4.9 • 696 Ratings
🗓️ 28 February 2025
⏱️ 14 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | Hello and welcome to the Friday, February 28th, 2025 edition of the Sands Internet Storm Center's Stormcast. |
0:10.1 | My name is Johannes Ulrich and today I'm recording from Jacksonville, Florida. |
0:15.3 | Xavier today published a quick diary with a new version of the N.J. Rad matter that he found. And well, NJ. Rad in this |
0:24.7 | example is taking advantage of Microsoft death tunnels. This is activity that may go unnoticed |
0:31.4 | because it is a legitimate service. Sometimes as I've described living off the cloud |
0:36.8 | attacks. but essentially |
0:39.9 | Dev tunnels are meant for developers to help test web services. But of course, they can also |
0:45.7 | be used to relay other traffic, like in this case, the exfiltration of credentials. The domain |
0:52.3 | to look for here is Devtunnels.m.MS for sort of credentials. The domain to look for here is DevTunnels.m.m. MS for sort of Microsoft. |
0:59.2 | This particular domain is exclusively used for these Dev tunnels and, well, they're called |
1:04.5 | Dev tunnels because they're used for development, not necessarily for production software. |
1:09.2 | So unless you are actually actively developing software using death tunnels, |
1:16.5 | you probably shouldn't see that Domania network, |
1:19.3 | which makes a pretty good indicator of compromise here, |
1:23.0 | something to go hunting for. |
1:26.0 | And researchers at George Mason University came up with an interesting method to subvert |
1:31.8 | the Apple-Might-Find network. |
1:34.7 | This is the network that's being used to track air tags and other Apple devices. |
1:39.5 | In order for a device to be tracked, it needs a valid public-private key pair. The public key is |
1:46.8 | then being used to essentially send the lost message that's then being received and |
1:52.7 | relate by various Apple devices that are capable of participating in this My Find network. |
2:00.2 | The problem that these researchers have discovered is that it's actually not that |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.