SANS NewsBites is a semiweekly high-level executive summary of the most important news articles that have been published on computer security during the last week. Each news item is very briefly summarized and includes a reference on the web for detailed information, if possible.
Spend five minutes per week to keep up with the high-level perspective of all the latest security news. New issues are delivered free every Tuesday and Friday.
Volume XVII - Issue #37
May 12, 2015
TOP OF THE NEWSUSIS Attackers Exploited SAP ERP Vulnerability
US DoD Report Claims China is Developing Tools to Attack Critical Infrastructure
Russia and China Sign Cyber Security Pact
Judge Says Airport Laptop Search "Unreasonable"
THE REST OF THE WEEK'S NEWSRSA President Questions Government's Role In Cybersecurity
U.S. Ports Under Cyber Attack
Ed Felten Becomes White House Tech Official
Paper Says Open Smart Grid Protocol Crypto is Weak
Former Dept. of Energy Employee Indicted for Alleged Phishing Attack
Adobe to Patch Critical Flaws in Reader and Acrobat
Malvertising Attack Targets Adult Website Visitors
STORM CENTER TECH CORNERSTORM CENTER TECH CORNER
******************* Sponsored By Palo Alto Networks *********************
WhatWorks Webcast: Using Palo Alto Networks Next Generation Firewalls to Increase Visibility into Threats and Reduce Threat Risks
Wednesday, May 13 at 11:00 AM EDT with John Pescatore and Lance Spencer. Learn how The Palo Alto Networks Next Generation Firewall met all those needs and identified threats that other security solutions had not detected
- -Healthcare Cybersecurity Summit & Training | Atlanta, GA | May 12-19 | Hear security experts from leading health care companies discuss proven approaches for securing and succeeding in the new health care environment. Meet leaders from the top health care organizations and see what really works in securing health care. Plus 3 Courses: SEC401, SEC504, & Health Care Security Essentials
- -SANS Pen Test Austin 2015 | Austin, TX | May 18-May 23, 2015 6 courses. Evening sessions include The State of the Takedown: Disrupting Online Cybercrime; and Unconventional Linux Incident Response.
- -ICS Security Training Houston | Houston, TX | June 1-5, 2015 | 5 courses.
- -SANSFIRE 2015 | Baltimore, MD | June 13-20, 2015 | 41 courses plus 18 bonus evening sessions lead by Internet Storm Center (ISC) handlers, including The State of the Takedown: Disrupting Online Cybercrime; Continuous Monitoring and Real-World Analysis; Unconventional Linux Incident Response; and "Network Security as Counterinsurgency" Replacing the Art of War with FM 3-24.
- -SANS Rocky Mountain 2015 | Denver, CO | June 22-27, 2015 | 8 courses. Bonus evening sessions include Jailbreak/Root Workshop for Mobile Devices and The 13 Absolute Truths of Security.
- -Can't travel? SANS offers LIVE online instruction. Day (Simulcast - http://www.sans.org/u/WF) and Evening (vLive - http://www.sans.org/u/WU) courses available!
- -Multi-week Live SANS training
Mentor - http://www.sans.org/u/X4
- -Looking for training in your own community?
Community - http://www.sans.org/u/Xj
- -Save on OnDemand training (30 full courses) - See samples at OnDemand Specials - http://www.sans.org/u/Xy Plus Melbourne, Bangkok, and Dublin all in the next 90 days.
For a list of all upcoming events, on-line and live:
TOP OF THE NEWS
USIS Attackers Exploited SAP ERP Vulnerability (May 10, 2015)A digital forensics company retained by Department of Homeland Security (DHS) contractor USIS said that a breach of its system last year was the work of attackers exploiting a vulnerability in a third-party enterprise resource planning (ERP) application. It is unclear if a fix for the unnamed SAP application was available at the time of the breach, and it has not been determined whether USIS or SAP was the party responsible for fixing the vulnerability.
[Editor's Note (Paller): A useful (slighted dated) report on the status of SAP security was published 3 years ago
and updated data was released a few days ago.
