SS-NEWS-085: Deepfake Hysteria, IIS Server Logs as C2!

Episode 85 November 07, 2022 00:29:17
SS-NEWS-085: Deepfake Hysteria, IIS Server Logs as C2!
Security Serengeti
SS-NEWS-085: Deepfake Hysteria, IIS Server Logs as C2!

Nov 07 2022 | 00:29:17

/

Show Notes

Several short stories for your consideration on this fine November day.

First, Sophos thinks we're on the hysteria part of the FUD Curve where Deepfakes are concerned, and we agree (as if our opinion mattered).  Then we discuss Bitcoin Mining Firms possibly going bankrupt.  Not really security related, but hey, it was interesting.  The Samsung is introducing Maintenance Mode for when you have to hand your phone over to be repaired!  Finally, the most interesting, the use of IIS Web Logs for command and control... this is amazing.  Unfortunately, the article didn't have a ton of information, but it's a really cool new method!

Article 1 - Phishing works so well crims won't bother with deepfakes, says Sophos chap

Article 2 - World’s largest Bitcoin mining firm Core Scientific on the verge of insolvency

Article 3 - Maintenance Mode aims to keep phone data private during repairs

Article 4 - Hackers use Microsoft IIS web server logs to control malware
Supporting Article(s):
Cranefly Cyberspy Group Spawns Unique ISS Technique

If you found this interesting or useful, please follow us on Twitter @serengetisec and subscribe and review on your favorite podcast app!

Other Episodes

Episode 123

August 21, 2023 00:44:38
Episode Cover

SS-REVW-123: Defcon and Black Hat Trip Report!

Matthew has returned from Hacker Summer Camp, full of stories and information about new technology.  So sit with us for a while, and listen...

Listen

Episode 88

December 05, 2022 00:36:00
Episode Cover

SS-RPRT-088: The Hype Cycle!

As you know, we're always looking for new and interesting reports to discuss, and this time we're discussing the Hype Cycle.  It's a report...

Listen

Episode 64

June 06, 2022 00:35:20
Episode Cover

SS-NEWS-064: Social Engineering Kill Chain Model!

In this episode, we discuss a Kill Chain-like model for Social Engineering attacks.  We were going to do two articles, but we went deep. ...

Listen