meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Tuesday, July 10th 2018

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 10 July 2018

⏱️ 6 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. Reverse Shell via Weblogic; Apple Patchesi; Hardening Azure AD Password Selection

Transcript

Click on a timestamp to play from that location

0:00.0

Hello, welcome to the Tuesday, July 10th, 2018 edition of the Sands and the Storm Center's Stormcast.

0:08.2

My name is Johannes Ulrich and the day I'm recording from Jacksonville, Florida.

0:13.6

Renato has been keeping his Web Logic Honeypot up and running, but so far he really hasn't

0:20.8

gotten much else than crypto miners and

0:23.6

he has already written about this well until earlier this week when he actually got a sort

0:29.1

of interesting reverse shell that infected his honeypot.

0:34.5

It used to standard Weblogic exploit, nothing really all too fancy about it, but then it

0:40.5

does upload an Elf binary that implements the back door.

0:45.4

This particular backdoor connects back to a command and control server on Port 630, which

0:52.6

is certainly an odd port and, well, not all that stealthy.

0:57.6

It connects back to a host in China, and so far it actually looks like most of the exploit attempts

1:04.2

that used this type of backdoor were launched from China, and according to a virus total probably came from the same

1:14.1

actor. Now talking about virus total. Virus total or better the anti-malware engine it's

1:20.7

using, they didn't recognize this particular sample. Now once the connection is established, then the attacker has the ability to launch arbitrary

1:33.0

commands.

1:34.3

One interesting titbit here is that the host, the compromised host, actually authenticated

1:41.3

to this reverse shell, so to the command control server.

1:46.0

However, it uses the password replace with your password.

1:50.0

So apparently components were reused here without making even minimal adjustments.

1:58.0

At this point, Renato hasn't really seen any commands being executed via this reverse shell.

2:04.6

Now, sort of interesting, the malware first checks the time zone file, also checks for the presence of a specific dot-h file.

2:14.6

I'm not really sure what that dot-h file is about could be part of the malware,

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.