4.9 • 696 Ratings
🗓️ 3 November 2025
⏱️ 6 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
| 0:00.0 | Hello and welcome to the Monday, November 3, 2025 edition of the Sands Internet Storm Centers. |
| 0:11.8 | Stormcast, my name is Johannes Ulrich, recording today from Jacksonville, Florida. |
| 0:17.5 | And this episode is brought you by the Sands.edu undergraduate certificate program in cybersecurity fundamentals. |
| 0:25.4 | It was just about a week ago that we got from Microsoft the emergency update for the Windows Server Update service. |
| 0:32.6 | This update fixed and already at the time exploited vulnerability that can lead to remote code |
| 0:40.6 | execution. Well, since the warnability now has been made public and also additional details |
| 0:47.0 | about the vulnerability have been made public, we have seen in our sensors an increase in scans for port 8530 and 8531, which are the two ports that are associated with was. |
| 1:02.6 | The first one is just plain TCP. |
| 1:05.6 | The second one is then also TCP, but with TLS for the 8530 scan rates went up from about 800 or so a day, |
| 1:18.3 | all the way up to in excess of 3,500. |
| 1:22.8 | And similar numbers for 8531, a little bit lower here, only about 3,000 counts here per day for 8531, |
| 1:34.1 | which is probably just because it's a little bit slower to scan TLS |
| 1:37.9 | if you actually want to go through the TLS handshake. |
| 1:42.9 | So assume that if you haven't exposed the WAS server, it has been found by now. |
| 1:50.3 | Now, many of these scans are being done by researchers. |
| 1:53.8 | I saw Shadow Server. |
| 1:55.5 | For example, in our data, doing some of these scans, Shadow Server will attempt to notify |
| 2:00.5 | entities of exposed servers, Shadow Server will attempt to notify entities off-exposed servers, |
| 2:03.1 | so please take those notifications serious. |
| 2:07.2 | The Australian Signals Directorate has published an advisory noting that an implant that they're |
| 2:13.5 | calling Bad Candy is being deployed to Cisco iOS XE devices that are still |
| 2:20.3 | warnable to CVE 202023-2198. So this is a 2023 vulnerability. Apparently it's still not patched. |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.