4.9 • 696 Ratings
🗓️ 25 July 2018
⏱️ 5 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | Hello, welcome to the Wednesday, July 25th, 2018 edition of the Sanctal Storm Center's Stormcast. My name is Johannes Ulrich and I'm recording from Jacksonville, Florida. |
0:12.4 | We haven't really seen a lot of posts this year talking about malicious spam in part because it hasn't really been all that common as it used to, |
0:23.6 | but one Malware family that's still going strong is Emotet and Brad as a reminder has |
0:30.6 | a recent sample that he is discussing in his latest diary post. As usual, you get plenty of indicators of compromise, |
0:40.7 | as well as packet captures that of course you can use to train your own analysis skills. In this |
0:47.1 | particular case, the malicious document was a Word document, and yes, the user has to enable macros in order to be infected. |
0:57.0 | Now Emothead of course is just the spreader or drop or whatever you want to call essentially |
1:03.0 | a part that will then download additional malware. In Brad's case this was the good old Seuss Panda Banker matter. |
1:13.6 | Well, and today's your lucky day we have a second diary that's dealing with packet captures. |
1:20.6 | The second one is by Tom and he's talking about cell phone tracker software that is created by cell phone trackers.co. |
1:30.4 | Now, this is sort of software that you would install on a cell phone in order to spy on whoever |
1:36.7 | is using the particular cell phone. |
1:39.9 | The sad part here is not just how much spying you can do with the software, but also that |
1:46.0 | all the data is exfiltrated in the clear. |
1:49.6 | So no HDPS and it goes way beyond the standards of GPS tracking. |
1:56.9 | It does, for example, record phone calls and then exfiltrate the audio files again without |
2:04.5 | any encryption. |
2:05.5 | Now, I'm not sure why anybody really would have a legitimate reason to install tracking software |
2:11.8 | that's that invasive. |
2:13.7 | Usually you have things like, for example, family tracking or such that typically evolves |
2:20.2 | around GPS tracking and typically requires that the owner of the phone agrees to being tracked. |
2:28.3 | And CERTCC released a coordinated vulnerability announcement that does affect most common Bluetooth implementations. |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.