SANSFIRE is right around the corner June 13-20 - Live Online, Register today!

Newsletters: @RISK

Subscribe to SANS Newsletters

Join the SANS Community to receive the latest curated cyber security news, vulnerabilities and mitigations, training opportunities, and our webcast schedule.





SANS NewsBites
@Risk: Security Alert
OUCH! Security Awareness
Case Leads DFIR Digest
Industrial Control Systems
Industrials & Infrastructure


@RISK provides a reliable weekly summary of (1) newly discovered attack vectors, (2) vulnerabilities with active new exploits, (3) insightful explanations of how recent attacks worked, and other valuable data

A key purpose of the @RISK is to provide the data that will ensure that the 20 Critical Controls (the US and UK benchmark for effective protection of networked systems) continue to be the most effective defenses for all known attack vectors. But since it is also valuable for security practitioners, SANS is making it available to the 145,000 security practitioners who have completed SANS security training and others at their organizations who hope to stay current with the offensive methods in use.

November 21, 2019

=============================================================

     @RISK: The Consensus Security Vulnerability Alert

              November 21, 2019 - Vol. 19, Num. 47


Providing a reliable, weekly summary of newly discovered attack vectors,

vulnerabilities with active exploits, and explanations of how recent

attacks worked


Archived issues may be found at http://www.sans.org/newsletters/at-risk


=============================================================


CONTENTS:

NOTABLE RECENT SECURITY ISSUES

INTERESTING NEWS FROM AROUND THE SECURITY COMMUNITY

VULNERABILITIES FOR WHICH EXPLOITS ARE AVAILABLE

MOST PREVALENT MALWARE FILES Nov. 14 - 21

============================================================


TOP VULNERABILITY THIS WEEK: Attackers user custom droppers to install Agent Tesla


****************** Sponsored By Eclypsium ******************


Mother of All Drivers - New Vulnerabilities In Windows Drivers. Research from firmware security leader Eclypsium reveals how Windows kernel security mode enables attacks and identifies vulnerable drivers that can provide attackers with near-limitless control over a victim device. Research report and webinar describe common design flaws and what to do about them. http://www.sans.org/info/214805


============================================================

TRAINING UPDATE

 

-- SANS OnDemand and vLive Training

Get an 11" iPad Pro, a 12.3" Surface Pro, or Take $350 Off through December 4 with OnDemand or vLive training.

https://www.sans.org/online-security-training/specials/


-- SANS Cyber Defense Initiative(R) 2019 | Washington, DC | December 10-17 | https://www.sans.org/event/cyber-defense-initiative-2019


-- SANS Miami 2020 | January 13-18 | https://www.sans.org/event/miami-2020


-- SANS Threat Hunting & IR Summit & Training | London, UK | January 13-19, 2020 | https://www.sans.org/event/threat-hunting-europe-2020


-- SANS Tokyo January 2020 | January 20-25 | https://www.sans.org/event/tokyo-january-2020


-- SANS Amsterdam January 2020 | January 20-25 | https://www.sans.org/event/amsterdam-january-2020


-- Cyber Threat Intelligence Summit & Training | Arlington, VA | January 20-27 | https://www.sans.org/event/cyber-threat-intelligence-summit-2020


-- SANS Scottsdale 2020 | February 17-22 | https://www.sans.org/event/scottsdale-2020


-- Open-Source Intelligence Summit & Training 2020 | Alexandria, VA | February 18-24 | https://www.sans.org/event/osint-summit-2020


-- SANS Secure Singapore 2020 | 16-28 March | https://www.sans.org/event/secure-singapore-2020


-- Can't travel? SANS offers online instruction for maximum flexibility

-- Live Daytime training with Simulcast - https://www.sans.org/simulcast

-- Evening training 2x per week for 6 weeks with vLive | https://www.sans.org/vlive

-- Anywhere, Anytime access for 4 months with OnDemand format | https://www.sans.org/ondemand/


-- Single Course Training

SANS Mentor |  https://www.sans.org/mentor/about

Community SANS | https://www.sans.org/community/

 

-- View the full SANS course catalog and Cyber Security Skills Roadmap

https://www.sans.org/courses

https://www.sans.org/cyber-security-skills-roadmap


********************** Sponsored Links: ********************


1) ICYMI Webcast: Learn about this comprehensive solution for protecting PAS applications. http://www.sans.org/info/214810


2) Take the SANS Network Visibility and Threat Detection Survey and enter to win a $400 Amazon gift card | http://www.sans.org/info/214815


3) Webcast November 21st at 1 PM ET: Maximizing Threat Hunting Efficiency with Automated Queries. Register: http://www.sans.org/info/214825


============================================================


NOTABLE RECENT SECURITY ISSUES

SELECTED BY THE TALOS SECURITY INTELLIGENCE AND RESEARCH GROUP


Title: New, custom dropper delivers variety of information-stealing malware

Description: A wave of adversaries which are dropping well-known information-stealer like Agent Tesla, Loki-bot and others since at least January 2019 using custom droppers. These droppers inject the final malware into common processes on the victim machine. Once infected, the malware can steal information from many popular pieces of software, including the Google Chrome, Safari and Firefox web browsers. The injection techniques are well-known and have been used for many years, but with the adversaries customizing them, traditional anti-virus systems are having a hard time detecting the embedded malware.

