meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Wednesday, December 18th, 2024

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 18 December 2024

⏱️ 5 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. Python Installs Anydesk; Vishing, Teams and Anydesk; SS7 Attacks; CrushFTP Vuln;

Transcript

Click on a timestamp to play from that location

0:00.0

Hello and welcome to the Wednesday, December 18th,

0:03.5

2004 edition of the Sanssendet Stormsendors Stormcast.

0:08.4

My name is Johannes Ulrich and I'm recording from Washington, D.C.

0:13.8

Today we got an interesting Python script from Xavier.

0:18.6

This particular Python script not only installs NEDESC, but also

0:23.1

checks if any desk is already installed, and in that case, just adjusts the configuration. Anydesk

0:30.7

is, of course, a legitimate remote management tool, and quite often attackers prefer, of course,

0:39.6

to use tools that are used in normal business purposes, so that way they're less likely going to get flacked even better if

0:46.2

the victim already installed tool for them and therefore won't notice it at something new

0:52.1

that was installed by the malware.

0:54.7

It's no surprise that the modified configuration does permit the attacker to access the system.

1:01.2

It also adds the ability to access system while it's not attended, which is not a default

1:08.3

configuration.

1:10.1

The configuration then and additional information about the system is exfiltrated

1:15.4

to inform the attacker of the new victim.

1:20.2

And well, any desk appears to be the tool de jure for attackers.

1:24.8

There's also a story from Trent Micro related to eddesk. What's actually

1:29.4

really interesting here is the social engineering being done in order to convince the victim

1:35.0

to install the malicious software. In this case, the attacker first flooded the victim with

1:43.8

several thousand spam emails. Then they

1:47.0

contacted the victim, claiming to be associated with a supplier to the victim's company,

1:53.6

using the spam emails that the victim just received as a pretense in order to then offer

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.