4.9 • 696 Ratings
🗓️ 12 May 2020
⏱️ 6 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | Hello, welcome to the Tuesday, May 12, 2020 edition of the Sands and the Storm Center's Stormcast. |
0:06.8 | My name is Johannes Ulrich. |
0:08.3 | Entertainment recording from Jacksonville, Florida. |
0:11.6 | The DA today took a look at a new to him tool, XLM macro, the obfuscator. |
0:17.0 | This tool allows you to, as the name implies, de-obvious skate XLM or Excel4 macros by actually |
0:25.2 | implementing sort of an emulator for these Excel for macros and executing a limited subset |
0:33.3 | of their functionality, helping you with de-obfuscating them without actually executing any sort |
0:39.8 | of the malicious code. |
0:42.0 | So thanks to Dissect Malibur for making this tool available for free on GitHub. |
0:48.2 | And then I did a quick walkthrough through a LinkedIn fission attempt. |
0:53.0 | No, I don't see a lot |
0:54.2 | of fishing attempts coming in via |
0:56.1 | LinkedIn. Typically, they come in |
0:58.1 | from a compromised account |
1:00.3 | that's then being used to essentially |
1:01.9 | spam their connections. |
1:04.4 | A couple interesting things about this was |
1:06.1 | that first of all, the |
1:08.0 | directory with the original |
1:10.1 | fishing kit was exposed. so that allowed me to download |
1:13.9 | the fishing kit. And then also to take a look at the logs that actually logged who fell |
1:20.0 | for the fish. Now, didn't log any email address and passwords. They're being sent to the attacker's |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.