4.9 • 696 Ratings
🗓️ 5 December 2025
⏱️ 5 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
| 0:00.0 | Hello and welcome to the Friday, December 5th, 2025 edition of the Sands Internet Storm Center's Stormcast. |
| 0:12.8 | My name is Johannes Ulrich, recording today from Dallas, Texas. |
| 0:18.1 | And this episode is brought you by the sands.edu graduate certificate program in cloud |
| 0:23.6 | security. In diaries today, we do have one of our undergraduate interns again, Jackie Nobjian, |
| 0:31.5 | talking about one of the attack observations that she retrieved from her honeypot. |
| 0:38.4 | In this particular case, well, we have an S-H scan, so the initial entry vector here was a weak |
| 0:45.2 | username and password. |
| 0:47.1 | What made this sort of a little bit interesting is that the request appeared to come from |
| 0:52.9 | an Indonesian government system. |
| 0:56.0 | Then, of course, the question is always, can you somehow imply intent if such an a |
| 1:01.9 | utterance is used? Well, Jackie here looked closer at the particular sample. It was fairly |
| 1:08.4 | standard, sort of a standard S-S-H warm that we have so many of it. |
| 1:13.6 | So her conclusion here was that this was not actually any kind of government organized or attributable event, |
| 1:22.3 | but instead likely just another compromise system that just happened to be inside this particular government's |
| 1:30.3 | network. Of course, packets themselves usually don't speak to intent. We would have to observe |
| 1:37.6 | more what the particular attack was actually then after, but in this case, it didn't really |
| 1:43.1 | look like it was anything special. |
| 1:45.1 | In the past, some government actors, for example, have used similar techniques to attack |
| 1:50.8 | home routers and the like in order to then build more sophisticated attack networks. |
| 1:58.9 | Well, that's just a quick update on the React vulnerability. |
| 2:02.4 | There are now working proof-of-concept exploits out there that have been verified, |
| 2:07.6 | that can easily be adjusted in order to launch arbitrary code on vulnerable systems. |
... |
Transcript will be available on the free plan in 20 days. Upgrade to see the full transcript now.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.