meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Tuesday, September 11th 2018

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 10 September 2018

⏱️ 5 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. Malicious LNK File Tricks; Trend Micro Apps Removed from Apple App Store

Transcript

Click on a timestamp to play from that location

0:00.0

Hello, welcome to the Tuesday, September 11th, 2018 edition of the Sansanet Storm Center's

0:07.0

Stormcast. My name is Johannes Ulrich and if I'm recording from Jacksonville, Florida.

0:14.0

It's always great if we get malware samples from readers and listeners. The latest one we got wasn't so far remarkable in that

0:24.2

the reader noticed that the PowerShell script that sort of started it all did search for two

0:31.2

very specific strings. These two strings, Dikona and Clyrod 3, were used to extract malware from a link file.

0:42.2

Now, the way this worked is that the attacker used the find string command.

0:46.8

That's essentially your crap for Windows.

0:49.9

And then the link file included additional data at the end of the proper link file that then

0:56.7

turned out to be the malware after it was extracted using the find string command.

1:02.8

It appears that this trick does fool some anti-malver because it only scans the proper link

1:09.8

file and nothing then beyond the end of

1:12.9

this file or what it considers the end of the file.

1:17.9

And we have another reason why blacklists don't work.

1:22.0

Apparently the Tor browser, which still includes the old style NoScriptScript plugin can be tricked into executing arbitrary

1:31.0

JavaScript just by using a somewhat malformed content type adder. If you're using text slash

1:37.8

HTML semicolon slash JSON, then JavaScript is being executed even if no script is in its strict security setting

1:47.6

that's supposed to prevent any JavaScript from running.

1:52.5

This only worked in the old Torprowser 7, not in the current version Torprowser 8,

1:58.2

and with auto update, you're probably not going to get exposed to the old

2:03.6

version of Tor browser. I think it was yesterday that talked about AdWare Doctor, which

2:11.0

was somewhat suspect software that was removed from the App Store after it turned out that it leaked users' browser

2:19.5

history. Well, turns out that advert doctor wasn't alone and that shouldn't really be a big

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.