(Murray): This is not unusual; it suggests that enterprise management was often not even aware that the server was there. If your vendor installs a server on your enterprise network, that server represents a vulnerability that you must compensate for. Appropriate controls include ensuring that this server can be accessed only by a VPN under your control (think your VPN server between the public network and the vendor's server), employs strong authentication, and is accessed by appointment or under supervision. Consider a VLAN or VPN between this server and anything on your network that it accesses. ]
US DoD Report Claims China is Developing Tools to Attack Critical Infrastructure (May 11, 2015)The US government has issued a warning that China is developing attacks capable of disrupting systems responsible for running a country's critical infrastructure. In its annual report to Congress, Military and Security Developments Involving the People's Republic of China, the US Defense Department (DoD) says "China is using its cyber espionage capabilities to support intelligence collection against the US diplomatic, economic, and defense industrial base sectors that support US national defense programs."
Russia and China Sign Cyber Security Pact (May 11, 2015)Russia and China have signed a pact agreeing not to launch cyber attacks against each other. The agreement also calls for the countries' law enforcement agencies to share information to help ensure that their critical infrastructures are protected.
Judge Says Airport Laptop Search "Unreasonable" (May 11, 2015)A US federal judge in the District of Columbia has ruled that a laptop search conducted at Los Angeles International Airport violated the laptop owner's constitutional privacy protections. The ruling allows the defendant, a South Korean businessman, to suppress evidence collected from his computer. He has been accused of selling aircraft parts to Iran.
[Editor's Note (Murray): This is not "Riley" at the border. ICE will continue to search the "container" for "contraband." Other law enforcement agencies will continue to use the "border exception" to advance other investigations. However, this decision says that there are still limits to what is "reasonable" and some courts will enforce those limits. While these searches are not yet so frequent as to interfere with the average traveler with a laptop, one continues to wish that ICE would publish the direction or guidance given to border agents about how to use this very broad and easily abused exception to the Fourth Amendment. ]
**************************** SPONSORED LINKS ******************************
1) Download the free eBook: Breach Detection - What You Need to Know. http://www.sans.org/info/177597
2) Exploit threat intelligence from the open Web (OSINT) using Recorded Future and Splunk. In this webcast on May 20, learn how to enrich data in Splunk with emerging threat indicators and IOCs from Recorded Future to improve SOC effectiveness: http://www.sans.org/info/177602
3) Hear what we learned about application security from the 2015 Survey: Part 1: Management Issues, May 13, 1 pm EDT. http://www.sans.org/info/177607 and Part 2: Application Development Issues, May 14, 1 pm EDT. http://www.sans.org/info/177612
THE REST OF THE WEEK'S NEWS
RSA President Questions Government's Role In Cybersecurity (April 29, 2015)Amit Yoran, president of RSA, rejected calls by U.S. intelligence chiefs for limits on the commercial use of encryption and was skeptical that a stronger government role in cyberdefense will abate the growing number of attacks.
[Editor's Note (Paller): Yoran was the nation's first cyber czar; he knows what government can and cannot do well. ]
U.S. Ports Under Cyber Attack; 37% of the servers running Microsoft had not been patched (May 11, 2015)Ninety percent of the world's goods are shipped on boats; the ports through which those boats deliver the goods are under attack. "The threat is very real," said Rear Adm. Marshall Lytle, the assistant commandant responsible for U.S. Coast Guard Cyber Command. "These intrusions and attacks are taking place every minute and every second of every day." More than one third of Windows servers in ports had not been patched.
MacKeeper Vulnerability (May 11 & 12, 2015)A critical vulnerability in MacKeeper could be exploited to execute malicious code remotely. The issue lies in the way MacKeeper handles custom URLs. The software allows commands to be run as root with no user interaction if users have previously provided MacKeeper with their passwords.
[Editor's note (Northcutt): If you are using MacKeeper, upgrade to the latest version today. If you are not using it, consider staying that course, it can be hard to get rid of:
Ed Felten Becomes White House Tech Official (May 11, 2015)Princeton Professor Ed Felten has been named White House deputy chief technology officer Office of Science and Technology Policy. Felten served as the Federal Trade Commission's (FTC's) first chef technologist from 2011 to 2012. He is also an outspoken critic of the NSA's information gathering practices.
[Editor's Note (Murray): Ed is now safely "inside the tent." One trusts that he will continue to "speak truth to power" but we may no longer know what he says. ]
Paper Says Open Smart Grid Protocol Crypto is Weak (May 11, 2015)According to a paper presented at the International Association for Cryptologic Research, the Open Smart Grid Protocol (OSGP) lacks adequate security. The paper describes OSGP as "a non-standard composition of RC4 and home-brewed MAC."
