meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Tuesday, February 7th, 2023

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 7 February 2023

⏱️ 7 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. Earthquake Scams; IP Lookup Detection; OpenSSH Vuln Details; Redis Malware

Transcript

Click on a timestamp to play from that location

0:00.0

Hello and welcome to the Tuesday, February 7, 2020,

0:05.0

edition of the Sansonet Storm Center's Stormcast.

0:09.4

My name is Johannes Ulrich, and I'm recording from Jacksonville, Florida.

0:15.0

Of course, you probably have heard already about the tragic earthquake that hit Turkey and Syria last night.

0:22.8

With tragic events like this, we often have scams emerging.

0:27.6

So publish a couple tips how to evade some of these scams.

0:32.3

Probably something that you want to share with friends.

0:35.7

Don't think a lot of listeners necessarily to his podcast will be too susceptible to it.

0:42.7

But it's something that keeps coming up.

0:45.2

And if you see anything, please let us know.

0:49.7

In recent years, some of these scams have become less visible, a little bit more difficult

0:55.4

to track, as a lot of them are targeting individuals and groups on social media.

1:01.7

In particular, for example, if you have links to the region affected by the disaster, you

1:09.3

may, for example, see on related Facebook groups or such some of

1:13.9

these scams popping up. That, of course, makes them harder to track down because they reach

1:21.2

sort of a more targeted audience. So let us know if you see something and of course with earthquakes, there are always

1:31.4

these sort of unpredictable surprise results. So there is often a certain lag in some of these

1:37.7

scams showing up. And in a second post today, I wrote about a little trick that you may find helpful to track systems that are infect, in particular sort of IoT devices and the like.

1:52.0

One of the things that I see many of these bots do if they infect the device is they try to look up what is the public IP address of the device. And in order

2:03.8

to do so, they're typically connecting to one of a small number of APIs that return the public

2:12.3

IP address. So you can look for DNS lookups, for host names or for HTTP requests if you have the

2:21.0

visibility for these APIs in order to detect possibly infected systems.

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.