SANS NewsBites

Mini-Netwars on Thursday; Ransomware Lessons Learned; Nation State Hackers Targeted COVID Drug Manufacturer

May 12, 2020  |  Volume XXII - Issue #38

Top of the News


2020-05-07

Lessons Learned From Analysis of Ransomware Attacks

In a Threat Research report, Navigating the MAZE: Tactics, Techniques and Procedures Associated With MAZE Ransomware Incidents, FireEye takes a close look at MAZE ransomware. The report draws from FireEye Mandiant Threat Intelligence's experience responding to multiple incidents as well as "research into the MAZE ecosystem and operations."

Editor's Note

The FireEye report provides insight into how the various Maze teams operate as well as indicators of compromise. The affiliate model of Maze distribution suggests the TTPs will continue to change over time. It is worth noting that the initial compromise is not just users falling for a phishing attack, but also may be via exposed vulnerable services such as RDP or VDI services using compromised accounts. The call to action is ransomware protection, which includes both user awareness and due diligence, particularly for the security of internet facing services. At a minimum, enable multi-factor authentication and limit account access so compromised credentials cannot be readily used for maleficence.

Lee Neely
Lee Neely

Several ransomware news items in this issue of NewsBites - the FireEye report around MAZE serves as a good summary of most ransomware incidents. Two major ways initial compromise was gained: (a) targeted phishing via email; and (b) exploitation of glaring lack of basic security hygiene in patching, server configuration and privilege management. The techniques used for lateral movement included sophisticated "living off the land" exploits but plenty of success from simple techniques like searching for files containing the text "password." SANS published a "2020 Threat Trends Report" with advice from SANS instructors Ed Skoudis, Heather Mahalik and Johannes Ullrich on this and related threat areas: https://www.sans.org/reading-room/whitepapers/threats/paper/38908

John Pescatore
John Pescatore

One interesting finding is that the attacks are a team effort, involving multiple skilled parties, using a black market to cooperate, collaborate, and coordinate.

William Hugh Murray
William Hugh Murray

2020-05-08

Nation State Hackers Targeted Pharmaceutical Company That Makes Drug Being Used to Treat COVID-19

Suspected nation-state hackers have reportedly targeted employees of a company that makes Remdesivir, a drug that has shown promise in speeding up recovery of patients suffering from COVID-19. The hackers attempted to trick employees of Gilead Science, Inc., into disclosing their email account credentials. The US Food and Drug Administration (FDA) last week granted the drug emergency use authorization. The US and Britain have recently warned that nation-state-backed hackers are increasingly targeting organizations involved with developing treatments for COVID-19.

Editor's Note

Enterprises with significant intellectual property should be using strong authentication.

William Hugh Murray
William Hugh Murray

The Rest of the Week's News


2020-05-11

Diebold Nixdorf Suffered Ransomware Attack Last Month

Diebold Nixdorf, which makes automated teller machines (ATMs), point-of-sale systems, and related software, was hit with a ransomware attack in April. The company's security team detected unusual activity on the corporate network on Saturday, April 25; they started disconnecting systems to prevent the malware from spreading further. Diebold says it did not pay the ransom.

Editor's Note

Today's NewsBites could be called "The Ransomware Round-Up." Ransomware clearly is a preferred attack mechanism today, with attackers increasingly not only encrypting the data, but also stealing it and threatening public disclosure unless they are paid. Based on that evolution of these attacks, I found this quote from Lawrence Abrams of BleepingComputer really thought provoking: "Every ransomware attack has to be treated as a data breach now."

Ed Skoudis
Ed Skoudis

2020-05-11

Pitney Bowes Detects Ransomware Attack, Prevents Data Encryption

Mailing services and equipment company Pitney Bowes has suffered a second ransomware attack. The company managed to detect the most recent attack and stop it before any data were encrypted. However, the attackers, who used Maze ransomware, claim they have stolen data from the company and are threatening to publish it. Pitney Bowes was also the target of an October 2019 ransomware attack that caused limited downtime for some package tracking systems. The ransomware used in that attack was Ryuk.


2020-05-11

Texas Court System Hit With Ransomware

The Texas courts system became infected with ransomware late last week; the incident was detected early on Friday, May 8. Websites and servers were disabled to prevent the malware from spreading further. The Office of Court Administration administrative director says they do not plan to pay the ransom.


2020-05-08

Data Stolen From NYC Law Firm in Ransomware Attack

A New York City law firm has been hit with REvil (also known as Sodinokibi) ransomware. The attackers are threatening to expose data they claim to have stolen from the firm's systems. They plan to release the data in nine stages unless the firm pays the ransom demand. The law firm, Grubman Shire Meiselas & Sacks, has a large number of high-profile clients.


2020-05-07

German University Takes Systems Offline in Wake of Ransomware Attack

A ransomware attack against IT systems at Ruhr-Universitaet Bochum has forced the German university to take down portions of the network, including backup systems. Last week, the university announced that "Due to significant technical problems in the IT infrastructure, a large number of systems have not been available since around 8 a.m. on Thursday, May 7, 2020." Users are unable to access the university's email system or the school's VPN tunnel.

Editor's Note

We need to dramatically raise the cost of attacks, starting with strong authentication, "least privilege" access control, system to system isolation (think "zero trust") among other measures. We must not continue to fund this growing extortion cabal. We have known what to do more than a decade. If not now, when?

