meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Tuesday, May 24th 2016

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 24 May 2016

⏱️ 5 minutes

🧾️ Download transcript

Summary

Daily 5 min infosec news summary. News, patches, vulnerabilities and trends in information security. Detailed Technical Report Released About Target Attack Against RUAG

Transcript

Click on a timestamp to play from that location

0:00.0

Hello, welcome to the Tuesday, May 24, 2016 edition of the Sands International Storm Center's Stormcast.

0:08.0

My name is Johannes Ulrich, and the day I'm recording from Seattle, Washington.

0:12.0

Rick found a real nice write-up about targeted attacks against Ruach.

0:18.0

Ruach is not very well known known but it is the largest and most

0:24.1

the government-owned defense contractor in Switzerland and as such of course

0:29.8

subject to a lot of the same target attacks that defense contractors see

0:35.7

around the world. In this particular case, the attack was discovered in January of 2016, but further investigation

0:44.3

did reveal that it began as early as September 2014.

0:50.3

Now the nice thing here is they did a real good job in releasing a detailed right up on the attack.

0:57.0

So I think it's a great example to learn from, to learn how these targeted attacks work,

1:02.0

and what kind of damage they cause, what kind of methods they use,

1:07.0

and how careful they are really to penetrate your network without really disturbing any unnecessary sensors.

1:14.6

So real good read if you're interested in targeted attacks and how to defend against them.

1:21.6

And what I like here is really a first person report, so it's written by Ruach itself. It's not something in a trade press or so that is trying to summarize the attack,

1:33.3

so lots of detailed technical background here.

1:37.3

And paste jacking is not really a new exploit, but one that I find is really a little bit underappreciated.

1:46.8

The exploit itself is pretty straightforward.

1:49.9

What you're doing is you're counting on a developer that will copy paste code from a website

1:56.3

into a shell or in this case into an editor.

2:00.5

So typically one would expect that whatever text you

2:03.0

highlight on a webpage and copy is what will end up in your clipboard. But that's not true,

2:09.3

strictly speaking. With some JavaScript tricks, you can actually send whatever text you want

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.