4.9 • 696 Ratings
🗓️ 21 August 2018
⏱️ 5 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | Hello, welcome to the Wednesday, August 22nd, 2018 edition of the Sandcent Storm Center's Stormcast. |
0:08.0 | My name is Johannes Ulrich, and I'm recording from Stockholm, Germany. |
0:12.0 | Xavier today took a look at another malware sample that used Auto-It to bypass many controls that typically protect you from installing and running malware. |
0:23.6 | Auto IT is a quite popular scripting language to automate various tasks, so it is not malware, |
0:31.6 | and it is not recognized, of course, as such, by your anti-malware systems. |
0:37.8 | But in this case, Auto IT is then used to download a DLL that is then actually used to conduct |
0:45.2 | a number of malicious operations on your systems. |
0:49.0 | When Xavier first came across it, it was not recognized at all by any of the scanners that are supported by |
0:56.6 | virus total. But since then, it looks like the antivirus community has caught up somewhat, |
1:02.9 | and most will recognize it now as malicious. The scripts involved were obfuscated or even |
1:09.4 | encrypted, and Xavier goes over some techniques used to reverse them, |
1:14.6 | so he was able to figure out what this final DLL was that was downloaded by this malware. |
1:21.6 | And if you are using the proxy traffic in order to load balance traffic between containers |
1:30.5 | like Docker and the like, well, it's time to update. |
1:34.7 | And this is a very urgent update because traffic did include an API that was not authenticated |
1:42.1 | and leaked the private key that you're using for TLS connections. |
1:47.0 | A fix was released on Monday, but of course there are already scans underway to look for vulnerable servers. |
1:55.0 | Apparently the onion was protected by a vulnerable traffic server and its private key was already leaked to the public. |
2:04.6 | Now, once an attacker obtains your private key, they are typically not able to decrypt any |
2:10.2 | traffic that they collected beforehand or they collect just passively because of DeVie Helman, |
2:16.6 | which is used most of the time in modern |
2:18.8 | browsers, which doesn't allow you to decrypt the traffic just by knowing the server's |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.