SANS NewsBites

Big Week for Critical Vulnerabilities Already Exploited: Google Drive Collaboration Feature, Windows Kernel, Oracle WebLogic Server, and WordPress

November 3, 2020  |  Volume XXII - Issue #87

Top of the News


2020-11-02

Google Drive Collaboration Feature is Being Exploited by Bad Actors

Bad actors are exploiting a legitimate feature in Google Drive to send emails and push notifications that lead to Google docs that contain malicious links. Google Drive's collaboration feature lets users send messages to invite others to share a Google doc. The push notifications used in this scheme lead to malicious docs; the email messages include the malicious link.

Editor's Note

While collaborating on documents using shared drives or shared documents is pretty common, it's still important to teach users to not accept unexpected collaboration requests. When collaborating, particularly outside your organization, make sure the collaboration link is only available for specific users, particularly if it allows write access. Once the document is opened there is a tempting link to a malicious site; use this as an opportunity to validate your boundary and endpoint protections still, in our current work environment, block access to malicious sites in case users click it.

Lee Neely
Lee Neely

The major point is that every communication/collaboration method created for legitimate use will be used by attackers for spam, phishing, malware delivery etc. Consider an egg salad sandwich left at your door. It really doesn't matter whether it got there by the mail carrier, UPS, FedEx or whoever - you really shouldn't eat it unless you know who sent it to you and unless you have made sure that the mayonnaise hasn't turned yellow or green - the latter being what Google has said it will ramp up on this communications path.

John Pescatore
John Pescatore

2020-11-02

Google Project Zero Discloses Windows Kernel Zero-day

Google's Project Zero has disclosed a zero-day vulnerability in Windows that is being actively exploited. The high-severity flaw lies in the Windows Kernel Cryptography Driver and can be exploited to escape sandboxes. The Windows flaw is being exploited in attacks that combine it with a recently-disclosed vulnerability in Chrome. Microsoft has not yet released a fix for the issue. Google gave Microsoft seven days to produce a patch, which is its policy when the vulnerability is being actively exploited.

Editor's Note

The Microsoft fix is scheduled to be released November 10th. Exploiting the flaw itself, a buffer overflow weakness in cng.sys, requires another successful exploit, such as the recent Chrome Flaw (CVE-2020-15999), to obtain local system access. The best mitigation is to fully deploy the Chrome update and push the Microsoft fix when released.

Lee Neely
Lee Neely

2020-11-02

Oracle Releases Emergency Fix for WebLogic Server Vulnerability

Oracle has released a patch for addressing a critical remote code execution flaw that affects multiple versions of Oracle WebLogic Server. The US Cybersecurity and Infrastructure Security Agency (CGISA) is urging users and admins to apply the updates.

Editor's Note

WebLogic is quickly becoming the WordPress of the enterprise world because of the large number of vulnerabilities being discovered. The flaws in Oracle's emergency fix have been actively exploited for about a week now, and the newest "emergency patch" is a trivial bypass of the patch released in October. First and foremost, do not expose WebLogic to the world. Even internally, be cautious. The latest flaw is easy enough to exploit. Any browser inside your network may easily be tricked into sending an exploit request to an internal WebLogic server when it visits a malicious web page. This could be exploited even via images included in emails (if your mail client downloads them automatically).

Johannes Ullrich
Johannes Ullrich

2020-11-02

WordPress Releases Multiple Security Updates

Last week, WordPress pushed out a security update, WordPress 5.5.2, which was intended to address a critical remote code execution issue and nine other vulnerabilities. The update caused problems installing WordPress on new sites. After learning of the issue, WordPress halted the rollout, which inadvertently caused a pre-release version of WordPress 5.5.3, (5.5.3-alpha) to be pushed out WordPress has now released WordPress 5.5.3.

Editor's Note

Check the version of your WordPress site to make sure that you're running 5.5.3. If you're on 5.5.3-alpha or earlier, or haven't enabled auto-updates, update to 5.5.3. While the 5.5.3-alpha plugin disablement was resolved in the 5.5.3 release, it's still a good idea to verify your plugins are properly enabled as well as updated. Given the pace of WordPress and plugin updates of late, automatic updates are a good way to stay current. Also make sure that you have regular backups in case you need to roll back.

Lee Neely
Lee Neely

It is time to add WordPress to the list of historically broken applications. Any continued use should be accompanied by strict management, scrutiny, and maintenance.

William Hugh Murray
William Hugh Murray

The Rest of the Week's News


2020-11-02

UK's ICO Fines Marriott #18.4m Over Four-Year Data Breach

The UK Information Commissioner's Office (ICO) has fined Marriott #18.4 million (USD 23.8 million) over a data breach that compromised information belonging to millions of customers. In 2014, hackers gained access to Starwood databases that held customer data. (Marriott acquired Starwood in 2016.) The system remained compromised through 2018. The number of customers affected is believed to be 339 million. Approximately seven million of those are UK citizens. The fine is significantly lower than the originally proposed #99m (USD 128 million) largely because of the economic situation created by the COVID pandemic.

Editor's Note

Of note is the dwell time. The attackers installed a web shell which allowed further attacks, including data dumps, administrator and end-user credential capture, which went undetected from July 2014 to September 2018. Another contributing factor was an incomplete deployment of multi-factor authentication (MFA). Make sure that your monitoring has sufficient coverage to detect unexpected access. Verify the completeness of security measures such as MFA to identify any resulting risks or omissions.

Lee Neely
Lee Neely

In 2019, Marriott said the breach cost them $28M, but their cyberinsurance policy paid $25M - reducing the direct impact to $3M. However, cyberinsurance doesn't always pay for regulatory fines, especially in EU for GDPR. An AON research report stated that in 20 of 30 EU countries, including the UK, GDPR fines would not be insurable. So, even this drastically reduced fine may end up costing Marriott more than a breach - that is a rare occurrence and needs to part of the calculus in deciding if cyberinsurance has a positive ROI.

