************************ SPONSORED BY Symantec *************************** Symantec Endpoint Protection 12 and Critical System Protection are positioned highest in Gartner's Magic Quadrant for completeness of vision and the ability to execute. Read the report to learn about the Endpoint Protection landscape, growth drivers and challenges, and where vendors are positioned. Learn More. http://www.sans.org/info/123600 **************************************************************************** TRAINING UPDATE
- --SANS 2013 Orlando, FL March 8-March 15, 2013 46 courses. Bonus evening presentations include Why Our Defenses Are Failing Us: One Click Is All It Takes ...; Human Nature and Information Security: Irrational and Extraneous Factors That Matter; and Over-Zealous Social Media Investigations: Beware the Privacy Monster. http://www.sans.org/event/sans-2013
- --North American Industrial Controls Systems and SCADA Summit 2013 Lake Buena Vista, FL February 6-13, 2013 The only technical security and training program in ICS security - for program managers, control systems engineers, IT security professionals and critical infrastructure protection specialists from asset owning and operating organizations along with control systems and security vendors who have innovative solutions for improving security. Every attendee leaves with new tools and techniques they can put to work immediately. 8 courses. Bonus evening presentation: The SANS SCADA Dinner Theater Players Present: From Exposure to Closure - Act III. http://www.sans.org/event/north-american-scada-2013
- -- SANS Monterey 2013 Monterey, CA March 22-March 27, 2013 7 courses. Bonus evening presentations include Base64 Can Get You Pwned!; and The 13 Absolute Truths of Security. http://www.sans.org/event/monterey-2013
- --SANS Northern Virginia 2013 Reston, VA April 8-April 13, 2013 7 courses. Bonus evening presentations include Infosec Rock Star: How to be a More Effective Security Professional; Pentesting Web Apps with Python; and Practical, Efficient Unix Auditing: With Scripts. http://www.sans.org/event/northern-virginia-2013
- --SANS Cyber Guardian 2013 Baltimore, MD April 15-April 20, 2013 9 courses. Bonus evening presentations include Windows Exploratory Surgery with Process Hacker; Offensive Countermeasures, Active Defenses, and Internet Tough Guys; and Tactical SecOps: A Guide to Precision Security Operations. http://www.sans.org/event/cyber-guardian-2013
- --Save on On-Demand training (30 full courses) - See samples at http://www.sans.org/ondemand/specials">http://www.sans.org/ondemand/specials Plus Scottsdale, Brussels, Johannesburg, Abu Dhabi, Seoul, and Bangalore all in the next 90 days. For a list of all upcoming events, on-line and live: http://www.sans.org
TOP OF THE NEWS
Industrial Control System Flaw Sufficient to Let Attackers Control Critical Systems (February 6 & 7, 2013)
A critical flaw in a widely used industrial control system (ICS) could be exploited to remotely take control of electronic door locks, heating systems, elevators, and other industrial processes at facilities using the vulnerable product. The problem lies in the Tridium Niagara AX Framework. Hackers can access a file on the system that contains all the system's configuration data. Among the information available in this file are usernames and passwords to access operator workstations. A Tridium spokesperson said the company plans to release a patch for the issue by February 13. -http://www.wired.com/threatlevel/2013/02/tridium-niagara-zero-day/ -http://arstechnica.com/security/2013/02/were-going-to-blow-up-your-boiler-critic al-bug-threatens-hospital-systems/ [Editor's Note (McBride): The Honeywell/Tridium Niagara security story broken by these two researchers is a much-needed case-study for the convergence of IT and OT networks. If Microsoft reports a 66% patch rate after nine months, what can we expect here? (Paller): Issuing a patch does NOT fix the problem. Vendor's should not be allowed to get away with leaving major security flaws in software used in the critical national infrastructure without ensuring that (1) each buyer knows about the risk (emails haven't changed, the right person is on the mailing list) and (2) the buyer has confirmed that he/she has the needed knowledge and support from the vendor to install the patch effectively. As an industry, we have to stop pretending that a patch release fixes a security flaw. Too often, a patch is never installed because the right person doesn't know about it or know enough about it and no automated capability is in place to ensure the patch is installed. ]
