meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Wednesday, September 5th 2018

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 4 September 2018

⏱️ 6 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. Microtik Exploits; Exposed git Directories; SSL Certs and Tor

Transcript

Click on a timestamp to play from that location

0:00.0

Hello, welcome to the Wednesday, September 5th, 2018 edition of the Sandtonet Storm Center's Stormcast. My name is Johannes Ulrich and I'm recording from Amsterdam, Netherlands. NetLabp 360 has an interesting blog post with some recent attacks against Microtick routers. These attacks take advantage of

0:24.2

a vulnerability that Microtic originally patched, I believe, in April, but CVE, and that would

0:31.5

be CVE 2018-14-847, wasn't assigned until early August.

0:39.6

Now, after the vulnerability was patched by Microtake, lots of details about it became known,

0:45.8

the vulnerability can be used to read arbitrary files, including username and password databases,

0:51.1

and then that information can be used to essentially reconfigure,

0:55.5

or even in some cases, execute code on the router.

1:00.0

As typical for this type of vulnerability, of course, crypto coin miners were all over it.

1:05.2

It was also used to inject coin hive miners into traffic that is proxied by micro-tick routers, even though

1:14.0

there was some discussion whether or not that actually worked.

1:17.2

But what NetLab 360 figured out is there is another class of attacks that these

1:24.3

routers are being used for, and they discovered 5,000 plus routers affected by these attacks.

1:33.0

There are really two things that these attacks do.

1:35.8

Now, first of all, Microtic has a feature that allows you to redirect traffic being passed through the router to a third party.

1:45.5

And this can be used to eavesdrop on traffic passing through the router.

1:50.5

And this is one configuration change that is being made by some of these attacks.

1:56.4

Secondly, some attacks are enabling the SOX proxy on these routers,

2:02.5

which then can be used to route traffic through the routers, hiding behind the routers.

2:08.6

I've seen this a couple of years ago, even in some more sort of APT-style attacks,

2:14.1

that used router networks like this in order to obfuscate the real origin of the attack.

2:22.1

So what does this mean for you if you are running a micro-tick router?

2:26.2

Or if you're running into a micro-tick router at like a relatives network or such?

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.