SANS NewsBites

Most Sought-After Cybersecurity Skills; Real Damage from Ransomware: Meow, Garmin, and SEI

July 28, 2020  |  Volume XXII - Issue #59

Top of the News


2020-07-24

Most Sought-After (Pre-)Cybersecurity Skills

Brian Krebs writes that people considering careers in cybersecurity frequently reach out to him, asking which specialization or certification he would recommend, but rarely do they ask, "which practical skills they should seek to make themselves more appealing candidates for a future job." A recent SANS survey asked more than 500 people who work in cybersecurity which skills they consider most valuable in job candidates, and which are most often missing. (Read the comments for more insights.)

Editor's Note

Perhaps surprisingly, some people already employed as cybersecurity analysts lack these same critical underlying skills. One of the larger federal cybersecurity contractors tested the beta version of a new course SANS developed for its undergraduate college students to ensure they have mastered the key foundational cybersecurity skills, hands-on, before diving into the challenging SANS courses required for their degree. The contractor's technical director called us last week and said he wanted to "start by having 100" of their existing cybersecurity employees take the foundations course and "the number will likely grow from there."

Alan Paller
Alan Paller

Hands-on experience with information systems, knowing how they operate, as well as system and service lifecycle are important skills in cybersecurity. And often people wishing to enter the field are unable to do so as they don't have needed experience. Internship programs are not only great ways to get this experience, but also provide a low-risk opportunity for an employer to discover and grow talent that can become a long-term employee.

Lee Neely
Lee Neely

We just completed a targeted survey on cybersecurity hiring needs and issues, separate from the one quoted in this piece. Among the results: (1) there is more of a skills gap than a headcount gap; and (2) the highest demand for entry level employees is for those who have experience using popular open source and commercial tools. One major finding: attrition rates in SOC teams are lower than IT industry average. Qualitative interviews gave anecdotal evidence that teams with more hands-on tool use and enhancement had the lowest attrition rates with managers saying it allowed staff to feel more creative and help fight alert burnout. Webinar on the results is on Wednesday - info at https://www.sans.org/webcasts/closing-critical-skills-gap-modern-effective-security-operations-centers-socs-survey-results-113485

John Pescatore
John Pescatore

Read more in


2020-07-25

The Number of Databases Deleted by Meow is Growing

The number of databases that have been wiped by the mysterious Meow hacker has grown to nearly 4,000 as of Saturday, July 25. The attacks appear to be targeting any database that is accessible from the Internet and is not adequately secured. The attacks are being conducted through a ProtonVPN IP address. It is still not clear why the attacker is deleting the vulnerable databases.

Editor's Note

Take immediate action to ensure you don't have databases that are world-writeable from the Internet. Meow has been seen mostly targeting Elastic and MongoDB. It is also targeting CouchDB, Redis, Hadoop, Jenkins, and even NAS devices. Don't rely on prevention by blocking ProtonVPN address ranges; there are likely other attack vectors as yet undiscovered.

Lee Neely
Lee Neely

Since the early days of the Verizon DBIR, we have been cautioned about orphan databases and servers. Know your own resources and vulnerabilities. These should be cheaper and more efficient for you to identify and eliminate than for your potential adversaries to find and exploit.

William Hugh Murray
William Hugh Murray

2020-07-27

Garmin Acknowledges Ransomware Attack was Responsible for Outage

In a post on Monday, July 27, Garmin acknowledged that the outage it suffered last week was due to ransomware. The company says they are in the process of getting its systems up and running. The attack occurred in the middle of last week.