Android Phones Often Remain Unpatched (February 5 & 6, 2013)
Responsibility for distributing updates for the Android operating system has not been established. Does it lie with Google, the operating system's developer? Or with the phone's hardware manufacturer? Or with the user's wireless service carrier? Although Google responds swiftly when it learns of vulnerabilities in Android, the carriers and hardware manufacturers often do not send the update out in a timely manner. Manufacturers and carriers have to tweak the updates before sending them out. As a result, millions of Android phones remain unpatched for months at a time because carriers and hardware manufacturers do not send out the fixes as soon as they become available. In December, Ars Technica published information about how often Android phones had received updates. Most users had received two updates, even if they had had the phone for years. -http://www.washingtonpost.com/business/technology/android-phones-vulnerable-to-h ackers/2013/02/01/f3248922-6723-11e2-9e1b-07db1d2ccd5b_story.html -http://www.wired.com/threatlevel/2013/02/carriers-fail-to-secure-phones/ [Editor's Note (Pescatore): Android devices have a double security whammy compared to IOS devices: (1) The Google Play App Store white list mechanism is optional, where in IOS it requires the user to actively subvert the phone; and (2) this issue of the OS and the hardware coming from separate vendors. Making the former much more mandatory can go a long way towards mitigating the risks of the latter. (Shpantzer): Fragmentation in the Android ecosystem has gotten really ridiculous, some estimates peg the 4.x version is only 10% of the userbase. iOS gets to double digits in a matter of DAYS due to the closed nature of the ecosystem and tight HW/SW coupling. Some say (I'm stilll noodling on it) that this kind of fragmentation makes it very difficult to write a mass exploit for Android, since you'd have to properly code for the insane number of HW/SW permutations. (Murray): It seems unlikely that there are any more implementation-induced Flaws in Android than in iOS. However, patches in iOS have to be tested on only a dozen or so devices. Those devices all look to a single source for updates. If one is interested in security, the iOS strategy has advantages. ]
************************ Sponsored Links: ******************************* 1) SANS Survey on SCADA Security results revealed by SCADA expert, Matt Luallen, Wed, Feb. 20. 1PM EDT. http://www.sans.org/info/123605 2) Take the SANS Survey on Help Desk Security! Enter to win an iPad 4! http://www.sans.org/info/123610 3) Java Web Security By Example - Featuring: Frank Kim and Andy Chou Tuesday, February 19, 2013 at 4:00 PM EST (2100 UTC/GMT) http://www.sans.org/info/123615 *****************************************************************************
THE REST OF THE WEEK'S NEWS
A Major Shift in Cyber Security of Industrial Control Systems (February 5, 2013)
Power and energy systems have long been recognized as "critical infrastructure" and everyone has felt the impact personally and to the economy overall when a power outage or a disruption in the flow of oil or gas hits. Cyber attacks have been increasingly targeting those same systems and unless the owners and operators enhance the levels of cybersecurity expertise of their staffs and the protection levels of the critical systems, cyber could be added to the causes for disruptions. Five of the most trusted technical leaders in control system and IT cybersecurity are joining forces with eleven large companies in the power, oil & gas industries to drive immediate improvement in the ability of the operators of critical infrastructure systems to protect themselves against advanced cyber attacks. The initial focus will be to increase the security skill levels of the operations and security staffs, since they represent both the first line of cyber defense and last line to avoid/manage consequences. The group will quickly establish a consensus set of knowledge and skill needs for the operations and cyber-security positions at critical infrastructure systems, leading towards a comprehensive international security skills program. A longer term effort will be to define the highest priority security practices and controls for greatly reducing power and energy's risk of successful attack. The leaders are Michael Assante who was CSO of American Electric Power and CSO of NERC; Tim Conway who was Director of NERC Compliance and Operations Technology at Northern Indiana Public Service Company (NIPSCO); John Pescatore who was Gartner's lead security