SANS NewsBites

UK, Canada, and US Say Russian Hackers Targeting Vaccine Research; Hackers Hijacked High-Profile Twitter Accounts; US Legislators Adding Solarium Report Recommendations to Bill

July 17, 2020  |  Volume XXII - Issue #56

Top of the News


2020-07-16

UK, Canada, and US Say Russian Hackers are Targeting COVID-19 Vaccine Research

In a joint advisory, government officials from the UK, Canada, and the US said that hackers with ties to Russia have been targeting organizations conducting research on COVID-19 vaccines. Suggestions for mitigating the risk of attack include keeping devices and networks up-to-date; implementing multi-factor authentication; and preventing and detecting lateral movement in networks.


2020-07-16

Hackers Hijacked High-Profile Twitter Accounts And Used Them in Bitcoin Scam

Hackers took over dozens of high-profile Twitter accounts and used them to tweet that if people sent then bitcoin, they would send back twice as much. They received $120,000 worth of the cryptocurrency before the scam was detected and shut down. Twitter says is believes that the hackers targeted Twitter employees in a "coordinated social engineering attack" to take control of the accounts.

Editor's Note

The hijacked accounts had "Verified" status, which indicates that the account takeover was from the use of Twitter administrator accounts. Multifactor authentication for administrator accounts cannot be optional. Further, limiting where they can login from should be considered.

Lee Neely
Lee Neely

Overall, Twitter has kept its infrastructure pretty secure over the years, but this event would be a good hook for raising the "What security actions are needed if our company will continue to rely on social media in general, and Twitter in particular, as a reliable place for business communications functions?" issue to CXOs and Boards of Directors. The flood of disinformation on Twitter and Facebook and others is so high that the risk vs. business value needs to be consciously examined.

John Pescatore
John Pescatore

After an earlier incident like this one, Twitter made a strong authentication option available to its users. These users are the ones for which use of strong authentication is strongly indicated.

William Hugh Murray
William Hugh Murray

This is a great example of why it is so important to have restrictions and fail-safes set into your systems for high privilege accounts. Applying the CIS Critical Security Controls for Effective Cyber Defense and in particular enhanced authentication, verification, and alerting on unusual behaviours are just some of the controls that should be considered to protect these accounts from themselves.

Brian Honan
Brian Honan

2020-07-14

US Legislators Adding Solarium Report Recommendations to Defense Spending Bill

Cybersecurity recommendations made in the Cyberspace Solarium Commission report, which was released earlier this year, are finding their way into markups of and proposed amendments to the FY 2021 US National Defense Authorization Act (NDAA). This month, the Cyberspace Solarium Commission staff released a list of 54 legislative proposals drawn from the report.

The Rest of the Week's News


2020-07-16

Patch Tuesday: Cisco and Oracle

Cisco has released fixes for more than 30 vulnerabilities in a variety of products, five of which are rated critical. The critical flaws include two remote code execution vulnerabilities, authentication bypass, privilege elevation, default credential. Oracle's Critical Patch Update for July 2020 includes nearly 450 fixes for vulnerabilities in multiple products.

Editor's Note

This is a busy patch week. The trick is getting all these patches installed remotely, with systems which remain on-premise and user systems being remote. Making patch services available to off-site trusted devices without requiring a VPN can increase success and provide for automating patches for those remote systems. Remember that some on-premise systems may need human intervention to reboot after patching, which requires planning and communication.

Lee Neely
Lee Neely

Pay attention to the backdoor ("Static Default Credential") Cisco removed from the VPN for its small business RV110W devices. This could be used to obtain unauthorized access to a network protected by the device.

Johannes Ullrich
Johannes Ullrich

Much of the responsibility for and cost of quality of our infrastructure has shifted from the developers to the users. This multiplies the cost and reduces the effectiveness in proportion to the popularity of the product.

William Hugh Murray
William Hugh Murray

2020-07-14

Patch Tuesday Adobe

On Tuesday, July 14, Adobe released fixes for a total of 13 vulnerabilities affecting five different products: Download Manager, ColdFusion, Genuine Service, Media Encoder and the Creative Cloud Desktop Application. Four of the vulnerabilities are rated critical; the other nine are rated important. The critical flaws are a Symlink vulnerability in Creative Cloud; two out-of-bounds write vulnerabilities in Media Encoder; and a command injection vulnerability in Download Manager.


2020-07-15

Microsoft Patch Tuesday Addresses 120+ Vulnerabilities, Including Wormable Flaw (SIGRed)

On Tuesday, July 14, Microsoft released fixes for more than 120 vulnerabilities across its product line; 18 of the vulnerabilities are rated critical. One of the critical flaws is a "wormable" remote code execution flaw which can spread from machine to machine with no human interaction. Check Point detected the flaw and reported it to Microsoft in May. SIGRed, as Check Point named the flaw, affects Windows DNS servers and can be exploited by sending a malicious request to a vulnerable Windows DNS server. The flaw has been present in Windows DNS Server for 17 years. It has been given a CVSS base score of 10.

