4.9 • 696 Ratings
🗓️ 25 March 2019
⏱️ 5 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | Hello, welcome to the Tuesday, March 26, 2019 edition of the San Antonio Stormsend, Stormcast. |
0:07.6 | My name is Johannes Ulrich. |
0:09.1 | And today I'm recording from Madrid, Spain. |
0:13.5 | Supply chain attacks are, of course, a big topic these days. |
0:17.4 | And it looks like Kerserski came across a pretty massive supply chain attack affecting |
0:25.2 | AISIS. |
0:26.4 | AIS's life update utility apparently was backdoored and installed on probably more than a million |
0:34.9 | of AIS's customers. |
0:37.3 | Kaspersky itself detected it on 57,000 systems that were protected with Kaspersky anti-virus. |
0:44.0 | However, of course, that's only a subset of the total population of infected systems. |
0:50.4 | So, one million, I guess, is what Kasperssky extrapolated based on that sample of 57,000 victims that it detected directly. |
1:01.0 | The malicious utility was available from AIS's own website. It was signed with a valid AIS certificate. |
1:10.0 | So for the end user, there was absolutely no indication that anything went wrong. |
1:15.6 | And this AISIS Life Update Utility can of course install arbitrary software, |
1:19.6 | can also update the bias on AIS's laptops. |
1:24.6 | But this is not where sort of this story ends. Now even though a large number of |
1:29.4 | users were affected by this particular malicious update utility, it looks like only 600 |
1:35.7 | specific systems were actually targeted by this system. So the attacker would have access |
1:42.2 | to millions of systems, but they picked 600 specific MAC addresses that were hard-coded into the utility that would then be targeted and subjected to malicious uploads. |
1:55.0 | Now, while AIS is the only victim mentioned in Kasperski's report. |
2:00.0 | They also say that there were three additional vendors |
2:03.5 | that were targeted by apparently the same technique. These vendors are not named yet, but |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.