meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Wednesday, April 3rd 2019

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 3 April 2019

⏱️ 5 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. LaCie Drives Spread Fake AV; Unpatched IE/Edge SOP Bug; Apache Patch; Verzion Phish

Transcript

Click on a timestamp to play from that location

0:00.0

Hello, welcome to the Wednesday, April 3rd, 2019 edition of the Sandinert Storm Center's Stormcast.

0:07.8

My name is Johannes Ulrich.

0:09.4

And I'm recording from Jacksonville, Florida.

0:14.0

Ran to some interesting spam this weekend advertising, fake licensed version for ESETs, not 32 antivirus.

0:25.6

Now, antivirus coverage for this particular malware was sort of mixed.

0:30.6

However, when I ran it on a standard Windows 10 system, Microsoft's anti-malware did pick it up right away once it started running

0:41.0

and sort of unpacking itself.

0:43.8

But what's sort of interesting is that the web servers being used in order to distribute

0:50.2

the malware, those apparently were at least in the couple instances where I've seen this

0:55.6

malware, Lassie hard drives.

0:58.4

Lassie is a maker of various USB and portable hard drives and the like, but they also make

1:04.1

some of these network storage devices where they are exposed via the internet and in this particular case the

1:13.2

FTP component on these drives was used to distribute the malware.

1:19.3

In addition to this malware the FTP directory also contained your usual

1:24.5

crypto coin miner and a couple of tools that looked like brute

1:28.9

force tools with short lists of simple passwords. Only about 10 to 20 passwords were listed. So you

1:38.8

had your standard admin admin, 1, 3, four, five and similar common passwords.

1:46.1

And that's what I assume was probably used in order to break into these Lassie network

1:53.3

drives.

1:56.6

And security researcher James Lee found interesting same origin policy violation in an explorer

2:03.2

and Microsoft Edge. Same origin policy essentially is supposed to keep different websites apart.

2:11.3

Now, there are of course many reasons why I would like to do this. In this particular case,

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.