SANS NewsBites

U.S. National Cybersecurity Talent Discovery Program Launches on Monday; Consolidating Congressional Cybersecurity Oversight

January 10, 2020  |  Volume XXII - Issue #3

Top of the News


2020-01-10

The U.S. National High School Cybersecurity Talent Discovery Program Launches on Monday

The U.S. National High School Cybersecurity Talent Discovery Program launches on Monday (1/13). Students play a game (CyberStart) to learn whether they have the aptitude to excel in cybersecurity. It's all online and no teacher expertise in cyber or computers is required. NSF support this year enables high school students in every state to participate. High school girls are eligible to start next week; if five girls do well in a school, they win access to the game for boys as well. Here's how parents and teachers describe the impact of GirlsGoCyberStart:


"Girls Go CyberStart REALLY made a big impact on my daughter! The first year, she had zero experience in computer coding or cybersecurity. After participating, she decided to take AP Comp Sci A and now she won a summer internship at the NJ Cyber Security Office!"


"Before I recruited girls to be a part of this wonderful program, I struggled to get girls to realize they could be computer scientists. I had girls actually saying they were too stupid to do this until I said, 'Just try it.' Some of my girls found out they were good at puzzles, some found out they liked programming. I now have girls asking our counselor about computer science degrees at our local community college."


Twenty-seven state governors personally announced GirlsGoCyberStart this year and encouraged students in their states to "just try it!" The Computer Science Teachers Association is a national cosponsor.


To learn more and/or sign up: https://www.girlsgocyberstart.org/


A personal note to NewsBites readers from Alan Paller: Finding talent early is the single biggest game changer a nation can implement to increase its effectiveness in cyberspace. The UK's CyberDiscovery program proved that the CyberStart game scales to provide full national coverage and identifies large numbers of high-aptitude students even when the student doesn't know s/he has it. Now CyberStart's aptitude discovery program has become available at no cost to all high schools in the US, but it runs only once a year and sign-ups close in two weeks. If you have any relationship with a high school student or teacher or administrator or an email list or Twitter following that includes high school teachers, make sure they know about GirlsGoCyberStart in time to take advantage of it this year.


2020-01-08

Consolidating Cybersecurity Oversight in Congress

Members of the US Cyberspace Solarium Commission are likely to propose consolidating authority for cybersecurity issues under one committee in each chamber of Congress. Currently, numerous committees in each chamber address cybersecurity issues, which can slow down needed legislation.

The Rest of the Week's News


2020-01-09

Attackers Infected Travelex with Ransomware Through Known Pulse Secure VPN Flaw

The Travelex currency exchange is still offline after a December 31 ransomware attack. The company says that its systems became infected with Sodinokibi, also known as REvil. The malware appears to have gained entry to the system through a known vulnerability in Pulse Secure VPN software; a patch for the flaw was made available in April 2019. (Please note that the WSJ story is behind a paywall.)

Editor's Note

While keeping services updated with the latest security patches is important, prioritize services at the perimeter and pay even more attention to boundary and access control devices such as VPNs, Firewalls, Routers, Proxies and WAFs. It is worth noting that Pulse Secure has been reaching out to customers to make sure that they are applying the patch. The Pulse Secure VPN flaw is being actively leveraged for REvil attacks, including CyrusOne, several managed service providers, 20 Texas local government offices and over 200 dentist offices per ZDNet. https://www.zdnet.com/article/vpn-warning-revil-ransomware-targets-unpatched-pulse-secure-vpn-servers/: VPN warning: REvil ransomware targets unpatched Pulse Secure VPN servers.

Lee Neely
Lee Neely

This breach has several examples of how to not handle incident response, from poor communications to key stakeholders, to not engaging with media, and lack of transparency to customers as to the real cause of the systems being offline.

Brian Honan
Brian Honan

2020-01-08

Pittsburgh School District Hit with Ransomware

The Pittsburgh Unified School District in Pennsylvania is recovering from a ransomware attack that infected its systems over the holiday break. Classes resumed as scheduled on Monday, January 6. The superintendent noted that while classrooms will not have laptops or Internet access, schools do have access to student information and phone systems are working.


2020-01-07

Contra Costa Library System Ransomware Attack

The Contra Costa County (California) Library System was hit with a ransomware attack late last week. The incident affects all 26 of the system's branches. On December 3, library officials said that while impacted servers were taken offline, libraries would be open as usual.

