meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Wednesday, October 24th 2018

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 24 October 2018

⏱️ 6 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. Malware Uses Decoy Picture; DoH Push Back; Signal Encryption Bug; Firefox 63

Transcript

Click on a timestamp to play from that location

0:00.0

Hello, welcome to the Wednesday, October 24, 2018 edition of the Sansonet Storm Center's Stormcast.

0:08.0

My name is Johannes Ulrich, and the I'm recording from Denver, Colorado.

0:13.0

Well, Xavier went hunting again, and in doing so, he came across some malware that uses simple base 64 encoding in order to disguise itself,

0:24.8

which apparently is sufficient to fool most antivirus tools according to Virus Total,

0:32.3

and then it used PowerShell to install additional tools.

0:37.6

Now the PowerShell script did adjust itself for various Windows versions or whatever version

0:44.2

of PowerShell was available it used.

0:47.2

And then as a random bonus, it did download an invoice from an S3 bucket to sort of fulfill its claim that it was an invoice.

0:58.4

So supposedly this is going to make the user feel safe.

1:01.5

Now, they know nothing about that invoice.

1:03.5

It's sort of a very random invoice, but they just assume someone sent that invoice to the wrong

1:09.4

recipient.

1:16.7

Also, the invoice is displayed using the PowerShell Start Process command, which will use the default image viewer, so the user will see the expected image viewer for their particular system

1:23.1

pop up to display this invoice.

1:27.3

And then there is some pushback against DNS over HDPS.

1:31.8

The pushback comes from Paul Vixie.

1:33.9

Now, Paul Vixie was part of the early development of DNS, also part of the bind name

1:41.8

server.

1:43.0

Now, his main argument is that DNS over HDPS does bypass a lot of

1:49.2

enterprise security mechanisms. Now, some people may say that this is exactly what DNS over

1:55.1

HTTP is supposed to accomplish. Now, Paul says, if you just want privacy, you can use DNS over TLS. DNS over TLS uses

2:06.3

port 853, not port 443, so it's easier blocked in an enterprise network if this protocol is not

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.