SANS NewsBites

Ransomware Attacks Using Storage Devices; Critical Windows Vulnerability; DARPA's Bug Bounty

June 9, 2020  |  Volume XXII - Issue #46

Top of the News


2020-06-05

Ransomware Attacks Targeting QNAP NAS Devices - Dangerous

Operators of the eCh0raix ransomware have begun a campaign that targets QNAP network-attached storage (NAS) devices. The attackers are gaining access to the devices through known vulnerabilities or through brute-force password attacks.

Editor's Note

If you own a QNAP or similar storage device (Netgear, Synology, Western Digital..), do the following today: (1) Patch. These devices tend to be difficult to patch. You will need to be careful to not disrupt any work if users use the device to store documents they work on, or worse, if the device is used as an iSCSI drive in a virtual environment. (2) Make sure the device is not exposed to the internet. (3) Uninstall all components that are not required to operate the device. These devices often come with a large number of vulnerable web applications preinstalled. Uninstall as many of them as possible. Vendors try to sell these functions based on the number of features bundled with them. It is easy and cheap to add features by adding random open source components to the device. But vendors also often fail to secure these components and with patching being difficult, these devices will be compromised after some time exposed to the internet.

Johannes Ullrich
Johannes Ullrich

Update the QNAP OTS and Security Counselor software, use stronger admin passwords, limit network accessibility, disable Telnet and unused SSH services and enable QNAP snapshot service. Flaws in eCh0raix have been fixed which neutralized the free decryption option released by BloodDolly.

Lee Neely
Lee Neely

NAS devices should not be connected to the public networks or hidden by end-to-end application layer encryption.

William Hugh Murray
William Hugh Murray

2020-06-08

SMBGhost Proof-of-Concept Exploit Code Released - Important

The US Department of Homeland Securitys Cybersecurity and Infrastructure Security Agency (CISA) has warned that functional proof-of-concept code to exploit a known vulnerability in Microsoft Windows is publicly available. The flaw, SMBGhost, lies in version 3.1.1 of the Microsoft Server Message Block protocol; it affects Windows 10 and Windows Server 2019. Microsoft released a fix for the issue in March 2020.

Editor's Note

This is not a big deal because we all patch our Windows systems on patch Tuesday (today..) and we would never allow SMB to traverse our perimeter. If this statement is not true for your organization: Panic. You are probably already compromised by an exploit targeting dozens of other vulnerabilities.

Johannes Ullrich
Johannes Ullrich

The critical Microsoft patch for CVE-2020-0796 was released March 12th and affects both Windows 10 and Windows Server versions 1093 & 1909. While the risk can be mitigated slightly by disabling SMB compression and blocking port 445, the complete fix is to apply the patch, particularly with an increased percentage of remote workers.

Lee Neely
Lee Neely

2020-06-08

DARPA Announces Bug Bounty Program

The US Defense Departments Defense Advanced Research Project Agency (DARPA) has announced a bug bounty program. The focus will be on DARPA's System Security Integration Through Hardware and Firmware (SSITH). Synack, a security company partnering with DARPA for the program, is holding a Capture-the-Flag (CTF) qualifying competition which runs from June 15-29, 2020. The DARPA bug bounty program will run from July-September 2020.

Editor's Note

This will be an interesting one to watch. Good to see DoD building on the success of years of Hack-the-Pentagon managed bug bounty programs but this has a different focus than almost all previous bug bounty programsfinding vulnerabilities in specialty hardware. This is badly neededthe vulnerabilities in Apples A4 chip and in PC motherboards and basement management controllers have made this very clear. Much more specialized skills are required, but too often hardware devices have relied on security through obscurity. Programs like this can shine a bright light on why that doesnt work.

John Pescatore
John Pescatore

The Rest of the Week's News


2020-06-08

CPA Canada Data Breach Affects More Than 329,000 People


Chartered Professional Accountants of Canada (CPA Canada) has acknowledged a data breach that affected personal information of more than 329,000 individuals. The majority of the compromised information is related to the CPAS Magazine mailing list. The breach was detected after a phishing campaign targeted CPA Canada members earlier this year.

2020-06-08

Phishing Scheme Targeting Members of German Coronavirus Task Force


A phishing scheme has targeted more than 100 executives of German multinational company involved in procuring personal protective equipment (PPE) for COVID-19 frontline healthcare workers. The unnamed company is part of a task force commissioned to use international contacts and knowledge to help obtain PPE.

Editor's Note

With the current environment and pressure to deliver solutions, users are more susceptible than usual to these sorts of attacks. One of the best mitigations for credential harvesting attacks like this is implementing multi-factor authentication, reducing the value of any captured credentials.

Lee Neely
Lee Neely

2020-06-08

Honda Network Problems in Europe and Japan May be Due to Ransomware

Automobile manufacturer Honda is investigating computer problems affecting networks in Japan and Europe; the issues may be due to a ransomware infection. Honda told Bleeping Computer that it can confirm that there is an issue with its IT network. This is currently under investigation, to understand the cause.