Reference: https://blog.talosintelligence.com/2019/11/custom-dropper-hide-and-seek.html

Snort SIDs: 52246

 

Title: Denial-of-service vulnerability in some Intel graphics drivers

Description: Intel's IGC64.dll graphics driver contains a denial-of-service vulnerability. An attacker could exploit this bug by supplying a malformed pixel shader if the graphics driver is operating inside a VMware guest operating system. This type of attack can be triggered from VMware guest usermode to cause a denial-of-service attack due to an out-of-bounds read in the driver.

Reference: https://blog.talosintelligence.com/2019/11/vuln-spotlight-intel-DLL-driver-DoS-Nov-2019.html

Snort SIDs: 50295, 50296


============================================================


INTERESTING NEWS FROM AROUND THE SECURITY COMMUNITY


An on-demand transcription service is under fire for letting all of its freelance contractors access a database where all the recordings are held.

https://onezero.medium.com/rev-a-transcription-service-used-by-police-and-journalists-leaves-customer-data-out-in-the-open-81fff9f16669


The U.S. Department of Justice charged two men with stealing SIM cards as part of a scheme to steal thousands of dollars' worth of cryptocurrency.

https://www.cyberscoop.com/alleged-sim-swappers-charged-550000-cryptocurrency-scam/


The new checkra1n iOS jailbreak is now out in the wild, leaving a number of privacy and security questions up for debate among researchers and users.

https://arstechnica.com/information-technology/2019/11/what-the-newly-released-checkra1n-jailbreak-means-for-for-idevice-security/


US Democratic presidential candidate Amy Klobuchar urged voting machine vendors to not dismiss amateur security researchers and create a fixed timeline to patch known bugs.

https://www.cyberscoop.com/klobuchar-voting-vendors-election-security/


Google and Samsung recently patched a vulnerability in some photo apps that could allow an attacker to take over a device's camera, but other Android makers' devices are still at risk.

https://arstechnica.com/information-technology/2019/11/google-samsung-fix-android-spying-flaw-other-makers-may-still-be-vulnerable/


Ten companies formed a new coalition against stalkerware, launching a website to help victims and vowing to stop of the spread of this type of software.

https://www.vice.com/en_us/article/ywa7xv/coalition-against-stalkware-launches-eff-kaspersky


Andrew Yang, a US Democratic presidential candidate, released his proposal for what amounts to a "digital bill of rights" that includes taxing digital ads and launching a new federal agency to regulate social networks' algorithms.

https://www.theverge.com/2019/11/14/20964834/andrew-yang-digital-ads-tax-elizabeth-warren-antitrust-tech-facebook-google


Louisiana's state government was hit with a ransomware attack this week, bringing down an internal network and disrupting some public websites. However, the state says it is not paying out the ransom.

https://www.theadvocate.com/baton_rouge/news/politics/article_f1fe1cdc-0a2f-11ea-a0ac-dfef52b2b2af.html


=========================================================


RECENT VULNERABILITIES FOR WHICH EXPLOITS ARE AVAILABLE

COMPILED BY THE QUALYS VULNERABILITY RESEARCH TEAM


This is a list of recent vulnerabilities for which exploits are

available. System administrators can use this list to help in

prioritization of their remediation activities. The Qualys Vulnerability

Research Team compiles this information based on various exploit

frameworks, exploit databases, exploit kits and monitoring of internet

activity.


ID:        CVE-2019-17671

Title:    WordPress Core Stored Cross-Site Scripting (XSS) vulnerability

Vendor:    Wordpress

Description: A stored Cross-Site Scripting vulnerability within the WordPress Customizer that allows authenticated users to make changes to the WordPress theme to directly customize the interface. This vulnerability could allow unauthenticated users to view private or draft posts, which otherwise would not be viewable.

CVSS v2 Base Score:    5.0 (AV:N/AC:L/Au:N/C:P/I:N/A:N)


ID:        CVE-2019-10098

Title:    Apache Httpd mod_rewrite Open Redirects Vulnerability

Vendor:    Multi-Vendor

Description: In Apache HTTP server, Redirects configured with mod_rewrite that were intended to be self-referential might be fooled by encoded newlines and redirect instead to an unexpected URL within the request URL.

CVSS v2 Base Score:    5.8 (AV:N/AC:M/Au:N/C:P/I:P/A:N)


ID:        CVE-2019-10092

Title:    Apache Httpd mod_proxy - Error Page Cross-Site Scripting Vulnerability

Vendor:    Multi-Vendor

Description: In Apache HTTP Server, a limited cross site scripting issue was reported affecting the mod_proxy error page. An attacker could cause the link on the error page to be malformed and instead point to a page of their choice. This would only be exploitable where a server was set up with proxying enabled but was misconfigured in such a way that the Proxy Error page was displayed.

