4.9 • 696 Ratings
🗓️ 8 April 2021
⏱️ 7 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | Hello, welcome to the Thursday, April 8, 2021 edition of the Sansonet Storm Center's Stormcast. |
0:08.2 | My name is Johannes Ulrich, and I'm recording from Jacksonville, Florida. |
0:13.6 | Today I wrote a quick post about how Wi-Fi IDss are affected by recent changes in Android and iOS that are randomizing Mac addresses. |
0:25.6 | And I used Enzyme, which is an open source Wi-Fi IDS that I kind of like for its neat |
0:32.9 | sort of dashboard and such it presents to show some of the problems that are coming up. As these devices |
0:40.2 | are creating these random Mac addresses, and that of course then triggers some false positives |
0:46.8 | if you're trying to track legit or not legit devices in your environment. And remember, it was about a week or so ago that the |
0:58.8 | PHP Git repository was compromised and the attacker added a couple of malicious commits that |
1:08.5 | intended to inject a backdoor into the Git source code. At the time, |
1:15.0 | the assumption was that this particular server that housed git.php.net was compromised. The repository |
1:24.9 | was moved to GitHub in order to essentially just move away from this possible, vulnerable and compromised server. |
1:35.9 | But as so often, well, it looks like whatever you find out in the first 24 hours is often wrong. |
1:42.5 | We now have an update from Nikita at php.net with additional details. |
1:49.2 | They no longer think that the server was compromised. |
1:52.4 | They actually now have some evidence that the attacker did manage to log in using the administrator's username and password. |
2:01.6 | This was initially not clear that it's even possible |
2:04.6 | because commits were supposed to use ZH, |
2:07.6 | but apparently there is still an HTTP path open |
2:12.6 | in order to send commits and that apparently was used by the attacker. |
2:20.3 | Now what's a little bit odd here is that the attacker used a couple of attempts in order to log in. |
2:27.3 | Now Nikita here writes that they believe that a database that they call master.p.net was compromised because this ran on a very old system, |
2:37.8 | apparently not even supporting TLS 1.2. But if an attacker has access to the password database, |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.