Former Dept. of Energy Employee Indicted for Alleged Phishing Attack (May 11, 2015)A man who used to work for the US Department of Energy (DOE) and the Nuclear Regulatory Commission (NRC) has been indicted on charges that he launched a spear phishing campaign against DOE employees. Charles Harvey Eccleston allegedly sent the phishing messages in January 2015. He allegedly intended to infect the DOE's network with malware that would steal information about US nuclear weapons for a foreign country.
Adobe to Patch Critical Flaws in Reader and Acrobat (May 8 & 11, 2015)Adobe plans to issue fixes for Reader and Acrobat on Tuesday, May 12. There will be updated versions for Reader and Acrobat X and XI for both Windows and Mac.
Malvertising Attack Targets Adult Website Visitors (May 8, 2015)Computers belonging to people who have visited popular adult content websites were infected by malicious advertisements through Flash exploits. The malicious ad attempts to drop malware on site visitors' computers with no user interaction. The ad does not redirect users to another website, but instead drops the malware itself.
STORM CENTER TECH CORNERAlienvault Vulnerability Fix
Two Men Arrested for Selling Photobucket Hacking Tool
IOActive Releases Cyberlock Advisory
Counterfeit Cisco Equipment Sale Leads to Arrest
SSDs Loose Information Quickly if Powered Down
Bullguard and Panda Antivirus Authentication Bypass
The Editorial Board of SANS NewsBites
John Pescatore was Vice President at Gartner Inc. for fourteen years. He became a director of the SANS Institute in 2013. He has worked in computer and network security since 1978 including time at the NSA and the U.S. Secret Service.
Shawn Henry is president of CrowdStrike Services. He retired as FBI Executive Assistant Director responsible for all criminal and cyber programs and investigations worldwide, as well as international operations and the FBI's critical incident response.
Stephen Northcutt teaches advanced courses in cyber security management; he founded the GIAC certification and was the founding President of STI, the premier skills-based cyber security graduate school, www.sans.edu.
Dr. Johannes Ullrich is Chief Technology Officer of the Internet Storm Center and Dean of the Faculty of the graduate school at the SANS Technology Institute.
Ed Skoudis is co-founder of CounterHack, the nation's top producer of cyber ranges, simulations, and competitive challenges, now used from high schools to the Air Force. He is also author and lead instructor of the SANS Hacker Exploits and Incident Handling course, and Penetration Testing course.
Michael Assante was Vice President and Chief Security Officer at NERC, led a key control systems group at Idaho National Labs, and was American Electric Power's CSO. He now leads the global cyber skills development program at SANS for power, oil & gas and other critical infrastructure industries.
Mark Weatherford is a Principal at The Chertoff Group and the former Deputy Under Secretary of Cybersecurity at the US Department of Homeland Security.
William Hugh Murray is an executive consultant and trainer in Information Assurance and Associate Professor at the Naval Postgraduate School.
Sean McBride is Director of Analysis and co-founder of Critical Intelligence, and, while at Idaho National Laboratory, he initiated the situational awareness effort that became the ICS-CERT.
Rob Lee is the SANS Institute's top forensics instructor and director of the digital forensics and incident response research and education program at SANS (computer-forensics.sans.org).
Tom Liston is the Principal Information Security Architect for Warner Brothers Entertainment, a handler for the SANS Institute's Internet Storm Center, and co-author of the book Counter Hack Reloaded.
Dr. Eric Cole is an instructor, author and fellow with The SANS Institute. He has written five books, including Insider Threat and he is a founder with Secure Anchor Consulting.
Mason Brown is one of a very small number of people in the information security field who have held a top management position in a Fortune 50 company (Alcoa). He leads SANS' efforts to raise the bar in cybersecurity education around the world.
David Hoelzer is the director of research & principal examiner for Enclave Forensics and a senior fellow with the SANS Technology Institute.
Gal Shpantzer is a trusted advisor to CSOs of large corporations, technology startups, Ivy League universities and non-profits specializing in critical infrastructure protection. Gal created the Security Outliers project in 2009, focusing on the role of culture in risk management outcomes and contributes to the Infosec Burnout project.
Alan Paller is director of research at the SANS Institute.
Brian Honan is an independent security consultant based in Dublin, Ireland.
David Turley is SANS operations manager and serves as production manager and final editor on SANS NewsBites.
Please feel free to share this with interested parties via email, but no posting is allowed on web sites. For a free subscription, (and for free posters) or to update a current subscription, visit http://portal.sans.org/