meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Thursday, December 30th, 2021

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 30 December 2021

⏱️ 4 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. Log4j Summary; MSFT Defender Log4j False Pos; T-Mobile SIM Swapping; Fisher Price Phone Flaw

Transcript

Click on a timestamp to play from that location

0:00.0

Hello, welcome to the Thursday, December 30th, 2021 edition of the Sansonet Storm Center's Stormcast.

0:07.9

My name is Johannes Ulrich, and I'm recording from Jacksonville, Florida.

0:13.0

Well, the big news today is we don't have a new version of Log 4J.

0:17.1

We are still at 217 as the latest version.

0:22.1

And just to summarize all the different versions of Log 4J, depending on what Java version

0:28.0

you are running, and also what each version is vulnerable to.

0:32.3

Russ put together a little table just summarizing the recent Log 4J activity.

0:38.3

So you may find that helpful if you're trying to explain what the purpose of each one of these upgrades is.

0:46.3

Well, somewhat related to Log 4J, Microsoft Defender for Endpoint apparently is giving you some false positives slash unclear warnings if you're running

0:57.2

Windows server 2016. So if you're seeing these possible sensor tampering in memory warnings,

1:06.4

that's likely caused by Microsoft 365 Defender scanning 4-4J processes.

1:15.6

Pleeping computer summarized some of the posts from users, also Microsoft's response.

1:20.0

Apparently they're working on a fix for this problem.

1:25.7

And T-Mobile is warning some of its customers of a potential sim-swapping attack.

1:31.5

This is when an attacker is essentially registering a new phone for your account in order to

1:37.1

then intercept messages. Sim-swapping is often sort of a one-off attack if an attacker is able to social engineer, for example,

1:46.4

a phone company in order to add that new phone to an account. But there have been instances

1:52.5

where it has happened in larger numbers. And this may be one of these instances. Sometimes this

1:58.7

involved data leaked in breaches. Sometimes it's also insiders

2:03.5

that cooperated with attackers in order to facilitate sim swapping. Not a lot of detail yet

2:11.2

from T-Mobile, but if you got one of these messages, well, that's what it's about. And yes, you should probably not use

2:19.9

SMS as a second factor for high value accounts, in particular when it comes to high value accounts,

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.