meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Friday, September 30th 2016

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 30 September 2016

⏱️ 5 minutes

🧾️ Download transcript

Summary

Daily 5 min infosec news summary. News, patches, vulnerabilities and trends in information security. #SNMP Pw0n3ge; Yahoo! Answers For Bots; Unpatched DLink Router Vuln

Transcript

Click on a timestamp to play from that location

0:00.0

Hello, welcome to the Friday, September 30th, 2016 edition of the Sandcent Storm Center's

0:06.9

Stormcast. My name is Johannes Ulrich, and the time recording from Jacksonville, Florida.

0:13.3

Sometimes it's the little things that really, you know, can cause big problems in a case that

0:19.8

Xavier is describing in his diary, it was SNMP, the simple network

0:26.2

management protocol. It's often overlooked and not configured, meaning that devices are set up

0:35.1

with default community strings that not only allow monitoring of the devices

0:40.5

and reading of values, but in many cases also changing the configuration.

0:46.7

We have already reported in the past about internet-wide scans that sort of use this in denial

0:51.9

of service attacks, but in Xavier case, it was actually

0:56.8

UPS's uninterruptible power supplies that were not configured, meaning just the default private

1:05.6

community string could be used to override configurations, including shutting down power on the UPS.

1:13.6

Usually all you need to find these issues is a regular, simple, automated vulnerability scan.

1:20.6

It doesn't really require a ton of skill equipment or money to do that.

1:26.6

But then again, even after the scan, of course,

1:30.0

you still have to go in and fix the issue.

1:34.0

And proving that any website can be used

1:36.6

as a command control channel if you do allow users to edit it,

1:40.8

Yahoo Answers has now been added to the list of websites used as a potential command

1:47.4

control channel. Palo Alto reports that they spotted a bot that used Yahoo Answers.

1:54.1

One little twist here, instead of just posting random characters, each byte value is actually translated into an English word.

2:03.6

So while the posting is still somewhat gibberish, it is at least English words and

2:09.6

doesn't really stick out as artificial as much as some of the other bot command and control channels. So pretty tricky and of course hard to block on the network level.

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.