SANS NewsBites

Hackers Use Interactive COVID-19 Map to Spread Malware; Illinois Public Health Ransomware Attack; Cyberspace Solarium Commission Report

March 13, 2020  |  Volume XXII– Issue #21

Top of the News


2020-03-13

Hackers Use Interactive COVID-19 Map to Spread Malware

Hackers have weaponized a live COVID-19 map to spread the AZORult malware, which steals passwords, payment card information, cookies, and other sensitive data. In a related story, state-sponsored hackers are using COVID-19 information as a lure in phishing attacks.

Editor's Note

By now, your company should have warned employees of the inevitable flood of malware and phishing attacks around the COVID-19 pandemic. Good to remind them it will happen again when things start to return to normal.

John Pescatore
John Pescatore

Expect high quality social engineering attempts due to the plethora of information about COVID-19, and users' desire to keep up-to-date on the illness and its impacts.

Lee Neely
Lee Neely

2020-03-12

Illinois Public Health District Website Suffers Ransomware Attack

The website of the Champaign-Urbana Public Health District (C-UPHD) in Illinois was hit with ransomware earlier this week. C-UPHD, which serves more than 200,000 people, including students at the University of Illinois's largest campus, has set up an alternate website while it works to restore its primary site.


2020-03-11

Cyberspace Solarium Commission Report

The US Cyberspace Solarium Commission's report, mandated by the 2019 National Defense Authorization Act, "advocates a new strategic approach to cybersecurity: layered cyber deterrence." The report makes more than 80 recommendations, which are organized under six pillars: reform the U.S. government's structure and organization for cyberspace, strengthen norms and non-military tools, promote national resilience, reshape the cyber ecosystem, operationalize cybersecurity collaboration with the private sector, and preserve and employ the military instrument of national power.

Editor's Note

We need a revolution; what we are doing is not working. We need to raise the cost of attack tenfold in 2020, a hundredfold in the next five years. We know what to do; we lack the will.

William Hugh Murray
William Hugh Murray

The Rest of the Week's News


2020-03-11

IoT Threat Report: Medical Imaging Devices are Running Outdated OSes

A report from Palo Alto Networks found that 83 percent of medical imaging devices in the US are running outdated operating systems. This marks a 56 percent increase over two years, which can be attributed in part to Microsoft's end of support for Window 7 in January 2020. The report "analyzed 1.2 million IoT devices in thousands of physical locations across enterprise IT and healthcare organizations in the United States." The researchers also found that 98 percent of traffic sent by IoT devices is unencrypted.


2020-03-10

Microsoft's Patch Tuesday

Microsoft's monthly security update for March 2020 addresses 115 security issues, 26 of which are rated critical. None of the vulnerabilities is currently being actively exploited.

Editor's Note

A monthly patch day from Microsoft is beginning to sound very outdated, kinda like "telephone dial." Imagine if the health care recommendation to prevent infection of open wounds was "on every second Tuesday of the month, apply protective covering..." Somehow businesses and IT manage to live through faster patching for phones, tablets and browsers, cloud apps and just about everything else, but Windows still has Vulnerability Tuesday?

John Pescatore
John Pescatore

While patch Tuesday is familiar and convenient for scheduling, and more vendors scheduling releases to this cadence is welcomed, the volume of fixes of late warrants a shorter interval between patch releases; particularly for endpoints.

Lee Neely
Lee Neely

2020-03-12

Microsoft Patches Wormable Vulnerability in SMBv3 Protocol

Microsoft has released a fix for a critical remote code execution flaw in the Microsoft Server Message Block 3.1.1 (SMBv3) protocol. Details of the vulnerability were inadvertently released online earlier this week. The vulnerability could be exploited to execute code remotely and spread to other vulnerable machines with no user interaction. The issue affects 32- and 64-bit Windows 10 versions 1903 and 1909 and Windows Server 2019 versions 1903 and 1909.


2020-03-11

Necurs Botnet Takedown

Working alongside partners in 35 countries, Microsoft has helped to take down the infrastructure that supported the Necurs botnet, which had been used to spread malware. Necurs comprises more than 9 million computers worldwide. On March 5, 2020, a federal judge in New York gave Microsoft the authority to take control of the computers in the US that are supporting Necurs. Microsoft then analyzed the Necurs algorithm for generating new domains, predicted six million of these potentially harmful domains, and reported them to the associated registry so they could be blocked and prevented from being used by the Necurs operators.


2020-03-11

Hackers Spoofing HTTPS Domains to Skim Payment Card Data

Hackers inserted malicious code into a website belonging to a US meat delivery service. The code, which includes a malicious domain, allowed the hackers to intercept customers' payment information. While the malicious domain has been removed from the company's website, it has been detected on other companies' sites.

Read more in


2020-03-11

Deloitte: Ransomware Attacks Against Local Government Increasing in Frequency and Cost

According to a study from Deloitte, ransomware attacks targeting state and local government systems have grown more sophisticated and have become more frequent. The study says that in 2019, there were 163 reported ransomware attacks against local governments; at least $1.8 million in ransom was paid, and millions more spent on recovery efforts. In 2018, there were 55 reported attacks and less than $60,000 in ransom paid.

Editor's Note

Part of the issue is these organizations may not have the resources to implement the mitigations needed, particularly differential backups, to aid with recovery as well as mitigations to prevent re-infection. While cyber insurance helps with the ransom payment, the funding for mitigations must be separately obtained, and are reliant on support during the already contested budget negotiation and funding cycle.

Lee Neely
Lee Neely

2020-03-12

FBI Arrest Individual Suspected of Operating deer.io

US federal law enforcement agents have arrested Kirill Victorovitch Firsov for allegedly operating deer.io, an online forum where cybercriminals could buy and sell stolen account credentials. Firsov is scheduled to be arraigned later this week.


2020-03-13

Avast Disables JavaScript Engine Over Security Concerns

Avast has disabled the JavaScript engine in its antivirus product after it was found to contain a remote code execution vulnerability. Researchers at Google Project Zero say that the emulator, which checks JavaScript code tor malware before it is allowed to execute, "is unsandboxed and has poor mitigation coverage."

Editor's Note

Timely disablement of the emulator was a good call on Avast's part. Other endpoint protections will continue to provide protections; even so, consider enablement of JavaScript only for trusted sites.

Lee Neely
Lee Neely

Internet Storm Center Tech Corner

Microsoft Patch Tuesday

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV200005

https://isc.sans.edu/diary.html?storyid=25886


Mystery SMB3 Flaw Update

https://isc.sans.edu/forums/diary/Critical+SMBv3+Vulnerability+Remote+Code+Execution/25890/


Microsoft Releases Patch for Windows SMBv3 Compression Vulnerability CVE-2020-0796

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0796


Agent Tesla Spread by Fake Canon EOS Notification Email

https://isc.sans.edu/forums/diary/Agent+Tesla+Delivered+via+Fake+Canon+EOS+Notification+on+Free+OwnCloud+Account/25884/


COVID19 Malware

https://blog.reasonsecurity.com/2020/03/09/covid-19-info-stealer-the-map-of-threats-threat-analysis-report/


Hancitor Distributed Through Coronavirus-Themed Malspam

https://isc.sans.edu/forums/diary/Hancitor+distributed+through+coronavirusthemed+malspam/25892/


Avast Removes Vulnerable JavaScript Emulator from Products

https://github.com/taviso/avscript


Checkra1n Exploit Works Against T2 Equipped Macs

https://www.idownloadblog.com/2020/03/10/luca-todesco-teases-checkra1n-hacks-on-a-t2-equipped-macbook-pros-touch-bar/