SANS NewsBites

Census Bureau Security Concerns; Microsoft's Fix for Zero-day Flaw in Internet Explorer; Adobe's 42 New Flaws

February 14, 2020  |  Volume XXII - Issue #13

Top of the News


2020-02-13

GAO Report Enumerates Census Bureau Security Concerns

A Government Accountability Office (GAO) report on the Census Bureau's preparedness found that the bureau is lagging on some of its goals, including IT system implementation and cybersecurity issues. The report says that the bureau has not met its goal of ensuring that its self-response site can support up to 600,000 users at a time. GAO also notes that the bureau needs to fix cybersecurity issues "in a timely manner," implement DHS recommendations, and ensure that the privacy of those responding is protected.


2020-02-13

Microsoft's February Updates Include Fix for Zero-day Flaw in Internet Explorer

Microsoft's monthly security updates include fixes for 99 vulnerabilities in multiple products. Twelve of the flaws are rated critical; of those, one, a remote code execution vulnerability in Internet Explorer, is being actively exploited. Microsoft disclosed the IE vulnerability in January but a patch had not been available until earlier this week.


2020-02-12

Adobe February Updates

Adobe's security updates for February include fixes for 42 vulnerabilities in multiple products. The updates address 21 critical issues in Framemaker and 12 critical flaws in Reader and Acrobat. The updates also fix critical flaws in Flash Player and Experience Manager.

Editor's Note

Hey, Adobe and McAfee - it has been at least 8 years since Adobe patches started trying to trick users into installing McAfee software. That practice continues to make both companies look cheap and sleazy - imagine if Ford said, "Every time a Ford car has a defect that requires a recall, we will try to trick you into turning on a satellite radio service." Is whatever revenue flows on this deal really worth it???

John Pescatore
John Pescatore

Remember the Flash Player EOL date is 12/31/20, so we're not yet done patching it. The Adobe Creative Cloud application keeps that suite of applications updated, augmenting the enterprise capabilities. Even so, scanning to make sure they are applied is prudent.

Lee Neely
Lee Neely

Tens last month, tens this month, likely tens next month. How deep must the reservoirs be?

William Hugh Murray
William Hugh Murray

The Rest of the Week's News


2020-02-13

US and German Intel Agencies Owned Controlling Stake in Swiss Encryption Device Maker

According to reports in the US, German, and Swiss press, between 1970 and 1993, the US and West German intelligence agencies were secret majority owners of Crypto AG, a Swiss company that made encryption devices. The reports say that the agencies were able to control aspects of Crypto AG's business, including manipulating algorithms used in the company's devices so that the agencies could easily decrypt foreign adversaries' communications. Crypto AG customers included more than 130 national governments. Germany withdrew from the arrangement in 1993; US intelligence bought its stake and remained in control until it sold off Crypto AG's assets in 2018. The controlling partnership was shielded behind a trust company in Liechtenstein. Bruce Schneier points out that while the story itself is not news, "what is new is the formerly classified documents describing the details" of how the agencies were able to exploit their access to supposedly encrypted information.

Editor's Note

As the article points out, this was no longer a secret by the early 1990s, but Crypto AG products were still used by many who weren't paying attention to relatively low visibility reports. Today, every piece of software used by businesses (especially mobile applications) is a potential "Crypto AG" scenario. Supply chain security has to focus on risk assessment and testing of products and services in use, not just country of origin.

John Pescatore
John Pescatore

2020-02-13

US Justice Department Charges Huawei with Racketeering and Conspiracy

The US Department of Justice (DoJ) has returned a superseding indictment, charging China's Huawei Technologies with racketeering and conspiracy to steal trade secrets. The defendants named in the indictment include Huawei and four subsidiaries. The indictment includes examples of Huawei's alleged theft of intellectual property from US companies.

Editor's Note

Like the Crypto AG item, this is also another "old news" item. Back in 2003 Cisco went public with intellectual property theft claims against Huawei and later settled a lawsuit. Trade wars between countries raise the press visibility of these issues, but the supply chain risk doesn't change - accurate assessments and monitoring are needed.

