SANS NewsBites

FBI Warns on Windows 7; NSA on Mobile Devices Location Data; Canon and Lafayette (CO) Hit With Ransomware

August 7, 2020  |  Volume XXII - Issue #62

Top of the News


2020-08-05

FBI Issues Warning on Windows 7 EOL

On Monday, August 3, the FBI sent out a private industry notification urging organizations to upgrade systems still running on Windows 7. Microsoft ended support for Windows 7 more than six months ago. Microsoft allows Windows 7 systems to upgrade to Windows 10 at no cost. However, older hardware may not have the capacity to support Windows 10, so an upgrade would necessitate purchasing new equipment.

Editor's Note

Over the last five months, much of the corporate infrastructure has been operated remotely; new systems may have been made remotely accessible which were previously isolated; and lifecycle plans were placed on hold. The security posture of Windows 7 has not improved during this time. Make sure that you don't allow either direct internet access to Windows 7 systems or direct access to your corporate network, remotely or locally from them. Remote workers running Windows 7, not currently behind the corporate perimeter, should be at the top of the equipment replacement list.

Lee Neely
Lee Neely

While companies should migrate to more modern operating systems, the reality is that some computers will remain on older platforms. This is due to dependencies in legacy applications, embedded operating systems in devices, or lack of budget. Your vulnerability management strategy should include how you manage the risks associated with outdated operating systems and software for which no patches or updates may be available. Things to consider should include enhanced monitoring, filtering of network traffic, segmenting vulnerable systems from other parts of your network, and updating both your incident response and business continuity plans.

Brian Honan
Brian Honan

2020-08-05

NSA: Mobile Devices Expose Location Data

The US National Security Agency (NSA) has released an advisory that enumerates ways in which mobile devices leak location data, often by design. The advisory includes suggestions for users to limit the ways they are tracked through their mobile devices. Recommendations include turning off services like find-my-phone, Wi-Fi, and Bluetooth when they are not needed.

Editor's Note

Some location exposure will always be there if you carry a constantly-transmitting device with you all the time. But, Apple and Google on the phone OS side, the wireless carriers on the service side, and (probably most importantly) the FCC on the rules and enforcement side really need to change the priorities to put privacy first, exposure by exception as the norm. Where we are today is like when full SSN and credit card numbers used to be printed on every receipt and displayed everywhere - it doesn't have to happen.

John Pescatore
John Pescatore

Ten years ago, keeping location services disabled was a reasonable option for users. Today, so many devices and mobile activities rely on or leverage location, for some users disabling these services is akin to going offline; NSA acknowledges these measures are impractical for most users. The advice is spot-on for not revealing a sensitive location or staff and should be assessed in those contexts. As John says, the protection measures around location services need to evolve to limit exposure and access to this information.

Lee Neely
Lee Neely

Please remember to conduct your own risk assessment before following this guide. The recommendations are good, and it represents a very nice and concise guide to limit location data you leak. But some recommendations, like anti-theft features on the phone, may be better left enabled. It all depends on what you consider the greater risk.

Johannes Ullrich
Johannes Ullrich

2020-08-06

Canon Hit With Ransomware

Electronics company Canon was the victim of a ransomware attack, according to a leaked internal memo. The memo says that the attack affected Canon's US website, email, collaboration platforms and internal systems. Canon's image.canon cloud image and video storage site experienced an outage in late July. When the service came back online on August 4, Canon noted that some user photos and video were lost.


2020-08-05

Lafayette, Colorado, Paid Ransomware Demand

The city of Lafayette, Colorado, paid $45,000 to regain access to encrypted data following a ransomware attack. The July 27 attack caused city email, phones, online payments, and reservations to be temporarily unavailable.

The Rest of the Week's News


2020-08-06

ES&S Releases New Vulnerability Disclosure Policy

Voting machine manufacturer Electronic Systems and Software (ES&S) has announced a new vulnerability disclosure policy in an effort to improve the security of its products. The "policy applies to all digital assets owned and operated by ES&S, including corporate IT networks and public facing websites. (Please note that the WSJ story is behind a paywall.)

Editor's Note

To reach the point where their systems are trusted requires an appropriate vulnerability disclosure model, devices that are resistant to attacks and sufficient transparency around the security to permit informed decisions related to product selection. Partnering with a company like Synack that has experience with vulnerability disclosure and bug bounties is important to successfully implement that model.

Lee Neely
Lee Neely

Election security is tricky. The goal is not just to secure the process, but also to be transparent so the public trusts the results. Opening up the vulnerability discovery process and working with the community may improve the public perception of election security.

Johannes Ullrich
Johannes Ullrich

This is a good first step for an organization that has long denied there were problems, but ES&S has definitely not yet earned the trust for anyone to believe that the broad terms in the policy (like "Work in good faith with you...", "Strive to keep you informed" , "Work to remediate discovered vulnerabilities in a timely manner", etc.) will be translated into timely action. ES&S did announce they are working with Synack on a managed bug bounty bug program (a good thing) but I would have really liked to see ES&S CEO Tom Burt do what then Microsoft CEO Bill Gates did in 2002, and what Zoom CEO Eric Yuan did this year when both companies were rocked by severe vulnerabilities in their companies' products: declare security is job 1, stop feature/functionality additions, and put the entire focus on a security push. As the old saying goes, the fish really does swim the way the head is pointed.

John Pescatore
John Pescatore

2020-08-05

Twitter Fixes Flaw in Android App

Twitter has fixed a vulnerability in its app for Android devices. The flaw could be exploited to access others' direct messages and other private information. The high-severity flaw lies in a security issue in the Android OS versions 8 and 9.

