meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Wednesday, June 1st 2016

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 31 May 2016

⏱️ 6 minutes

🧾️ Download transcript

Summary

Daily 5 min infosec news summary. News, patches, vulnerabilities and trends in information security. What's Up With Telnet? Bloatware Still Insecure.

Transcript

Click on a timestamp to play from that location

0:00.0

Hello, welcome to the Wednesday, June 1st, 2016 edition of the Sandton and Storm Center's

0:07.0

Stormcast. My name is Johannes Ulrich, and the I am recording from Jacksonville, Florida.

0:13.0

Over the weekend, we saw a pretty significant uptick in Telnet scans. Now,

0:19.0

Telnet, of course, is heavily attacked no matter what day it is,

0:23.6

but the number of sources that were scanning for Telnet servers about doubled this weekend

0:31.6

and the attacks appear to be continuing into today. So it not over yet problem is we don't really

0:40.1

know what's exactly responsible for this uptick there is of course so much

0:45.9

going on on telnet every day so it's a little bit hard to really identify one

0:51.4

particular exploit or one particular bot that increased the scan rate by this amount.

1:00.3

It's not just us seeing it. There are a couple other people that reported to us that they're seeing

1:04.9

similar increases in inbound Telnet traffic. Overall, of course, you should not expose telnet. The most likely

1:14.0

target, according to the exploits, we are seeing our embedded devices that expose telnet, and then

1:22.1

an attacker would get shell access and then use busy box on the device to download additional malware.

1:30.4

So my best guess at this point is some stupid old vulnerability in some kind of router IP

1:37.4

camera or anything like that that exposes Telnet. Make sure that you are not exposing telnet from any device like that,

1:46.5

block it at your firewall and then make sure that the firewall itself can't be reached via

1:51.4

telnet. And dual security looked at some of the update software that is commonly shipped

1:58.4

with many laptops. Typically, this software is used to keep

2:03.9

system drivers and the like up to date, but also to update loadware that's often

2:09.9

pre-installed on systems when you purchase it from these OEMs. Well, in part, in order to update things like system drivers,

2:20.3

this software does run as a system.

2:24.3

So if there is a vulnerability, an attacker does get full access to the system.

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.