SANS NewsBites

GAO Says Election Security Strategy Not Finalized; State Election Officials More Accepting of Federal Help

February 11, 2020  |  Volume XXII - Issue #12

Top of the News


2020-02-07

GAO Report Finds CISA's Election Security Strategy Has Not Been Finalized

In January 2017, the US Department of Homeland Security (DHS) designated state and local election infrastructure used in federal elections as a component of the country's overall critical infrastructure. The designation allows DHS to provide state and local election officials with help to protect assets, which include voter registration databases and voting equipment. A report from the Government Accountability Office (GAO) found that DHS's Cybersecurity and Infrastructure Security Agency (CISA) "has not yet completed its strategic and operations plans to help state and local officials safeguard the 2020 elections or documented how it will address prior challenges." The report urges CISA to finalize its strategic plan.

Editor's Note

While not the end of the world, there is no time for local agencies to implement strategic measures prior to the election. CISA needs to quickly publish prioritized tactical guidance that can be implemented through the rest of this election year.

Lee Neely
Lee Neely

This is not that damning a report, but with the primaries underway and the Presidential election less than 9 months away, I'd say no more time for strategic plans: the focus should be on prioritizing which fires to put out first.

John Pescatore
John Pescatore

2020-02-07

State Election Officials More Accepting of Federal Help

US State election officials are more willing to accept help from the Department of Homeland Security's (DHS's) Cybersecurity and Infrastructure Security Agency (CISA) than they were in the past. Officials were initially resistant to having their election systems designated as critical infrastructure, but have come to see that information and support provided by CISA can help them proactively secure their election infrastructure. CISA director Christopher Krebs said that two conference calls in January regarding potential cyberthreats from Iranian hackers had 1,700 and 5,900 dial-ins, respectively.

The Rest of the Week's News


2020-02-07

Maryland Jurisdictions Will Not Use Problematic Reporting Network in Upcoming Elections

During a special district primary in Maryland last week, a network designed to send voter information to state officials was shut down because it was causing delays at polling places. Elections officials say they will not require jurisdictions to use the network in the upcoming primary election in April or in the November general election.


2020-02-05

Iowa Caucus Reporting App Security Examined

Pro Publica asked security firm Veracode to review code in the caucus tally reporting app used in Iowa last week. The company found security issues it deemed "elementary." The flaws could be exploited to intercept and alter data, including passwords and vote tallies.

Editor's Note

The app vendor's CEO says the reporting app "...underwent multiple, rigorous tests by a third party" but Veracode says the flaws they found were "elementary." The standard advice for mission-sensitive software is require the vendor to show evidence of third-party testing of the software - important to have full transparency about the qualifications of who did the testing.

John Pescatore
John Pescatore

2020-02-10

Chrome Will Block Unsecure Downloads

Over the course of 2020, Google's Chrome browser will block all HTTP downloads started on HTTPS pages, also known as mixed content. Chrome 81, scheduled for release in March 2020, will print console warnings about mixed content. Over the following months, in Chrome 82 through Chrome 85, the browser will warn about and then block mixed content downloads of executables, archives, disk images, images, audio, video, and text. Chrome, 86, scheduled for release in October 2020, will block all mixed content downloads.

Editor's Note

When we first started using HTTPS, the overhead was such that we limited it to secure operations only. Now current software and hardware make the overhead negligible and all content should be delivered over secure connections.

Lee Neely
Lee Neely

Google has a lot of resources, and applying them to make the Chrome browser more restrictive on unsecure downloads is a good thing. However, I'd really like to see more Google posts about improvements in pre-release security and privacy testing of apps in Google Play. Google's Vulnerability Reward Program bug bounty payouts almost doubled from 2018 to 2019, which is kind of like a restaurant saying, "Our volunteer food testers removed twice as many glass shards from our food!" Google's Play Protect was ranked at or the near the bottom of malware detection by AV-TEST in 2019 - it would be good to see many fewer glass shards in published apps.

John Pescatore
John Pescatore

2020-02-10

Firefox Will Take Step Toward Blocking TLS 1.0 and 1.1

Starting in March 2020, Firefox users will need to intentionally allow connections to websites using TLS 1.0 or 1.1. When users attempt to connect to websites that support only lower versions of TLS, they will see a "Secure Connection Failed" message that offers an option to override and continue to the site.

Editor's Note

Browsers negotiate to the highest common denominator which can mask the presence of less secure connection options. Make sure you're regularly scanning the encryption settings on your web servers to ensure older, less secure connections are disabled, or monitored and documented where enabled. Monitoring may show the need to support older less secure operating systems and browsers may not be as significant as thought, or worth the risk.

Lee Neely
Lee Neely

2020-02-10

Google's February Android Updates Include Fix for Critical Bluetooth Vulnerability

Google has published its February security updates for Android. In all, the updates address 25 security issues. One of the flaws addressed in the updates is a critical vulnerability affecting Bluetooth in Android Oreo (8.0 and 8.1) and Pie (9.0) that could be exploited to allow remote code execution with no user interaction. The issue is also present Android 10, but the effects are somewhat less severe: exploitation could crash vulnerable devices, but would not allow code execution.

