4.9 • 696 Ratings
🗓️ 28 July 2016
⏱️ 6 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | Hello, welcome to the Thursday, July 28, 2016 edition of the Sandstone Storm Center's Stormcast. |
0:08.2 | My name is Johannes Ulrich, and the day I'm recording from Jacksonville, Florida. |
0:13.1 | In diaries today, we got one by Xavier. |
0:16.4 | He caught an Unixpot in one of his honeypots. Well, lesson learned here, we passwords still work. |
0:25.7 | Really over the last year we have seen a big search in just simple telnet scanning. And if you |
0:31.2 | look at the list of passwords that this particular bot attempts, it's only about two dozen different passwords that it attempts, |
0:40.9 | and apparently it's still successful enough to actually find vulnerable hosts. Once it finds a |
0:48.5 | vulnerable system and infects it, it will then connect back to an IRC server to wait for commands. So it's a very good old-fashioned |
0:56.1 | IRC bot. Now, we have seen reports lately about in and of things like cameras and such, |
1:02.4 | getting infected by just like bots like this. In this particular case, also, the bot can be |
1:09.3 | used to launch denial of service attacks which |
1:13.2 | was observed with the bot that infected these security cameras given the passwords |
1:19.3 | being used they're definitely looking sort of for Internet of Things style devices |
1:24.0 | and if you are running sen for virtualization, either the open source |
1:28.6 | version or the commercial version by Citrix, you need to patch because due to |
1:35.0 | a vulnerability in this virtualization platform, an attacker who has control |
1:39.8 | over one of the virtual machines would be able to take over the entire host. |
1:46.0 | This kind of virtual machine escape, of course, is always very dangerous, |
1:51.0 | in particular if you are hosting virtual machines for others. |
1:56.0 | And not a good day to day for last pass, the password manager. There was first block by Matthias Carlson. |
2:05.6 | He detailed a bug that he found that has been patched now that essentially allowed malicious websites to extract |
2:13.6 | passwords from your password manager. What happened here was it's a common flaw in these kind of password and form-preful |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.