Threat Level: green Handler on Duty: Johannes Ullrich

SANS ISC: Locky Back Via Fake Fonts; Asterisk RTPBleed; Arris AT&T Backdoor - SANS Internet Storm Center Locky Back Via Fake Fonts; Asterisk RTPBleed; Arris AT&T Backdoor


Sign Up for Free!   Forgot Password?
Log In or Sign Up for Free!
podcast logo

ISC StormCast for Tuesday, September 5th 2017

A daily summary of cyber security news from the SANS Internet Storm Center
Author:Johannes B. Ullrich, Ph.D.
See below for a schedule of classes I teach.
Created: Tuesday, September 5th 2017
Length: 6:18 minutes
Today's Headline: Locky Back Via Fake Fonts; Asterisk RTPBleed; Arris AT&T Backdoor

If you like this podcast, then please consider telling others about it. Use this button to Tweet about this episode: click here. Errors? Corrections? Complaints? Player Problems? Please let us know here: https://isc.sans.edu/contact.html

Plain HTML5 Player
Fancy Player (with skip back/forward)

Show Notes

Locky Ransom Ware is Back and This Time Pretents to Be a Font
https://isc.sans.edu/forums/diary/Malspam+pushing+Locky+ransomware+tries+HoeflerText+notifications+for+Chrome+and+FireFox/22776/

When is a PDF Just a PDF?
https://isc.sans.edu/forums/diary/It+is+a+resume+Part+1/22780/

Asterisk Vulnerable to RTPBleed
https://github.com/EnableSecurity/advisories/tree/master/ES2017-04-asterisk-rtp-bleed

Arris AT&T Modems With Backdoor
https://www.nomotion.net/blog/sharknatto/

Discussion

New Discussions closed for all Podcasts older than two(2) weeks
Please send your comments to our Contact Form

Interested in attending one of my classes? See below for my current schedule.

IPv6 EssentialsWashingtonDec 12th - Dec 13th 2017
Defending Web Applications Security EssentialsWashingtonDec 14th - Dec 19th 2017