Handler on Duty: Xavier Mertens
Threat Level: green
Podcast Detail
ISC StormCast for Friday, August 28th 2015
If you are not able to play the podcast using the player below: Use this direct link to the audio file: https://chrt.fm/track/2748D7/https://traffic.libsyn.com/securitypodcast/4633.mp3
My Next Class
Application Security: Securing Web Apps, APIs, and Microservices | Online | US Eastern | Jan 27th - Feb 1st 2025 |
Network Monitoring and Threat Detection In-Depth | Baltimore | Mar 3rd - Mar 8th 2025 |
Interested in Internet Storm Center stickers? Check here if there are still some available for today.
Obfuscating Malicious Word Macros Inside PDFs
https://isc.sans.edu/forums/diary/PDF+maldoc1+maldoc2/20079/
Patch For BitTorrent Traffic Amplification Bug
http://engineering.bittorrent.com/2015/08/27/drdos-udp-based-protocols-and-bittorrent/
Adobe Cold Fusion Patch
https://helpx.adobe.com/security/products/coldfusion/apsb15-21.html
Iranian Attackers Phish Google 2FA Tokens
https://citizenlab.org/2015/08/iran_two_factor_phishing/
https://isc.sans.edu/forums/diary/PDF+maldoc1+maldoc2/20079/
Patch For BitTorrent Traffic Amplification Bug
http://engineering.bittorrent.com/2015/08/27/drdos-udp-based-protocols-and-bittorrent/
Adobe Cold Fusion Patch
https://helpx.adobe.com/security/products/coldfusion/apsb15-21.html
Iranian Attackers Phish Google 2FA Tokens
https://citizenlab.org/2015/08/iran_two_factor_phishing/
Discussion
New Discussions closed for all Podcasts older than two(2) weeks
Please send your comments to our Contact Form
Application Security: Securing Web Apps, APIs, and Microservices | Online | US Eastern | Jan 27th - Feb 1st 2025 |
Network Monitoring and Threat Detection In-Depth | Baltimore | Mar 3rd - Mar 8th 2025 |
Application Security: Securing Web Apps, APIs, and Microservices | Orlando | Apr 13th - Apr 18th 2025 |
Application Security: Securing Web Apps, APIs, and Microservices | San Diego | May 5th - May 10th 2025 |
Network Monitoring and Threat Detection In-Depth | Baltimore | Jun 2nd - Jun 7th 2025 |
The article linked by SANS, in turn references a report by the Israeli company Clearskysec, which in turn references a non-existent Google cache entry from Florida's College of Arts (???). See for yourselves at page 14 of http://www.clearskysec.com/wp-content/uploads/2015/06/Thamar-Reservoir-public1.pdf (version as of today 2015-08-28).
The other "intelligence" could have been intentionally spoofed: Iranian IP addresses (botnet?), a blog in Farsi (with an English name), free Iranian hosting service (without its access logs), domain registration details (can be set/changed to anything) and lastly the phone call in Farsi... I don't always send phishing, but when I do, I always phone in my native language disclosing my nationality and leaving a voice fingerprint.
All I ask is that you please label a guess as such.