4.9 • 696 Ratings
🗓️ 5 August 2016
⏱️ 7 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | Hello, welcome to the Friday, August 5th, 2016 edition of the Sands and its Storm Center's |
0:06.4 | Stormcast. |
0:07.4 | My name is Johannes Ulrich and the day I'm recording from Boston, Massachusetts. |
0:12.2 | In 2014, Trent Labs reported about vulnerability in Nettis routers. |
0:18.7 | Now, Nettis routers are typically only sold in China, but occasionally you can find them |
0:25.0 | in the US or other parts of the world as well. |
0:27.9 | The problem here was that exploitation of this vulnerability was rather simple. |
0:34.4 | It was just a listening UDP port, and you could send any shell command to that UDP port. |
0:41.9 | You had to prefix it with the right static password that was well known and you could essentially |
0:50.2 | execute commands. |
0:52.5 | This has been laying dormant for a while. It has been abused occasionally, |
0:58.0 | mostly in China, in areas where these routers are common. But about a week ago, we saw |
1:05.0 | a huge search in scans for the port here. It's 53,413. This port has been scanned by thousands of hosts |
1:17.6 | starting about a week ago, which indicates that since the number of sources increased at about the same rate, |
1:25.6 | the number of actual targets increased, that this is likely |
1:30.3 | a worm that will infect systems and turn them into additional scanners. |
1:36.3 | Shadow Server has been looking into this problem for a while now and has been assembling lists |
1:41.3 | of infected IP addresses in order to notify owners. |
1:47.0 | At this point, we do see about 30,000 different IP addresses |
1:52.0 | and assuming that these are infected systems, scanning for more systems to infect. |
1:59.0 | The initial exploit will just download additional binaries. The little bit odd part |
2:05.1 | is that the download uses a more or less static IP address. It's not downloading it from the |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.