meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Tuesday, November 27th 2018

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 27 November 2018

⏱️ 6 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. ViperMonkey; More Malicious NPM Libraries; BMC Lateral Movement;

Transcript

Click on a timestamp to play from that location

0:00.0

Hello, welcome to the Tuesday, November 27th, 2018 edition of the Sands and its Storms Center's

0:07.1

Stormcast. My name is Johannes Ulrich. And then I'm recording from Jacksonville, Florida.

0:14.1

Russ today in his diary is taking a look at Viper Monkey. Viper Monkey is an emulator for visual

0:20.6

basic for applications. So what it does is

0:24.5

it's Python actually, but it can be used to interpret and with that also to de-obuscate some malicious

0:32.3

visual basic code. And of course, we do see a lot of this coming across in various malicious

0:38.4

documents so if you are into reverse engineering malware if you want to get a

0:43.3

quick primer in how viper monkey works this is a diary for you to read and it looks

0:51.0

like NPM the note packet manager system dodged yet another bullet with malware being pushed via NPM packages.

1:01.5

Problem with NPM is that if you're using this ecosystem in order to develop JavaScript code,

1:07.7

which well pretty much anybody does these days in particular if you're

1:12.1

developing server-side JavaScript with Node.js, then you not only include code from various

1:19.4

libraries whenever you create new code, but this code is also automatically updated as new versions

1:25.4

are released. Now, this is one of the advantages of this

1:28.5

ecosystem that it's really easy and sort of seamless how everything works, but of course you

1:34.5

lose control over what code you actually include. In this particular case, and that has happened

1:42.1

before particular packages, developers changed. So a new developer

1:47.7

came in to the project and took it over. That of course happens quite regularly with these

1:53.4

open source projects. However, in this case, it appears that this new developer may have been

1:59.1

malicious and due to changes to dependencies

2:02.7

made by this developer, all of a sudden you ended up with encrypted code in this package

2:09.1

that then once decrypted, it did turn out to be code that steals crypto keys for

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.