4.9 • 696 Ratings
🗓️ 6 March 2023
⏱️ 5 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | Hello and welcome to the Monday, March 6, 2020, |
0:04.5 | edition of the Sansanet Storm Center's Stormcast. |
0:08.6 | My name is Johannes Ulrich, and today I'm recording from Jacksonville, Florida. |
0:14.5 | First big shout out to our Science Technology Institute College graduates. We had our commencement ceremony this weekend |
0:24.6 | in Washington, D.C. and, well, 313 graduates made up the glass of 2022 and about 50, 60 or so, I think, |
0:36.1 | were actually present in person at the ceremony. |
0:40.5 | So big shout out here. |
0:42.6 | Congratulations and thanks to everybody who was able to attend and sometimes traveled quite far to attend our graduation ceremony. |
0:52.6 | But well, let's talk about some current attacks. |
0:55.4 | We have a great write-up, I think, by Sysdick, |
0:58.3 | who looked into some recent attacks against Kubernetes clusters in AWS. |
1:05.1 | What happened here was that attackers first gained access to the Kubernetes cluster that were exposed to the Internet. |
1:15.3 | Yes, they installed a crypto miner, but I think that's less interesting here. |
1:19.6 | What's more interesting is that then they used the AWS instance metadata service |
1:25.9 | to actually enumerate other AWS resources and also find credentials. |
1:32.4 | That's a technique that's quite common in attacks against AWS. |
1:37.3 | We actually do have sort of an exercise for that even in SEC 522, just to illustrate the dangers of exposing these kind of services and what can happen if an attacker gains access to this. |
1:50.8 | Once they found the credentials, well, then of course they used the credentials to move laterally and then continuously gathered more information, |
1:59.9 | exfiltrated data, and also disabled logging. |
2:05.0 | I think it's also a good reminder, |
2:06.1 | and I mentioned this before in the podcast, |
2:08.9 | maybe not recently, |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.