4.9 • 696 Ratings
🗓️ 31 August 2016
⏱️ 5 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | Hello, welcome to the Wednesday, August 31st, 2016 edition of the Sansonet Storms and Stormcast. |
0:08.1 | My name is Johannes. |
0:09.0 | Orrache. |
0:09.4 | And today I'm recording from Jacksonville, Florida. |
0:12.2 | I've been looking a little bit more at the lucky emails that we see a lot of recently small change here in the way they operate. |
0:22.3 | Instead of using a JavaScript file or dot.js file, it now uses a Sipped Windows script file or dot WSF. |
0:31.5 | Well, it's really the same thing. |
0:34.0 | There's a slightly different header and, course a different extension, but other than |
0:38.9 | that, the same obfuscation techniques and everything. Sadly, antivirus still does a pretty |
0:44.8 | lousy job in detecting this downloader. It then goes down and downloads the actual ransomware, |
0:53.0 | and then that ransomware will register to host once the |
0:56.9 | infection started. Sort of interesting that the registration part always appears to use an IP address, |
1:04.0 | not an host name. All of this is pretty detect. So if you're still seeing these emails in your inbox, you probably are doing |
1:13.1 | something wrong in your mail server configuration. Make sure that you can just categorically |
1:18.4 | block all Sipped script files. And if you used one login to store secure notes, well, you have |
1:26.2 | a problem. Apparently, these notes were stored in the clear at one login and one login has now been breached. |
1:35.3 | Apparently what has been happening here is something that's all too common. They do store these notes encrypted, but apparently their logs still contained notes before they got encrypted, |
1:50.0 | so those logs then got leaked. |
1:53.0 | And with that, any notes that users left between June 2nd and August 25th, apparently this covers 12 million customers. There shouldn't really be a good |
2:04.7 | reason for them to log these notes in clear text, but it's something that I have seen over and over |
2:11.3 | again with credit card numbers, with passwords, where yes, they're stored encrypted in a database or with credit card numbers. |
2:19.3 | They're being thrown away after being sent to the processor, but logs still contain that data. |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.