meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Wednesday, December 4th, 2024

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 4 December 2024

⏱️ 5 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. Files in Word; Sat Receiver DDoS Agent; Veeam Vuln; CVE-2024-49039 PoC;

Transcript

Click on a timestamp to play from that location

0:00.0

Hello and welcome to the Wednesday, December 4, 2020, edition of the Sansanet Storm Service.

0:08.0

Stormcast, my name is Johannes Ulrich, and I'm recording from Jacksonville, Florida.

0:14.3

Well, I mentioned malformed work documents yesterday.

0:17.5

Today we have a diary by D.D.E.

0:20.7

Not about malformed, but about perfectly normal,

0:25.1

at least syntactically, word documents and how to analyze them if they include embedded files.

0:33.0

As I mentioned yesterday, word documents are just SIP files, and these SIP files may contain multiple components.

0:40.4

One of these components may very well be a binary.

0:44.0

Now, these executables won't execute by themselves.

0:47.5

The user has to execute them by double-clicking them.

0:51.6

So typically, an attacker would send a VIR document with some kind of

0:56.3

pretense that would trick the victim into double-clicking the icon that represents

1:02.1

the executable and in doing so starting and executing the malicious payload.

1:09.8

The tools that the DDA used are the all too familiar file magic.py as well as

1:16.6

OliDump.PyI in order to parse and dissect the Word documents payload.

1:24.9

Let me have a real odd case of a supply chain compromise coming from Korea.

1:32.5

Apparently, South Korean company manufacturing satellite receivers has been delivering receivers

1:40.7

to a particular broadcasting company that came pre-configured with a DDoS tool.

1:48.0

These DDoS tools were apparently installed on the request of this broadcasting company.

1:54.8

So the broadcasting company was not sort of here innocently just buying these receivers.

2:01.7

These appear to be more sort of TV satellite receivers the way things are written,

2:06.9

but there's very little information in the press release,

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.