4.9 • 696 Ratings
🗓️ 26 November 2018
⏱️ 6 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
| 0:00.0 | Hello, welcome to the Monday, November 26, 2018 edition of the Sands at Storm Center's Stormcast. |
| 0:08.1 | My name is Johannes Ulrich. |
| 0:09.7 | And I'm recording from Jacksonville, Florida. |
| 0:13.6 | While many of you, like me, probably took the long weekend off. |
| 0:18.6 | Our European handlers stayed busy and published a number of interesting |
| 0:24.1 | posts over the last couple days. I want to point out one post in particular by Remko about |
| 0:31.2 | attacks against Docker APIs. Now, this is something I have mentioned before. By default, Docker doesn't actually listen |
| 0:39.7 | for network connections, but it can easily be configured to do so. If you decide to expose |
| 0:46.8 | Docker's HTTP interface on port 2375 TCP, be ready that you will be scanned. |
| 1:00.1 | And Remco is walking through an exploit attempt of Docker API. |
| 1:06.8 | The end result here is that NetHacker will be able to launch arbitrary Docker containers. |
| 1:10.1 | Of course, they're going to use this for crypto coin mining and in some cases attackers use the |
| 1:13.4 | Nkrock.io service in order to expose some of these internal servers in particular to then of |
| 1:20.8 | course have easier access to them and yes crypto coin mining certainly is still a thing among |
| 1:26.5 | attackers crypto coin prices have is still a thing among attackers. |
| 1:32.0 | Cryptocoin prices have been depreciating quite quickly lately, |
| 1:34.9 | but remember attackers, they don't pay for power, |
| 1:39.1 | so even if they get only a fraction of what they used to get in the past, |
| 1:41.9 | well, it's still worth it to them. |
| 1:51.7 | And Matthew Bing with Arbor Networks has a nice write-up about how the recent yarn vulnerability in her dupe is being exploited by botnets. |
| 1:55.8 | In particular, a Miri-like botnet apparently has zoomed in on this vulnerability and added it to its repertoire. |
| 2:03.6 | That's something we have seen with Mirai anyway where, yes, in the beginning it was just going after these simple telnet and SSH, |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.