meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS Stormcast Thursday Mar 27th: Classifying Malware with ML; Malicious NPM Packages; Google Chrome 0-day

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 27 March 2025

⏱️ 5 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. SANS Stormcast Thursday Mar 27th: Classifying Malware with ML; Malicious NPM Packages; Google Chrome 0-day

Transcript

Click on a timestamp to play from that location

0:00.0

Hello and welcome to the Thursday, March 27th,

0:03.3

2025 edition of the Sands and then at Storm Center's Stormcast.

0:08.7

My name is Johannes Ulrich, and today I'm recording from Jacksonville, Florida.

0:14.2

It's always great when students are able to apply what they're learning in their classes,

0:19.5

and we have a great example here from one of our undergraduate interns.

0:26.0

We can join.

0:27.1

And we did write about how to classify matter using machine learning.

0:34.6

And it's in, I think, a pretty interesting novel way.

0:38.8

Also, the diary itself that we wrote this and lots of details so really also enables you

0:46.5

to apply some of these techniques to samples and such that you may have in your

0:53.1

environment the goal of this particular work was to classify Malvern, so not to figure out is it malicious or not so much as to what type of malvern it is.

1:05.0

And that's, of course, with these underrated interns, as part of the internship, they're looking at honeypot data you end up

1:11.6

with a ton of malware there and the difficult part is sometimes how to sort of triage it and

1:18.8

deal just with the sheer volume of data so this particular model was then able to distinguish between

1:26.1

like simple troppers download downloaders, backdoors,

1:29.7

ransomware, throchins, viruses, and worms, also information stealers, was another category

1:36.1

that we looked at. And well, it worked actually really well with detection sort of in the 90% correct range. Of course

1:46.3

there are always a piece of malware that may be somewhat in between and well again lots of

1:51.5

details here in the diary if you're interested in these type of techniques. I think really

1:57.4

educational piece and very thorough the work being done here.

2:03.6

And imagine that we still have malicious packages. NPM packages in particular, and there is a

2:09.6

good new blog post by Lugia Valentic with reversing labs. She looked into the Ether's provider two packages, which was recently

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.