meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Wednesday, May 24th, 2023

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 24 May 2023

⏱️ 6 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. Apache NiFi Scans; Samsung 0-Day Fix; Lenovo Bricked; Dell VX Rail; BrutePrint

Transcript

Click on a timestamp to play from that location

0:00.0

Hello and welcome to the Wednesday, May 24, 2023 edition of the Sansonet Storm Center's Stormcast. My name is Johannes Ulrich, and today I'm recording from Jacksonville, Florida.

0:14.5

Today I noticed some interesting scans on our honeypots and really don't quite have a great idea of what they're

0:23.3

after other than it looks like they're going after Apache Niphi. Now Apache Nify is not an

0:31.7

application. It's necessarily of a household name, but it is quite popular. It's one of those

0:36.6

big Java applications and the main purpose of it is quite popular. It's one of those big Java applications, and the main purpose

0:40.1

of it is to route data. So let's say you have a JSON file, but you need to insert that into

0:46.5

MongoDB database. Well, that's what NIFI can do for you. It can sort of transform data

0:53.6

from one format to another

0:55.3

interact with different file and database types like this. It's quite popular in the sort of

1:01.8

machine learning space where often you have these large data sets that you sort of have to

1:07.1

reshape in order to use it for your machine learning. All I see at this point is that

1:13.3

over the last couple days, we had one IP address in particular that appears to scan for NIFI servers.

1:21.0

There are a couple other IP addresses that hit the same URL slash NIFI, but with different user agents almost looks to me a

1:29.3

little bit like they may be sort of following up on the initial scans.

1:33.0

If the first scan finds something, maybe these other scans are then trying to sort of confirm

1:39.7

that NIFI is running. Best I can think of is that they may be looking for unprotected

1:47.0

NYFI instances. It could certainly be an issue. If you have any insight, let me know.

1:52.6

There was one comment so far, noting that they also are seeing some of these scans against

1:59.9

the Port 8080 in particular.

2:03.4

I didn't see any sort of noteworthy warnability in NIFI recently that could prompt something

2:08.6

like this.

2:09.5

So if you use NIFI, it would also be interesting to know what kind of abuse scenarios

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.