meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Wednesday, October 3rd 2018

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 3 October 2018

⏱️ 5 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. Yara Rules; GhostDNS; Foxit PDF Reader Vulns; Intel ME Manufacturing Mode

Transcript

Click on a timestamp to play from that location

0:00.0

Hello, welcome to the Wednesday, October 3, 2018 edition of the Sandcent Storm Center's Stormcast.

0:08.0

My name is Johannes Ulrich, and I'm recording from Honolulu, Hawaii.

0:14.0

Yara rules are rules that were designed to essentially build sort of antivirus engines, detect Malware, and in general,

0:23.1

sort of detects various patterns in binaries. It can be quite useful to create your own

0:29.6

Yara rules occasionally. If you wonder how that works, DDA has a nice little tutorial in

0:37.1

yesterday's diary for you.

0:41.5

NetLab 360 has an interesting blog post with details about a DNS changer campaign that they have been tracking recently.

0:51.2

DNS changers typically use exploits or weak passwords to change the DNS settings

0:57.0

in routers. And a couple cases also exploits like cross-side request forging. Now, in this case,

1:04.1

it seems to be they use the former, so weak passwords and some exploits against vulnerable scripts that lead to all the occasion

1:13.6

bypass in order to update the DNS settings on these routers.

1:18.8

Now, many DNS changer campaigns really just change the DNS settings to direct victims to

1:26.2

spam and ad campaigns or to redirect, for example, Google to

1:31.3

their own search engine. In this case, it looks like the bad guys went a step further and

1:37.8

launched full fishing attacks. What it did was if a user went to a bank's website, they would redirect them via the bad DNS server to a fishing site that would then steal the victim's credentials.

1:53.0

Netlab 360 is calling this particular group Ghost DNS and they have been tracking them now for a while.

2:00.0

At this point, they appear to be focusing on routers in Brazil.

2:05.0

The 100 plus thousand routers that NetLab 360 beliefs are infected by this particular attack

2:11.8

use 70 plus different firmware and router combinations,

2:17.1

and also more than 50 domain names were redirected by this tag.

2:21.7

Again, focusing on banks, but also things like, for example, Netflix were redirected to steal credentials.

2:29.7

Your number one defense against attacks like this should be TLS. If the bank's website has TLS

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.