4.9 • 696 Ratings
🗓️ 14 December 2021
⏱️ 5 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | Hello, welcome to the Tuesday, December 14th, 2021 edition of the Sandcent Storm Center's Stormcast. |
0:08.4 | My name is Johannes Ulrich, and today I'm recording from Jacksonville, Florida. |
0:14.0 | Let's start by hopefully somewhat wrapping up a log for Jay. |
0:17.9 | We had our live stream at noon today here Monday Eastern time. And as Mick put it during |
0:26.5 | the live stream, well, this is becoming a marathon. The initial sort of adrenaline kind of fades off. |
0:33.3 | And pretty much everybody should have been sort of hit by some form of the exploit at this point. |
0:41.1 | We do see a relatively quick sort of evolution of the exploits becoming a little bit more obfuscated. |
0:46.8 | Also, instead of these pretty much widely sort of sprayed user agents and URLs, we now have attackers trying to adapt their exploits a little bit for specific software |
0:58.9 | packages. |
1:00.2 | Plenty of vendor advisories out there listing whether or not particular software is |
1:05.9 | affected, how to mitigate the vulnerability if it is affected, |
1:17.2 | and patches are certainly being released relatively quickly for most software. |
1:21.6 | The one to sort of point out is VMware's V-center. |
1:26.7 | That one is already being exploited in sort of a more targeted fashion. We also have seen crypto coin miners being used quite a bit as a follow-on payload, |
1:34.0 | and Renato wrote up one particular case that he was able to observe that installed a crypto coin miner. |
1:41.2 | Also, we are seeing how several botnets and such, things like |
1:45.0 | Mirai and similar botnets are taking advantage of this vulnerability. Also keep in mind that |
1:53.0 | at this point, if you're finding a vulnerable system, in particular if it's vulnerable to sort of one |
1:58.0 | of the standard exploits, you should assume that the system is already |
2:02.3 | compromised, so it's not a simple matter of just patching and move on, but also look for |
2:11.0 | some of the indicators of compromise to make sure the system that you're patching hasn't |
2:17.0 | already been backdoored. |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.