SS-NEWS-085: Deepfake Hysteria, IIS Server Logs as C2!

Episode 85 November 07, 2022 00:29:17
SS-NEWS-085: Deepfake Hysteria, IIS Server Logs as C2!
Security Serengeti
SS-NEWS-085: Deepfake Hysteria, IIS Server Logs as C2!

Nov 07 2022 | 00:29:17

/

Show Notes

Several short stories for your consideration on this fine November day.

First, Sophos thinks we're on the hysteria part of the FUD Curve where Deepfakes are concerned, and we agree (as if our opinion mattered).  Then we discuss Bitcoin Mining Firms possibly going bankrupt.  Not really security related, but hey, it was interesting.  The Samsung is introducing Maintenance Mode for when you have to hand your phone over to be repaired!  Finally, the most interesting, the use of IIS Web Logs for command and control... this is amazing.  Unfortunately, the article didn't have a ton of information, but it's a really cool new method!

Article 1 - Phishing works so well crims won't bother with deepfakes, says Sophos chap

Article 2 - World’s largest Bitcoin mining firm Core Scientific on the verge of insolvency

Article 3 - Maintenance Mode aims to keep phone data private during repairs

Article 4 - Hackers use Microsoft IIS web server logs to control malware
Supporting Article(s):
Cranefly Cyberspy Group Spawns Unique ISS Technique

If you found this interesting or useful, please follow us on Twitter @serengetisec and subscribe and review on your favorite podcast app!

Other Episodes

Episode 3

March 29, 2021 00:43:28
Episode Cover

SS-NEWS-03: CNA and Insider Threat

This week we discuss two articles around CNA (an insurer that provides cybersecurity insurance) taking down some of their systems, and an insider threat...

Listen

Episode 116

June 19, 2023 00:33:08
Episode Cover

SS-NEWS-116: First SOAR with Generative AI!

FINALLY!  A SOAR platform called Blink has added generative AI to the creating automations.  I'm sure this is just a step in getting there,...

Listen

Episode 146

July 16, 2024 00:35:16
Episode Cover

SS-NEWS-146 - Sysmon usable as EDR?

This week we discuss two articles - One about how the Technology Adoption Cycle applies to companies and how they acquire a new security...

Listen