meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Wednesday, November 28th 2018

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 28 November 2018

⏱️ 5 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. QNAP bash Malware; HTTPS Phishing Sites; Wildfire Scams; FTP Going Away

Transcript

Click on a timestamp to play from that location

0:00.0

Hello, welcome to the Wednesday, November 28, 2018 edition of the Sansa and at Storm Center's

0:06.6

Stormcast. My name is Johannes Ulrich, and today I'm recording from Jacksonville, Florida.

0:13.8

Xavier today is taking a look at an obfuscated bash script that a reader found on a compromised Q QNAP storage device. These type of storage devices

0:24.4

are always in the crosshairs of attackers because typically there's quite a bit of data on them,

0:29.9

also some reasonable processing power for crypto coin mining. And then of course they tend to be

0:35.8

one of these devices that are often forgotten when it comes to patching.

0:40.8

Also not necessarily that easy to patch because you have to reboot the device, which then breaks any links of any shared files or so that may be in use on the device.

0:52.3

Now one thing that makes this script a little bit special is that it's actually obfuscated.

0:56.9

In many cases, scripts copied to these devices are not obfuscated.

1:02.3

So reverse analysis is usually not all that difficult.

1:05.6

Now, in the end, what this particular script is doing is pretty standard.

1:09.7

It's setting up back doors.

1:11.6

It's also setting up a backdoor admin account and then does some brute forcing.

1:18.5

Not 100% clear how this particular script ended up on the device as in what vulnerability

1:26.0

was used to copy it, but often it's just a simple as H password

1:31.1

or a vulnerability in one of the many web applications that are typically running on these

1:36.9

devices. Over the last couple years, systems like Let's Encrypt have substantially lowered the bar needed to get

1:46.6

an HTTP website.

1:47.8

And of course, that not only made it easier for the good guys to set up HDPS, but also

1:53.3

for the bad guys.

1:55.4

So it's not only the majority of good websites that are taking advantage of, HTTP, but also about half of fishing sites

2:03.2

according to Fish Labs are now taking advantage of HTTP.

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.