meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Tuesday, May 5th 2020

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 5 May 2020

⏱️ 5 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. Exploring Sysmon 11 Delete Protection; Digicert CT Compromise

Transcript

Click on a timestamp to play from that location

0:00.0

Hello, welcome to the Tuesday, May 5th, 2020 edition of the Sansonet Storm Center's Stormcast. My name is Johannes Ulrich.

0:08.7

And I'm recording from Jacksonville, Florida.

0:13.2

Now, when Sysmon was updated last week to Sysmon 11, one of the great new features that was added was file deletion protection, which essentially

0:24.3

will make automatic backups of files that are being deleted.

0:29.6

Didy today took a closer look at the feature and sort of explored a little bit its limits.

0:35.1

First of all, if you overwrite a file with tools like S-Delete

0:39.7

that will delete the file and then override the disk space with zeros, well, the undelete

0:46.3

feature in Filemon still works. Where it doesn't work, of course, is if you override the file

0:53.5

a byte at a time with zeros, and

0:56.1

then delete it, then you only end up with a backup of the file with all zeros.

1:02.4

However, if you do override it in blocks of one megabyte or smaller blocks, if the file

1:08.5

itself isn't one megabyte in size, then it actually worked and preserved the original file.

1:15.6

So pretty interesting.

1:17.6

Now, a reader kind of reported a little bit an odd issue with removable drives.

1:23.6

Apparently, once you enabled that Sysmon feature feature, you can no longer cleanly unmount

1:29.8

to drive because SysMond keeps files open on the device.

1:34.7

And Sys Internals promised a fix for this issue in a future update.

1:41.1

And yesterday I mentioned how the salt vulnerability is being used to attack various systems.

1:48.3

Well, we have another noteworthy victim here, and that's DigiCert's certificate transparency log.

1:56.1

On Sunday, DigiCert reported that they discovered a compromise of the system that's operating

2:02.9

their certificate transparency log, and the attacker had access to the secret key being used

2:10.3

to sign entries in this transparency log.

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.