Editor's Note

As libraries reinvent themselves in the digital age, the importance of their digital service offerings has increased. While you can still visit a branch to get a book, their web system processed over 1.5 million virtual visits, and 425,897 virtual checkouts in 2019. The system has address, phone numbers, email and dates of birth for members; it doesn't contain social security numbers or credit card information. They stopped collecting driver's license numbers and purged those data last year.

Lee Neely
Lee Neely

2020-01-08

ToTok App is Available in Google Play Store Again

Apple and Google pulled the ToTok messaging app from their stores after the US intelligence officials said it was likely being used as a spy tool for the United Arab Emirates. Google has put what appears to be an updated version of ToTok back in the Google Play Store. The app now asks users for permission to access and sync contact lists.


2020-01-08

TikTok Vulnerabilities Fixed

TikTok has patched several flaws that left the social video app vulnerable to account takeovers, private data exposure, and other forms of account manipulation. Researchers from Check Point found the vulnerabilities and notified TikTok in late November 2019. The company fixed the flaws in late December.

Editor's Note

The patches address account takeover and data exposure issues, not the concerns raised last fall about China-based ByteDance collecting data while the app is being used. Those risks have not changed. If you are continuing to use the application, keep it updated.

Lee Neely
Lee Neely

2020-01-09

Google's Project Zero Announces Changes to Its 90-Day Disclosure Policy

Google's Project Zero says it will now wait the full 90 days after notifying vendors about a bug to disclose details of the vulnerability, regardless of when the vendor makes a fix available. Previously, Project Zero would release vulnerability details as soon as a patch was released. The rationale for the change is that it will allow for more thorough patch development and wider patch adoption before details are released. Vulnerability details may be disclosed sooner than 90 days if the vendor agrees. Exceptions to the rules include allowing the vendor to request up to an additional 14 days if the patch will be ready within that time, and allowing only seven days for vulnerabilities that are being actively exploited.

Editor's Note

I was encouraged to see in the SANS Security Spending Trends survey we are currently working on, increased spending on strong authentication came in 4th highest, after cloud monitoring, cloud access security and staff skills training. Ransomware and breaches in the news have been the ammunition to convince management to back the move away from reusable passwords. In telephone interviews, several small/medium sized organizations making the move as part of moving to O365 and other cloud-based services.

John Pescatore
John Pescatore

2020-01-08

Minnesota Hospital eMail Breach

Alomere Health is notifying nearly 50,000 patients in Minnesota that their personal health information may have been compromised. Two Alomere Health employee email accounts were compromised in late October and early November 2019.

Editor's Note

I was encouraged to see in the SANS Security Spending Trends survey we are currently working on, increased spending on strong authentication came in 4th highest, after cloud monitoring, cloud access security and staff skills training. Ransomware and breaches in the news have been the ammunition to convince management to back the move away from reusable passwords. In telephone interviews, several small/medium sized organizations making the move as part of moving to O365 and other cloud-based services.

John Pescatore
John Pescatore

Cases like this help to justify Multi-Factor Authentication to senior management.

Brian Honan
Brian Honan

2020-01-09

Mozilla Releases Firefox 72.0.1 to Fix Actively Exploited Critical Flaw

Just one day after releasing Firefox 72, Mozilla released version 72.0.1 to address a critical vulnerability that was being actively exploited. The type-confusion flaw could be exploited to execute code or cause crashes on vulnerable systems. Firefox 72 included new privacy features and fixes for five high-severity security issues.

Editor's Note

If you're on the ESR distribution, the fixes are in 68.4.1. The affected component is the IonMonkey JavaScript JIT compiler which provides optimization and performance enhancement for JavaScript. The flaw is reported as being actively exploited in the wild. Regardless of the version, unless you have disabled IonMonkey, which is enabled by default, applying the update quickly is prudent.

Lee Neely
Lee Neely

Users should prefer purpose-built applications to porous browsers for sensitive applications. Enterprise management should isolate mission-critical data, applications, and systems from browsers.

William Hugh Murray
William Hugh Murray

2020-01-08

Prison for Webcam Spy

A UK man has been sentenced to five years in prison for spying on people through their webcams and mobile phone cameras. Scott Cowley used the Imminent Monitor remote access Trojan (RAT) to infect the targeted computers and phones.