John Pescatore
John Pescatore

In his recent book, Hamilton, the author Ron Chernow noted that the US became an industrial power, in part, by stealing intellectual property and suborning talent from England. While free trade is the preferred way to redress inequities among nations, theft of IP is to be preferred to armed conflict.

William Hugh Murray
William Hugh Murray

2020-02-12

Mozilla Updates

Mozilla has released updated versions of Firefox, Firefox ESR, and Thunderbird. Firefox 73 includes fixes for six vulnerabilities; Firefox ESR 68.5 includes fixes for five vulnerabilities; and Thunderbird 68.5 includes fixes for four vulnerabilities.

Editor's Note

Your enterprise may already be pushing out these updates. If not, leverage slipstreaming them in with the February Microsoft and Adobe updates you're already deploying.

Lee Neely
Lee Neely

2020-02-13

Fix Available for Critical Flaw in GDPR Cookie Consent WordPress Plugin

The developers of the GDPR Cookie Consent plugin for WordPress have released an updated version to address a critical flaw. The vulnerability could be exploited to alter website content or to inject malicious JavaScript code. As its name suggests, the plugin is designed to help websites comply with the EU's General Data Protection Regulation (GDPR); the plugin is estimated to be in use on more than 700,000 websites.

Editor's Note

While your Wordpress site will detect out-of-date plugins, updating them automatically requires additional software or a plugin. If you're manually checking and updating, put a reminder on your calendar; don't wait to find out you have a problem the hard way.

Lee Neely
Lee Neely

2020-02-13

Malicious Extensions Pulled from Google Chrome Store

Google has pulled more than 500 malicious extensions from its Web Store. The extensions redirected users to potentially malicious sites and harvested users' personal information.

Editor's Note

If you have one of these extensions installed, it will be automatically be disabled and marked as malicious. Extensions so marked should be uninstalled.

Lee Neely
Lee Neely

2020-02-13

MIT Researchers Detail Mobile Voting App's Flaws

In a paper released earlier this week, researchers from the Massachusetts Institute of Technology (MIT) say that the Voatz mobile voting app, which has been used in several US states to allow voters overseas to cast their ballots, contains worrisome security shortcomings. The flaws could be exploited to see data being transmitted from the app, alter users' votes, and to impersonate a user's mobile phone. In addition, Voatz does not use blockchain to secure votes in the way its makers say it does. Voatz responded to the papers findings, noting in a blog post that the researchers based their conclusions on an outdated version of the app and that the researchers did not connect to the Voatz servers.


2020-02-13

xHelper Android Malware is Vexingly Persistent

Android malware known as xHelper reinfects devices even after factory resets. The malware dropper Trojan was first noticed last spring. Theories that the reinfections came from pre-installed malware or from the Google Play store were disproven. Researchers at Malwarebytes, along with a savvy Android user, discovered that the reinfection came from folders that were not removed even after a factory reset. Malwarebytes has instructions for removing the folders.

Editor's Note

In short, the malware dropper hangs out in hidden directories that are not removed during a factory wipe and leverages Google PLAY to reinstall itself. The Malwarebytes article has steps for finding and removing the files. As the dropper uninstalls itself after setting up the processes for installing the malware, your MDM is unlikely to detect it.

Lee Neely
Lee Neely

It seems unlikely that most, or even many, Android users will even know about xHelper, much less do anything about it. One accepts that geeks can manage the security of Android devices. One should not give them to children, the elderly, or the otherwise naive.

William Hugh Murray
William Hugh Murray

2020-02-12

Car Mobile Apps Not Always Reset After Vehicles Are Rented or Resold

A man who leased a car from Ford between 2013 and 2016 discovered that he still had access to the vehicle's controls through the mobile app more than three years later. Another man has twice rented cars and found that he could still access the controls for the vehicles months after he had retuned them.

Editor's Note

The same is true for many of those smart TVs in hotels, but especially in Airbnbs and other consumer grade lodging that employees and executives might be using on travel. Good to use this item as an updated warning in awareness campaigns.

