SANS NewsBites

Uber CSO Indicted for Breach Coverup; CISA 5G Strategy; iOS SDK Malicious Code

August 25, 2020  |  Volume XXII - Issue #67

Top of the News


2020-08-21

Former Uber CSO Indicted for Covering Up 2016 Breach

Former Uber CSO Joseph Sullivan has been indicted for allegedly covering up a 2016 data breach at the company. The breach compromised personal data belonging to 57 million Uber drivers and passengers; the information included Uber drivers driver's license numbers. Sullivan allegedly failed to disclose the breach while the FTC was investigating a 2014 breach at the company.

Editor's Note

There is a more subtle lesson here than the need to follow the rules. As security becomes more core to enterprise success, security practitioners will increasingly be caught up in decisions involving CEOs and attorneys. When the CEO believes that he does not need to follow the rules, the resulting culture of criminality corrupts good people by implicitly or explicitly threatening their high-paid jobs if they don't "go along." The bottom line: if you work for an executive who expects his/her people to break the rules, get out quickly.

Alan Paller
Alan Paller

Over the past several years, Uber has become the poster child for dysfunctional management in many areas - not surprising to see security management being accused of being part of the problem. This is a good cautionary tale to use with CXOs, legal counsel, and boards to illustrate the high risks of trying to downplay or hide incidents.

John Pescatore
John Pescatore

Sullivan reportedly received an email from the hacker informing him of the 2016 breach and, rather than report the breach, paid the attackers $100,000 USD in bitcoin via a bug bounty program and had attackers sign a non-disclosure agreement (NDA) asserting no data was stolen or stored.

Lee Neely
Lee Neely

2020-08-24

CISA Releases 5G Security Strategy

On Monday, August 24, the US Cybersecurity and Infrastructure Security Agency (CISA) released a strategy to defend 5G networks against threats. The strategy "establishes five strategic initiatives that seek to advance the deployment of a secure and resilient 5G infrastructure."

Editor's Note

CISA is moving to raise awareness and reduce risks through these initiatives. By leveraging existing and new partnerships, they hope to maximize the capabilities and security of 5G. They include policy, including security, supply chain, partnerships, innovation and sharing of risk management information, which will result in a foundation that should be leveraged to reach these goals.

Lee Neely
Lee Neely

Much of the discussion of 5G networks, led by the carriers, has focused on the high speed and low latency of the communication services they offer. However, this defensive strategy is about the "nodes," the devices and their applications, in the network rather than merely the "links." These are the responsibility of the developers and managers of the applications, not the carriers.

William Hugh Murray
William Hugh Murray

2020-08-24

Malicious Code Found in Mintegral iOS SDK

A report from Snyk describes malicious code it detected in an iOS software development kit (SDK) that has been used in more than 1,200 apps; the vulnerable apps have been downloaded a collective total of more than 300 million times. The Mintegral iOS SDK collects user data and steals clicks from ads commits advertising attribution fraud.

Editor's Note

By using method swizzling, the Mintegral SDK captures advertising activities, registering them as accesses to their advertising, in addition to the legitimate ad accessed. As the last registered click gets the attribution, their second registration wins, and they get the revenue. While the debate about the SDK also being used to capture privacy information continues, the new iOS 14 privacy disclosure prompts should allow users to identify the behavior and make informed choices.

Lee Neely
Lee Neely

Apparently, the appeal of the Mintegral SDK is that it produces apps for both iOS and other environments, which, of course, the Apple SDK does not do. However, Mintegral denies any "fraud or invasion of privacy," claims that it uses an Apple API, and cites an Apple e-mail that states that Apple does not have evidence that Mintegral has "harmed users." Users should read the statements from Apple in the last two paragraphs of the ZDNet report.

William Hugh Murray
William Hugh Murray

The Rest of the Week's News


2020-08-24

Canpar Express Hit with Ransomware

The internal computer systems at Canadian delivery company Canpar Express were infected with ransomware last week. Customers complained of delayed deliveries. On Monday, August 24, files that appear to have been taken from Canpar systems were leaked on the dark web.

Editor's Note

At this late stage in the game, continued vulnerability to ransomware is reckless. Resist corruption of your programs and data using "least privilege" access control and lateral compromises within the enterprise using strong authentication, structured networks, and end-to-end application-layer encryption.

