meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Friday, July 6th 2018

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 6 July 2018

⏱️ 5 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. Gentoo GitHub Breach PM; World Cup Used to Trap Israeli Soldiers

Transcript

Click on a timestamp to play from that location

0:00.0

Hello, welcome to the Friday, July 6, 2018 edition of the Science Internet Storm Center's Stormcast.

0:06.9

My name is Johannes Ulrich, and today I'm recording from New York City, New York.

0:11.8

Going to be another shorter podcast today, given still the short holiday week here in the US.

0:19.8

One real nice item is that Gentoo published a very detailed

0:25.9

write-up on the incident had recently where someone took over their GitHub repository.

0:33.7

Like always with these write-ups, the great thing is that this really helps you to learn for yourself before and without you actually having an incident like this.

0:44.2

So whenever someone shares these kind of details, it's important to look at the lessons learned and make sure that you hopefully incorporate these lessons learned in your own organization

0:55.5

and hopefully avoid an incident this way.

0:59.3

The GENTOO team had some luck here in the sense that the attacker didn't really try to be stealthy.

1:04.5

The hacker modified the read-me file in the GitHub repository as very early on in the process.

1:11.6

But the hacker also tried very typical steps to retain access to the repository

1:19.6

even after they got discovered.

1:22.6

For example, they added a couple of new administrator accounts to the GitHub project.

1:28.3

They also removed some existing administrators from the project to make it more difficult to recover.

1:36.3

The root cause of all of this appears to be as so often a weak password.

1:41.3

In this case, now they don't really say exactly what the password was, but the way

1:46.4

I read their write-up is that the password was sort of guessable if you know other passwords that

1:53.2

this particular user had. So what some users do is they have sort of one common password,

1:59.6

and they just append the site name like you know

2:03.3

GitHub password or Facebook password and such so if I know that your password is you know

2:08.9

Facebook gopher then I know your GitHub password is probably GitHub gopher and that's probably

2:15.3

how they guessed the password that's at least sort of my reading of this report.

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.