4.9 • 696 Ratings
🗓️ 23 August 2023
⏱️ 6 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | Hello, welcome to the Wednesday, August 23rd, 2003 edition of the Sansonet Stormontas Stormcast. |
0:08.2 | My name is Johannes Ulrich. |
0:09.9 | And today I'm recording from Jacksonville, Florida. |
0:14.1 | Exxavier found some interesting, different malware using new or relatively new, at least for |
0:20.1 | Malver, a encryption algorithm called new at least for Malver, |
0:24.3 | a encryption algorithm called Furnay encryption. |
0:26.8 | Furnay encryption has been around for a while. |
0:32.6 | 2016 is the last day the actual Python module was updated for it, |
0:39.6 | but Xavier has observed that in recent month there's a little uptick in the use of this algorithm in Malver. Big question, of course, why is Malver attracted to the algorithm? There is no sort of obvious |
0:46.0 | reason when it comes to usability. You actually, as Xavier shows, have to specifically install |
0:51.6 | the respective Python module for Windows Python. |
0:56.9 | The reason maybe in my opinion kind of that since it's a somewhat unusual algorithm, |
1:03.4 | it may evade some of the detection that you sometimes find in antimatter |
1:08.2 | that attempts to detect encryption, in particular if it's trying |
1:13.4 | to sort of disrupt ransomware. Not really clear if that's the reason, or maybe it's just |
1:19.0 | a simple to use algorithm. There's also no real good review that I could see for this particular |
1:25.7 | algorithm to kind of figure out if it's any good. |
1:29.5 | But for cases like this for Malware, it often isn't really all that important, how good it is |
1:35.7 | as far as the security of the encryption goes, but more, well, how difficult it is to detect |
1:42.4 | that files are being encrypted or decrypted. |
1:45.0 | It's a simple symmetric algorithm which also makes it really not that suitable for ransomware in a sense that, well, the keys delivered as part of the malicious binary. |
1:55.7 | So really more maybe to transmit some encrypted binaries and then decrypted on the victim to evade |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.