4.9 • 696 Ratings
🗓️ 1 November 2023
⏱️ 4 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | Hello, welcome to the Wednesday, November 1st, 2023 edition of the Sands and its Storms anders Stormcast. |
0:08.0 | My name is Johannes Ulrich, and I'm recording from Jacksonville, Florida. |
0:13.5 | If you're looking in the reverse analysis of malicious Python scripts on Windows, a nice post here by Xavier, looking at various anti-sand-high |
0:23.6 | sandboxing techniques that Xavier found in one particular script. This script took advantage |
0:30.6 | of the Microsoft API and it used it to check, first of all, if it's running inside a debugger, |
0:38.3 | then if there's enough physical memory available, |
0:41.1 | is there actually a user behind the keyboard and is the mouse moving, |
0:46.1 | and then, of course, if the script is spending too much time in debugger. |
0:52.2 | Interesting techniques, and of course, something that you need to be ready for if you are |
0:57.7 | reverse engineering malware and a nice list here from Xavier. So take a look at what he found. |
1:05.0 | And then we got yet another Confluence data center and server vulnerability CVE 2020ably CVE 2020-518. This one allows an |
1:16.2 | unauthenticated attacker to essentially the way the vulnerability sounds to delete data. |
1:22.8 | Since there's no authentication required, Eician does recommend that you take immediate action. |
1:30.1 | Their cloud instances, of course, are not affected here. So something to worry about if you're |
1:35.9 | still self-hosting these applications. |
1:40.0 | Let me go on to more attacks targeting developers Malbites is reporting that they have seen some malicious advertisements, |
1:49.8 | malvertisements, promising some serial keys for JetBrains PiCharm. |
1:56.3 | PiCharm is a well-respected Python integrated development environment, so it's not really a problem with Pi-Charm we're talking about here. |
2:05.2 | It's just that these malicious actors are tricking developers into installing their malicious version of the product, |
2:12.9 | which, of course, comes with a good amount of malicious add-ons. |
2:18.8 | Interestingly, they picked some random wedding planning website that is, of course, compromised |
2:24.6 | in order to place their malicious ads and then the downloads. |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.