meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Monday, June 12th 2017

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 12 June 2017

⏱️ 6 minutes

🧾️ Download transcript

Summary

Daily 5 min infosec news summary. News, patches, vulnerabilities and trends in information and cyber security. SAMBA Vuln. Exploited;

Transcript

Click on a timestamp to play from that location

0:00.0

Hello, welcome to the Monday, June 12th, 2017 edition of the Sands and Storm Center's Stormcast. My name is Johannes Ulrich and the

0:08.4

I'm recording from Washington, D.C. According to Kerspersky, the recent Samba remote code execution vulnerability

0:17.1

is being exploited in order to install Bitcoin miners on vulnerable devices.

0:24.5

Now, this vulnerability has often been compared to the Eternal Blue or Wanna Cry vulnerability

0:30.5

that, of course, affected Windows SMB.

0:34.4

In this particular case, however, the attacker first does need to be able to log into the

0:40.3

system and does need to be able to upload a file to the system. So while there are hundreds of

0:47.1

thousands of Samba systems that are exposed to the internet, only few of them are actually exploitable, and Kaspersky detected

0:58.0

this exploit in a honeypot that was specifically set up to be vulnerable. And Microsoft is

1:05.5

reporting about an interesting covert channel that it found. It was used as part of an advanced hacking campaign

1:13.5

that Microsoft calls Platinum. Now, in this particular case, the Malaver used Intel's active

1:21.7

management technology or AMT in order to communicate with other systems on the network.

1:28.8

Now, AMT was recently in the news due to a vulnerability.

1:33.1

This is not related at all to this vulnerability.

1:35.9

The attacker here was really just taking advantage of this particular feature and using it as

1:41.7

a covert channel.

1:43.4

Again, the protocol they're using here is serial

1:46.1

over LAN. And of course, since AMT is its own little system, it does work even if the system

1:54.2

is powered down and it's not restricted or monitored by the operating system. So, for example, host-based firewalls will not block this communication.

2:06.7

Now Microsoft does go into some detail in how this particular covert channel is implemented,

2:13.1

and also how to detect any software running on a system that is using AMT.

2:20.3

So this particular cover channel is something you would find on a system that's already thoroughly compromised.

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.