meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Wednesday, May 25th, 2022

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 25 May 2022

⏱️ 5 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. Python/PHP Library Backdoor; Zoom Patches; VMWare Exploit; Zyxel Patches

Transcript

Click on a timestamp to play from that location

0:00.0

Hello, welcome to the Wednesday, May 25th, 2020 edition of the Sansonet Storm Center's Stormcast.

0:08.1

My name is Johannes Ulrich.

0:09.7

And I'm recording from Jacksonville, Florida.

0:13.5

Well, last night on Reddit, some people did notice that there was a CTX Python package Python package on PIP, that hadn't been updated in a while,

0:25.0

but all for a sudden did receive an update.

0:28.1

CTX is an expansion to the Dict, the dictionary object, and, well, the addition that was added

0:36.1

was code that exfiltrated your EWS credentials, at least if you kept them in environment variables, which is very common.

0:47.0

The exfiltration was pretty simple.

0:48.6

It just appended the data to a URL, base 64 encoded it, and then sent it off to anti-theft web.heroku app.com.

1:00.9

So kind of ironically named.

1:03.7

And well, next thing, of course, is a quick Google search to figure out what else is connecting

1:10.2

to this particular URL. And

1:12.9

turns out there was also a PHP package that was updated five days ago. Now this PHP package

1:21.1

was a password hashing package, something that is, I don't think, really maintained anymore,

1:28.3

at least that particular package, but hasn't again been updated for a while.

1:33.3

And what the attacker did here is actually just claimed that they created sort of a fork of

1:38.3

a package in order to continue to maintain it.

1:41.3

In some ways, actually, they felt a little bit short here. If you think about it,

1:44.9

they did backdoor a password hashing package, but again, the only thing they actually

1:50.7

exfiltrated were these AWS environment variables and not the passwords that were going

1:56.8

to be hashed, at least in the version I looked at. The PIP package has since been removed.

2:03.6

Last time I checked the PHP package was still up there, but probably less of a problem, actually,

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.