meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Thursday, January 11th, 2024

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 11 January 2024

⏱️ 5 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. Jenkins Scans; Ivanti VPN Exploited; Zoom Update; Hadoop Attacks; infosec toolshed

Transcript

Click on a timestamp to play from that location

0:00.0

Hello and welcome to the Thursday, January 11th, 2024 edition of the Santonet Storms anders Stormcast.

0:08.2

My name is Johannes Ulrich and I'm recording from Jacksonville, Florida.

0:14.0

Well, it's also a little bit sort of the post-patch Tuesday catch-up.

0:18.0

So we do have one diary here left to talk about, and these are scans

0:22.6

for Jenkins, in particular for the J-A's GI Security Check URL, which is typically used to

0:30.3

verify usernames and passwords, or essentially your login page.

0:35.3

Seeing a marked increase in scans for this particular URL, in particular from one IP address,

0:43.0

a Chinese IP address.

0:44.9

What makes it sort of interesting as far as attribution goes, usually shouldn't just go by

0:50.2

the IP address, but also part of the data being submitted. In particular, the submit

0:57.5

value is the Chinese word for login. So likely the request that's being used here and being

1:04.5

replayed was captured from a Chinese instance of Jenkins. The usernames and passwords being submitted are pretty trivial.

1:13.6

Actually, many of the passwords are just empty,

1:15.6

so I suggest that these attempts are really just more looking for vulnerable instances

1:21.6

and not so much actively trying to find working usernames and passwords.

1:29.6

And then Ivanti is in the news again this time for a change, not for its mobile device management software.

1:36.4

They have other buggy software to sell you.

1:39.7

In this case, it's what used to be known Pulse Secure and used to be known for some interesting

1:45.7

vulnerability back when it was called Pulse Secure. It's now called Ivanti Secure Access. And

1:53.1

today, Ivanti published details regarding two vulnerabilities after Waleck City discovered

2:00.1

these vulnerabilities being exploited in the wild.

2:04.4

There are two vulnerabilities that are being chained for complete compromise.

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.