meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Wednesday, February 22nd, 2023

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 22 February 2023

⏱️ 5 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. Customized Phishing; FortiNAC Exploit; Apache Commons FileUpload Fix; VMWare Win Server 2022 Fix

Transcript

Click on a timestamp to play from that location

0:00.0

Hello and welcome to the Wednesday, February 22nd, 2023 edition of the Sandtonet Storms, Stormcast. My name is Johannes Ulrich and today I'm recording from Jacksonville, Florida.

0:15.7

Xavier ran into another one of these sort of customized, branded fishing pages. The trick here is that the fishing page

0:24.3

is automatically adjusted based on the email address being entered into the page. So typically

0:31.4

here, the user will receive an email a message with a link that leads to the phishing page. The link itself includes as a parameter

0:40.7

the email address of the victim and then JavaScript on the page is loading a screenshot of a webpage

0:48.9

based on the victim's email domain. So if you're for, entering sands.edu email, it will automatically pull in a screenshot

0:59.5

of the sands.edu website, use it as a background, and with that, make the entire fishing page

1:06.5

more plausible.

1:08.6

The trick how this works with only client site and JavaScript code is a service

1:13.7

called Thumb.io. It essentially creates screenshots of random webpages and easily integrates

1:22.6

with JavaScript. So there is no server site code required for this, which of course makes it very

1:29.4

easy and simple to host respective phishing pages. I believe you had a page like this also last

1:36.8

year. Xavi also explains how to de-obuscate some of the JavaScript being used in this site.

1:45.6

And earlier this week, I talked about 40Net fixing 40 or something like this,

1:51.1

vulnerabilities, one of them a critical vulnerability in 40 NAC, CVE 2020-22-39-952.

1:59.8

Well, as promised, Horizon 3 now released a deep dive into this vulnerability,

2:05.9

including a proof-of-concept exploit.

2:09.1

To make things more interesting, exploitation is pretty straightforward of the vulnerability.

2:14.7

As part of the patch, a file was removed from Fortinac

2:19.4

that allowed upload of key files.

2:22.9

But these key files were then immediately unsypped

2:26.6

without any further inspection,

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.