4.9 • 696 Ratings
🗓️ 27 February 2025
⏱️ 7 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | Hello and welcome to the Thursday, February 27th, 2025 edition of the Sands Internet Storm Center's Stormcast. |
0:08.7 | My name is Johannes Ulrich and I'm recording from Jacksonville, Florida. |
0:13.4 | Well, today we have a guest diary by one of our undergraduate interns, Robin Sar here. |
0:19.0 | Robin is writing about the use of ephemeral ports in order to download |
0:24.7 | Malver. This is something that happens quite common where the web server that the attacker is |
0:31.5 | connecting to in order to download additional Malver is not listening on Port 80,443, not even port 8,000, but instead on a very |
0:40.2 | high port, like 60,000 something or such. This is certainly something you look for, where you're |
0:47.0 | looking for anomalies, looking for HTTP traffic or HTTP or TLS traffic, for that matter, |
0:53.4 | on these high ports. |
0:55.3 | You have to be a little bit careful. |
0:57.7 | I've, in particular lately, more and more, seen it with web service and such, |
1:02.0 | where they sometimes listen on these high-od ports in cloud environments, |
1:07.4 | also, I think in part also because of the overloading of IP addresses. |
1:12.0 | People sometimes use these sort of random high ports. |
1:16.2 | They're even sometimes negotiated dynamically. |
1:19.2 | So where you first have some kind of handshake that then defines what high port is |
1:24.8 | being used. |
1:25.4 | This used to be more common like for a voiceover IP and for online gaming, |
1:30.2 | but I've sadly seen this more and more with sort of more mainstream applications as well, |
1:36.2 | which of course makes a detection of this kind of attack activity more tricky. |
1:41.6 | Still something you look for, and if you can definitely block outbound |
1:46.5 | connections on these high boards, again, just be careful that you're not disrupting any |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.