4.9 • 696 Ratings
🗓️ 8 March 2023
⏱️ 6 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | Hello, welcome to the Wednesday, March 8, 2003 edition of the Sands and its Storm Center's |
0:06.6 | Stormcast. My name is Johannes Ulrich, and today I'm recording from Jacksonville, Florida. |
0:13.4 | And we have yet another diary written by one of our interns from the Sands Technology Institute |
0:20.4 | College. |
0:21.5 | These interns, they're working with our honeypots and also are looking for other attacks |
0:26.4 | that they're then writing up. |
0:28.1 | And the latest here that I found worth while sharing as a diary was written by David Boyd. |
0:35.6 | David looked at scans that he saw looking for a configuration file. |
0:41.4 | And turns out that this configuration file is associated with a Visual Studio code extension |
0:47.5 | SFTP. |
0:49.6 | SFTP, not a bad protocol. |
0:51.8 | If you want to upload, download files, it's basically related to S.H and works like FTP, which makes it pretty easy, but it's all |
1:02.2 | nicely encrypted, but you still, of course, need credentials. |
1:05.8 | And what apparently happens here is that developers are creating these configuration files with |
1:12.9 | their username and password in clear text, and then they're pushing these configuration files |
1:18.9 | together with the entire source code of their application to a live website, which |
1:26.9 | of course exposes them, and that's what attackers are looking for. |
1:31.4 | So if you're seeing scans for dot vScode slash sftp.jason, that's the attack here. |
1:38.9 | If you're using this extension, vS code sftp, make sure you are securing those credentials. |
1:47.3 | When you're copy pasting data via clipboard in many operating systems, pretty much all |
1:54.8 | applications that you may currently have active are able to access that clipboard. |
2:01.3 | That kind of access across different applications, of course, can be abused, |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.