meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Tuesday, April 18th, 2023

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 18 April 2023

⏱️ 5 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. Increase in Honeypots in China; Mac Ransomware; GC2 in Malware

Transcript

Click on a timestamp to play from that location

0:00.0

Hello and welcome to the Tuesday, April 18, 2020, 3 edition of the Sands and its Storm Center's Stormcast.

0:08.5

My name is Johannes Ulrich, and today I'm recording from Augusta, Georgia.

0:14.3

Jan today wrote a diary about a significant increase in the number of medical devices exposed in China, according to

0:24.5

Shodan at least. The increase started about two weeks ago and now reached 30,000 devices.

0:33.1

The other classification assigned to these IP addresses appears to be Honeypot.

0:38.7

So, well, are these medical device honeypots or what's exactly going on here?

0:45.2

Jan wasn't quite able to figure out how Chodan classified these devices.

0:52.0

He didn't really find sort of any specific ports open on a small

0:56.4

sample of these devices to identify them as medical devices or a honeypot for that matter.

1:04.1

On the other hand, it could also be, of course, that this is some trick being played by the

1:09.9

Chinese firewall or some other network device

1:13.0

that specifically redirects, for example, scans from Shodan scanners.

1:20.1

In general, while Shodan is pretty good in identifying vulnerable devices and classifying them,

1:26.1

it is, as Jan points out, somewhat a black box,

1:29.6

and of course some artifacts like this could always show up in their data based on essentially

1:36.0

a buck or maybe a little bit inaccurate decision in how these devices are classified.

1:45.7

And Melver Hunterunter team recently reported that they spotted a Mac OS version of the infamous

1:53.7

lockbit ransomware in the wild. This particular binary was apparently compiled specifically

2:00.3

for M1 Max.

2:03.8

Patrick Wardle now took a closer look at the binary and published a blog post with an analysis.

2:09.9

And while this does look like it's derived from log bit and it does look like it's an attempt

2:15.7

at creating a ransomware, it's an attempt at creating a ransomware.

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.