SANS NewsBites

California Privacy Law Now in Effect; Ransomware Infections at US Coast Guard and Maastricht University; Malware on Landry's Restaurant POS Systems

January 3, 2020  |  Volume XXII - Issue #1

Top of the News


2020-01-02

California Privacy Law Now in Effect

A new California state privacy law took effect on Wednesday, January 1, 2020. The California Consumer Privacy Act (CCPA) requires companies to disclose what data they collect from consumers and how they plan to use them. The CCPA also allows consumers to request that their data not be sold and that the companies delete their data. The law applies to companies that have revenue of $25 million or more and that make more than half of their money selling data, and to companies that collect data on 50,000 or more individuals. California's attorney general says the law will start being enforced until July 1, 2020.

Editor's Note

Meaningful enforcement action by July 1 is very unlikely, as there are many areas where the wording of the Act is broad and open to interpretation and the industry legal actions to fight/delay will be fast and furious. Advice to corporate management: whether CCPA gets delayed or not, consumer demand and legislative trends are definitely on the side in the companies needed to give customers more visibility and more control over the use of their personally identifiable information. Companies can save money in the long run by skipping the "OK, let's just wallpaper our website with disclaimers" stage by starting with "let's make our customers happy and safe, and then be able to easily demonstrate GDPR/CCPA et al compliance."

John Pescatore
John Pescatore

One of the challenges in implementing CCPA is that legal guidance is not finalized. For example, while it appears to exclude non-profit entities, a small institution doing online business may have data on over 50,000 devices, which may put them back in-scope for CCPA. Work with your legal department to establish and record your applicability decision. The good news is the implementation can leverage measures taken for GDPR; even so, CCPA specific guidance is still maturing.

Lee Neely
Lee Neely

One has been thankful to the California Legislature in the past for going where angels fear to tread. Their reach has been long, their aim true, and their impact salutary. One hopes that this effort will prove to be as effective. However, as with much law, the devil is in the detail and the enforcement.

William Hugh Murray
William Hugh Murray

2019-12-30

US Coast Guard Discloses Ransomware Infection at Maritime Facility

The US Coast Guard (USCG) has acknowledged that systems at a Maritime Transportation Security Act regulated facility were infected with Ryuk ransomware. The incident resulted in 30 hours of downtime for the facility's primary operations. The USCG Marine Safety Information Bulletin does not identify the facility or indicate when the incident occurred beyond noting that it was "recent."


2020-01-02

Landry's Acknowledges Malware Found on Restaurant POS Systems

Landry's, a Texas-based restaurant chain, is investigating a breach of its point-of-sale (POS) system. The company's security team found malware designed to steal payment card data. Following a 2016 breach of its POS system, Landry's stepped up the security with end-to-end encryption of payment card data while the information is being processed. However, order entry terminals, which are also used to swipe rewards cards, did not receive the same security upgrade; some wait staff may have mistakenly swiped customers' cards on these machines, which exposed the data to theft. The malware is believed to have existed on the system between from March 13, 2019, to October 17, 2019, although at some locations, the malware was active since January 18, 2019.

Editor's Note

Hospitality has been a major target for PCI data for a decade. It is unconscionable, even in a business that has grown by acquisition, that is should take so long to identify and remediate such a compromise. These compromises persist for so long because no one is looking for them. One should have in place an objective, stated in days, for mean-time to detection of a compromise and a plan to achieve it.

William Hugh Murray
William Hugh Murray

End-to-End encryption protected the cardholder data where applied. The trick is making sure all the points where the data is entered have equivalent protection, or ensure omitted devices can no longer process or collect that data. In this case, the order entry terminals were intended to process reward card data not payment cards, so neither the security fix was applied, nor was payment card processing disabled. Additionally, Landry's has taken steps to remove the malware and increase security to prevent re-introduction.

Lee Neely
Lee Neely

2020-01-02

Maastricht University Systems Infected with Ransomware

Systems at Maastricht University in the Netherlands were infected with ransomware on December 23. Nearly all of the institution's Windows systems were affected, which made using email services "particularly difficult." Maastricht University took all systems offline and planned to bring them back in stages. As of Thursday, January 2, "the most important education-related computers systems [are] up and running again, albeit to a limited extent."

Editor's Note

Not only is MU prioritizing recovery, they are providing alternative options for students needing services which are still offline. Because they have not determined the exact scope of the incident, all systems are suspect and being investigated. MU has brought in external expertise as well to aid with analysis, response, and recovery. Additionally, they are paying attention to the status of their scientific data, adding protections where needed, not only to ensure integrity of that data but also as current Ransomware TTPs now include requests for payment to prevent release of customer data.

Lee Neely
Lee Neely

The Rest of the Week's News


2019-12-30

Wyze Database Leaks eMail Addresses and IoT Device Information

An insufficiently secured database that belongs to Internet of Things (IoT) vendor Wyze exposed device information and customer email addresses. The leak affects 2.4 million users; the database was unsecured for more than three weeks. Wyze sells smart cameras, smart door locks and other household IoT products. Some of the compromised data include personal health information.