Editor's Note

Consider policies and controls that isolate social networking, browsing, and e-mail applications from mission critical ones.

William Hugh Murray
William Hugh Murray

2020-08-05

Trend Micro Report: ICS Protocol Gateway Vulnerabilities

Researchers at Trend Micro discovered vulnerabilities in protocol gateways, which translate communications between devices used at industrial plants. The most critical of the flaws could be exploited to disable temperature monitoring sensors; the vendor does not plan to release a patch as it considers the product "end-of-life." Other security issues they found include weak encryption implementation and "specific scenarios wherein an attacker could exploit vulnerabilities in the translation function to issue stealth commands that can sabotage the operational process."

Editor's Note

It is important to understand and track the lifecycle of all the ICS components, particularly those with security functions such as gateways or protocol translators, to keep them updated. Additionally, consider further segmentation of the environment to insulate the system from inappropriate access and achieve defense in depth.

Lee Neely
Lee Neely

2020-08-06

York, PA: Physical IT Attack Prompts City Hall Closure

The York, Pennsylvania, city hall has been closed following a physical attack on IT infrastructure there. On Wednesday evening, August 5, a press release noted that "access to ALL city landline phone numbers are down. Additionally, access to city files and services are limited. Some web services may be unavailable as our staff works to repair the damage." Emergency services and other critical operations are functioning.

Editor's Note

Have you verified that your physical protection measures are resistant to attack? Check for improperly configured single-factor security measures, such as strike plates on electronic locks that don't properly fit the latch, allowing them to be opened with a hook or credit card; motion-based lock releases located above doors that can be triggered externally; or horizontal door levers that can be triggered by sliding a hook under the door. Most importantly, make sure that doors and closets with IT assets are, in fact, kept locked.

Lee Neely
Lee Neely

2020-08-06

Capital One Fined $80M Over 2019 Breach

The US Office of the Comptroller of the Currency (OCC) has announced that it is imposing an $80 million fine on Capital One for "the bank's failure to establish effective risk assessment processes prior to migrating significant information technology operations to the public cloud environment and the bank's failure to correct the deficiencies in a timely manner." In 2019, a data breach compromised information belonging to more than 100 million Capital One customers. OCC is an independent bureau of the Department of the Treasury.


2020-08-06

Operation Skeleton Key Stole IP from Taiwanese Semiconductor Companies

Researchers from Taiwanese cybersecurity firm CyCraft say they have found evidence that hackers believed to have ties to China have stolen intellectual property from seven Taiwanese semiconductor companies. The stolen data include source code, software development kits, and chip designs.


2020-08-06

Intel Data Leaked Online

Intel is investigating the leak of 20GB of its internal documents online. The documents include source code, schematics, and other intellectual property that belongs to the chip maker. An Intel spokesperson said that the leaked documents include data that is shared with partners and customers under non-disclosure agreements (NDAs).

Editor's Note

Recently, we've been getting distracted by stories of leaked data with a corresponding ransom demand, which could result in the data no longer being available on line. This time, core information is available which could be used to develop new bios/firmware hacks which will be difficult to mitigate. The hack was successful not only because an unprotected share on their CDN was used, but also because confidential files within that storage had easy-to-guess passwords, such as Intel123. Verify that the security on your CDN is equivalent to or better than your systems, and when using passwords to protect files, use long passphrases that are resistant to cracking or guessing attempts. If user selectable encryption is available, use strong options such as AES to thwart brute force access methods.

Lee Neely
Lee Neely

Internet Storm Center Tech Corner

A Reminder to Patch CVE-2020-3452. Active Exploitation Seen

https://isc.sans.edu/forums/diary/Reminder+Patch+Cisco+ASA+FTD+Devices+CVE20203452+Exploitation+Continues/26426/


Internet Choke Points: Concentration of Authoritative Name Servers

https://isc.sans.edu/forums/diary/Internet+Choke+Points+Concentration+of+Authoritative+Name+Servers/26428/


FTCode Ransomware Resurfaces

https://isc.sans.edu/forums/diary/A+Fork+of+the+FTCode+Powershell+Ransomware/26434/


Malware Analysis Quiz

https://isc.sans.edu/forums/diary/Traffic+Analysis+Quiz+Whats+the+Malware+From+This+Infection/26430/


Possible New iOS Jailbreak Affecting Secure Enclave

https://twitter.com/SparkZheng/status/1286599007834271744


August Android Patches Released

https://source.android.com/security/bulletin/2020-08-01


Exploiting CVE-2020-9854 on MacOS

https://objective-see.com/blog/blog_0x4D.html


iOS OAuth2 Vulnerability

https://www.computest.nl/en/knowledge-platform/blog/vulnerability-new-touchid-feature-iCloud-accounts-at-risk-breached/


Limiting Location Data Exposure

https://media.defense.gov/2020/Aug/04/2002469874/-1/-1/0/CSI_LIMITING_LOCATION_DATA_EXPOSURE_FINAL.PDF


Microsoft Anti-Malware Flagging Host File Manipulation

https://www.bleepingcomputer.com/news/microsoft/windows-10-hosts-file-blocking-telemetry-is-now-flagged-as-a-risk/


Reviving Older Printer Vulnerability

https://www.blackhat.com/us-20/briefings/schedule/#a-decade-after-stuxnets-printer-vulnerability-printing-is-still-the-stairway-to-heaven-19685