SANS NewsBites

NSA and FERC/NERC Issue Extremely Valuable Security Guides; CISA Emergency Directive on Windows

September 22, 2020  |  Volume XXII - Issue #75

Top of the News


2020-09-21

NSA Cybersecurity Information Sheets

The US National Security Agency (NSA) has published two cybersecurity information sheets. The first, "Compromised Personal Network Indicators and Mitigations," is for government teleworkers; it "provides guidance to users who have received authorization to connect GFE (government furnished equipment) to personal networks." The second document, "Performing Out-of-Band Network Management," provides information for system admins on isolating management traffic from operational traffic.


Editor's Note

There is information in the first document we can all leverage as we are all connecting assets to a personal or other non-company managed networks, providing IoCs and mitigations for home users, including aggressive measures if your home network is actively compromised. The second document not only outlines out-of-band management practices, it also provides alternatives for either physical or virtual separations, which help raise the bar on corporate IT devices and services.

Lee Neely
Lee Neely

Excellent resources.

Brian Honan
Brian Honan

2020-09-21

FERC/NERC Report Looks at Electric Utility Cyber Incident Response

A report from the U.S. Federal Energy Regulatory Commission (FERC) and the North American Electricity Reliability Corporation (NERC) outlines best practices for cybersecurity incident response. The report is based on information gleaned from cybersecurity incident response plans of eight US utilities.

Editor's Note

This is a great source of best practices and successes. Leverage this report to see if you've missed anything, as well as a source for solutions you may not have derived on your own, possibly facilitating that "ah ha!" moment.

Lee Neely
Lee Neely

Good to see FERC/NERC highlighting common successful practices across very individual security programs of the eight utilities interviewed. There is no shortage of information about failures in security - finding out how others have overcome the barriers to higher levels of security is what is needed. During my years at Gartner, Case Study research notes were among the highest page views of all Gartner documents and here at SANS the What Works program continues that approach. The value is not in "I never thought of doing that," it is in the "Oh, that is how they were able to do that."

John Pescatore
John Pescatore

2020-09-18

CISA Emergency Directive on Windows Server Vulnerability

On Friday, September 18, the US's Cybersecurity and Infrastructure Security Agency (CISA) issued an Emergency Directive ordering federal agencies to patch a critical vulnerability in Windows Server for which Microsoft issued a fix in August. The flaw lies in an Active Directory authentication component called Microsoft Windows Netlogon Remote Protocol (MS-NRPC). Agencies have been directed to "update all Windows Servers with the domain controller role by 11:59 PM EDT, Monday, September 21, 2020." The privilege elevation vulnerability has been given a CVSS score of 10.

Editor's Note

The flaw can be leveraged for an unauthenticated attacker to obtain administrative privileges on your domain controller. Double check that you applied the update to all your Domain Controllers. The fix applies to Windows Server 2008 or later. Next, build a plan for the required post-patch activities prior to the Q1 2021 DC enforcement phase to avoid devices losing access:

Lee Neely
Lee Neely

We are at the point where most enterprises should apply Windows patches by default. The risk of not doing so now exceeds that of applying without testing for their impact on applications.

William Hugh Murray
William Hugh Murray

The Rest of the Week's News


2020-09-18

Researchers: Rampant Kitten Hacking Campaign Uses an Arsenal of Data-Stealing Malware

Researchers at Check Point have detected a long-standing surveillance campaign used by Iranian entities to target dissidents and expatriates. Dubbed Rampant Kitten, the campaign employs malware to steal information, including two-factor authentication (2FA) SMS codes, take screenshots, and record sounds near infected devices.

Editor's Note

The CheckPoint blog notes that most of the targets of this campaign are "Iranian Nationals" (and a few neighbors), those seen as opponents of the regime. While the blog did point to tools (including CheckPoint products) useful for resisting this campaign, this editor was unable to find indicators of compromise (IOCs). The investigation is of interest, but this campaign does not represent a risk for most of our readers.

