4.9 • 696 Ratings
🗓️ 25 October 2016
⏱️ 7 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | Hello, welcome to the Tuesday, October 25th, 2016 edition of the Sandcent Storm Center's Stormcast. My name is Johannes Ulrich. |
0:09.9 | And the day I'm recording from Jacksonville, Florida. Just a very quick update on the Mirai Botnet, no new denial of service attacks that I have heard of. |
0:18.5 | But still, the botnet overall is very active scanning |
0:22.7 | for new victims. |
0:24.3 | We have seen a slight drop in the scanning, but really nothing to be too excited about, |
0:31.0 | but probably some of the countermeasures are taking effect. |
0:35.4 | Like for example, I don't see any of the command control domain |
0:40.2 | names that are still resolving for this botnet. And also as a reminder, while the DVR servers |
0:47.8 | of the big news item here, this botnet certainly has the capability to infect other systems as well. |
0:54.6 | There is a site from the ARM 7 payload. |
0:58.3 | There's also a MIPS and a power PC payload. |
1:01.0 | Particularly the power PC payload is sort of targeting than Cisco devices. |
1:06.1 | And for example, for Cisco device, it's trying sort of a default enable password of enable. However, it's probably |
1:13.3 | less likely to succeed here. The big problem with these DVRs remains that you can't change |
1:20.2 | the default password. And then we got updates from Apple for iOS and Mac OS Sierra. It fixes a number of security vulnerabilities. |
1:30.3 | The more interesting ones here are first of all, |
1:33.3 | a vulnerability in core graphics. |
1:35.3 | A malicious JPEC could be used to execute arbitrary code. |
1:40.3 | Of course, this could, for example, be exploited |
1:43.3 | via more or less any software that displays |
1:46.4 | JPEX. Now, another vulnerability I think was already patched in the past. I remember something |
1:53.1 | very similar with FaceTime. The problem here is that a man in the middle on a FaceTime call |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.