meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Wednesday, June 29th, 2022

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 29 June 2022

⏱️ 6 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. HiByMusic Scans; OpenSSL Heap Overflow; ZuoRat;

Transcript

Click on a timestamp to play from that location

0:00.0

Hello, welcome to the Wednesday, June 29th, 2020 edition of the Sandsenet Storm Center's Stormcast.

0:08.0

My name is Johannes Ulrich and then I'm recording from Stockholm, Germany.

0:13.0

For a while now, we are running this first scene URL page that basically looks at all the submissions we are getting from the honeypots

0:22.6

you all are running for us and they're looking sort of for new URLs that are showing up there.

0:27.6

Of course, you know, some of just small variations of like, yet another WordPress or

0:32.6

JAWS botnet or whatever, but the last couple days there was one little odd URL and the attacker here

0:39.7

was looking for a file called Radio.txt. After some Googling and checking with some of

0:47.7

other handlers, turns out that the attacker is likely looking for high buy music devices.

0:56.6

These are Android-based music players, sort of a little touchscreen, and they're running a special

1:03.3

piece of software called High Buy Music in order to play music.

1:07.7

And apparently there's a radio.txt file that defines what particular

1:13.8

URLs are being used by different online radio stations. So it looks like attackers are looking

1:21.6

for this file and not 100% clear why there don't appear to be at least any sort of critical public

1:29.9

vulnerabilities in these devices, there was a director traversal, which doesn't really sound

1:35.0

that terribly bad.

1:36.5

Of course, there could be some vulnerabilities that we aren't aware of, but another angle

1:41.9

on this is that since users of the devices tend to customize this radio.tXT file,

1:48.1

it could just be an attempt to enumerate different URLs people are using for their online radio stations,

1:56.4

maybe to find some hidden or private URLs here that users wouldn't be willing to share

2:04.5

publicly. There's kind of scans. If you have all of those devices, wouldn't mind hearing from

2:09.6

you to figure out what some of the angles are here because I don't have one of these devices

2:16.2

myself.

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.