Editor's Note

Expect working exploits for CVE-2020-1350 ("SigRed" Microsoft DNS Server Vulnerability) soon, maybe today. So far, only a DoS exploit has been made public. Of course, this vulnerability caught the most attention out of all of the issues patched. Another interesting vulnerability was patched in Outlook. Sadly, this patch caused a lot of problems for Outlook users, and some had to remove it.

Johannes Ullrich
Johannes Ullrich

The DNS flaw was highlighted in CISA Emergency Directive 20-03 (https://us-cert.cisa.gov/ncas/current-activity/2020/07/16/cisa-releases-emergency-directive-critical-microsoft-vulnerability), which urges immediate patching. If you cannot patch immediately, apply the registry fix mitigation to Windows servers running DNS services immediately while completing your regression testing. Note, per Binding Operational Directive 19-0 (https://cyber.dhs.gov/bod/19-02/), Federal Agencies have 15 days to apply this patch.

Lee Neely
Lee Neely

Another reminder that IT operations patching performance may have suffered during the transition to working from home. The rise in infection rate in areas of the US and the world may cause more degradation. Worth checking and pushing tighter levels of mitigation if IT ops has been unable to meet patching SLAs or norms.

John Pescatore
John Pescatore

Read more in

KrebsOnSecurity: 'Wormable' Flaw Leads July Microsoft Patches

ZDNet: Microsoft July 2020 Patch Tuesday fixes 123 vulnerabilities

Threatpost: Microsoft Tackles 123 Fixes for July Patch Tuesday

Bleeping Computer: Microsoft July 2020 Patch Tuesday: 123 vulnerabilities, 18 Critical!

Check Point: SIGRed - this is not just another vulnerability- Patch now to stop the next cyber pandemic

MSRC: CVE-2020-1350 | Windows DNS Server Remote Code Execution Vulnerability

Wired: Hack Brief: Microsoft Warns of a 17-Year-Old 'Wormable' Bug

Duo: Wormable Flaw in Windows DNS Server Can Take Over IT Networks

Ars Technica: Microsoft urges patching severe-impact, wormable server vulnerability

Dark Reading: Microsoft Patches Wormable RCE Flaw in Windows DNS Servers

Threatpost: Critical DNS Bug Opens Windows Servers to Infrastructure Hijacking

Bleeping Computer: Microsoft patches critical wormable SigRed bug in Windows DNS Server


2020-07-16

Apple Updates: iOS, macOS, and More

On Wednesday, July 15, Apple released updates for numerous products, including iOS (13.6), iPadOS (13.6), macOS (10.15.6), Safari (13.1.2), tvOS (13.4.8), and watchOS (6.2.8).

Editor's Note

The patches include updates for iOS 12.4.8 and watchOS 5.3.8 which contain no CVE entries. The updates to Kernel, Audio, WebKit and Safari occur across the updates with CVE entries, and as such need to be rolled out with your other patch Tuesday updates.

Lee Neely
Lee Neely

Read more in

The patches include updates for iOS 12.4.8 and watchOS 5.3.8 which contain no CVE entries. The updates to Kernel, Audio, WebKit and Safari occur across the updates with CVE entries, and as such need to be rolled out with your other patch Tuesday updates.

2020-07-16

Counterfeit Cisco Devices Caused Network Switch Failures

An F-Secure investigation into network switch failures at an unnamed IT company found that the problem was caused by counterfeit Cisco devices. The failure occurred after a software upgrade in fall 2019.

Editor's Note

Be careful where you buy equipment. This isn't a new issue. Counterfeit equipment has also been responsible for datacenter fires in the past due to substandard power supplies. Here is an example from 2008: https://www.zdnet.com/article/cisco-partners-sell-fake-routers-to-us-military/: Cisco partners sell fake routers to US military.

Johannes Ullrich
Johannes Ullrich

Back in 2008, the FBI operation "Cisco Raider" found over 3,500 counterfeit Cisco devices sold to US government, industry and power plants. The procurement side of supply chain security obviously failed again. Good item to prompt a review of internal procurement controls to prevent this and important to blacklist any integrator or channel supplier that is found to have sold counterfeit gear.

John Pescatore
John Pescatore

These counterfeit devices did not include any discoverable backdoors, indicating these were financially motivated replacements that were very difficult to differentiate from genuine products. The F-Secure analysis provides insight into the steps taken to ensure the fake devices would run the genuine Cisco firmware, including how integrity checks were bypassed. Make sure that your suppliers have adequate controls to assure genuine products are delivered as well as understanding the response plan if a counterfeit device is discovered.

Lee Neely
Lee Neely

The first article is about forensics, the second about "counterfeiting" of Cisco devices. It ends with four recommendations the most important of which is "Source all your devices from authorized resellers," to which I would add "expect to pay market prices."

