meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Stormcast, Jan 27, 2025: Access Brokers; Llama Stack Vuln; ESXi SSH Tunnels; Zyxel Boot Loops; Subary StarLeak

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 27 January 2025

⏱️ 6 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. SANS ISC Stormcast, Jan 27, 2025: Access Brokers; Llama Stack Vuln; ESXi SSH Tunnels; Zyxel Boot Loops; Subary StarLeak

Transcript

Click on a timestamp to play from that location

0:00.0

Hello and welcome to the Monday, January 27th, 2025 edition of the Sandcent,

0:06.7

and the Sunnet Storm Center's Stormcast. My name is Johannes Ulrich and I'm recording

0:10.6

from Jacksonville, Florida. At the Internet Storm Center, we had another diary created by one of

0:18.2

our undergraduate interns. This time it was Joseph Flint writing about

0:24.1

how access brokers are maintaining persistence. Access brokers are just breaking the system

0:32.4

and then selling access to these systems to others, like, for example, ransomware actors, or really

0:40.1

whoever sort of needs a botnet for whatever. So it's really the initial phase of sort of

0:46.1

your Malware economy. One example that Joseph is pointing out here is SystemBC.

0:56.0

That's a botnet that's often associated with these access brokers and, well, how it reflects itself in our honeypots, some of the specific URLs related to SystemBC that people are scanning for.

1:10.3

But then also how to prevent infection

1:13.4

and how to detect infection,

1:15.5

which should not really be all that difficult.

1:18.9

There are plenty of intrusion detection rules out there,

1:22.9

as Joseph points out,

1:25.6

as well as, of course, usually these access brokers are using fairly

1:31.2

low-level and easy vulnerabilities. They're often using weak passwords, well-known web

1:39.0

application vulnerabilities, so some basic system hardening, and of course, course patching keeping your system up to date

1:45.6

goes a long way to prevent these initial infections and everything related to AI of course

1:54.5

is still getting a lot of news should get a lot of news given the rapid adoption of AI

2:00.0

tools everywhere one way how rapid adoption of AI tools everywhere.

2:01.6

One way how you adopt these AI tools is, well, by using various frameworks to create

2:08.2

applications around this.

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.