4.9 • 696 Ratings
🗓️ 26 October 2021
⏱️ 5 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | Hello, welcome to the Tuesday, October 26, 2021 edition of the Sandcent Storm Center's Stormcast. |
0:08.4 | My name is Johannes Ulrich, and then I'm recording from Al-Kobar, Saudi Arabia. |
0:14.2 | Yesterday, I mentioned how the DA published a tool to decrypt the command control traffic from Cobalt Strike using leaked secret RSA keys. |
0:25.1 | The traffic is typically encrypted, but a number of secret keys that are often used by malicious |
0:32.1 | Cobalt Strike installations have been leaked, and the DDA's tool is able to use these keys to then hopefully |
0:40.6 | decrypt the traffic. Now today DDA did publish a diary walking you through how this |
0:48.1 | decry works and how to use his tool. As a sample, DDA is using a packet capture that Pratt posted, and this packet capture |
0:58.3 | does show you the complete infection chain with Cobalt's drying additional malware, so Didi |
1:04.6 | was able to demonstrate his tool, and yes, luckily, of course, that particular traffic was encrypted using one of |
1:13.8 | the leaked keys that is incorporated in DDA's tool. |
1:19.2 | And this score is an open source discussion platform or some people may call it a bulletin board |
1:26.0 | has released a critical update to patch remote code |
1:30.1 | execution vulnerability. Don't mix it up with Discord, the online chat software. This is sort of more |
1:39.2 | your good old web-based bulletin board, but still important that you patch it. |
1:45.4 | We have seen a lot of attacks against similar products in the past, |
1:49.6 | whether it's, of course, good old PHP bulletin board or some of the similar products. |
1:56.0 | Definitely patch this if you're using the software. |
1:59.3 | Technical details regarding the flaw have been made |
2:02.7 | public and exploitation probably shouldn't take much longer. And we got yet another |
2:10.5 | compromised NPM package. This time it is UA Parcer.js. The package apparently had been downloaded several million times a week and is typically |
2:22.3 | used as the name suggests to parse the user agent. |
2:27.8 | The malicious versions and there are several versions of the package that have been compromised |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.