Editor's Note

This was a case of the WastedLocker Ransomware, which comes from the Russian Evil Corp group, who are also known for Dridex banking malware. WastedLocker leverages fake software update messages to get installed, and targets file servers, database services, virtual machines and cloud environments. Make sure you are installing verified updates, particularly on core business system components. The Garmin Aviation, InReach and Explore systems are now fully functional, including resolution of backlogs. Garmin Connect services are still being restored. Check Garmin service status sites: Aviation service: https://status.flygarmin.com InReach/Explore: https://status.inreach.garmin.com/ Connect services: https://connect.garmin.com/status/

Lee Neely
Lee Neely

2020-07-27

SEI Customer Data Compromised in Ransomware Attack on Vendor

A ransomware attack on the network of M.J. Brunner, a service provider, exposed data belonging to the customers of one of its clients, SEI Investments. The attackers stole files containing usernames, emails, and other personal information associated with the SEI dashboard that Brunner developed and supports. Brunner refused to pay the demanded ransom, and the malware operators posted the stolen data online earlier this month. (Please note that the WSJ story is behind a paywall.)

Editor's Note

One thing that we should be learning from the success of "ransomware" is that our systems are too weak. By the time that a ransom demand is made, one's network is already severely compromised. Paying ransom is only one of many bad things that may result. Resist the breach in the first place; raise the cost of attack. Use strong authentication, DMARC, least privilege access control, application layer end-to-end encryption or network segmentation, and early warning systems. Use training and supervision.

William Hugh Murray
William Hugh Murray

The Rest of the Week's News


2020-07-27

CISA and NCSC Urge Users to Patch QNAP NAS Devices

A joint alert from the US Cybersecurity and Infrastructure Security Agency (CISA) and the UK's National Cyber Security Center (NCSC) warns users to patch their QNAP network attached storage (NAS) devices to protect them from QSnatch malware. QSnatch attacks were detected as long ago as 2014, but the agencies noted a significant uptick in infections: in October 2019, 7,000 devices were affected, in mid-June 2020, more than 62,000 devices were infected. The newest version of QSnatch can steal passwords, exfiltrate data, and can be used to execute arbitrary code.

Editor's Note

QNAP and other network-based storage devices are at the top of the list of targeted devices. Do not expose them to the internet, minimize the installed applications and at least try to keep them patched. (It is hard to do this quickly!)

Johannes Ullrich
Johannes Ullrich

Protect your NAS system from direct access, either from the Internet, or from other systems which have no need to connect to them. QNAP published a security advisory; if you have devices that you suspect or know are compromised, they need to be factory wiped prior to performing the firmware update. https://www.qnap.com/en/security-advisory/nas-201911-01: Security Advisory for Malware QSnatch

Lee Neely
Lee Neely

Better yet, put NAS devices on network segments isolated from the public networks. While software quality is an issue and patching is mandatory, it operates late. Raise the cost of attack. Reduce the attack surface using compartmentation (e.g. firewalls, network segmentation, and application layer end-to-end encryption) and restrictive access control (e.g., "least privilege," "white-listing").

William Hugh Murray
William Hugh Murray

2020-07-27

Hackers are Actively Exploiting Flaws in F5 BIG-IP and Cisco Network Products

Hackers are actively exploiting a high-severity directory traversal vulnerability that affects Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software firewall products. Cisco has released a fix for the issue. Hackers are also actively exploiting a critical vulnerability in F5 BIG-IP advanced delivery controller; F5 released fixes for the flaw on July 9.

Editor's Note

We have written about these attacks a few times in the last weeks. If you still have unpatched F5, Citrix, or affected Cisco products around, assume that they are now compromised. Include SAP Netweaver in that list (but it is not as heavily targeted yet, so you may be lucky and find one that hasn't been compromised, yet.)

Johannes Ullrich
Johannes Ullrich

Touch base with your F5 administration team; you may find they have already patched. The Cisco patch, released last Wednesday, definably boosted the interest of attackers attempting to exploit the flaw, and may not be as well known to your network team. For both patches, make sure that staff understand the flaw is being actively exploited and immediate patching is appropriate.

Lee Neely
Lee Neely

2020-07-24

Russian Hackers Targeted US Government, Education, and Energy Sectors

A hacking group with ties to Russian military intelligence launched previously undisclosed attacks against US targets between December 2018 and May 2020. In that 18-month period, Fancy Bear, also known as APT 28, conducted cyberattacks against networks at government agencies, educational institutions, and organizations in the energy sector. The attacks were largely focused on breaking into email servers, VPN servers, and Office 365 and email accounts. Earlier this year, the FBI notified organizations that had been targeted.