Editor's Note

The disclosure of "health information" was limited to tens of people in the beta test of a connected scale. The ZDNet article is worth a read for what it says about irresponsible disclosure by those who ought to know better. We continue to see disclosure motivated by the desire for recognition by the discloser rather than by the safe, timely, and effective repair of the compromise or vulnerability.

William Hugh Murray
William Hugh Murray

2020-01-02

US Army and Navy Ban TikTok

The US Army has banned the TikTok social media app from use on government-owned devices. An army spokesperson said that the app is considered a security threat. The US Navy banned the use of TikTok earlier in December 2019. TikTok is owned by a company based in China.

Editor's Note

Consider the question: Is this type of application appropriate for corporate devices, and does it fit within your incidental use policy; further, what action should be taken when devices are introduced to your network. In this case, devices with the disallowed application are blocked from the network. The issue is that the app is passing PII information to China through the services provided by the Musical.ly component. U.S. Senate Minority Leader Chuck Schumer and Senator Tom Cotton asked for a national security probe in a letter to Joseph Macguire, acting director of national intelligence. The Committee on Foreign Investment in the United States (CFIUS), which reviews deals by foreign acquirers for potential national security risks, has started to review the Musical.ly deal. CFIUS reviews are confidential.

Lee Neely
Lee Neely

2019-12-30

South Korean Officials Investigating TikTok

Authorities in South Korea are investigating TikTok due to data security concerns raised by a legislator there. The Korea Communications Commission (KCC) has launched an investigation.

Editor's Note

As with the US, the KCC also doesn't want their citizens PII routed to China.

Lee Neely
Lee Neely

2019-12-31

Microsoft Takes Down Domains Linked to North Korean Hackers

Microsoft has taken control of 50 domains that were allegedly being used by North Korean hackers to launch phishing and other malware campaigns. Microsoft filed a lawsuit late last year alleging that the hackers' activity was targeting Microsoft customers and was infringing company trademarks and brands.


2019-12-31

Starbucks API Key Exposed

Developers working for Starbucks appear to have left an API key in a public GitHub repository. The incident was reported to Starbucks in October 2019; the company removed the repository and revoked the key within days.

Editor's Note

With the current rapid software production and update cycles, automation is necessary to verify code is not pushed to repositories that contain sensitive configuration items, including API & SSH keys, passwords, or other sensitive configuration files. Additionally, if possible, configure services to limit access to only authorized addresses and make sure that you have good key management and revocation processes.

Lee Neely
Lee Neely

2019-12-30

RavnAir Cyberattack Update

A cyberattack that caused Alaska-based RavnAir to cancel flights on December 20 "now appears more extensive than initially reported," according to a statement on the company's website. The attack affected the maintenance system the company uses for its Dash aircraft. RavnAir said that it could be as long as a month before all systems are back to normal, and that there will likely be additional delays and cancellations.


2020-01-02

Mozilla to Give Firefox Users More Control of Their Own Data

Prompted by the California Consumer Privacy Act, Mozilla says that Firefox users will be able to choose to delete their personal data that Mozilla collects. The option will be available in the next version of Firefox, which is scheduled to be released on January 7. The option will be available to all Firefox users, not just California residents.

Editor's Note

Good to see the major browser providers (Google and Firefox) getting behind CCPA. Facebook acts as a "browser" to the walled garden that is Facebook - it doesn't look like they are taking a proactive stance. As part of providing information/recommendations around what CCPA will mean to your company, it is worth mentioning that a special look should be given to any corporate Facebook presence or advertising efforts.

John Pescatore
John Pescatore

Internet Storm Center Tech Corner

PiHole Dashboard

https://isc.sans.edu/forums/diary/ELK+Dashboard+for+Pihole+Logs/25652/


Corrupt Office Documents

https://isc.sans.edu/forums/diary/Corrupt+Office+Documents/25650/


Enumerating Office 365 Users

https://isc.sans.edu/forums/diary/Enumerating+office365+users/25648/


Ransomware written in JavaScript using Node.js

https://isc.sans.edu/forums/diary/Ransomware+in+Nodejs/25664/


Breaking 2FA Soft Tokens

https://resources.fox-it.com/rs/170-CAK-271/images/201912_Report_Operation_Wocao.pdf

ISC API Update

https://isc.sans.edu/apihttps://isc.sans.edu/forums/diary/Miscellaneous+Updates+to+our+Threatfeed+API/25654/


CCC Conference

https://fahrplan.events.ccc.de/congress/2019/Fahrplan/https://events.ccc.de/congress/2019/wiki/index.php/Main_Page


Landry Restaurant PoS Breach

https://www.landrysinc.com/CreditNotice/CANotice.aspCitrix/


NetScaler Vulnerability Special Webcast Recording

https://i5s.us/citrix