meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Tuesday, July 13th, 2021

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 13 July 2021

⏱️ 6 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. Kaseya Patch; Solarwinds Advisory; Mint Mobile Breach; Twitter Verified Account Mistake

Transcript

Click on a timestamp to play from that location

0:00.0

Hello, welcome to the Tuesday, July 13, 2021 edition of the Sansonet Storm Center's Stormcast.

0:08.5

My name is Johannes Ulrich, and I'm recording from Jacksonville, Florida.

0:14.1

And we do have a patch now for Kasea VSA.

0:17.4

The patch was delayed a little bit, but it is available now for the software as a service product,

0:24.6

as well as for the on-premise product. Now, the patch does fix all of the issues that were

0:33.0

disclosed to Kasea, and some of these issues again were used in these ransomware attacks.

0:40.3

But the patch also comes with a caveat.

0:43.8

First of all, if you apply the patch or once you applied the patch, you definitely should

0:48.3

apply the patch, you need to reset your passwords and that's because part of a vulnerability being fixed here is a credential.

0:57.0

And I believe passwords are now also stored more securely, so better hashed than they were in the old version.

1:04.0

There are also a number of functionality differences in this new version.

1:09.0

Now I believe that's just for me scanning the advisory, that these changes are due to the

1:15.7

patches, so they're actually addressing these vulnerabilities.

1:19.4

Overall, of course, it's never a good idea to sort of mix up security fixes and functional

1:26.2

changes in particular for a very important patch like this one

1:30.4

that people should roll out as quickly as possible. Cassia also made available for its on-premise

1:37.3

customer, a hardening and best practices guide recommends that you deploy this before you actually deploy the patch.

1:47.5

Part of the two most important parts here of the hardening guide is first of all, make sure

1:53.2

that the server is isolated from the network, and secondly, make sure the server isn't

1:59.1

already compromised.

2:05.0

And they offer a number of tools to check for that. And given what we have heard is you should pretty much assume that every exposed Kasea VSA server was compromised within a couple of hours or so of the initial news.

2:17.6

So yes, your system is probably compromised.

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.