4.9 • 696 Ratings
🗓️ 20 May 2025
⏱️ 7 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | Hello and welcome to the Tuesday, May 20th, 2025 edition of the Sands and at Storm Center's Stormcast. My name is Johannes Ulrich. And this episode brought you by the Sands IDU Graduate Certificate Program in Cybersecurity Leadership was recorded in Jacksonville, Florida. |
0:25.9 | In today's diary, we got Xavier taking apart a remote access tool. |
0:31.6 | This remote access tool starts out with scripts written in Auto-It. |
0:34.3 | This is something that keeps coming up. |
0:39.0 | It's not a new technique at all, but something I think that's often overlooked. Auto IT is a language designed to, well, rollout configurations, remote-managed machines, |
0:45.6 | and that's exactly what the bad guys take advantage of here. In particular, since these scripts |
0:51.4 | can also be compiled into self-contained executables, not requiring the victim |
0:57.2 | to already have auto-it installed. In the past, of course, we have seen a couple of examples |
1:02.5 | where the actor would also install auto-it on the system for the victim, but that's not the case here |
1:10.5 | with what Xavier saw. |
1:13.0 | It also enables some simple persistence by adding itself as a startup item, and then essentially |
1:19.5 | connects to a remote control server, some command control server that luckily is no longer |
1:26.7 | accessible. |
1:28.1 | From a defensive point of view, you probably don't want to outright block Auto IT |
1:32.6 | because it is a useful tool unless you're not using it in your environment. |
1:38.5 | And other than that, well, it comes back to downloading executables, letting users execute random executables. |
1:45.7 | Never a good idea. |
1:47.8 | And last week I talked about the unfortunate incident around RV tools, the VMware |
1:54.1 | Analysis Toolset, well, there was some confusion whether or not it was actually just |
2:00.0 | malicious version downloaded from some other random site or whether the actual RV Tools website was compromised. |
2:08.8 | We now got confirmation from rawfair.net, the entity behind RVTools, that yes, their website was compromised and the website is currently shut down. |
2:22.7 | Now, in different news, we have a similar incident around KeyPass, but in this case, it's not that |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.