meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS Stormcast Thursday, April 24th: Honeypot iptables Maintenance; XRPL.js Compromise; Erlang/OTP SSH Vuln affecting Cisco

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 24 April 2025

⏱️ 6 minutes

🧾️ Download transcript

Summary


Honeypot Iptables Maintenance and DShield-SIEM Logging
In this diary, Jesse is talking about some of the tasks to maintain a honeypot, like keeping filebeats up to date and adjusting configurations in case your dynamic IP address changes
https://isc.sans.edu/diary/Honeypot%20Iptables%20Maintenance%20and%20DShield-SIEM%20Logging/31876
XRPL.js Compromised
An unknown actor was able to push malicious updates of the XRPL.js library to NPM. The library is officially recommended for writing Riple (RPL) cryptocurrency code. The malicious library exfiltrated secret keys to the attacker
https://www.aikido.dev/blog/xrp-supplychain-attack-official-npm-package-infected-with-crypto-stealing-backdoor
https://github.com/XRPLF/xrpl.js/security/advisories/GHSA-33qr-m49q-rxfx
Cisco Equipment Affected by Erlang/OTP SSH Vulnerability
Cisco published an advisory explaining which of its products are affected by the critical Erlang/OTP SSH library vulnerability
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-erlang-otp-ssh-xyZZy

Transcript

Click on a timestamp to play from that location

0:00.0

Hello and welcome to the Thursday, April 24th,

0:03.7

2005 edition of the Sands and a Storm Center's Stormcast.

0:08.9

My name is Johannes Ulrich and today I'm recording from Jacksonville, Florida.

0:14.6

Jesse and Ye have been maintaining part of our DeShield Honeypot,

0:20.4

in particular the seam component. The seam component

0:23.0

is an optional add-on that you can install for your Honeypot to give you a local dashboard

0:29.0

of what's going on with your Honeypot, what attacks you're seeing, and some graphic

0:34.6

representations of that. Now, keeping all that system up to date,

0:39.0

maintained, it can be a little bit tricky at times.

0:41.0

So Jesse did publish a diary,

0:45.4

summarizing some of his learnings about how to maintain the honeypot.

0:50.9

For example, how to update your bioval rules, your IP table rules automatically

0:57.6

to reflect a dynamic IP address. One thing we're doing

1:01.9

as part of the Honeypot is we only allow access to the admin port, the

1:05.9

actual SSH port, from very specific IP addresses, typically from IP addresses inside your own network,

1:14.5

and then also only log attacks coming from outside of your own network.

1:21.3

That may need some tweaking if your IP address gets updated, and as a result, Jesse is sort of summarizing what he had to do

1:30.1

in order to get that all working and set up properly.

1:34.9

The other thing that Jesse did illustrate is how to update the file beats component.

1:43.6

Now, the seam, and again, that's an add-on,

1:46.2

doesn't come sort of by default with the honeybot,

1:49.0

but it uses the usual Elk stack, Elasticsearch, Logs Dash, Kibbana.

...

Transcript will be available on the free plan in 19 days. Upgrade to see the full transcript now.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.