meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Tuesday, May 3rd, 2022

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 3 May 2022

⏱️ 6 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. VSTO Office Files; Gmail SMTP Relay; OpenSSF Package Analysis; M1 Prefetcher Leak

Transcript

Click on a timestamp to play from that location

0:00.0

Hello, welcome to the Tuesday, May 3, 2022 edition of the Sandsenet Storms,

0:06.3

and its Stormcast. My name is Johannes Ulrich. And then I'm recording from Jacksonville, Florida.

0:13.7

Well, I talked a few times already about how attackers are attempting to bypass issues with macros.

0:20.7

Macros have been the go-to-way how attackers tricked victims into running code in Microsoft Office.

0:29.2

But of course, Microsoft has gotten or is going to be more tied in when they allow macros to run at all, regardless of user permission.

0:42.3

DDA today has an interesting article looking at one way how this restriction could possibly bypass.

0:50.6

This is VSTO Office Files.

0:59.7

VSTO stands for Visual Studio Office and that's exactly sort of what it is. It's a Visual Studio application linked in to an office document like a

1:07.5

VERT document. Now there are some restrictions.

1:16.7

It's not quite as easy as just adding a random binary to a VIRD document.

1:21.5

They have to be validly signed or they have to come from the intranet zone and the like.

1:26.8

But yes, they can be downloaded from a remote location. And that's what did he looked at, whether or not he's able to detect, whether or not a document

1:33.3

is including a URL that's downloading these additional applications.

1:38.8

And well, it turns out he didn't even have to write a new tool.

1:42.1

XIF tool does the job for you. The two properties

1:46.1

you're looking for here is assembly location and assembly name. So when you're running XF tool,

1:52.1

just grab for it or the DA actually used this handy head-tail tool, which will display

1:58.0

the first 10 and the last 10 lines of the output, which then also

2:02.8

includes these two properties. X-F tool works for OXML files. That's what the D is demonstrating

2:10.0

here, but if you use Siptum.Py, you can also get the same result or Oli Dump will return it for Oli files.

2:20.8

This article by D-D-D was in part based on a tweet by Mark Oxenmeyer, and in general,

2:28.7

if you haven't looked at VSTO files, you definitely should take a moment and read up on how these files work and

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.