meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS Stormcast Monday April 7th 2025: New Username Report; Quickshell Vulnerability; Apache Traffic Director Request Smuggeling

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 7 April 2025

⏱️ 6 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. SANS Stormcast Monday April 7th 2025: New Username Report; Quickshell Vulnerability; Apache Traffic Director Request Smuggeling

Transcript

Click on a timestamp to play from that location

0:00.0

Hello and welcome to the Monday, April 7th, 2025 edition of the Science and at Storm Center's Stormcast. My name is Johannes Ulrich, and today I'm recording from Jacksonville, Florida.

0:13.0

I added a quick new report to the Storm Center website this weekend, and the reason I added it is the last couple of weeks,

0:22.0

I spent a bit more time with our S-H IntelNet data. You may have been able to tell by some of

0:29.1

the diaries I published. But the one thing I felt sort of was missing from the website was an easy

0:35.5

way to figure out what particular usernames and passwords

0:39.2

are just being newly used that have not been used before. This type of report is always

0:46.2

very useful. We have one for our web honeypots, for URLs and for the headers. So now we have it

0:53.9

also for usernames.

0:55.5

Passwords haven't made that public yet.

0:57.4

There are so many different passwords that makes that report a little bit challenging,

1:02.4

so still working on it.

1:04.3

And just a quick overview when I looked at it today wasn't anything super exciting.

1:15.7

Looks like a couple new first initial last name combinations were attempted.

1:21.0

Also, a couple bucks in tools, at least I think part of it at least is bugs,

1:23.9

where the first letter of the username is missing.

1:29.8

That can often happen like if an attacker doesn't understand quite how to pass command line arguments to a tool. There's also one particular attacker who has sent about

1:35.5

14,000, I think it was, requests using the file name of the username file as a username. So again, probably just someone not knowing how to use

1:47.7

the tool correctly. That happens actually, I think, much more often than people are realizing

1:52.7

that attackers are using exploits and such that they don't understand very well themselves

2:00.0

and that fail even if you are vulnerable.

2:03.7

Seen similar things also on the web application site

2:08.6

where attackers are just misspelling URLs.

...

Transcript will be available on the free plan in 2 days. Upgrade to see the full transcript now.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.