4.9 • 696 Ratings
🗓️ 5 August 2021
⏱️ 6 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | Hello, welcome to the Thursday, August 5, 2021 edition of the Sansonet Storm Center's Stormcast. |
0:07.9 | My name is Johannes Ulrich, and I'm recording from Stockholm, Germany. |
0:13.5 | Really interesting fishing site that Ye Jing came across and, well, he actually managed to find this fishing site while investigating |
0:23.3 | an online banking fishing site that hit a bank in Singapore. |
0:30.1 | But while that fishing site was done instead after pivoting through some of the IP addresses, |
0:36.0 | Yi Jing did find a fishing site impersonating the UN Peace Corp website. |
0:45.4 | This fishing website apparently was collecting data about UN peacekeeping personnel. |
0:52.4 | The reason that I Ching thinks that it is a fishing site is that |
0:58.3 | it is very close to the official US peacekeeping site, but it has the additional feature to allow |
1:06.3 | users to search by tracking IDs, essentially personnel IDs that are apparently being collected here. |
1:14.6 | Now, we don't know the phishing email what that looked like. |
1:17.6 | And of course, there's still a small chance that this is some kind of development site or so |
1:22.6 | that just happened to use that particular host and that IP address and was left open to the public. |
1:32.6 | And then we have yet more vulnerability in OT, meaning operation technology-centric TCP IP stack. |
1:41.5 | The team reached us from JFrog and Forscout, that's the same team that looked at similar |
1:48.0 | stacks and found for vulnerabilities in the past, now looked at niche stack. |
1:53.0 | Nech stack is, well, not necessarily just used for niche devices, used by 200 different device |
1:59.0 | vendors that basically use this TCPIP-IP stack preferably for these |
2:04.6 | operational technology devices that you find on factory floors in power plants and the like, |
2:11.6 | and they found 14 different vulnerabilities. |
2:14.6 | One of them they rated with a CVSS score of 9.8 because it does likely |
2:21.2 | allow remote code execution. Also a second one that's also a buffer overflow in HEPP |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.