4.9 • 696 Ratings
🗓️ 8 May 2025
⏱️ 6 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | Hello and welcome to the Thursday, May 8th, 2025 edition of the Sands Internet Storm Center's Stormcast. |
0:08.1 | My name is Johannes Ulrich, and today I'm recording from San Diego, California. |
0:13.8 | Today's diary comes from Xavier, and Xavier takes a look at an interesting piece of matter. |
0:19.6 | This matter is written in dot net, not Python, for a change, |
0:23.9 | and it is thinked itself by being very modular. Now, the way the modularity is implemented is |
0:31.3 | if a particular feature is needed, the particular module a DLL file is loaded from GitHub, and then installed on the system. |
0:41.6 | Some of these modules, for example, can install a root kit. There is a token grabber module. |
0:47.5 | There also is a password stealer, and then the one module that Xadri looks at a little bit closer |
0:53.7 | is implementing some webcam functionality. |
0:57.6 | The advantage of malware like this is that the initial download, first of all, is smaller and is also less likely going to trigger alerts because it doesn't contain any code that indicates that it may act malicious. |
1:11.4 | That's only then added again later on demand. |
1:15.4 | And since this malware is reasonably simple built, it's not obvious gated, |
1:19.9 | it makes it a great sort of little learning tool in order to better understand how malware works. |
1:26.7 | Let me have an interesting vulnerability to talk about again from sort of friends of the show |
1:32.3 | Watchtower. This vulnerability affects CIS aid. CIS aid is an IT service management platform, |
1:40.0 | so it allows you to let help desk tickets, inventory, and various other sort of IT management tasks. |
1:47.2 | Of course, software like this is always in the crosshairs of ransomware gangs, |
1:53.0 | given that they're also often used by outsourced IT management companies |
1:57.3 | that would give an actor access to multiple entities using one compromised |
2:03.6 | CIS aid instance. |
2:05.6 | Now the vulnerabilities here start out with XML external entity vulnerabilities. |
2:12.6 | It's a little bit weird vulnerability if you're not familiar with XML. |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.