John Pescatore
John Pescatore

2020-11-01

Wroba Mobile Banking Trojan Spreads Though Text Messages

The Wroba banking trojan spreads through text massages to infect mobile phones. It targets both iPhones and Android-based phones. Wroba is not new; it has mainly been used to target users in the APAC region. A campaign targeting US users was detected on October 29. The malicious text messages are often phony package delivery notifications. If users click on the link included in the message, the infection process begins.

Editor's Note

All the usual precautions against clicking on bait messages apply. In this case users must click twice. Android users, once on the message itself and once to install the malware. While it is more difficult to corrupt iOS devices by clicking on something on a web page, iOS users must both click on the message and be duped into entering their Apple credentials. While it seems to be counter-intuitive, mobiles remain safer than so called "personal" computers.

William Hugh Murray
William Hugh Murray

2020-10-30

Canadian Mall Customers' Images Collected Without Their Knowledge

A real estate firm that owns shopping malls in Canada collected images of shoppers in 12 of those malls and used "anonymous video analytics" (AVA) facial recognition technology to convert the images into individual biometric representations of each face. An investigation conducted by Canadian privacy commissioners revealed that the AVA service provider had collected and stored approximately five million numerical representations of faces on behalf of Cadillac Fairview Corporation Limited (CFCL). The data were stored on on a decommissioned server, for no apparent purpose and with no justification.

Editor's Note

While there should not be an expectation of privacy in public, using facial data to create a unique biometric representation of one's image should be disclosed. Additionally, when storing unique identifiers or PII, that repository needs to be deliberately managed and tracked to protect the information from misuse or acquisition.

Lee Neely
Lee Neely

2020-11-02

Precious Metals Dealer JM Bullion Hit with Skimmer Attack

JM Bullion, a Texas-based company that deals in precious metals, has notified its customers that their personal information may have been stolen in a breach earlier this year. The company became aware of the issue on July 6, although the hackers had been in the system since February. The malicious code used to steal information was present on the JM Bullion from February 18 through July 17.

Editor's Note

Timely breach notification are important when customers need to take action in response to lost data. In this case, JM Bullion didn't notify customers until three months after the breach discovery. As reports are circulating that the breach data from JM Bullion has been offered for sale since late May, JM Bullion customers should take active measures to monitor and secure their credit.

Lee Neely
Lee Neely

2020-10-30

UHS Ransomware Recovery

Universal Health Services (UHS) says it has recovered from a late September 2020 ransomware attack that affected the organization's facilities in the US. In both the company's third quarter financial report and in a form 8-K filing with the US Securities and Exchange Commission (SEC), UHS writes, "as a result of this cyberattack, we suspended user access to our information technology applications related to operations located in the United States," and "since that time, our information technology applications have been restored at our acute care and behavioral health hospitals."


2020-11-02

Hackers Stole US Voter Registration Data

On October 30, the US Cybersecurity and Infrastructure Security Agency (CISA) and the FBI jointly released an alert offering additional information about an Iranian cyber threat actor targeting state websites. "The actor successfully obtained voter registration data in at least one" of the systems they scanned earlier this fall.

Editor's Note

A lot of voter data is available publicly or for a nominal fee from many states. In some cases, the goal of these hacks isn't the actual data, but to support the narrative that election systems are insecure.

Johannes Ullrich
Johannes Ullrich

2020-10-30

Montreal Transit Agency Says it Will Not Pay Ransom

The hackers behind an attack that took down Societe de transport de Montreal (STM) servers in mid-October are demanding a payment of USD 2.8 million. The attack caused an outage of more than two-thirds of the Montreal transit agency's servers; a reservation system for adapted transportation was rendered unavailable. While the STM website is still down, the adapted transportation reservation system is now operational. STM says it does not intend to pay the ransom.


2020-10-30

Chatham County, NC Government Network Hit with "Cyber Incident"

The Chatham County, North Carolina, communication system experienced a "cyber incident" on Wednesday, October 28. The county's government network, including email and phone lines, were rendered unavailable. The incident did not affect 911 emergency services or early voting. The Chatham County manager released a statement on October 30, saying the incident "is still under investigation [and] Chatham County's Management and Information Systems (MIS) Department, along with federal, state and local partners continue working to restore the affected systems."

Editor's Note

The county is working to establish temporary email and phone numbers to allow operation while service restoration completes. Watch the county website (http://www.chathamnc.org/) and social media channels for updates.

Lee Neely
Lee Neely

Internet Storm Center Tech Corner

Quick Status of the CAA DNS Record Adoption

https://isc.sans.edu/forums/diary/Quick+Status+of+the+CAA+DNS+Record+Adoption/26738/


Emotet -> Qakbot -> More Emotet

https://isc.sans.edu/forums/diary/Emotet+Qakbot+more+Emotet/26750/


Operation Earth Kitsune

https://www.trendmicro.com/vinfo/us/security/news/cyber-attacks/operation-earth-kitsune-tracking-slub-s-current-operations


Google Chrome Update

https://chromereleases.googleblog.com/2020/11/stable-channel-update-for-desktop.html


Windows Kernel cng.sys pool-based buffer overflow CVE-2020-17087

https://bugs.chromium.org/p/project-zero/issues/detail?id=2104


WebLogic Bad News

https://www.oracle.com/security-alerts/alert-cve-2020-14750.html

https://twitter.com/80vul/status/1322078337137700865


NAT Slipstreaming Re-Discovered

https://thehackernews.com/2020/11/new-natfirewall-bypass-attack-lets.html