4.9 • 696 Ratings
🗓️ 26 February 2025
⏱️ 6 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | Hello and welcome to the Wednesday, February 26, 2025 edition of the Sands Internet Storm Center's Stormcast. |
0:08.7 | My name is Johannes Ulrich, and I'm recording from Jacksonville, Florida. |
0:14.0 | Security Scorecard published a write-up about a botnet that they have observed attacking Microsoft 365 accounts. |
0:22.4 | And what's a little bit different here is that they're not sort of going after normal |
0:27.3 | user accounts, but instead they're going after accounts used by automatic scripts. |
0:33.4 | And with that, of course, you often don't have the ability to do things like two-factor authentication. |
0:40.3 | In this particular case, they're attacking accounts that are using basic authentication, |
0:45.8 | which means you typically have a static username and password, some kind of API key. |
0:52.1 | And, well, a recent NIST guidance, for example, |
0:55.2 | specifically suggested to move away from API keys. |
0:58.7 | And one of the big reasons behind that was that API keys tend to be difficult to rotate. |
1:05.5 | If you do need to design some kind of API and web services access. |
1:13.4 | The standard method these days is often O-O-O-O-O-O-R. |
1:16.3 | Now, O-O-Rth is not really safe from some of these Info-Stealer types, |
1:21.3 | but in addition to that, you probably also want to make sure |
1:24.7 | that development and production environment are cleanly separated |
1:28.8 | because infestilers tend to infect developers, not so much in production environments. |
1:36.0 | And as such, if an infestaler steals credentials from a developer, then, well, they can't be used against the production environment. |
1:44.5 | It may also be worthwhile looking into like Canary tokens here. |
1:49.6 | That's a nice little trick that can help you identify some of these attacks. |
1:55.4 | Now, security scorecard did publish a bunch of indicators of compromise here with the report, |
2:00.6 | but we all know that |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.