meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Friday, March 10th, 2023

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 10 March 2023

⏱️ 6 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. Sonicwall Backdoor; WebLogic "Crypter"; Home Assistant Vuln; Fake ChatGPT

Transcript

Click on a timestamp to play from that location

0:00.0

Hello and welcome to the Friday, March 10th, 2020, edition of the Sands and at Storm Center's Stormcast. My name is Johannes Ulrich. And today I'm recording from Jacksonville, Florida.

0:14.0

Well, I think it's the third time this week, maybe the second time and not sure that I'll be talking about an attack that's more sophisticated

0:23.8

and affecting parameter security devices. This time it's Sonic Wall's turn. In particular,

0:31.5

the Sonic Wall Secure Mobile Access Appliances, and it is targeted by what Mandian attributes to a Chinese actor.

0:39.9

So these Sonic Wall appliances do run based on Linux.

0:43.8

The malware is exploiting well-known and patched vulnerability, but if you didn't apply

0:51.1

the patch, well, then it'll take over your system.

0:55.1

It comes to a former sort of simple bash scripts initially just to get sort of the infection started.

1:01.3

Also, uses very common for Unix process names that sort of fit in with what you may expect on a Linux device like Firewall D or

1:13.8

HTTPSD or IP tables. These are some of the names it's using. What I find particular

1:21.4

interesting is that it's specifically built to survive a firmware upgrade.

1:28.4

On these Sonic Wall devices, if you upgrade the firmware, there's first a file being

1:34.0

uploaded to the device, and it's placed the specific directory on a specific file name.

1:40.9

It's a SIP file that's then, of of course being expanded into the new firmware. Well,

1:46.3

the trick here that this particular bot place is that it keeps monitoring the location where

1:52.5

the new firmware image would be loaded before it's being installed. And then it unsips it and

1:59.6

adds an backdoor root account.

2:02.8

Well, it's actually using Acme as a username, but the UID and GID of Zero.

2:10.8

So with that, if the new firmware is installed, the bot will no longer be present on the system,

2:20.2

but this backdoor account can then be used to reinfect the system. Mannion just now published details about this

2:26.4

particular attack, but apparently at least some of the features of this attack go back to

2:34.7

2021.

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.