meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Tuesday, December 10th, 2024

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 10 December 2024

⏱️ 6 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. CURLing DDoS; OpenWRT Vuln; Android Update; RCS Not Always Encrypted

Transcript

Click on a timestamp to play from that location

0:00.0

Hello and welcome to the Tuesday, December 10th, 2024 edition of the Sansonet Storms and Stormass.

0:08.1

My name is Johannes Ulrich, and the time recording from Jacksonville, Florida.

0:14.4

Jesse today looked at some intrusions into his SSH honeypot that, well, executed a lot of commands. Most of the time

0:23.6

after the attacker connects to the Honeypot and is able to log in, they usually only execute

0:29.4

about a dozen or so different commands trying to install, for example, additional backdoors

0:35.9

or some kind of bot. These attacks were different. They had

0:42.0

a thousand more commands that were being executed. And as it turns out, they were just repetitive

0:47.3

curl commands. Now, these curl commands did not attempt to actually download anything.

0:53.4

Actually, any output was just directed to death null.

0:57.2

The apparent goal of these attacks was just to launch a denial of service attack.

1:02.5

Jesse does see a lot of targets here in the crypto space, so that could possibly be some

1:09.8

kind of extortion attempt or so against these

1:13.3

crypto sites.

1:15.3

From a defensive point of view, these attacks should be that terribly hard to defend against.

1:20.4

If you're behind something like Cloudflare or any kind of other anti-Didos provider,

1:26.1

they should be able to pretty easily filter these curl requests.

1:30.1

They're not attempting to spoof any headers or any kind of user agent or such.

1:36.0

So it should be pretty straightforward to filter them out.

1:39.4

But of course, if they do have access to many thousand vulnerable systems that could still just

1:47.6

sort of volumetric overload the target system. And for a change, we do have some vulnerabilities

1:55.3

in an open source router operating system, OpenWRT.

2:02.4

There are two vulnerabilities here.

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.