Editor's Note

One trusts geeks to be able to operate Android safely, even with late availability of patches. It is important to keep Android out of the hands of children, the elderly, and the otherwise naive.

William Hugh Murray
William Hugh Murray

2020-02-10

New Emotet Variant Can Spread Through Wi-Fi Networks

A recently-detected variant of Emotet malware has the ability to spread from infected devices to nearby unsecured Wi-Fi networks. From there, it can attempt to infect connected devices. When Emotet first appeared more than five years ago, it was a banking Trojan. Over the years, it has gained the ability to install a variety of malware on infected devices.

Editor's Note

The Japanese CERT, JP-CERT, has a great write up on this malware at https://www.jpcert.or.jp/english/at/2019/at190044.html: [Updated] Alert Regarding Emotet Malware Infection and they have also released a tool to check for Emotet called EmoCheck; it can be downloaded from the JP-CERT GIT Repository https://github.com/JPCERTCC/EmoCheck/releases: JPCERTCC / EmoCheck

Brian Honan
Brian Honan

2020-02-10

US DOJ Announces Charges Against Alleged Chinese Hackers in Equifax Case

A US federal grand jury has returned an indictment charging four members of China's People's Liberation Army (PLA) with breaking into Equifax computer systems and stealing data. The breach occurred in 2017 and compromised personal data belonging to nearly 150 million US citizens.


2020-02-07

Minebridge Backdoor Used in Attacks Against Financial Sector Firms

A report from FireEye says that since the beginning of 2020, phishing campaigns attempting to spread the Minebridge backdoor have been targeting organizations in the financial sector. The messages contain malicious attachments; if they are opened, macros attempt to install Minebridge. If it is successfully installed on a system, Minebridge can be used to deliver additional malware


2020-02-11

Abandoned Driver Code Lets Hackers Disarm Security Software

Ransomware actors are exploiting a known but unpatched vulnerability in an old and no longer supported Gigabyte motherboard driver to take control of Windows computers and disable security software. The attackers load a driver of their own that kills processes and files related to security products and allows the ransomware to encrypt data without being detected or thwarted.


2020-02-07

Rockdale County, GA Ransomware Attack Affects Water Department

Rockdale County, Georgia, is recovering from a ransomware attack that hit its municipal computer systems. County officials have shut down nine servers to contain the infection. The attack has affected the county's water department and water billing services. Rockdale County was also the target of a ransomware attack in 2017; the county was able to decrypt infected servers at that time.


2020-02-07

Having Backups May Not Be Sufficient for Ransomware Recovery

While victims of ransomware attacks have successfully restored systems from backups, the ransomware threat landscape is changing. Some attackers now steal data before files are encrypted and upload them if the victims refuse to pay the ransom.

Editor's Note

Good isolated differential backups remain necessary for recovery. The tactics have changed to add exfiltration to the attack and has been seen with Maze, Sodinokbi and Chimera. Some mitigation can come through the use of DLP solutions. The consequences of publishing need to be added to the ransom payment decision process, along with an assessment of likely of future payment demands.

Lee Neely
Lee Neely

If your system is compromised, it is compromised. "Ransomware" is only a way to exploit that. These attacks will continue until the cost of attack exceeds the value of success and the risk of punishment goes up. Only the cost of attack and value of success are in our hands. We must increase the cost of attack roughly ten fold in 2020. Strong authentication, least privilege access control, restrictive policy, end-to-end application layer encryption, and mean time to detection of breaches in hours to days. We must ensure the survivability of our data and its timely recovery. Get on with what we can do.

William Hugh Murray
William Hugh Murray

Internet Storm Center Tech Corner

Sandbox Detection Tricks and Nice Obfuscation in a Single VBScript

https://isc.sans.edu/forums/diary/Sandbox+Detection+Tricks+Nice+Obfuscation+in+a+Single+VBScript/25780/


Paypal Phish is Asking for Everything

https://isc.sans.edu/forums/diary/Current+PayPal+phishing+campaign+or+give+me+all+your+personal+information/25786/


Emotet Spreads via Wifi

https://www.binarydefense.com/emotet-evolves-with-new-wi-fi-spreader/


Dell SupportAssist Client Uncontrolled Search Patch Vulnerability

https://www.dell.com/support/article/ro/ro/robsdt1/sln320101/dsa-2020-005-dell-supportassist-client-uncontrolled-search-path-vulnerability?lang=en


Exploit Available for sudo pwfeedback bug

https://dylankatz.com/Analysis-of-CVE-2019-18634/


xiongmail/hisilicon Vulnerability

https://censys.io/blog/probing-the-xiongmai-hisilicon-soc-vulnerability


Insecure Docker Registries

https://unit42.paloaltonetworks.com/leaked-docker-code/


Lock My PC Used By Support Scammers

https://fspro.net/lock-pc/

https://www.bleepingcomputer.com/news/security/lock-my-pc-used-by-tech-support-scammers-dev-offers-free-recovery/