4.9 • 696 Ratings
🗓️ 20 November 2018
⏱️ 5 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
| 0:00.0 | Hello, welcome to the Tuesday, November 20th, 2018 edition of the Sansonet Storm Center's Stormcast. |
| 0:07.6 | My name is Johannes Ulrich, and I am recording from Jacksonville, Florida. |
| 0:13.7 | Android users, be aware Lucas Stefanko with ESET, found 13 fraudulent applications in Google's Play Store. |
| 0:23.5 | These 13 applications do not really do anything. |
| 0:27.1 | They claim to be games, but if you install one of them, |
| 0:31.0 | it will actually not even install an icon. |
| 0:34.2 | Instead, it will immediately download AdWware and essentially delete itself. So the only |
| 0:40.1 | thing these applications do is install adware on your system. Now yes you have to give the |
| 0:47.2 | application permission to do that. During the initial install it will essentially tell you |
| 0:52.2 | that it's now installing another application. It will |
| 0:55.5 | also request access to all network connections and it will request permission to start |
| 1:02.3 | whenever your phone is rebooted. So no real exploit involved here. The user is doing all the |
| 1:09.1 | work for these malicious applications. |
| 1:12.9 | Google has been notified of course and the URL from which that second part that adware |
| 1:18.0 | was downloaded is no longer accessible. |
| 1:22.7 | And the tags against ATMs, the automatic teller machines have been highly publicized over the last few months. |
| 1:30.0 | So positive technologies came out with a nice document summarizing the different weaknesses |
| 1:36.8 | and attacks against these machines. |
| 1:40.3 | Now, the attacks for the most part do require some level of physical access, but even as |
| 1:47.2 | little as having access to the network connection from the ATM to the bank does allow |
| 1:54.7 | for some attacks that are successful with the majority of devices that positive technologies tested. Other attacks typically |
| 2:04.8 | require, for example, an exposed USB port or other forms of physical access that usually |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.