meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Tuesday, May 10th, 2022

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 10 May 2022

⏱️ 6 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. Octopus Backdoor is Back; CVE-2022-1388 (BIG-IP) Exploits; Trend Micro Fix; Azure RCE Vuln;

Transcript

Click on a timestamp to play from that location

0:00.0

Hello, welcome to the Tuesday, May 10th, 2020 edition of the Sandsenet Storm Center's Stormcast. My name is Johannes Ulrich, and today I'm recording from Jacksonville, Florida.

0:14.1

Let's start a day with a diary by Xavier about a new incarnation of the octopus Backdoor that he found. Now, in this case, it's delivered

0:25.9

again as a Word document. The Word document itself appears to include PDFs as embedded

0:33.8

documents, but it's actually not PDFs. It just uses the PDF extension and logo.

0:39.7

It's actually a good old batch file. It is then executed by clicking on it, and Xavier does a good

0:47.5

job going through the obfuscation and how to sort of decode it. Well, in the end, you end up with the octopus backdoor.

0:57.3

It luckily still connects to a well-known host name,

1:02.6

HPSJ.firewall dash gateway.net.

1:07.4

And as an add-on, if you run into code like this, Renato actually created a little Python script

1:14.8

that allows you to automate the decode process for this particular type of obfuscation.

1:23.6

And well, then, a little bit as expected, we do have now a public exploit for CVE 2022-1388, the F5 Big IP vulnerability that was patched late last week.

1:38.8

And this exploit is now heavily used in order to target vulnerable systems. So far we see a lot of reconnaissance,

1:47.8

some backdoors, web shells is what we have seen in, even two instances of a destructive

1:55.4

attempt that essentially just attempts to run RM-RF slash on affected systems.

2:04.1

Now, with the exploit being released, we now also know a little bit more about the vulnerability.

2:10.5

It's kind of actually an interesting vulnerability.

2:14.8

The root cause is something called hop by hop headers in HTTP. In HTTP, if you add

2:23.9

the name of a header to the connection header, in this case, that's the XF5 auth token header that's

2:32.2

being added, then a proxy will not modify this particular header.

2:37.5

It will just pass on its content.

2:40.6

And while the XF5-Oth token header is, as the name kind of implies, usually used for authentication.

2:48.6

So by preventing the proxy,

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.