John Pescatore
John Pescatore

When selling or turning in your personal vehicle, it is prudent to factory reset the mobile apps, including any phonebook information which has been downloaded. When purchasing a vehicle, make sure you are the only one with access to the online management features, which may require dealer support to verify. Current Rental Car agreements also advise consumers to reset the information prior to turning in the vehicle. In any cases, it's prudent to make sure the vehicle doesn't contain prior data before connecting your devices.

Lee Neely
Lee Neely

2020-02-13

Mobile World Congress Tech Show Cancelled Over Coronavirus Worries

The Mobile World Conference tech show, which was scheduled to be held February 24-27 in Barcelona, Spain, has been cancelled due to concerns about the coronavirus. The decision to cancel the conference was made after a number of high-profile vendors announced they would not attend.


2020-02-13

Ransomware Targets Texas City and School District

A city and school district in Texas have been hit with ransomware. Computers belonging to the city of Garrison became infected on February 10; Garrison's mayor says the city has recovered from the attack and is operating as usual as of February 13. Computers at the Nacogdoches Independent School District became infected on February 11; the district is still working to recover access to its data. The city and the school district are about 20 miles apart and do not share a computer system. Officials are investigating whether the two attacks are related.


2020-02-12

Florida County Election System Infected with Ransomware in 2016

Palm Beach County (Florida) election supervisor Wendy Sartory Link said that computers at the the county's election office became infected with ransomware shortly before the 2016 US general election. Link, who became election supervisor in January 2019, learned of the incident during a conversation with the office's acting IT director.


2020-02-11

North Miami Beach Police Systems Hit with Ransomware

Hackers have targeted computers belonging to the North Miami Beach (Florida) Police Department with ransomware. The police department's IT staff shut down affected machines to curtail the malware's spread and have alerted the FBI and the Secret Service.

Editor's Note

Remember that, while the decision as to how to deal with a "ransomware" attack is a business decision, ensuring that the decision is made prior to the attack is a responsibility of security staff.

William Hugh Murray
William Hugh Murray

Internet Storm Center Tech Corner

Microsoft Patch Tuesday

https://isc.sans.edu/forums/diary/Microsoft+Patch+Tuesday+for+February+2020/25790/


Adobe Patches

https://helpx.adobe.com/security.html


Malspam Pushes Ursnif

https://isc.sans.edu/forums/diary/Malpsam+pushes+Ursnif+through+Italian+language+Word+docs/25792/


Changes to Microsoft LDAP/AD and How to Cope with Them

https://isc.sans.edu/forums/diary/Authmageddon+deferred+but+not+averted+Microsoft+LDAP+Changes+now+slated+for+Q3Q4+2020/25800/

https://isc.sans.edu/forums/diary/March+Patch+Tuesday+is+Coming+the+LDAP+Changes+will+Change+Your+Life/25796/


Ransomware Abuses Out of Date Driver

https://news.sophos.com/en-us/2020/02/06/living-off-another-land-ransomware-borrows-vulnerable-driver-to-remove-security-software/


SweynTooth BLE Vulnerabilities

https://asset-group.github.io/disclosures/sweyntooth/


Safe Documents in Office 365 Advanced Threat Protection

https://docs.microsoft.com/en-us/microsoft-365/security/office-365-security/safe-docs


Wordpress GDPR Cookie Consent Plugin Vulnerability

https://blog.nintechnet.com/wordpress-gdpr-cookie-consent-plugin-fixed-vulnerability/


Apple Joins Fido Alliance

https://fidoalliance.org/members/

https://research.kudelskisecurity.com/2020/02/12/fido2-deep-dive-attestations-trust-model-and-security/


Symantec Endpoint Protection Multiple Issues

https://support.symantec.com/us/en/article.SYMSA1505.html


DNSSEC Root Key Signing Ceremony Delayed

https://mm.icann.org/pipermail/root-dnssec-announce/2020/000121.html