meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Monday, August 28th, 2023

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 28 August 2023

⏱️ 7 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. Postgresql C2; MacOS Network Connections; Fake/Bad CVEs; Windows Cert Confusion; Bad NPM Package

Transcript

Click on a timestamp to play from that location

0:00.0

Hello, welcome to the Monday, August 28, 2023 edition of the Sandcent Storm Center's Stormcast.

0:08.5

My name is Johannes Ulrich, and I'm recording from Jacksonville, Florida.

0:15.1

Well, when it comes to covert channels, there's probably no protocol that hasn't been attempted yet at some

0:22.4

point to be used as a covert channel. I always say it's easy to find a covert channel

0:27.0

if you know what to look for. The latest example is a command control communication that

0:33.6

Xavier ran into in some malware that may have been more intended sort of as a test.

0:41.1

But what's sort of interesting and unique about this malware is that it actually uses Postgres,

0:46.9

the database, for command and control.

0:50.0

The attacker apparently set up a Postgres database, and then the Malver will base just send SQL commands back to that database in order to exchange information or look for new commands.

1:03.8

This could go undetected in a network that's using Postgres routinely.

1:09.7

Of course, even if you do use Postgres routinely, this should still raise alerts

1:15.1

because this traffic does not appear to be encrypted.

1:20.4

And database traffic, SQL traffic should never really be sent in the clear.

1:25.9

And of course, when you are looking for covert channels,

1:29.1

definitely do not stop with signatures for known covert channels, but look for anomalies.

1:37.6

And then we also got some tips for macOS users from Xavier when it comes to identifying the owner of network connections.

1:48.2

And in general, looking more in depth into network connections, well, two commands here

1:53.4

that you should keep in mind.

1:55.0

The obvious and pretty well-known one, I think, is LSOF, typically used for files, but definitely can also be used for

2:03.8

network connections. And then a second one that's not as well known nettop. Nettop as the name

2:11.3

implies is like a top for network connections, like the good old sort of command line top program, and Netop will

2:20.5

list all network connections, including associated processes, and it can be made to sort of

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.