2020-07-24

Former Raytheon Employee Sentenced for Retaining National Defense Information

A former Raytheon systems engineer has been sentenced to 18 months in prison for taking home sensitive data. In January 2020, Ahmedelhadi Yassin Serageldin pleaded guilty to willfully retaining national defense information. According to a Department of Justice press release, Serageldin "retained 31,000 pages of information that was marked as classified, some of which pertained to U.S. missile defense and was classified at the SECRET level, and altered or obliterated the classification markings on documents." Serageldin worked at Raytheon for nearly 20 years.

Editor's Note

The documents were transferred on a portable drive against company policy. There are requirements from DoD, NIST, and CNNSI to employ technical control software to manage connection of allowed peripherals/devices to classified system to prevent these activities. In addition to the control, monitoring is necessary to assure it is operating and track changes or disablement. While not a complete solution, technical controls on media connection can slow inappropriate data transfers in and out of your enterprise.

Lee Neely
Lee Neely

"Classified" or other sensitive data should be stored in document management systems or other object-oriented databases that preserve meta-data (e.g., classification labels), resist arbitrary copying, and preserve transparency and accountability. Such data should not be stored in file system objects or on desktop systems.

William Hugh Murray
William Hugh Murray

2020-07-27

FBI Warning on New DDoS Attack Vectors

Last week, the FBI issued a Private Industry Notification warning of several new network protocols and a web application that are being abused to conduct distributed denial-of-service (DDoS) attacks. They are CoAP (Constrained Application Protocol), WS-DD (Web Services Dynamic Discovery), ARMS (Apple Remote Management Service, and Jenkins web-based automation software.

Editor's Note

In the SANS 2020 Top New Attacks and Threats report, SANS Fellow Ed Skoudis detailed "Living Off the Land" attacks and what to do about them for near term mitigation. Longer term, pressure needs to be applied to vendors to provide out-of-the-box configurations that have potentially dangerous services off by default. The report can be downloaded at https://www.sans.org/reading-room/whitepapers/analyst/top-attacks-threat-report-39520

John Pescatore
John Pescatore

2020-07-24

CISA ICS Advisory Warns of Vulnerabilities in Schneider Products

The US Cybersecurity and Infrastructure Security Agency (CISA) has issued an ICS advisory regarding five vulnerabilities in Schneider Electric Triconex TriStation and Tricon Communication Module. The vulnerabilities include cleartext transmission of sensitive information, uncontrolled resource consumption, hidden functionality, and improper access control. One of the vulnerabilities - the improper access control issue - has been given a CVSS v3 base score of 10.

Internet Storm Center Tech Corner

Compromised Desktop Applications By Web Technologies

https://isc.sans.edu/forums/diary/Compromized+Desktop+Applications+by+Web+Technologies/26384/


Cracking Maldoc VBA Project Passwords

https://isc.sans.edu/forums/diary/Cracking+Maldoc+VBA+Project+Passwords/26390/


Analyzing Metasploit ASP .Net Payloads

https://isc.sans.edu/forums/diary/Analyzing+Metasploit+ASP+NET+Payloads/26392/


Cisco Patching Treck IP Stack Vulnerabilities

https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC


Ubiquity Devices Break Due to Malformed Feed

https://community.ui.com/questions/Threat-Management-rules-silently-disabled-for-users-as-of-July-17-2020/35221bd2-843d-41a3-a957-33f57d9a8468


Emotet Payloads Replaces with GIFs

https://twitter.com/GossiTheDog/status/1286271503005290497


QNAP Devices Attacked

https://us-cert.cisa.gov/ncas/alerts/aa20-209a


In Memory of Donald Smith

https://isc.sans.edu/forums/diary/In+Memory+of+Donald+Smith/26396/