Handler on Duty: Guy Bruneau
Threat Level: green
Podcast Detail
SANS Stormcast Wednesday, April 30th: SMS Attacks; Apple Airplay Vulnerabilities
If you are not able to play the podcast using the player below: Use this direct link to the audio file: https://traffic.libsyn.com/securitypodcast/9430.mp3
My Next Class
Application Security: Securing Web Apps, APIs, and Microservices | San Diego | May 5th - May 10th 2025 |
Application Security: Securing Web Apps, APIs, and Microservices | Washington | Jul 14th - Jul 19th 2025 |
More Scans for SMS Gateways and APIs
Attackers are not just looking for SMS Gateways like the scans we reported on last week, but they are also actively scanning for other ways to use APIs and add on tools to send messages using other people’s credentials.
https://isc.sans.edu/diary/More%20Scans%20for%20SMS%20Gateways%20and%20APIs/31902
AirBorne: AirPlay Vulnerabilities
Researchers at Oligo revealed over 20 weaknesses they found in Apple’s implementation of the AirPlay protocol. These vulnerabilities can be abused to execute code or launch denial-of-service attacks against affected devices. Apple patched the vulnerabilities in recent updates.
https://www.oligo.security/blog/airborne
Application Security: Securing Web Apps, APIs, and Microservices | San Diego | May 5th - May 10th 2025 |
Application Security: Securing Web Apps, APIs, and Microservices | Washington | Jul 14th - Jul 19th 2025 |
Application Security: Securing Web Apps, APIs, and Microservices | Las Vegas | Sep 22nd - Sep 27th 2025 |
Application Security: Securing Web Apps, APIs, and Microservices | Denver | Oct 4th - Oct 9th 2025 |
Podcast Transcript
Hello and welcome to the Wednesday, April 30th, 2025 edition of the SANS and Internet Storm Center's Stormcast. My name is Johannes Ullrich and today I'm recording from Jacksonville, Florida. Today I expanded a little bit on work that I already wrote about last Thursday's and thats attacks against SMS gateways and tools. Now on Thursday I talked particularly about attacks against Teltonika, networks, gateways. These are sort of standalone devices more or less that you can use to basically programmatically send SMS messages. But of course that's actually not what most people are using to send SMS messages. Most people are using some kind of API. API, Twilio comes to mind as one of the big ones offering these services. Broadband.com and a couple of other companies like this. So I went through our logs today to see what other ways I see how attackers are trying to attack these types of SMS gateways. And well, no big surprise here. I saw a number of different techniques being used here. First of all, well, WordPress. I sort of stopped of course talking a little bit about WordPress vulnerabilities. There are just so many about the plugins in particular. And turns out there are dedicated plugins that allow you to send SMS messages from WordPress. And these plugins of course are attacked. What we are seeing here in our data is mostly attempts to fingerprint WordPress sites to check if they're running one of these plugins. And then it's assumed that once they find that a particular site has this plugin installed, they will then actually attempt to exploit it. Now, there's also a couple of a little bit odd and broken scans here. Like these, yes, sort of WordPress scans. But notice that percent, percent, target, percent, percent. That's often left over when people sort of build these templates and then are not properly filling them in and dealing with them. But we also see plenty of scans for SMS API related configuration files. Like these ENV files that are often used to store environment variables that then contain access credentials for a particular SMS service. Focusing a little bit here on Twilio, not because they're particular vulnerable. But, well, they're sort of the big one here, particular for smaller sites that are sending SMS messages. And that's why they sort of keep showing up here. We also do have a couple sort of unique tools like this SMS.py script, for example. I've seen this actually being scanned for quite a bit. And then SMS underscore Bomber dot exe. That is a tool that's specifically designed to send SMS very quickly. It supports spreading them out across multiple different APIs and also across proxies. It comes actually with an interesting configuration file that has a list of various APIs it supports, including credentials for these respective APIs. I haven't tested them. I'm not sure if those credentials that they basically distribute via their Git repository are still valid. I doubt it. I consider them really more sort of sample credentials. And, of course, you have then to replace with credentials that you stole somewhere else. Also, some proxy attempts. Then, again, your SMS Bomber does support the use of proxies. So, we do have some scans of our honeypots where they're checking if our honeypot is a proxy that's able to then relay these requests to various SMS APIs. Overall, if you are sending SMS from your application, make sure you are protecting credentials. If these credentials get lost, first of all, you'll get stuck with a pretty substantial bill, probably. And then the number you are sending those texts from, well, that number could be marked as spam or fraudulent. So, you pretty much, if this happens, have to use a new number, which, of course, may be bad for a reputation and such if people already know that they expect messages from you from a particular number. Researchers from Oligo did find 23 different vulnerabilities in Apple's AirPlay. Now, before you panic here, these vulnerabilities have been fixed. If your system is up to date, you should be good. AirPlay, if you're not familiar with it, it's Apple's protocol to stream audio and video to devices within the local network. And that's a little bit where the problem comes from. It's, as a protocol, designed to be used on the local network. And with that, well, it kind of lives in that illusion of having sort of a secure network environment. It does offer some authentication, but there is a substantial attack surface pre-authication, that protocol. And that's in part where the issue lies here in this vulnerability. The vulnerabilities have spanned the entire gamut from zero -click remote code execution all the way here to denial of service, where not all of the 23 vulnerabilities, in particular denial of service vulnerabilities, did get a CVE number from Apple. So we have less than 23 CVE numbers in case you're counting. But there are a couple of different types of attacks. So first of all, of course, the most severe one is the remote code execution attack. It does not require user interaction as long as you do allow all devices from the local network to connect to your system. The second one here is then an attack against speakers and receivers that support the AirPlay protocol. This is a vulnerability that's sort of inherent to the software development kit that is used to implement this protocol. And then we also do have vulnerabilities in CarPlay devices. They are exploitable also in some cases via Bluetooth and, yes, USB. But, of course, that's probably the most difficult part here to actually exploit. One interesting part here is with the entire pairing process, in particular if Bluetooth is involved, there may be a pin code displayed on the device, which may be the screen in your car. And it's not unreasonable that someone being in close proximity to your car may be able to see that number and with that actually complete the authentication. Again, these vulnerabilities are patched. If you do want to take a look on your own Apple device in the AirDrop and HandOff settings, that's sort of where you find them. You can just turn off the AirPlay receiver. And if you do leave it turned on, you have the option to either only allow the current user, that's sort of your most secure mode here, or then anyone on the same network or everyone. AirPlay itself is exposed on port 7000. Yeah, so you may want to review your AirPlay settings. At least, like I said, limit them to current user, maybe turn it off altogether. Personally, I hardly ever see a reason to sort of stream video audio to like a laptop or something like this. It's really more meant for systems like Apple TV, and that's usually not something that you're moving around much to untrusted networks. Well, that's it again for today. Sorry for running a little bit longer today on the two individual stories. Hope you don't mind that too much. Well, if there's anything I should do different, if there's any story that I missed, please let me know. And that's it for today. Thanks for liking and recommending this podcast. Again, if you happen to be at the RSA conference, stop by at the SANS booth. And that's it. Talk to you again tomorrow. Bye.