Handler on Duty: Guy Bruneau
Threat Level: green
Podcast Detail
SANS Stormcast June, Tuesday, June 10th, 2025: Octosql; Mirai vs. Wazuh DNS4EU; Wordpress Fair Package Manager
If you are not able to play the podcast using the player below: Use this direct link to the audio file: https://traffic.libsyn.com/securitypodcast/9486.mp3
My Next Class
Application Security: Securing Web Apps, APIs, and Microservices | Washington | Jul 14th - Jul 19th 2025 |
Application Security: Securing Web Apps, APIs, and Microservices | Las Vegas | Sep 22nd - Sep 27th 2025 |
OctoSQL & Vulnerability Data
OctoSQL is a neat tool to query files in different formats using SQL. This can, for example, be used to query the JSON vulnerability files from CISA or NVD and create interesting joins between different files.
https://isc.sans.edu/diary/OctoSQL+Vulnerability+Data/32026
Mirai vs. Wazuh
The Mirai botnet has now been observed exploiting a vulnerability in the open-source EDR tool Wazuh.
https://www.akamai.com/blog/security-research/botnets-flaw-mirai-spreads-through-wazuh-vulnerability
DNS4EU
The European Union created its own public recursive resolver to offer a public resolver compliant with European privacy laws. This resolver is currently operated by ENISA, but the intent is to have a commercial entity operate and support it by a commercial entity.
https://www.joindns4.eu/
WordPress FAIR Package Manager
Recent legal issues around different WordPress-related entities have made it more difficult to maintain diverse sources of WordPress plugins. With WordPress plugins usually being responsible for many of the security issues, the Linux Foundation has come forward to support the “FAIR Package Manager,” a tool intended to simplify the management of WordPress packages.
https://github.com/fairpm
Application Security: Securing Web Apps, APIs, and Microservices | Washington | Jul 14th - Jul 19th 2025 |
Application Security: Securing Web Apps, APIs, and Microservices | Las Vegas | Sep 22nd - Sep 27th 2025 |
Application Security: Securing Web Apps, APIs, and Microservices | Denver | Oct 4th - Oct 9th 2025 |
Application Security: Securing Web Apps, APIs, and Microservices | Dallas | Dec 1st - Dec 6th 2025 |
Podcast Transcript
Hello and welcome to the Tuesday, June 10th, 2025 edition of the SANS Internet Storm Center's Stormcast. My name is Johannes Ullrich and this episode brought to you by the SANS.edu Master's Degree Program in Information Security Engineering is recorded in Jacksonville, Florida. Well, in diaries today, we do have a little tool introduction by Russ. Russ introduces us to OctoSQL, a tool I haven't used yet myself, but actually sounds like something that I like. It essentially allows you to read in files in various text file formats like JSON, CSV, tab delimited and the like. And then it allows you to write SQL queries against the content of these files. So that makes it really handy to have sort of a simplified query language, no matter what the particular file format is that you're reading into. And the example that Russ here presents is using the NVD JSON database and then writing queries against this. For example, figuring out various products, what their vulnerabilities are. So it doesn't just read in the vulnerabilities, also like the product identifier database from NVD in order to then be able to join the two. So interesting tool. And like I said, certainly something that I'll probably give a try as well. Well, yesterday I talked about DVR vulnerability in Mirai, which I mentioned, well, is sort of nothing really that unique and new. But, well, today I have to talk again about Mirai. And this time it's a little bit more interesting in that Mirai now apparently is also exploiting Wazuh-related vulnerability. If you're not familiar with Wazuh, it's actually a real great open source tool. It is an open source endpoint detection response tool. So monitor systems, does some log aggregation alike. But, yes, back in April, I think it was, they had a severe vulnerability. Don't expose these kind of dashboards and complex tools to the Internet. Of course, something like Wazuh, the tricky part is that hosts in your network have to connect to its API. So there is some restriction around what kind of firewall rules and such you can put in place around these tools in order to really isolate them well from exploitation. And, yeah, the fact that Mirai is now taking advantage of this vulnerability just shows that this is very straightforward, very simple to exploit vulnerability. So if Mirai knows about it, well, everybody else in the world who may have a little bit more access to your network already is exploiting it as well. Well, and then we have another recursive resolver that the public can use. This one is a little bit different. It's run by a government entity right now. And that's the European Union. Now, the European Union runs it right now. It will configure it, set it up. They hope to hand it over to a yet -to-be-named private entity that then will also fund this service. Given that it was created by the European Union, that means that it's specifically sort of built around some of the privacy requirements that come with that. And they offer otherwise of the standard services that usually these public resolvers are offering, where they offer various levels of filtering based on what particular resolver you select. Whenever you configure a recursive resolver like this, of course, the key issue is do you trust a particular entity that is running this particular recursive resolver? We do have a number of existing ones, like the famous ones run by Google, Cloudflare, Cisco, and the like, that are already offering very similar services, also similar levels of filtering. One of the advantages, in addition to the filtering, if you want to do that, is, of course, also that these resolvers tend to be a little bit faster than setting up your own internal recursive resolver. Because you're kind of, you know, gaining some speed from all data that they may have already cached in their system. Well, I stopped over the last couple years to talk about WordPress add-on of Waterbleach. Just because there are so many, and I think it's really brave if you're still hosting WordPress yourself with a bunch of different packages installed. But lately, things apparently have been even more complicated for WordPress users with some legal issues between some of the big backers behind WordPress. And that made it particularly difficult to keep all of your WordPress packages and add-ons up to date. Well, the Linux Foundation now stepped forward together with some people that manage and create WordPress packages to create this new Package Manager project, FAIR, that's intended to provide you with an independent way to keep your WordPress packages up to date. So, if you are running WordPress, take a look at this. Probably will make it a little bit easier to keep WordPress running safely for you. Well, and that's it for today. So, thanks for listening. Thanks for recommending this podcast. Thanks for leaving reviews on Apple Podcasts or whatever platform you're using. Remember, there's a video format on YouTube as well as, for example, on Alexa. You should be able to include this podcast as part of your daily flash briefing. Thanks, everybody, and talk to you again tomorrow. Bye.