4.9 • 696 Ratings
🗓️ 16 July 2025
⏱️ 6 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | Hello and welcome to the Wednesday, July 16th, 2025 edition of the Sands Internet Storm Centers. |
0:07.5 | Stormcast, my name is Johannes Orich, recording today from Washington, D.C. |
0:12.4 | And this episode is brought to you by the Sands.edu graduate certificate program in cyber defense operations. |
0:21.3 | Xagyi has recently been zooming in a little bit on alternate data streams, |
0:26.2 | and today in his diary he presents Yetner Find a Python script that implements a keystroke logger |
0:34.2 | and stores that data in an alternate data stream. In addition to keystroke |
0:39.9 | log data, it also adds clipboard content to the file that could then later be exfiltrated. That |
0:47.7 | exfiltration is not implemented in the script that Xavier found. It's just the collection of the data. |
0:55.9 | The file is also marked as hidden, |
0:57.9 | which I guess supposed to make it a little bit more difficult to find. |
1:00.5 | Of course, attributes like this aren't always that common, |
1:03.2 | so they could also be used as an indicator to find suspect file. |
1:07.7 | Same for alternate data streams. |
1:17.5 | All the data streams I've talked about in the past, they're being used for the zone identifier or the mark of the web. |
1:20.5 | However, otherwise not that terribly common. Well, Xavier shows a PowerShell script that you can use to easily find and extract some basic information about |
1:29.1 | alternate data stream to find potential malicious ones, or at least suspicious ones that |
1:34.7 | probably should look be closer. And Mac users, be aware, there's yet another |
1:39.6 | malvertising campaign out there trying to get you to install a malicious version of HomeProoo. |
1:46.0 | HomePro is a very popular package manager for macOS that allows you to install a lot of |
1:53.4 | great open source tools. In this particular case described by Deriv Tech, a user that attempt to Google Proo install |
2:04.5 | or install Prue and was then presented |
2:08.3 | with a malicious advertisement that directed them to |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.