meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Wednesday, April 6th, 2022

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 6 April 2022

⏱️ 7 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. CryptoMiner vs #Alibaba; #Cicada APT Techniques; Win11 Security; Fin7 Update

Transcript

Click on a timestamp to play from that location

0:00.0

Hello, welcome to the Wednesday, April 6, 2020 edition of the Sansonet Storm Center's Stormcast. My name is

0:08.9

Johannes Ulrich, and today I'm recording from Jacksonville, Florida. Well, today we got another

0:15.1

crypto coin miner, of course, nothing that terribly new with crypto coin miners, but they keep adding new tricks.

0:22.9

And this one, first of all, went after a WebLogic vulnerability that's about two years old.

0:30.5

So not the most common vulnerability out there, but still apparently sufficient systems out there to make it worthwhile scanning

0:39.7

for them.

0:40.8

And then in addition to actually deleting all the competition, which is standard for

0:47.5

crypto coin miners, it also specifically disables Alibaba cloud monitoring software.

0:54.2

If you're setting up a virtual machine in Alibaba's cloud, by default,

0:58.9

there is a specific service installed, the Ali Yun service,

1:05.2

that's then being used to monitor your virtual machine.

1:08.8

Well, you can uninstall it, and that's exactly what this

1:12.9

particular script does. It downloads from Oligan, the uninstalled script, and then runs it. That, of

1:22.6

course, makes it a little bit more difficult or less likely that the crypto coin miner is being discovered.

1:30.2

Other than that, it's actually not very stealthy malware. It does disable a bunch of services

1:35.2

on the system, probably in order to, first of all, made it harder for the administrator to access

1:41.9

the system, but then also to probably get more CPU cycles for itself.

1:48.0

So any system used for real would immediately kind of be obvious

1:53.0

that all of a sudden, for example,

1:55.0

some of the Oracle service and such are no longer running,

1:58.0

but this looks like it's going after systems that are pretty much sort of in

2:03.5

its default configuration, unmaintained really, but still running. It also doesn't attempt to

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.