4.9 • 696 Ratings
🗓️ 7 February 2025
⏱️ 6 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | Hello and welcome to the Friday, February 7th, 2025 edition of the Sands Internet Storm Center's Stormcast. |
0:12.1 | My name is Johannes Ulrich, and I'm recording from Jacksonville, Florida. |
0:17.1 | And Xavier today wrote up an interesting anti-debugging system that he found in a Python script. |
0:22.7 | It is labeling itself as a multilayer anti-debugging system, actually an unbreakable multi-layer |
0:30.3 | anti-debugging system. |
0:32.4 | It's implemented in various threats that run in parallel, that in itself, of course, makes it a bit more difficult |
0:38.9 | to figure out what's going on here and to disrupt these anti-debugging techniques. Some of them |
0:46.2 | are sort of well known, for example, checks if the program is being traced, but also have some |
0:52.3 | interesting things, for example, overwrite the file itself with randomized lines in order to prevent hashing. |
0:59.5 | It also does calculate a checksum of its memory footprint ever so often to detect |
1:06.9 | tampering. Interesting techniques here, of course they can all get bypassed, in particular |
1:12.9 | in something like a Python script where it's not that difficult to go into the file and make |
1:18.2 | changes to the file, like for example, to disable some of these techniques. And Xavier is going |
1:25.2 | over some of the other sort of interesting techniques here as well. |
1:28.3 | There are about a dozen or so techniques in total that are being employed by this single piece of matter. |
1:36.3 | When it comes to remote management tools, it's often a fine line between which tools are malicious and which tools are beneficial for an organization. |
1:46.1 | And that line is usually not defined by the tool that's being used, but by who is actually |
1:51.3 | using the tool. We often see, well, most famously, tools like VNC and RDP being used by attackers |
1:59.1 | in order to remote control compromised systems. |
2:02.9 | Silent Push has a good little update on how Screen Connect is currently being used. |
2:09.1 | Again, a legitimate tool that's often used by administrators to remote-manage systems, |
2:15.2 | but is also used by attackers, and Silent Push is listing some of the |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.