analyst for the last 13 years; Ed Skoudis who is widely acknowledged as the nation's top expert on malicious software and penetration methods and who developed the training and simulators now used to ensure the skills of cyber warriors and defenders in the U.S. military; and Tony Sager who, in his 34-year career, developed and managed the 750 top cyber vulnerability and defense experts at the National Security Agency. The initiative will be unveiled in a workshop on February 13 where the man who led the DHS team that handled break-ins at US critical infrastructure will share pragmatic security measures that work. The workshop may be the most important meeting ever held on this topic because it marks the end of the era of "admiring the problem" and the beginning of an international consensus to fix the problem. -http://www.sans.org/event/north-american-scada-2013
Iran Airs Video Allegedly From Downed US Drone (February 7, 2013)
DOD Faces Hurdles in Finding 4,000 Qualified Cybersecurity Specialists (February 6, 2013)
Experts say that the 4,000 cybersecurity experts the US Cyber Command wants to hire simply do not exist right now. The issue is three-fold. First, people need to be identified as having the potential for success in the field. Second, those people must commit to 2,000 and 5,000 hours of hands-on, "stick time" experience. And finally, the DOD will be competing with private industry for the talent; DOD will require its employees to have security clearances, and the private sector offers higher salaries. Programs aimed at training people in cybersecurity have been established, but they are not likely to generate the large number that DOD wants very quickly. -http://www.defensenews.com/apps/pbcs.dll/article?AID=2013302060013
Microsoft and Symantec Take Down Bamital Botnet (February 7, 2013)
Microsoft and Symantec recently joined forces to take down a botnet known as Bamital, which was reportedly earning more than US $1 million a year for its operators. Earlier this week, technicians from both companies, accompanied by US federal marshals, raided data centers in Virginia and New Jersey to seize evidence. Bamital infected between 300,000 and one million computers by the time it was shut down, and it had been used to attack more than eight million computers over the past two years. It was used to hijack web searches. When users whose computers are infected with Bamital try to search the web, they will now be greeted with a page from Microsoft explaining why they have been redirected and what they should do to clean up their computers. -http://www.h-online.com/security/news/item/Microsoft-and-Symantec-collaborate-to -disable-click-fraud-botnet-1799528.html -http://www.bbc.co.uk/news/technology-21366822 -http://krebsonsecurity.com/2013/02/microsoft-symantec-hijack-bamital-botnet/ -http://news.cnet.com/8301-1009_3-57568067-83/microsoft-symantec-shutter-another- botnet/ [Editor's Note (Henry): (Henry): The private sector's involvement in identifying and dismantling adversary infrastructure is a growing phenomenon, which I expect to see increase going forward. They have visibility into the networks, and that intelligence is critical for a successful takedown. Coordination with the US Government, in this case the Marshal's Service, should be considered, and the use of authorized judicial process provides a sense of over confidence that this is done fairly and lawfully. (Murray): Again, kudos to all those responsible for bringing down this and other botnets. That said, the existence of botnets is evidence that there are lots of weak systems connected to the Internet. Botnets have been used for spam and DDoS attacks, but they dramatically reduce the potential cost of Brute Force attacks against passwords, lock-words, and keys. ]
- Intel's Network Card Vulnerable to Packet of Death (February 8, 2013)
DOD and VA Scrap New EHR Plan in Favor of Developing Interoperability of Existing Systems (February 6, 2013)