2020-01-09

Las Vegas City Network Fends Off Serious Cyber Incident

On Tuesday, January 7, 2020, the city of Las Vegas, Nevada experienced a network security incident. The vector of attack is likely to have been a malicious email. City IT staff detected the breach quickly and took steps to minimize its impact. On Wednesday, January 8, the city posted a statement on Twitter that it has "resumed full operations with all data systems functioning as normal."

Editor's Note

I love this news piece. Kudos to the city of Las Vegas IT and security teams. Think of when a strong storm hits your area. If the power blips a few times, or goes out for an hour or so, everyone understands. If it goes out for days, you hate the power company, you know they failed you. You really don't expect the electricity to your house to be totally immune to storms, but you expect the power company to minimize the outages and to proactively trim the trees in advance of the next season of storms. That is how CEOs and Boards of Directors think about IT security!

John Pescatore
John Pescatore

2020-01-09

Dustman Data-Wiping Malware Likely Has Ties to Iran, Say Analysts

Cyber analysts at Saudi Arabia's National Cybersecurity Authority (CNA) have detected a new variant of data-wiping malware. Dustman, as it has been named, was found on systems at Bapco, Bahrain's national oil company, late last year and appears to be a variant of data-wiping malware used in attacks on organizations in the Middle East last year. CNA analysts say the malware made its way into Bapco systems through the company's VPN servers. The malware affected only some of Bapco's computers, and the company continued to operate through the attack.


2020-01-09

Hackers Scanning for Unpatched Citrix Servers

Hackers are actively conducting scans to find Citrix servers that have not been patched against a critical vulnerability that affects the company's Application Delivery Controller (ADC) and Gateway products. The directory traversal flaw could be exploited to remotely execute code.


2020-01-09

Dragos Report Describes North American Electric Sector Cyber Threats

Dragos has published a report titled North American Electric Cyber Threat Perspective that "provides a comprehensive look at threats to the North American electric sector and offers numerous defensive recommendations for asset owners and operators to implement and combat observed threats."


2020-01-09

US Government-Funded Android Phones Have Chinese Malware Preinstalled

The US Federal Lifeline Assurance program provides inexpensive or even free phones free with discounted service for low-income households. Researchers at Malwarebytes found that one of the phones available through the program, the $35 Unimax (UMX) U686CL device from Assurance Wireless, comes with unremovable Chinese malware preinstalled.

Editor's Note

Supply chain security is complicated, and critical, especially when you're driven to deliver the lowest bid solution. US funded programs typically insist on American made solutions, but in this case the $35 device was accepted without full security vetting. As an entity, purchasing devices from a known source, is a good first step; verifying their security, or hiring someone to do that, is prudent.

Lee Neely
Lee Neely

Internet Storm Center Tech Corner

Citrix ADC Update

https://isc.sans.edu/forums/diary/A+Quick+Update+on+Scanning+for+CVE201919781+Citrix+ADC+Gateway+Vulnerability/25686/


Another Malicious Word Document

https://isc.sans.edu/forums/diary/Quick+Analyzis+of+another+Maldoc/25694/


Google Project Zero Changing Disclosure Policy

https://googleprojectzero.blogspot.com/2020/01/policy-and-disclosure-2020-edition.html


Google Updates Android

https://source.android.com/security/bulletin/2020-01-01


Critical Firefox Update Fixing Exploited Bug

https://www.mozilla.org/en-US/security/advisories/mfsa2020-03/


Pulse Secure SSLVPN Exploited

https://devco.re/blog/2019/09/02/attacking-ssl-vpn-part-3-the-golden-Pulse-Secure-ssl-vpn-rce-chain-with-Twitter-as-case-study/

https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729


3 Google Play Store Apps Exploit Android Zero-Day

https://blog.trendmicro.com/trendlabs-security-intelligence/first-active-attack-exploiting-cve-2019-2215-found-on-google-play-linked-to-sidewinder-apt-group/


Tails 4.2

https://tails.boum.org/news/version_4.2/index.en.html


TikTok Vulnerabilities

https://research.checkpoint.com/2020/tik-or-tok-is-tiktok-secure-enough/


SHA1 Update

https://sha-mbles.github.io/


Cisco Updates

https://tools.cisco.com/security/center/publicationListing.x