meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Tuesday, May 16th, 2023

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 16 May 2023

⏱️ 5 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. Facebook Phish; No Intel Microcode Vuln; Fake Trezor Wallets; TP-Link Exploited

Transcript

Click on a timestamp to play from that location

0:00.0

Hello and welcome to the Tuesday, May 16, 2023 edition of the Sandton and Storm Center's

0:07.8

Stormcast. My name is Johannes Ulrich and today I'm recording from Jacksonville, Florida.

0:15.2

For about four months now, Jan has been tracking some interesting emails that claim to come from Facebook.

0:23.5

Of course, they're not from Facebook.

0:25.8

They're essentially phishing emails with a couple sort of interesting artifacts.

0:30.5

First of all, the from address is just the string Facebook, not a valid email address, just essentially the name.

0:40.2

Now, typically, you do have a name and an email address, but here the email address part is

0:45.8

just left blank. Maybe this is supposed to help with some of the sort of de-kim SPF-like filters.

0:54.7

Then the links are also a little bit odd in that many of the links are mail-to-links.

0:59.5

So if the user clicks on them, they're not being sent to a particular webpage instead.

1:05.0

The email client opens a new window and then attempts to send an email.

1:10.1

Of course, the user still has to actually send the email.

1:12.6

The email is not sent automatically.

1:14.8

Could be where the attacker is maybe trying to sort of communicate with the victim here,

1:20.1

maybe hoping the victim would ask for help.

1:22.4

And then, of course, the attacker would like to supply that help.

1:27.4

But what's for the most interesting part of this otherwise,

1:31.5

not really not super remarkable phishing email,

1:34.8

is that the attacker apparently just copy-pasteed a lot of the content

1:39.8

from an actual Facebook email.

1:42.1

Of course, that makes the email more plausible, makes it easier

1:45.6

to actually have the right layout and everything.

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.