William Hugh Murray
William Hugh Murray

2020-09-18

Hijacking Flaw in Firefox for Android is Fixed in Version 79

Firefox for Android users are urged to update their apps to version 79 or newer to protect the browser from being hijacked. An attacker on the same Wi-Fi network as someone running a vulnerable version of Firefox for Android could cause a new browser window to open. The issue lies in the browser's Simple Service Discovery Protocol (SSDP) engine.

Editor's Note

There were three separate updates to the rules as incremental fixes were quickly released, rather than delaying to only release the comprehensive fix; make sure you have the latest which fully addresses the problem. Initial exploits were possible as a parameter could be changed to move to the less secure v1 code base, either by request manipulation or CSRF. Both exploit paths are closed. If you're relying on the free Wordfence firewall, rules were released September 19th and 20th. Rules for the paid version were released 30 days previously.

Lee Neely
Lee Neely

2020-09-17

Internet Archive and Cloudflare Collaborate to Archive More Website Content

A partnership between the Internet Archive and Cloudflare will automatically archive content of websites that use Cloudflare's Always Online service. The Always Online feature serves cached static versions of websites when the sites are experiencing downtime. The partnership will help increase the number of sites the Internet Archive's Wayback Machine archives.


2020-09-17

Another Patch for Discount Rules for WooCommerce WordPress Plugin

The developers of the Discount Rules for WooCommerce WordPress plugin have released an update to address a pair of high-severity cross-site scripting vulnerabilities. This is the third time that updates have been issued to address the flaws; two earlier versions did not sufficiently fix the problem. Users are urged to update to version 2.2.1.

Editor's Note

It is now routine to identify vulnerabilities in WordPress Plug-ins. Many of these remain unpatched, in part because the decision to include the plug-in was made casually, at a low-level of management, and was not documented. Said another way, no one is responsible for knowing what plug-ins are in use, much less for patching them. If you are using WordPress, identify and minimize the plug-ins that are in place, and monitor announcements about those that you continue to use.

William Hugh Murray
William Hugh Murray

2020-09-16

Jekyll Island Authority Systems Hit with Ransomware

The Jekyll Island Authority (JIA) has acknowledged that its network was hit with a ransomware attack last week. (Jekyll Island is located off the coast of the US state of Georgia.) The JIA executive director said, "All of our computer systems ... were impacted, and it's a very serious situation." JIA employed a third-party IT services provider that is working on restoring JIA systems.


2020-09-21

Ransomware Operators Stole Data from ArbiterSports

ArbiterSports has acknowledged that its network suffered a ransomware attack in July. According to its website, "ArbiterSports provides a complete suite of tools and technology that caters to the needs of Assigners, Coordinators, Business Offices, Game officials and Athletic or Federal Program Directors." The company said that the attackers stole data belonging to 540,000 users. Although ArbiterSports paid the demanded ransom and the hackers said they deleted the stolen files, there is no guarantee that the information is not still in their possession.

Internet Storm Center Tech Corner

A Mix of Python and VBA in a Malicious Word Document

https://isc.sans.edu/forums/diary/A+Mix+of+Python+VBA+in+a+Malicious+Word+Document/26578/


Salesforce Phish

https://isc.sans.edu/forums/diary/Analysis+of+a+Salesforce+Phishing+Emails/26582/


Slightly Broken Overlay Phishing

https://isc.sans.edu/forums/diary/Slightly+broken+overlay+phishing/26586/


Google App Engine Used in Phishing Attacks

https://medium.com/@marcelx/attackers-are-abusing-googles-app-engine-to-circumvent-enterprise-security-solutions-again-eda8345d531d


Sysmon Adds Clipboard Monitoring

https://docs.microsoft.com/en-us/sysinternals/downloads/sysmon


Windows Defender No Longer Able to Download Files

https://www.bleepingcomputer.com/news/microsoft/microsoft-removes-windows-defender-ability-after-security-concerns/


MacOS Code Injection via Third Party Frameworks

https://www.trustedsec.com/blog/macos-injection-via-third-party-frameworks


Snort/ClamAV Cobalt Strike Detection

https://blog.talosintelligence.com/2020/09/coverage-strikes-back-cobalt-strike-paper.html