William Hugh Murray
William Hugh Murray

Read more in


2020-07-16

IBM X-Force Found Iranian Threat Group Training Videos Online

IBM's X-Force Incident Response Intelligence Services (IRIS) discovered a server that contained video files of an Iranian threat group's operations. The server contained 40 gigabytes of data. The videos include evidence of stealing data from a US Navy officer and a Greek naval officer.


2020-07-16

EU Court of Justice Invalidates Privacy Shield Data Sharing Agreement

The European Union Court of Justice has ruled that Privacy Shield, the EU/US data sharing agreement, is invalid. The court said that the agreement did not adequately protect EU residents' data when it is sent to the US, and as such, violates EU privacy law. Privacy Shield was created in 2016, after the Safe Harbor agreement was deemed inadequate and the establishment of Standard Contractual Clauses (SCC), which are still valid.

Editor's Note

This is a complex issue; make sure your legal counsel is aware of the change. The most immediate pressure will be on companies defined as "Electronic Communication Service Providers" under 50 US 1881. That will be pressure for additional safeguards beyond what might have been defined in existing Standard Contractual Clauses and increased demand for EU citizen data only being stored in EU-located data centers that are under EU regulations and not subject to US mandated surveillance.

John Pescatore
John Pescatore

At the core of this decision was the lack of assurances that could be demonstrated to the ECJ that personal data belonging to those in the EU would not be subjected to US surveillance laws when transferred to the US. This will have implications for many cloud based companies and for US companies operating in the EU who need to transfer personal data back to the US. While the court has deemed the Standard Contractual Clauses as an alternative to relying on Privacy Shield, this could change and more stringent legal agreements put in place. Of note is the statement from the office of the Irish Data Protection Commission (who brought the case to the ECJ) which says "This is an issue that will require further and careful examination, not least because assessments will need to be made on a case by case basis". So watch this space.

Brian Honan
Brian Honan

2020-07-16

Identity Theft Resource Center: Data Breaches Decreasing

The Identity Theft Resource Center says that data breaches have decreased during the first quarter of 2020. The organization compiled data from publicly reported breaches in the US during the first three months of 2020.

Editor's Note

I've used the ITRC data for years - one important caveat is that most ransomware attacks have not been considered "breaches" in the past and are often not reported formally or at all. That is starting to change, but many state and local organizations that tightened up controls around sensitive databases to prevent breaches were impacted by ransomware. The main point is to make sure you have basic security hygiene in place before you address attack specific controls.

John Pescatore
John Pescatore

2020-07-13

Decommissioned Police Bodycams Purchased Online Contain Sensitive Data

A used bodycam purchased on eBay yielded unencrypted video of US military police officers at work. Other decommissioned bodycams purchased online have turned up similar data.

Editor's Note

Just about every piece of electronic gear contains persistent storage. Decommissioning, repair, warranty returns, and upgrade activities need to include processes for analyzing what is stored and enact device wipe or media removal where appropriate. NIST SP 800-88 has a lot of information and clearing processes, including validation, which can be leveraged. In some cases, where a wipe cannot be assured, working with a recycler that can shred or otherwise destroy the device can make sure that's done properly and avoid the consequences of inadvertent data loss.

Lee Neely
Lee Neely

Internet Storm Center Tech Corner

MSFT Patch Tuesday

https://isc.sans.edu/forums/diary/Microsoft+July+2020+Patch+Tuesday+Patch+Now/26350/


MSFT DNS Server Vulnerability

https://isc.sans.edu/forums/diary/PATCH+NOW+SIGRed+CVE20201350+Microsoft+DNS+Server+Vulnerability/26356/

https://www.sans.org/webcasts/about-windows-dns-vulnerability-cve-2020-1350-116120


SIGRed PoC

https://github.com/maxpl0it/CVE-2020-1350-DoS


Outlook Crashes After Patch Tuesday Updates

https://www.reddit.com/r/sysadmin/comments/hrq0mn/outlook_immediately_crashing_on_open_after/fy5nnx2/


Adobe Patches

https://helpx.adobe.com/security.html


Oracle Quarterly Critical Patch Update

https://www.oracle.com/security-alerts/cpujul2020.html


Cisco Backdoors

https://tools.cisco.com/security/center/publicationListing.x?product=Cisco&sort=-day_sir&limit=100#~Vulnerabilities


Twitter Compromise

https://twitter.com/TwitterSupport/status/1283591846464233474


Apple Updates

https://support.apple.com/en-us/HT201222


SAP PoC Exploit Code Published

https://github.com/chipik/SAP_RECON

https://us-cert.cisa.gov/ncas/alerts/aa20-195a


SANS.edu Student: Aaron Elyard: KITT

https://www.sans.org/reading-room/whitepapers/OpenSource/improving-analyst-efficiency-office365-business-email-compromise-investigation-scenarios-implementation-open-source-tools-39655

KITT: https://github.com/intrepidtechie/KITT-O365-Tool