meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Tuesday, November 22nd 2016

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 21 November 2016

⏱️ 5 minutes

🧾️ Download transcript

Summary

Daily 5 min infosec news summary. News, patches, vulnerabilities and trends in information security. Encrypted ZIP File With Comments; Siemens Camera Default Password

Transcript

Click on a timestamp to play from that location

0:00.0

Hello, welcome to the Tuesday, November 22nd, 2016 edition of the Sandson and Storms,

0:06.2

Stormcast. My name is Johannes Ulrich, and the I am recording from Jacksonville, Florida.

0:12.5

The DA came across an interesting new variation of the old password encrypted zip file trick.

0:20.0

Now, we have seen this for many years where malware comes

0:23.0

attached as a zip file that's encrypted in order to prevent anti-malware from analyzing the file.

0:31.5

Now typically the password is then just mentioned in the text of the email. Sometimes we have also seen images with the password

0:41.1

in order to prevent automatic algorithms from finding the password. In this latest iteration,

0:47.4

the password is actually a comment inside the SIP file. You may attach comments to SIP files that are being displayed then when

0:57.2

you're trying to decompress the file and in this case this comment will then provide you with

1:05.3

the password. Shouldn't really be too hard for anti-malware than to figure out what the password is,

1:11.6

but of course they first have to start looking for this particular variation.

1:16.6

And just as a side note, of course, researchers often use password-incrypted zip files in order

1:24.0

to exchange samples. Typically, the password in these cases is just the word

1:28.8

infected, sometimes malware or things like that.

1:32.8

Well, I've actually observed that some mail systems do actually unsyp these files if they're

1:39.4

using one of these standard passwords.

1:43.5

And just to show it's not just the no-name cheap Asian

1:47.9

cameras that are affected by simple vulnerabilities. Siemens today announced that its IP-based

1:56.3

CCTV cameras also suffer from pretty easy to exploit vulnerability. Now this is not a hard-coded

2:05.2

password like we had, for example, in some of these systems infected by the Mirai bot, but instead

2:12.9

in this case, NetHacker can simply retrieve the current password for the camera by accessing a specific

2:20.3

URL. We have seen this before where configuration files and the like were not adequately protected

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.