SANS NewsBites

Judge: Opposing Lawyers Get Consultants' Forensic Breach Report; Highly Customized Spear Phishing Attacks; Open Source Supply Chain Attack; DHS Cyber Essentials Toolkit

June 2, 2020  |  Volume XXII - Issue #44

Top of the News


2020-05-29

Judge: Capital One Must Provide Lawyers With a Copy of Digital Forensic Breach Report

A US federal judge in Virginia has ordered Capital One to provide a copy of a forensic report regarding a data breach to attorneys who are suing the company on behalf of affected customers. The Capital One breach, which was disclosed last year, affected payment card application data for more than 100 million people.

Editor's Note

Subsequent to a breach, first hire experienced and competent legal counsel; let them hire and supervise the investigators. Any report of the investigators should be "attorney work product," so labeled, and arguably privileged. While transparency is desirable, litigation may increase transparency, and courts are entitled to all evidence, one does not want one's legitimate efforts used against one.

William Hugh Murray
William Hugh Murray

Understanding data protection and disclosure restrictions, particularly around security audits, assessments, and reports is key before the engagement begins. When taking legal action, be certain that the case, for or against, doesn't depend on disclosing the very documents you wish to keep private. Sometimes a redacted document can be offered as a compromise, particularly when protecting information with regulatory driven or mandatory protections such as PII, HIPAA, and CUI; even so, your legal and information management teams should validate your assumptions up front.

Lee Neely
Lee Neely

2020-06-01

Highly Customized Spear Phishing Attacks

Researchers have detected targeted attacks that appear to be aimed at stealing credentials for industrial control systems (ICS) equipment and software suppliers. Researchers detected attacks targeting organizations in Germany, Japan, the UK, and Italy. The attacks employ steganography and messages customized to match the language used by the targets. In addition, one of several PowerShell scripts used in the attacks contains a deliberate error; the error message it returns serves as the decryption key for the data hidden in the steganographic image.

Editor's Note

This attack leverages multiple techniques to avoid detection and analysis, including a deliberate PowerShell script "error" as well as downloading components from legitimate Internet sites. Segmentation or isolation is an important mitigation for control systems. Direct internet access, inbound our outbound, should not be available by default. Also make sure that credentials are unique for your control system so that credentials captured elsewhere are ineffective.

Lee Neely
Lee Neely

All industrial control systems connected to the public networks must employ strong authentication to resist fraudulent reuse of compromised credentials.

William Hugh Murray
William Hugh Murray

2020-06-01

Open Source Software Supply Chain Attack: Octopus Scanner Malware Infected 26 GitHub-Hosted Projects

In early March 2020, GitHub's Security Incident Response Team learned that some repositories were serving open-source projects that had been infected with malware known as Octopus Scanner. The malware is a backdoor that was crafted to infect NetBeans projects. A GitHub report describes the attack from detection through remediation.

Editor's Note

Kudos to GitHub for being so open with this incident and for sharing their report. It is through sharing that we as an industry can learn how to improve our processes and responses.

Brian Honan
Brian Honan

2020-06-01

CISA Cyber Essentials Toolkit

The US Department of Homeland Security's (DHS's) Cybersecurity and Infrastructure Security Agency (CISA) has released the first of six planned Cyber Essentials Toolkit modules, "Essential Element: Yourself, the Leader." This module "focuses on the role of leadership in forging a culture of cyber readiness in their organization with an emphasis on strategy and investment."

Editor's Note

As a new or seasoned CISO, this reference provides an easy to read list of essential actions and supporting resources which will aid getting a handle on your current cyber readiness and starting to assess your corresponding risks. Future toolkits will focus on awareness, protection, access controls, backups, and business continuity.

Lee Neely
Lee Neely

The Rest of the Week's News


2020-06-01

REvil Ransomware Operators Publish Data Stolen from Elexon

Ransomware operators behind last month's attack on systems at the UK's Elexon have published data stolen from the company. The documents posted online include employee passport information and an insurance policy application. Elexon runs the balancing and settlement code for the UK's electricity markets.

Editor's Note

The new modus operandi for ransomware is to extensively compromise systems and exfiltrate information well before encrypting the data. Also, ransomware operators are starting to include brute force attacks, reducing reliance on social engineering. Knowing where your data is housed and the value of those repositories is essential to assessing the impact of exposure and to using a risk-based approach to application of security protections.

Lee Neely
Lee Neely

A reminder that under GDPR a ransomware attack can be considered a data breach as, in effect, you have lost control of that personal data entrusted to your organization. If GDPR applies to your organization, review your Incident Response processes for ransomware attacks to ensure they include an assessment of what personal data has been affected and whether you need to report the breach to your Supervisory Authority.

Brian Honan
Brian Honan

2020-05-29

Georgia (US) Bureau of Investigation Found No Evidence of Hacking in Voter Registration System

An investigation into allegations of hacking targeting the US state of Georgia's voter registration system found "no evidence of damage to (the Secretary of State's office) network or computers, and no evidence of theft, damage, or loss of data." The Georgia Bureau of Investigation recently released the case files from the closed investigation


2020-06-01

Daniel's Hosting Database Leaked Online


A database leaked online contains email addresses, associated passwords, and other sensitive information belonging to "owners and users of several thousand darknet domains." The database was taken from Daniel's Hosting.

2020-06-01

Apple Releases Updates to Fix Memory Consumption Issue

Less than a week after a round of comprehensive security updates, Apple has released updates to iOS, iPadOS, watchOS, tvOS and macOS to correct a memory consumption issue which could allow an application to execute arbitrary code with kernel privileges (CVE-2020-9859). The issue has been addressed through improved memory handling.

Editor's Note

Due to code reuse across products, the vulnerability had to be corrected in multiple places and while the severity rating has not yet been published, timely deployment of the updates is warranted. Note that this fix also closes the vulnerability used by the Unc0ver jailbreak.

Lee Neely
Lee Neely

2020-05-30

Prison Sentence for Former Employee Who Sabotaged Network

A man who worked as a system administrator for an Atlanta, Georgia-based construction industry firm has been sentenced to 18 months in prison for sabotaging the company's computer network after his departure. Charles E. Taylor resigned from his position in July 2018; a month later, he logged into the company's network without authorization and change router passwords and shut down a central command server. Taylor was convicted of computer fraud earlier this year. Taylor was also ordered to pay more than US $800,000 in restitution.

Editor's Note

Timely disabling of accounts and changing of shared credentials is key when staff separates, particularly system and network administrators. Monitoring use of disabled accounts as well as privileged accounts, including those with domain or device administration rights, is important in detecting this type of threat. Also, make sure that remote administration of network and boundary control devices require the use of a secure entry point - not only to prevent unauthorized user modification, but also to protect devices from direct exploitation of vulnerabilities.

Lee Neely
Lee Neely

2020-06-01

Nipissing First Nation Computers Targeted by Ransomware

Computers belonging to Nipissing First Nation (NFN) administration in Canada were infected with ransomware last month. The incident was detected on May 8 and affected every department, "result[ing] in communications disruptions that [they] are still working to overcome."

Internet Storm Center Tech Corner