system. No big surprise really here, given if it's the same

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.