4.9 • 696 Ratings
🗓️ 15 July 2025
⏱️ 6 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | Hello and welcome to the Tuesday, July 15th, 2025 edition of the Sands and then at Storm Center's |
0:07.1 | Stormcast. My name is Johannes Orrich, and this episode brought you by the sands.edu certificate program |
0:14.9 | in cybersecurity leadership is recorded in Washington, D.C. Well, if you are running one of our honeypots and sending us |
0:23.2 | logs, which I hope many of you are doing, you may have noticed a delay in imports of these |
0:29.5 | logs over the weekend. This was in part caused by, well, an unintentional, self-reflected denial |
0:35.2 | of service. We were playing with a new version of the honeypot, |
0:39.4 | and well, myself and Jesse were running it and causing a lot of additional logs. |
0:44.7 | But this also triggered Jesse to look a little bit at the log volume of his honeypots. |
0:50.7 | He's running about half a dozen of them across time. And we have seen in the past |
0:56.0 | where honeypots are on a particular day or so all of a sudden get a big search in logs. This is |
1:03.2 | often caused by one particular IP address, essentially running a vulnerability scan against a particular |
1:09.0 | honeypot. Well, what Jesse saw was something a little bit different. |
1:13.7 | Over the last couple weeks, the log volume across all of his honeypots, |
1:19.0 | has increased substantially sort of by an order of magnitude. |
1:23.6 | Actually, when he plotted it sort of as number of logs, events over time, |
1:29.4 | the prior part of the graph pretty much looked like zero, like nothing was there. |
1:34.9 | What is also interesting here is that this attack appears to be caused by IP addresses |
1:40.6 | that only scan a very small number of URLs. |
1:45.2 | And these URLs are related to the Sonic Wall vulnerability. |
1:50.5 | Looks like there is some kind of botnet that infected these Sonic Wall systems |
1:56.3 | and is now very aggressively scanning for additional warnable systems. |
2:02.0 | I hope they sort of got what there is as far as vulnerable systems exists out there, |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.