4.9 • 696 Ratings
🗓️ 29 April 2020
⏱️ 5 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | Hello, welcome to the Wednesday, April 29th, 2020 edition of the Santernut Storm Center's |
0:06.5 | Stormcast. My name is Johannes Ulrich. And I'm recording from Jacksonville, Florida. |
0:13.6 | Today's diary is from Jan, and he is looking at some of the history of recent ancient Tesla |
0:20.4 | mal-spam campaigns. |
0:22.6 | And what he sort of sadly noticed is they haven't really changed all that much over the last year. |
0:28.8 | You probably have seen these emails to the sort of TNT shipping notification messages that then, |
0:36.6 | of course, have a suspect attachment. |
0:40.1 | Kind of always the sad thing that keeps repeating here is that it's not necessarily the new |
0:47.5 | and shiny exploits that cause all the damage. |
0:50.1 | It's all that sort of ongoing bombardment with pretty old tricks, old Malvern, that apparently still works. |
0:57.6 | So the attackers, they don't really have to work that hard to actually infect systems. |
1:04.8 | And VMware released a patch for its ESXI product, fixing stored cross-set scripting vulnerability that VMware assigned |
1:13.9 | a CVSS score of 8.3, so kind of up there and labeled as important. In order to exploit |
1:22.6 | this vulnerability and attacker would need to have access to a virtual machine running within |
1:29.4 | ESXI and they would need to be able to change a virtual machine attribute like, for example, |
1:36.8 | the host name of the virtual machine. |
1:39.7 | With cross-site scripting, it's always a little bit up to the creativity of the attacker, |
1:43.6 | how much |
1:44.3 | they'll do with it. And of course, an attacker that took over a virtual machine would potentially |
1:50.4 | be able to sort of affect the ESXI management console, which is almost kind of like a virtual |
1:57.2 | machine escape vulnerability. And the Microsoft threat protection intelligence team did publish a pretty extensive |
2:05.3 | blog post about how to reduce the risk from ransomware. |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.