Handler on Duty: Jesse La Grew
Threat Level: green
Podcast Detail
Petya Ransomware Decrypted
If you are not able to play the podcast using the player below: Use this direct link to the audio file: https://chrt.fm/track/2748D7/https://traffic.libsyn.com/securitypodcast/4949.mp3
My Next Class
Application Security: Securing Web Apps, APIs, and Microservices | Online | US Eastern | Jan 27th - Feb 1st 2025 |
Network Monitoring and Threat Detection In-Depth | Baltimore | Mar 3rd - Mar 8th 2025 |
Interested in Internet Storm Center stickers? Check here if there are still some available for today.
Petyz Ransomware Decrypted
https://isc.sans.edu/forums/diary/Tool+Released+to+Decrypt+Petya+Ransomware+Infected+Disks/20929/
Malware Creator Bribes Anti-Virus Vendors
http://blog.checkpoint.com/2016/04/08/qihoo-360-just-the-tip-of-the-whitelisted-malware-iceberg/
User Will Plug in USB Drives They Find In The Parking Lot
https://www.elie.net/publication/users-really-do-plug-in-usb-drives-they-find
Ruby Gems Replacement Vulnerability
http://blog.rubygems.org/2016/04/06/gem-replacement-vulnerability-and-mitigation.html
https://isc.sans.edu/forums/diary/Tool+Released+to+Decrypt+Petya+Ransomware+Infected+Disks/20929/
Malware Creator Bribes Anti-Virus Vendors
http://blog.checkpoint.com/2016/04/08/qihoo-360-just-the-tip-of-the-whitelisted-malware-iceberg/
User Will Plug in USB Drives They Find In The Parking Lot
https://www.elie.net/publication/users-really-do-plug-in-usb-drives-they-find
Ruby Gems Replacement Vulnerability
http://blog.rubygems.org/2016/04/06/gem-replacement-vulnerability-and-mitigation.html
Discussion
Poor audio starting around 1:20 through 3:00.
Posted by JDubsFL on Tue Apr 12 2016, 01:49
Warning to headphones users: the segment mentioned by JDubsFL is pretty much murder on the ears. I didn't see it coming and ow...
Sorry for the bad audio and thanks for letting me know. I just re-recorded the section and re-uploaded the MP3. Give it 15 min to refresh the cache...
I am interested in the study on USB drives -- however the statistic "estimated success rate of 45–98%" doesn't really narrow it down and makes me wonder how they came to that number. Maybe by leaving contact information on the drive? But still, why such a wide range? Presumably flash drive doesn't dial home.
-Stefan
-Stefan
New Discussions closed for all Podcasts older than two(2) weeks
Please send your comments to our Contact Form
Application Security: Securing Web Apps, APIs, and Microservices | Online | US Eastern | Jan 27th - Feb 1st 2025 |
Network Monitoring and Threat Detection In-Depth | Baltimore | Mar 3rd - Mar 8th 2025 |
Application Security: Securing Web Apps, APIs, and Microservices | Orlando | Apr 13th - Apr 18th 2025 |
Application Security: Securing Web Apps, APIs, and Microservices | San Diego | May 5th - May 10th 2025 |
Network Monitoring and Threat Detection In-Depth | Baltimore | Jun 2nd - Jun 7th 2025 |