meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Monday, October 3rd 2016

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 3 October 2016

⏱️ 6 minutes

🧾️ Download transcript

Summary

Daily 5 min infosec news summary. News, patches, vulnerabilities and trends in information security. DVR Exploit Analysis; Odd User-Agent From Word Exploit;

Transcript

Click on a timestamp to play from that location

0:00.0

Hello, welcome to the Monday, October 3, 2016 edition of the Sansanet Storm Center's Stormcast.

0:07.6

My name is Johannes Ulrich, and I'm recording from Honolulu, Hawaii.

0:11.5

Just published a quick summary of some of the attacks we are currently seeing against DVRs,

0:17.3

given all the emphasis in the last week about denial of service attacks against DVRs.

0:23.6

Nothing really all that great and new about it.

0:26.6

They're still using standard default passwords accessing the DVR via Telnet and getting in that way.

0:35.6

Not just actually Port 23, also port 2323 is being scanned by these bots.

0:43.8

Probably looking for a couple of DVRs that's listening on off ports. The big problem here are of course home users, not so much enterprise networks, but it's the small networks that

0:56.0

of course don't have a lot of controls. So really things like IDS signatures and such,

1:00.9

don't really make a lot of sense for this kind of threat. Probably best if you're worried about

1:07.0

this to scan your network yourself, figuring out if you have any telnet servers that

1:12.1

you didn't expect in many cases, it's not obvious from the GUI that you have with your DVR

1:20.2

that it has a telnet server listening. So that can be somewhat deceiving. And also, we're talking

1:26.9

here about security camera DVRs,

1:29.9

not the ones that you typically use to record TV shows.

1:34.1

These DVRs are often exposed to remote monitor these DVRs or the security video images.

1:43.6

So that's usually how the Telnet server gets exposed.

1:48.7

The DVR itself often uses also UPNP to auto-configure firewalls.

1:55.1

And of course, on that note, it's also not just these DVRs, it's also cameras themselves

2:00.8

if they do have an IP address.

2:03.6

Nk Xavier wrote up the latest malicious Word file that he came across.

2:08.6

This one sort of attracted his attention because it did use a URL in the user agent,

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.