meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Tuesday, April 20th, 2021

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 20 April 2021

⏱️ 5 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. Finding Phishing Sites; Nagios XI Exploit; XCSSET Malware and M1; qnap/junos patches;

Transcript

Click on a timestamp to play from that location

0:00.0

Hello, welcome to the Tuesday, April 20th, 2021 edition of the Sands and at Storm Center's

0:06.4

Stormcast. My name is Johannes Ulrich, and today I'm recording from Jacksonville, Florida.

0:13.4

Neat diary today by Jan. He looks at fishing sites on how to identify them. One trick here is the use of specific FAF icons, the

0:23.4

favorite icon that's often displayed as part of the URL in a web browser. Of course,

0:30.3

to make a fishing site plausible. This icon is copied from the original site and well, Shodan actually allows you to search for specific icons.

0:43.7

And Jan also included a link to a GitHub project that tracks different hashes for popular Faf icons.

0:52.6

Now, the hash being used here is a murmur hash. It's not a cryptographic

0:57.0

hash. The goal here is not really to be secure in a sense to make it difficult to reverse the hash,

1:04.3

but really just have an efficient lookup method for these images. Back in February Nagaios, the network monitoring tool

1:15.0

patched an OS command injection vulnerability. That's actually, well, fairly easy to exploit. All you

1:22.4

have to do is more or less at the command you would like to execute to a specific URL.

1:29.6

And Unit 42, the Palo Alto research team, is now reporting that they see this vulnerability

1:38.3

actively exploited to install crypto coin miners.

1:42.8

And please don't forget, because this is very easy to exploit vulnerability.

1:47.0

These crypto coin miners are probably just the tip of the iceberg.

1:50.8

There's probably a bunch of other stuff that's being done using this particular vulnerability.

1:58.4

Nagaios, sort of being able to connect to a lot of systems in network,

2:02.8

often being also allowed to execute commands on other systems on the network, is certainly

2:08.2

a fairly juicy target and something an attacker could easily leverage to get access to

2:15.7

large parts of a network.

2:19.3

And Trent Micro is reporting about a new version of the XES set malware.

2:26.0

This malware came originally up in August last year, and it is targeting macOS developers.

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.