SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS Stormcast Tuesday, March 31st, 2026: Honeypot Session Lifetime; Let’s Encrypt Tests Mass Revocation; F5 RCE Exploited

Mar 31, 2026
Analysis of long-lived honeypot sessions that repeatedly run commands to transfer malware. A simulation of mass certificate revocation by a major CA and how ACME clients may handle replacement requests. A reclassification of an F5 BIG-IP flaw to remote code execution and the urgency of reprioritizing patches.
Ask episode
AI Snips
Chapters
Transcript
Episode notes
ANECDOTE

Last Command Often Reveals Honeypot Detection

  • Attackers sometimes reveal they're in a honeypot by the last command they run before disconnecting.
  • Jesse's diary showed commands with distinct return values that hint a honeypot response needs tweaking to keep attackers engaged.
INSIGHT

Most Honeypot Sessions Are Very Short

  • Most honeypot sessions are fleeting, often lasting only a couple seconds before disconnecting.
  • Johannes Ulrich observed some outliers that run many repeated commands to stream binaries, revealing different attacker behaviors.
INSIGHT

Let's Encrypt Tested Mass Revocation With ACME ARI

  • Let's Encrypt tested mass revocation using the new ACME ARI feature in the staging environment to avoid impacting production.
  • The ARI renewal check lets clients learn a certificate should be renewed and tells the CA which certificate replaces it for revocation.
Get the Snipd Podcast app to discover more snips from this episode
Get the app