meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Monday, December 27th, 2021

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 27 December 2021

⏱️ 6 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. #log4j/#log4shell and IMDS + more Crypto Miners; MSFT Vuln/Malicious Driver Reporting; Azure Source Code Leak

Transcript

Click on a timestamp to play from that location

0:00.0

Hello, welcome to the Monday, December 27, 2021 edition of the Sansonet Storm Center's Stormcast. My name is Johannes Ulrich. And then I'm recording from Jacksonville, Florida. Let's start out with a quick roundup of log for shell or log for J-related news that sort of broke over the long weekend.

0:23.4

Luckily, there wasn't really all that much new about this vulnerability.

0:28.1

Mick Douglas wrote a little post about how this vulnerability could affect the internal

0:34.7

metadata service on cloud services.

0:37.8

Most notably, if you are using, for example, an AWS virtual machine in EC2, there is a

0:45.1

metadata service exposed on an internal IP address, 169-254, 169-254, and NetHacker could connect to that metadata service via the log for J-warnability

1:00.2

and potentially retrieve allification tokens for other cloud services by the same organization.

1:08.3

This particular exploitation path was, for example, made kind of famous

1:15.5

in the Capital One breach. So certainly these metadata service is something that you need to get a

1:21.1

handle on. Make sure you're configuring them right, meaning for the latest version of the particular

1:27.4

metadata service that you are using.

1:30.9

And yeah, if you don't need them, then turn off the HTTP interface, of course, for these services.

1:37.8

They can be accessed pretty much by any code running within that particular virtual machine.

1:43.9

So this is not something that's specific to log 4J.

1:47.8

Any code execution vulnerability on the virtual machine

1:51.9

could easily be escalated to be sort of an enterprise-wide problem

1:55.8

if you don't have credentials configured correctly

1:59.4

that are being offered by these metadata services.

2:04.0

And as far as exploited hymns go, crypto miners are still at the top of the list.

2:09.3

And Renato wrote up another crypto coin miner that got caught in his honeypots.

2:17.0

You can find more details in Renato's post, including

2:21.2

indicators of compromise. Of course, all the typical indicators of compromise for crypto miners

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.