meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Thursday, May 25th, 2023

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 25 May 2023

⏱️ 6 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. Enriching Cowrie; Volt Typhoon; Android Spy App; Zyxel, Baracuda and GitLab Patches;

Transcript

Click on a timestamp to play from that location

0:00.0

Hello and welcome to the Thursday, May 25th, 2023 edition of the Sansonet Storm Center's

0:08.0

Stormcast. My name is Johannes Ulrich, and today I'm recording from Jacksonville, Florida.

0:15.3

Jesse today wrote a diary expanding his cowrie processor tools. It's a Python script that Jesse, I think, originally

0:23.6

developed actually while he was still one of our undergraduate interns. We do use a

0:29.6

carri as part of this program. So one of the questions always comes up is, how do you find

0:35.6

interesting logs? In this particular case, of course, one thing that helps is if you can easily attach

0:42.6

various external data to your logs, and that's what Jesse's script does.

0:49.3

He expanded it now even further, added additional details to it, and has some sort of interesting

0:56.0

little samples to show you what the tool can do is part of this latest diary. So great for

1:04.3

everybody who is using Cowrie and is looking for more efficient ways to look through the logs.

1:11.6

And then you have yet another big announcement from a number of cyber security agencies in different countries in the US here.

1:22.6

For example, the NSA was part of it, but also Australia, Canada, UK and others have taken part in this,

1:31.6

and they assigned the name Walt Typhoon to this particular activity.

1:36.5

Now, whenever you read one of these bulletins, of course, they are describing fairly sophisticated

1:42.3

techniques that were found to be used in very specific cases.

1:47.4

I believe here attacks against power system in Guam, if I got it correctly.

1:52.7

The way you should really read them is look for any of the techniques being described here.

2:00.2

And there's a lot about the use of Living of the Land tools, for example,

2:05.5

but also the use of compromised home routers again.

2:09.9

And try to figure out if you would be able to detect a similar activity in your network.

2:16.7

Because what may happen soon is that you'll see

2:20.3

these techniques being used, for example, by cybercriminals, ransomware gangs and such,

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.