4.9 • 696 Ratings
🗓️ 31 October 2018
⏱️ 5 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
| 0:00.0 | Hello, welcome to the Wednesday, October 31st, 2018 edition of the Sandcent Storm Center's Stormcast. |
| 0:08.7 | My name is Johannes Ulrich, and I'm recording from Jacksonville, Florida. |
| 0:15.1 | Brad today wrote a diary about some of the changes that he has seen in the Hankitor Malspam. |
| 0:22.6 | Hangator, also known as Chanitor or Tor doll, has been around for a while and it usually |
| 0:29.6 | uses vert macros to install malware. |
| 0:32.6 | What Brad is seeing is a shift in the malware being installed. |
| 0:38.3 | Until recently the macros installed the Sous Panda banking malware on disk and in addition |
| 0:46.3 | run Pony malware in RAM. Initially the document just stopped sending Sous, so it just stuck with the in-ram |
| 0:57.0 | component, which was still a pony. |
| 1:00.1 | But over the last few days, it looks like Sue's Panda has been replaced by U.R. sniff. |
| 1:07.0 | Your sniff is typically an info stealer, but it can also intercept web traffic, which |
| 1:13.7 | is white sometimes used as banking matter just like Seuss. |
| 1:21.4 | Then of course you probably heard about Apple having a major media event today announcing |
| 1:26.4 | new hardware, but that's not the only |
| 1:29.6 | thing we got from Apple today. |
| 1:31.9 | Apple also released updates for its more popular products, fixing a number of security |
| 1:38.3 | vulnerabilities. |
| 1:39.4 | As often for Apple, vulnerabilities may apply to various operating systems and products. One interesting |
| 1:47.2 | issue is a vulnerability in FaceTime. This vulnerability can be used to execute arbitrary code |
| 1:54.1 | at the recipient's system. It can also leak memory. So what could happen here is that an attacker is calling you via FaceTime and uses the call |
| 2:05.7 | to actually steal memory content from your system. |
| 2:10.9 | Apple also fixed a problem with IPSEC that does affect several of its operating systems. |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.