CVSS v2 Base Score:     4.3 (AV:N/AC:M/Au:N/C:N/I:P/A:N)


ID:        CVE-2019-1821

Title:    Cisco Prime Infrastructure Health Monitor HA TarArchive - Directory Traversal / Remote Code Execution

Vendor:    Cisco    

Description: A vulnerability in the web-based management interface of Cisco Prime Infrastructure and Cisco Evolved Programmable Network Manager could allow an authenticated remote attacker to execute code with root-level privileges on the underlying operating system. This vulnerability exist because the software improperly validates user-supplied input. An attacker could exploit this vulnerability by uploading a malicious file to the administrative web interface. A successful exploit could allow the attacker to execute code with root level privileges on the underlying operating system.

CVSS v2 Base Score:    10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)


ID:        CVE-2019-1322

Title:    Microsoft Windows 'COMahawk' Local Privilege Escalation Vulnerability

Vendor:    Microsoft

Description: An elevation of privilege vulnerability exists when Windows improperly handles authentication requests. An attacker could exploit this vulnerability by running a specially crafted application on the victim system. This CVE ID is unique from CVE-2019-1320, CVE-2019-1340.

CVSS v2 Base Score:    4.6 (AV:L/AC:L/Au:N/C:P/I:P/A:P)


ID:        CVE-2019-11932

Title:    nipper-ng Remote Stack Buffer Overflow Vulnerability

Vendor:    nipper-ng project

Description: A stack based buffer overflow in the processPrivilage() function in IOS/process-general.c in allows remote attackers (serving firewall configuration files) to achieve Remote Code Execution or Denial Of Service via a crafted file.

CVSS v2 Base Score:    6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)


=========================================================


MOST PREVALENT MALWARE FILES Nov. 14 - 21:

COMPILED BY THE TALOS SECURITY INTELLIGENCE AND RESEARCH GROUP


SHA 256: 7acf71afa895df5358b0ede2d71128634bfbbc0e2d9deccff5c5eaa25e6f5510

MD5: 4a50780ddb3db16ebab57b0ca42da0fb

VirusTotal: https://www.virustotal.com/gui/file/7acf71afa895df5358b0ede2d71128634bfbbc0e2d9deccff5c5eaa25e6f5510/details

Typical Filename: xme64-2141.exe

Claimed Product: N/A

Detection Name: W32.7ACF71AFA8-95.SBX.TG


SHA 256: 3f6e3d8741da950451668c8333a4958330e96245be1d592fcaa485f4ee4eadb3

MD5: 47b97de62ae8b2b927542aa5d7f3c858

VirusTotal: https://www.virustotal.com/gui/file/3f6e3d8741da950451668c8333a4958330e96245be1d592fcaa485f4ee4eadb3/details

Typical Filename: qmreportupload

Claimed Product: qmreportupload

Detection Name: Win.Trojan.Generic::in10.talos


SHA 256: 85b936960fbe5100c170b777e1647ce9f0f01e3ab9742dfc23f37cb0825b30b5

MD5: 8c80dd97c37525927c1e549cb59bcbf3

VirusTotal: https://www.virustotal.com/gui/file/85b936960fbe5100c170b777e1647ce9f0f01e3ab9742dfc23f37cb0825b30b5/details

Typical Filename: Eternalblue-2.2.0.exe

Claimed Product: N/A

Detection Name: W32.WNCryLdrA:Trojan.22k2.1201


SHA 256: c3e530cc005583b47322b6649ddc0dab1b64bcf22b124a492606763c52fb048f

MD5: e2ea315d9a83e7577053f52c974f6a5a

VirusTotal: https://www.virustotal.com/gui/file/c3e530cc005583b47322b6649ddc0dab1b64bcf22b124a492606763c52fb048f/details

Typical Filename: c3e530cc005583b47322b6649ddc0dab1b64bcf22b124a492606763c52fb048f.bin

Claimed Product: N/A

Detection Name: W32.AgentWDCR:Gen.21gn.1201


SHA 256: f917be677daab5ee91dd3e9ec3f8fd027a58371524f46dd314a13aefc78b2ddc

MD5: c5608e40f6f47ad84e2985804957c342

VirusTotal: https://www.virustotal.com/gui/file/f917be677daab5ee91dd3e9ec3f8fd027a58371524f46dd314a13aefc78b2ddc/details

Typical Filename: FlashHelperServices.exe

Claimed Product: Flash Helper Service

Detection Name: PUA:2144FlashPlayer-tpd


=============================================================


(c) 2019.  All rights reserved.  The information contained in this

newsletter, including any external links, is provided "AS IS," with no

express or implied warranty, for informational purposes only.


Please feel free to share this with interested parties via email, but

no posting is allowed on web sites. For a free subscription, (and for

free posters) or to update a current subscription, visit

https://www.sans.org/account


SANS Institute, 8120 Woodmont Ave., Suite 310, Bethesda, MD 20814-2743