meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Tuesday, September 13th 2016

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 13 September 2016

⏱️ 6 minutes

🧾️ Download transcript

Summary

Daily 5 min infosec news summary. News, patches, vulnerabilities and trends in information security. Free Document Converters Add Malware; check my.cnf ownership; FDE Ransomware

Transcript

Click on a timestamp to play from that location

0:00.0

Hello, welcome to the Tuesday, September 13th, 2016 edition of the Sandstone Storm Center's Stormcast.

0:07.0

My name is Johannes Ulrich, and today I'm recording from Las Vegas, Nevada.

0:13.0

Now, we all know to be somewhat careful with results if you get back from Google in particular,

0:18.0

if you're searching, for example, for downloads for popular software.

0:24.2

Rob ran into this issue when he looked for a PDF to Doc X converter,

0:30.9

so essentially converting a PDF to a Microsoft Word file,

0:34.7

and a few of the results he got back when he looked at free converters

0:40.9

on Google actually added malware to his document. Three out of the first five converters that

0:49.8

he tried out did add exploit kits to the document that they converted from the PDF.

0:57.0

And then of course in the end all he had to do was actually open the PDF, invert and save

1:04.0

it as a Word document and he states that actually worked pretty well. He lost some of the graphics

1:10.0

but for the particular application that he had, that didn't matter.

1:15.8

So Google, for the most part, actually now got rid of a lot of the very common kind of bad links.

1:22.9

For example, when you searched for things like Adobe PDF reader downloads,

1:27.3

you used to get a lot of malware.

1:29.5

Not so much of that is happening these days, but then of course these secondary downloads

1:34.4

that people don't really do that often, they apparently still slip between the cracks.

1:42.6

One common way to trigger privilege escalation vulnerability is if a

1:48.1

less privileged user is able to modify an executable or a configuration file that's then being

1:55.9

executed by the more privileged user, the administrator. There is a newly documented issue here with MySQL.

2:05.6

Now, in MySQL, you have typically the safe MySQL process,

2:11.6

that's sort of a demon that runs as root in the background,

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.