meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Friday, May 1st 2020

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 1 May 2020

⏱️ 7 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. IOCs from IMAP; Zyxel 0Day Bot; Salt Vuln; Mac Sandbox Escape

Transcript

Click on a timestamp to play from that location

0:00.0

Hello, welcome to the Friday, May 1st, 2020 edition of the Sandtonet Storm Center's Stormcast.

0:07.0

My name is Johannes Ulrich, and I'm recording from Jacksonville, Florida.

0:13.1

Well, we actually got two interesting diaries today to talk about one by Xavier about how to harvest your IMAP inbox for indicators of compromise.

0:24.9

Use case here is, for example, if you are subscribing to a number of security mailing list,

0:30.5

you may have lots of emails that, for example, have lists of IP addresses or domain names.

0:36.6

Similar, if you direct all of your spam to an inbox

0:41.2

like this, then any URLs, for example, that are mentioned in spam could be used as indicators

0:47.7

of compromise or, for example, in block lists. All it takes is a Docker image that Xavier came up with and he published

0:57.4

the Docker file as part of his diary that will help you set up a Docker image that will

1:04.4

grab the email via IMAP, parse it, extract any in the case of compromise, but also include things like the from and the

1:12.9

subject, and create a JSON file that then can readily, for example, be imported into Elastic

1:20.2

Search. Pretty neat, a little setup, so probably some of you may find this helpful.

1:27.8

And Jim noticed that about a week ago we had a sudden jump-in reports for attacks against Port 9,673.

1:38.1

Of course, this is not necessarily a port that sort of rings a bell.

1:41.6

Well, some searches did lead Jim to a psych cell Saturday of vulnerability that was published

1:49.4

last month, and it looks like the bad guys are fully starting to exploit it now.

1:55.7

The vulnerability is a pretty straightforward command injection vulnerability via the accept language header, so you'll

2:03.0

find a simple shell script there that will then typically download additional malware

2:08.6

and execute it.

2:10.5

Radware did identify this as the hoax calls denial of service botnet, probably also others that are being distributed via this

2:20.1

method.

2:21.3

The botnet doing the scanning doesn't really look that super large.

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.