meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Wednesday, December 29th, 2021

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 29 December 2021

⏱️ 5 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. One More #Log4j Vuln; LotL Classifiers; LastPass Credentials Stuffing

Transcript

Click on a timestamp to play from that location

0:00.0

Hello, welcome to the Wednesday, December 29th, 2021 edition of the Sansonet Stormsendor's

0:07.0

Stormcast. My name is Johannes Ulrich, and then I'm recording from Jacksonville, Florida.

0:14.2

And well, I'm sorry about the year is ending with yet another log for J update, yet one more remote code execution vulnerability.

0:23.2

However, this one can only be exploited by actually modifying the logging configuration.

0:30.8

Rook-COS is again J-NDI or Gindi, and yes, the exploit pattern sort of is the same, but modifying the configuration

0:41.5

shouldn't be as easy and as common as some of the other flaws, so that's why I wouldn't

0:47.5

really assign it the same priority as you get from the prior vulnerabilities.

0:54.5

The latest version with this is Log 4J217.1.

1:01.2

That's for Java 8.

1:02.6

For Java 7, we're now up to 2.12.4.

1:07.7

And for Java 6, it's now 2.3.2.

1:11.6

And the fix here is essentially that by default, JNDI is disabled and the JDBC appender will only allow JNDI if the specific system property is set to true.

1:33.2

The CVE number for this vulnerability is 2021-44832,

1:37.3

and the CBSS score is 6.6.

1:42.9

And in Diaries today, we have a great one by Russ. He's introducing work done by the Adobe Security

1:47.5

Coordination Center and their Secure Intelligence Group, where they open-sourced some

1:53.5

machine learning classifiers for living off the land attacks. The problem is old, but in some ways

1:59.8

also very current in, for example, Renato talking

2:03.6

earlier this week about how MS-built is being used by attackers in attacks like this.

2:09.6

The work published by Adobe here does contain classifiers for, for example, shells and

2:17.4

ex-fill attempts and also coin miner.

2:20.1

So some of the more common attacks that you may be seeing, and the idea is that you

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.