The US Departments of Defense (DOD) and Veterans Affairs (VA) will not pursue development of a new electronic health records (EHR) system that would enable data sharing across the departments. Instead, the departments will seek out existing technologies to improve the interoperability of their existing systems. The shift will save money, improve service for patients and care providers, and be complete sooner than the new system would have been. The plan calls for piloting a common interface at seven joint rehabilitation centers this summer. The new system would have been operational in 2017, but the revised plan should be in place by the beginning of 2014. -http://www.nextgov.com/health/2013/02/cut-costs-defense-and-va-scrap-plans-new-e lectronic-health-record/61120/?oref=ng-HPtopstory [Editor's Note (Pescatore): For the last six months my doctor's office has had a sign at the receptionist area: "Please excuse the delays. We are implementing electronic health records." EHR has been overhyped for years, and in many ways the desire to increase efficiency/interoperability has been part of the reasons why HIPAA has been largely a toothless compliance regime. However, nothing will stay "non-electronic" much longer - there is an opportunity to build better security into new systems and software built from scratch. The DoD and VA will need to make sure they pay attention to and *fix* existing vulnerabilities and weaknesses in those legacy systems before they start opening them up for sharing and interoperability. (Shpantzer): Two places to look for information of concern to us on medical systems are HIMSS and Dartmouth ISTS -http://www.ists.dartmouth.edu/projects/healthit_security/index.html]
Complex Identity and Card Fraud Scheme Netted Gang US $200 Million (February 5 & 6, 2013)
************************************************************************ The Editorial Board of SANS NewsBites
John Pescatore was Vice President at Gartner Inc. for fourteen years. He became a director of the SANS Institute in 2013. He has worked in computer and network security since 1978 including time at the NSA and the U.S. Secret Service.
Shawn Henry recently retired as FBI Executive Assistant Director responsible for all criminal and cyber programs and investigations worldwide, as well as international operations and the FBI's critical incident response. He is now president of CrowdStrike Services.
Stephen Northcutt founded the GIAC certification and is President of STI, the premier skills-based cyber security graduate school, www.sans.edu.
Dr. Johannes Ullrich is Chief Technology Officer of the Internet Storm Center and Dean of the Faculty of the graduate school at the SANS Technology Institute.
Ed Skoudis is co-founder of CounterHack, the nation's top producer of cyber ranges, simulations, and competitive challenges, now used from high schools to the Air Force. He is also author and lead instructor of the SANS Hacker Exploits and Incident Handling course, and Penetration Testing course..
William Hugh Murray is an executive consultant and trainer in Information Assurance and Associate Professor at the Naval Postgraduate School.
Michael Assante was Vice President and Chief Security Officer at NERC, led a key control systems group at Idaho National Labs, and was Vice President and Chief Security Officer for American Electric Power.
Sean McBride is Director of Analysis and co-founder of Critical Intelligence, and, while at Idaho National Laboratory, he initiated the situational awareness effort that became the ICS-CERT.
Rob Lee is the curriculum lead instructor for the SANS Institute's computer forensic courses (computer-forensics.sans.org) and a Director at the incident response company Mandiant.
Tom Liston is a Senior Security Consultant and Malware Analyst for InGuardians, a handler for the SANS Institute's Internet Storm Center, and co-author of the book Counter Hack Reloaded.
Dr. Eric Cole is an instructor, author and fellow with The SANS Institute. He has written five books, including Insider Threat and he is a founder with Secure Anchor Consulting.
Mason Brown is one of a very small number of people in the information security field who have held a top management position in a Fortune 50 company (Alcoa). He is leading SANS' global initiative to improve application security.
David Hoelzer is the director of research & principal examiner for Enclave Forensics and a senior fellow with the SANS Technology Institute.
Gal Shpantzer is a trusted advisor to CSOs of large corporations, technology startups, Ivy League universities and non-profits specializing in critical infrastructure protection. Gal created the Security Outliers project in 2009, focusing on the role of culture in risk management outcomes and contributes to the Infosec Burnout project.
Alan Paller is director of research at the SANS Institute.
Brian Honan is an independent security consultant based in Dublin, Ireland.
David Turley is SANS infrastructure manager and serves as production manager and final editor on SANS NewsBites.
Please feel free to share this with interested parties via email, but no posting is allowed on web sites. For a free subscription, (and for free posters) or to update a current subscription, visit http://portal.sans.org/