meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Wednesday, November 2nd 2016

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 2 November 2016

⏱️ 6 minutes

🧾️ Download transcript

Summary

Daily 5 min infosec news summary. News, patches, vulnerabilities and trends in information security. Google Ads On Google Pushing Malware to macOS Users; Memcached Vuln

Transcript

Click on a timestamp to play from that location

0:00.0

Hello, welcome to the Wednesday, November 2, 2016 edition of the Sansanet Storm Center's Stormcast.

0:07.6

My name is Johannes Ulrich, and the day I'm recording from Jacksonville, Florida.

0:12.8

Security company Silence did discover a pretty nifty malvertising campaign that is targeting Mac OS users users what they're doing here is that they're

0:23.4

advertising actually a download for google chrome now kind of ironic that they're using

0:29.4

google ads to do so so on google's website it will display in the top location the get Google Chrome link that's actually

0:38.6

malicious and to make things worse the URL displayed below is actually the

0:44.1

legitimate Google.com slash Chrome URL turns out that when you buy ads

0:50.6

via Google that you can actually set that display URL to whatever string you would

0:57.6

like to and then redirect the user to the actual URL.

1:03.2

And apparently Google doesn't even have sort of a blacklist built in here for their own

1:09.0

URLs. Now if a user falls for this and installs the malicious application, they're then going to

1:17.1

be bombarded with ads.

1:19.3

At this point, it doesn't look like this software is doing anything but displaying ads

1:26.0

to the user.

1:27.3

The same software that's being distributed via these malvertising links also has been seen in the past, advertised as a flash player.

1:36.4

So essentially it does rely on the user willingly installing that software.

1:41.4

It's nothing that would sort of abuse an exploit in order to get itself installed

1:47.0

on the victim's machine. Now silence doesn't say anything about whether or not the binary was

1:53.1

digitally signed, but typically these binaries are signed with a valid developer signature, so the

1:59.8

result would be that the user installing this particular

2:03.8

application has no idea that anything malicious is being done here.

2:09.0

Apparently, the ad also sort of works for Windows users, but the domain the user is being

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.