William Hugh Murray
William Hugh Murray

2020-05-06

Samsung Releases Fix for Critical Zero-click Flaw

Samsung has made an update available to address a critical zero-click vulnerability that affects devices running Android versions 4.4.4 and later. The flaw could be exploited to assume permissions and privileges granted to Samsung Messenger; no user interaction is required. The issue lies in a problem with the way Android's Skia graphics library handles .qmg images.

Editor's Note

The Qmage image format, developed by Quarmsoft, is Samsung-specific. While the exploit takes 50-100 messages to bypass ASLR, it is possible to send those messages without triggering device alerts, and requires no user action to exploit, making this a very stealthy attack. While the update applies to a wide range of devices, check Samsung's Android Security Updates page to make sure your device is in scope for updates, particularly if it is more than three years old.

Lee Neely
Lee Neely

Safe operation of Android devices requires cooperation between vendors, carriers, and knowledgeable end users. Nice people do not give such devices to children or the elderly.

William Hugh Murray
William Hugh Murray

2020-05-11

DHS's CISA Says Online Voting Has Significant Security Risks

In an advisory to election officials and voting vendors, the US Department of Homeland Security's (DHS) Cybersecurity and Infrastructure Security Agency (CISA) warned that online voting "faces significant security risks to the confidentiality, integrity, and availability of voted ballots." Other agencies, including the FBI, the Election Assistance Commission (EAC), and the National Institute of Standards and Technology (NIST), have signed off on the guidance.

Editor's Note

It's interesting to see this comment come in the same issue as the Diebold ransomware story.

Ed Skoudis
Ed Skoudis

The response to the Pandemic demonstrates the need for online voting. Surely we can do as good a job online with purpose-built apps as the banks do. Surely we can do as good a job as is done with paper, rubber stamps, and double envelopes. We cannot continue to allow the perfect to be the enemy of good enough.

William Hugh Murray
William Hugh Murray

2020-04-21

MITRE Releases APT29 Emulation Test Results for Products From 21 Vendors

MITRE has released the results of evaluations of security products' response to attacks that emulated the activity of the APT29 hacking group. In all, products from 21 vendors were evaluated.

Editor's Note

This is worth reading, not necessarily to determine how the various products fared in the testing, but to get an understanding as to how threat actors attack your network and how to prevent that happening.

Brian Honan
Brian Honan

2020-05-08

Virginia State Government Website Subdomains Hijacked

Two subdomains of the state of Virginia's official government website were hijacked by hackers who set up what appear to be suspicious e-book sites. A researcher with the Electronic Frontier Foundation (EFF) found the sites and contacted Motherboard. After Motherboard notified the State of Virginia, the sites were taken down. A spokesperson for Virginia's state government says they plan to "undertake a full audit of the Virginia.gov domain to verify the hosting and content responsibilities across the platform."


2020-05-10

Thunderspy Data Stealing Attack

A researcher from Eindhoven University of Technology in the Netherlands has discovered an attack that allows attackers to steal data from Windows and Linux devices that have Thunderbolt ports. Exploiting the vulnerability, known as Thunderspy, requires physical access to the targeted device.

Editor's Note

To exploit this vulnerability, an attacker has to have access to your laptop, needs to open it, and then apply new firmware. Exploitability depends on how easy it is to open the device and how easy it is to reach the respective components that need to be patched. With current travel restrictions, attacks are unlikely. But if you ever get to travel again, you could cover your laptops screws in glitter nail polish to make it easier to detect tampering. And as a reminder: There are about 6 or 7 ransomware attack stories in this edition of NewsBites alone. Once you got ransomware under control, this may be an attack worth worrying about.

Johannes Ullrich
Johannes Ullrich

While this attack does require physical access to a system, it's still a fascinating approach to undermining the security levels that were... bolted on... to Thunderbolt. Direct Memory Access (DMA) attacks have been around for many years and are based on the idea that, to achieve high speeds, we can have devices and even peripherals talk directly to memory with little involvement of the CPU. That's hard terrain to defend.

Ed Skoudis
Ed Skoudis

While the exploit requires physical access, the Thunderbolt bus still needs to be active, so the best mitigation is to not leave systems sleeping, but instead have them powered off or hibernating, particularly when left in a hotel room or vehicle.

Lee Neely
Lee Neely

While this reads like an exciting vulnerability, it requires the attacker to have unfettered physical access to the device. It is probably a technique that will be more useful for forensic investigators rather than attackers.

Brian Honan
Brian Honan

Internet Storm Center Tech Corner

YARA 4.0.0 Released

https://isc.sans.edu/forums/diary/YARA+v400+BASE64+Strings/26106/


Excel 4 Macro Analysis: XLMMacroDeobfuscator

https://isc.sans.edu/forums/diary/Excel+4+Macro+Analysis+XLMMacroDeobfuscator/26110/


vBulletin Vulnerability

https://nvd.nist.gov/vuln/detail/CVE-2020-12720


MacOS 2FA Application Trojan

https://blog.malwarebytes.com/threat-analysis/2020/05/new-mac-variant-of-lazarus-dacls-rat-distributed-via-trojanized-2fa-app/


LinkedIn Phish

https://youtu.be/g0WHz6rikoc


VMWare Patches vRealize to Address SaltStack Vulnerabilities

https://www.vmware.com/security/advisories/VMSA-2020-0009.html


Samsung Patches Android RCE Vulnerabilities

https://bugs.chromium.org/p/project-zero/issues/detail?id=2002

https://security.samsungmobile.com/securityUpdate.smsb


ThunderSpy Thunderbolt Attack

https://thunderspy.io/


Mini-Netwars

https://www.sans.org/mini-netwars