meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Stormcast: Cryptomining Malware, Fake PoC Exploit, Malicious Browser Extensions, and Palo Alto Vulnerabilities. Jan 9th 2024

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 10 January 2025

⏱️ 7 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. Cryptomining Malware, Fake PoC Exploit, Malicious Browser Extensions, and Palo Alto Vulnerabilities

Transcript

Click on a timestamp to play from that location

0:00.0

Hello and welcome to the Friday, January 10th, 2020,

0:04.2

5 edition of the Sans and the Storm Center's Stormcast.

0:08.2

My name is Johannes Ulrich and I'm recording from Jacksonville, Florida.

0:13.5

Well, in diaries today, we have diary by one of our undergraduate interns Cody Hales.

0:19.4

Cody is writing about an infection with Redtail. Redtail is

0:24.4

crypto miner at its core. Has some interesting traits. For example, all the parts of the

0:30.3

crypto miner are copied to the system via SCP. This kind of makes sense because the initial

0:36.5

access is via SSH and a weak username and password.

0:41.1

Then the attacker is just uploading additional files.

0:45.0

Many other tools are using curl, W get or such to download files from malicious sites.

0:52.3

Of course, the advantage of the upload is the attacker doesn't have to set up a web server

0:57.2

to offer the malicious files.

0:59.1

And also, it may be a little more stealthy because everything runs over the encrypted

1:03.7

ZH connection, which typically isn't proxied or such, like HTTP, which or H-TS even, which is then often analyzed, may be able

1:15.0

to use to spot any malicious downloads like this. Interesting approach. What kind of reminded me

1:24.1

of some of the early days here at Sands and the United Storm Center was the password being used here at NIMDA.

1:30.9

I'm not sure if anybody remembers the NIMDA warm, of course 2001-ish, and I sort of just about started here at Sands.

1:39.7

I guess today it's still remembered at least in a form of weak passwords.

1:48.3

One of the highlights, if that's the right word of the December patch Tuesday, was a bug in Microsoft's implementation of LDAB, CVE 2024.

1:58.6

CVE 202449-112.

2:01.8

This vulnerability potentially allows for remote code execution.

2:05.9

L-DAP being behind Active Directory, of course, a highly critical system here.

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.