meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS Stormcast Thursday, October 2nd, 2025: Honeypot Passwords; OneLogin Vuln; Breaking Intel SGX; OpenSSL Patch

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 2 October 2025

⏱️ 8 minutes

🧾️ Download transcript

Summary


Comparing Honeypot Passwords with HIBP
Most passwords used against our honeypots are also found in the Have I been pwn3d list. However, the few percent that are not found tend to be variations of known passwords, extending them to find likely mutations.
https://isc.sans.edu/diary/%5BGuest%20Diary%5D%20Comparing%20Honeypot%20Passwords%20with%20HIBP/32310
Breaking Server SGX via DRAM Inspection
By observing read and write operations to memory, it is possible to derive keys stored in SGX and break the security of systems relying on SGX.
https://wiretap.fail/files/wiretap.pdf
OneLogin OIDC Vulnerability
A vulnerability in OneLogin can be used to read secret application keys
https://www.clutch.security/blog/onelogin-many-secrets-clutch-uncovers-vulnerability-exposing-client-credentials
OpenSSL Patch
OpenSSL patched three vulnerabilities. One could lead to remote code execution, but the feature is used infrequently, and the exploit is difficult, according to OpenSSL

Transcript

Click on a timestamp to play from that location

0:00.0

Hello and welcome to the Thursday, October 2nd, 2025 edition of the Sands Internet Storms Centers.

0:11.6

Stormcast, my name is Johannes Ulrich, recording today from Jacksonville, Florida.

0:17.6

And this episode is brought you by the Sands.edu master's degree program in information security

0:23.7

engineering. Today's diary comes yet again from one of our undercreated interns. Trayton

0:30.1

Barwick wrote this diary looking at the passwords collected by the Honeypot and then comparing

0:37.0

them to the have I been a pawned to the Have I Been Poned list.

0:40.6

Have I Been Pond you're probably familiar with is a website that does collect passwords from

0:46.9

password breaches and you can look up if a particular password has already been leaked in one of

0:53.7

these breaches and that's what Trayton is doing here

0:57.3

with a script. This script will first of all summarize and extract all the passwords from the

1:03.6

Honeypot logs and then compare them to the half-have-been-poned list. No big surprise? Well,

1:09.6

most of the passwords are in the half-I-be-boned list.

1:14.9

And that in part is because often default passwords are being attempted, but also credential

1:20.8

stuffing where attackers are attempting to use passwords that were specifically found in prior breaches.

1:28.9

Now then, Trayton took a closer look at the remaining 7% of passwords that didn't show up

1:34.6

in half-have-been-poned, and many of them were derivatives of passwords, like, for example,

1:41.1

changing the year and things like this or adding a couple special characters.

1:46.4

Probably the attackers attempt here to expand on the patterns

1:50.0

that are commonly seen in these league password lists

1:52.8

to hopefully gather and hit a couple passwords

1:56.3

that maybe the competition hasn't attempted yet.

2:00.5

And tall came me with Clutch Security published an interesting vulnerability report for One Login.

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.