meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Wednesday, July 6th, 2022

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 6 July 2022

⏱️ 6 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. EternalBlue Retrospective; OpenSSL Update; Keystroke Logging NPM Packages

Transcript

Click on a timestamp to play from that location

0:00.0

Hello, welcome to the Wednesday, July 6, 2022 edition of the Sansonet Storm Center's Stormcast. My name is Johannes Ulrich and I'm recording from Stockholm, Germany.

0:14.4

About five years ago, the Wanna Cry and Notpetya warms caused quite a bit of havoc, taking advantage of the eternal

0:23.4

plu exploit. So Jan took the opportunity to take a look at Shodan data to see how such a highly

0:32.5

publicized and dangerous vulnerability has been patched over the last five years.

0:39.6

Well, turns out, yeah, it has been patched, but far from perfect.

0:43.6

Now, at its peak, Shodan counted 35,000 vulnerable systems.

0:50.8

These days, there are about 5,000, or actually exactly 5,565. As Jan points out,

0:58.4

vulnerable machines left, again, according to Shodan. But remember one way how some of these

1:04.6

warms really caused the damage was by entering a network and then spreading internally. And of course, Shodan typically does not detect these internal vulnerable hosts.

1:17.6

Other interesting thing, about six months ago, the number was at 10,000 and actually remained

1:25.6

sort of constant, if you're looking at the 12 month and six month

1:29.8

number.

1:30.5

But overall, this matches what we have seen all the way back to vulnerabilities like the

1:35.8

code red, NIMDA vulnerabilities, and the worms that are versed with it, that there is an

1:41.3

initial, relatively fast drop in vulnerable systems.

1:45.1

Those are systems that are being patched, usually within a month or so.

1:49.4

And then there is this long tail that pretty much lasts forever.

1:53.6

And at this point, once you sort of discount honeypots and the like systems vulnerable to

1:59.1

these particular issues are probably never really patched,

2:02.9

but just decommissioned.

2:05.9

And I've got an interesting update to Open SSL.

2:09.6

It actually fixes two different vulnerabilities.

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.