meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Friday, April 23rd, 2021

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 23 April 2021

⏱️ 6 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. Docker and grype; SolarWinds Update; Cellebrite Exploit

Transcript

Click on a timestamp to play from that location

0:00.0

Hello, welcome to the Friday, April 23rd, 2021 edition of the Santer at Storm Center's Stormcast.

0:08.3

My name is Johannes Ulrich, and today I'm recording from Jacksonville, Florida.

0:14.0

We're using Docker containers as well, who doesn't these days?

0:18.7

We have a quick diary by Xavier today, introducing a quick tool that allows

0:23.8

you to check if your Docker image is suffering from any known vulnerabilities or back

0:32.2

doors. There's sort of two big problems when it comes to Docker containers. First

0:37.0

of all, they may just be out of

0:39.6

date and contain vulnerable software, but sometimes they also come with additional goodies,

0:45.9

kind of these certified pre-poned Docker containers. So the tool that Xavier is talking about here, GRIP, should be able to help you identify at least some of these issues.

1:00.9

Take a look at his diary. It's a pretty straightforward tool.

1:06.5

And Risk IQ did some data harvesting to look for additional parts of the attack infrastructure

1:13.1

used in the Solar Winds event, and they were successful identifying a couple additional

1:20.3

domains that may be associated with the same attack group. Now, they based this on really two

1:27.4

pieces of evidence. First of all,

1:29.9

the time frame in which the certificates were issued, that's somewhat unique to solar winds.

1:36.5

However, of course, there were a large number of certificates associated with that particular

1:42.7

time frame and the certificate authorityior authority that the SolarWinds

1:47.4

attackers used. Next, they narrowed down the list by looking at specific patterns coming back

1:55.3

from these web servers and limiting those two patterns that matched known patterns from existing infrastructure

2:05.4

used by this attacker. Doing so, they were able to narrow down to a total of 10 new domains,

2:14.0

and additional information is published by Risk IQ as part of their threat portal.

2:22.1

So given that they narrowed it down quite well, it may be worthwhile to take a quick look

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.