meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Stormcast, Jan 9, 2025: Critical Vulnerabilities in Ivanti, Aviatrix, and Hijacked Backdoors in Compromised Systems

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 9 January 2025

⏱️ 6 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. SANS ISC Stormcast, Jan 9, 2025: Critical Vulnerabilities in Ivanti, Aviatrix, and Hijacked Backdoors in Compromised Systems

Transcript

Click on a timestamp to play from that location

0:00.0

Hello and welcome to the Thursday, January 9th, 2025 edition of the Sandus Storm Center's Stormcast.

0:08.4

My name is Johannes Ulrich and I'm recording from Jacksonville, Florida.

0:13.7

Let's start today with some domain dumpster diving watchtower.

0:18.7

Did interesting research where what it did is they registered

0:22.4

expired domains.

0:23.5

Now, this in itself is new, has been done off in order to sort of go after some abandoned

0:29.6

infrastructure that Enterprise have set up that is still trusted in some ways.

0:35.4

In this case, however, Watchtower took a little bit a different approach.

0:39.9

Instead of looking at abandoned infrastructure of enterprises, they looked at abandoned infrastructure

0:46.5

of attackers. Attackers often set up domains that are then being used by hijacked systems to connect to command and control servers.

0:58.0

Well, they then forget about them or are no longer interested in them and as a result are abandoning those domains.

1:06.0

Watchtower now set up their own web server on some of these abandoned domains. They basically just

1:12.7

re-registered them. And surprise, they actually immediately got access to thousands of compromised

1:21.2

systems that were calling back to connect to a command control system. or in the case that Watchtower in particular

1:29.3

focused on, they looked at backdoors that attackers installed, where the backdoor itself

1:35.7

was backdoored. And the way you backdoor a backdoor is that you add some script that by saying

1:42.0

notifies the attacker on a particular web address

1:45.8

that, well, a new system was infected with this backdoor.

1:50.7

So they had these infected systems that had backdoors installed on them,

1:56.4

call back to the abandoned and now re-registered domain,

2:05.8

and identified various companies, government agencies worldwide that were affected by these fairly well-known backdoors. These are not

2:13.3

back doors that are hard to find by any means. These are very well-known backdoors. Simple signature-based

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.