William Hugh Murray
William Hugh Murray

2020-08-21

FBI and CISA Release "Vishing" Warning

The FBI and the Cybersecurity and Infrastructure Security Agency (CISA) has issued a joint advisory warning of an increase in the threat of voice phishing, or "vishing," attacks targeting people working from home during the pandemic. The attackers call their targeted victims and, pretending to be IT desk employees, tell them they need to use a different VPN login page. They then direct the victims to specially-crafted pages that harvested their VPN credentials. The advisory offers mitigation advice for organizations and end-users.

Editor's Note

This is not the upgraded VPN you're looking for. Part of the trick here is they are calling users' cell numbers with a caller ID that maps to a corporate number. As the users are remote, your VoIP firewall can't intervene. Another component is processes enacted to eliminate in-person validation are being exploited. A prime target here is new-hires. When doing remote validation, make sure to include a video component, comparing the photo on government issued ID to the worker. Other mitigations include watching for look-alike domains, restricting VPN access to known (ideally managed) good devices, and restricting login times.

Lee Neely
Lee Neely

2020-08-24

Zoom Outages Fixed

Video communications company Zoom experienced outages on Monday, August 24. The majority of the outages affected users in the UK and on the East Coast of the US. The issues were resolved shortly after 1:00pm ET (5:00pm UTC.)

Editor's Note

Zoom has a service status page (https://status.zoom.us) which has information about updates as well as service interruptions, including past issues. Consider subscribing to their email updates for a more active notification. The total outage was about 4.5 hours, with the majority of users back online after about 2 hours

Lee Neely
Lee Neely

2020-08-24

Flaw in WooCommerce NAB Transact Extension

A critical payment bypass vulnerability in the WooCommerce NAB Transact extension could be exploited to make it appear to vendors that orders have been paid in full. The NAB extension, which is from National Australia Bank, lets online vendors process payment card transactions within their websites. Users are urged to upgrade to version 2.1.2.


2020-08-24

Freepik Data Breach Affects 8.3M Users

Hackers used an SQL injection attack to steal email addresses and password hashes belonging to 8.3 million Freepik and Flaticon users. Freepik is a website that offers free photos and design graphics.

Editor's Note

Make sure that your apps are sanitizing input, separate from your WAF. Regular web application scanning can be used to ensure this remains implemented as well as reveal issues prior to an attacker doing so. Ideally scan with and without the WAF to verify its operation, as well.

Lee Neely
Lee Neely

Checking inputs is difficult but essential, particularly in public facing applications. That said, the detection and elimination of SQL commands should be the "low hanging fruit."

William Hugh Murray
William Hugh Murray

2020-08-24

MITRE Active Defense Framework

MITRE's Shield active cyber defense framework is designed to help organizations "engage... an active cyber defense." The Shield Active Defense Matrix cross-references tactics - what defenders want to accomplish - with techniques for achieving those tactics.


2020-08-24

Fix Available for BIND 9 Denial-of-Service Issue

A security flaw affecting BIND name server versions 9.16.1 through 9.17.1 could be exploited to cause denial-of-service conditions on vulnerable devices. Updated versions of BIND address this buffer overflow vulnerability as well as several less severe flaws.

Internet Storm Center Tech Corner

A Word of Caution: Helping Cyber Stalking Victims

https://isc.sans.edu/forums/diary/A+Word+of+Caution+Helping+Out+People+Being+Stalked+Online/26422/


RDP and Telnet Scans

https://isc.sans.edu/forums/diary/Remote+Desktop+TCP3389+and+Telnet+TCP23+What+might+they+have+in+Common/26492/


Tracking a Malware Campaign Through VT

https://isc.sans.edu/forums/diary/Tracking+A+Malware+Campaign+Through+VT/26498/


Thales Cinterion Input Validation Vulnerability

https://www.thalesgroup.com/en/markets/digital-identity-and-security/iot/resources/security-updates-cinterion-iot-modules


RDP Remains a Top Target

https://www.group-ib.com/media/iran-cybercriminals/


Google Drive File Extension Spoofing

https://thehackernews.com/2020/08/google-drive-file-versions.html


Zoom Outage

https://www.cnn.com/2020/08/24/us/zoom-outage-worldwide-trnd/index.html


Microsoft Introduces Application Guard

https://docs.microsoft.com/en-us/microsoft-365/security/office-365-security/install-app-guard?view=o365-worldwide


Safari File Sharing Bug

https://blog.redteam.pl/2020/08/stealing-local-files-using-safari-web.html