2020-06-08

Maze Ransomware Encrypts Servers at VT San Antonio Aerospace


The network of VT San Antonio Aerospace (VT SAA) was infected with Maze ransomware. The malware operators stole data from the company before encrypting company servers. VT SAA provides maintenance, repair, and overhaul services for North American aircraft.

Editor's Note

The attack on VT SAA and Westech are further indicators that the Maze Operators are focusing more on US Defense contractors. The Maze operators are not only attempting to sell data they have exfiltrated, but are also working with other cybercriminal gangs to auction off their stolen data. The trick is catching and stopping the data exfiltration before the attack moves to the encryption stage.

Lee Neely
Lee Neely

2020-06-05

Fitness Depot Acknowledges Data Breach


Canadian fitness equipment retailer Fitness Depot has acknowledged a data breach affecting its ecommerce platform. Details of the incident suggest that the system was infected with Magecart skimming malware. Affected customers who conducted transactions for delivery or for in-store pick-up between February 18 and May 22, 2020. The compromised information includes names, street and email addresses, phone numbers, and payment card data.

Editor's Note

We now have the tools to resist "card not present" fraud if we would only use them. Consumers should prefer online merchants that use check-out proxies such as PayPal, Apple Pay, and Click-to-Pay. Otherwise they should use one-time or one-merchant tokens from Privacy.com or others in lieu of Primary Account Numbers. The card brands should be encouraging online merchants to use Click-to-Pay, their co-branded check-out proxy.

William Hugh Murray
William Hugh Murray

2020-06-05

Conduent Hit with Ransomware


Operators of the Maze ransomware hit systems at IT services firm Conduent late last month. The company says the attack caused just a partial interruption and that most systems were operating as usual within hours of the attack.

Editor's Note

A plan for mitigating "ransomware" and other data changing attacks must include rapid restoration of mission critical applications.

William Hugh Murray
William Hugh Murray

2020-06-08

Researchers Find Serious Security Issues in OmniBallot Online Voting System

Researchers from the Massachusetts Institute of Technology (MIT) and the University of Michigan have released a report detailing their findings about the security of the OmniBallot Internet voting and ballot delivery system. OnmiBallot, which is produced by Democracy Live, has been used in the past to let voters print ballots, complete them by hand, and return them by mail. For the 2020 election, the system will include online ballot return. The researchers, J. Alex Halderman and Michael Specter, write that the safest option is to avoid using OmniBallot. They note that OmniBallot is vulnerable to vote manipulation by malware on the voters device and by insiders or other attackers and that it appears not to have a privacy policy.

Editor's Note

Two analogies here: (1) A few years ago, I had rotator cuff surgery and the morning of the operation the surgeon came to the prep room with a black marker and wrote This arm and his signature on my right arm; (2) I have never seen, and never want to see, a traffic light that is showing green in all four directions. Errors in presidential elections are pretty much up there with operations on the wrong body part or cars colliding at intersections. There needs to be both manual mechanisms and auditing and safety interlocks built-in to any software-based voting system, just as it is built into surgical procedures even though we have Electronic Health Records, and in traffic signal controller hardware even though we have online light control systems. Every state has rigorous control of traffic lights and there are national standards for them, as well. Since election systems are considered part of the critical national infrastructure, they should be treated just as rigorously.

John Pescatore
John Pescatore

If you must use OmniBallot, the most secure option for remote voting remains printing, hand marking, and then returning a paper ballot by mail. The electronic ballot return mechanisms dont include sufficient anti-tampering protections, and even when printing paper ballots, if youre using the application to mark your ballot, OmniBallot collects and sends privacy information from the voters for tabulation. As electronic voting continues to move forward, rigorous testing and validation of security is essential to election integrity and voter confidence.

Lee Neely
Lee Neely

There is a fundamental flaw in all such systems. If one makes the ballot unique, even though it would require collusion between the issuer and the counter of ballots, the voter cannot be sure that it cannot be identified with him.

William Hugh Murray
William Hugh Murray

Internet Storm Center Tech Corner

PHP FastCGI Attacks

https://isc.sans.edu/forums/diary/Not+so+FastCGI/26208/

Protest Cybersecurity

https://isc.sans.edu/forums/diary/Cyber+Security+for+Protests/26210/


Translating BASE64 Obfuscated Scripts

https://isc.sans.edu/forums/diary/Translating+BASE64+Obfuscated+Scripts/26214/


uBlock Origin Blocks Portscans

https://www.bleepingcomputer.com/news/security/ublock-origin-ad-blocker-now-blocks-port-scans-on-most-sites/


QNAP Vulnerability

https://www.qnap.com/en/security-advisory/qsa-20-01


Fake Ransomware Decryptor

https://www.bleepingcomputer.com/news/security/fake-ransomware-decryptor-double-encrypts-desperate-victims-files/


GNUTLS TLS 1.3 Machine in the Middle

https://gitlab.com/gnutls/gnutls/-/issues/1011


CallStranger UPNP Vulnerability

https://callstranger.com/


Shellcode Analysis 101

https://www.sans.org/webcasts/sansatmic-shellcode-analysis-101-114160