SANS NewsBites

Improperly Configured AWS S3 Bucket Exposes 10 Million Hotel Guest Records; Critical Flaws in WordPress Plugin; Australia to Expand Scope of Critical Infrastructure

November 10, 2020  |  Volume XXII - Issue #89

Top of the News


2020-11-09

Improperly Configured AWS S3 Bucket Exposes 10 Million Hotel Guest Records

A misconfigured AWS S3 bucket has exposed 24.4 GB of personal data belonging to millions of hotel guests. The issue affected a hotel reservation platform, Cloud Hospitality, that allows hotels to integrate their own systems with third-party online booking sites, such as Expedia and Hotels.com. The stored data include names, national ID numbers, and payment card information.

Editor's Note

A great aid for avoiding these types of vulnerabilities: the Center for Internet Security has updated v1.3 benchmarks (configuration guidelines) for AWS S3, Office365 and the other commonly used cloud services that are constantly in the news with avoidable misconfigurations enabling incidents and exposures. https://www.cisecurity.org/blog/cis-benchmarks-september-2020-update/: CIS Benchmarks September 2020 Update

John Pescatore
John Pescatore

While Amazon has implemented controls and warnings to limit creating or modifying an S3 bucket to be world accessible, it's still necessary to audit your configured storage to make sure permissions are appropriate for storage created prior to those controls or to find users accepting the warning and proceeding anyway. Amazon has published guidelines for auditing your AWS account and services for appropriate permissions as well as tools like CloudTrail and S3 bucket logging which allow you to monitor for inappropriate activity. See AWS security audit guidelines: https://docs.aws.amazon.com/general/latest/gr/aws-security-audit-guide.html: AWS security audit guidelines

Lee Neely
Lee Neely

2020-11-09

Critical Flaws in Ultimate Member WordPress Plugin

Three critical privilege elevation flaws in the Ultimate Member plugin for WordPress could be exploited to take over vulnerable websites. The plugin is installed on more than 100,000 sites. Website admins are urged to update to version 2.1.12 as soon as possible.

Editor's Note

The updated plugin was released October 29th. The vulnerability is characterized as easy to exploit, involves leveraging the plugin's not sanitizing input such that a user could change the meta data which defines their role. The free Wordfence firewall rule will not be available until November 22nd.

Lee Neely
Lee Neely

2020-11-09

Australian Government Seeks to Expand Scope of Critical Infrastructure

A proposed amendment to Australia's Security of Critical Infrastructure Act 2018 would expand the definition of critical infrastructure to comprise additional sectors, including communications, financial services and markets, data storage and processing, defence industry, higher education and research, energy, food and grocery, healthcare and medical, space technology, transport, and water and sewerage. The Act currently imposes security requirements on organizations in the gas, electricity, water, and maritime port sectors.

Editor's Note

The exposure draft clearly defines the scope and impacts related to the new categories, for systems, information and location, as well as legal basis of penalties for non-compliance. What is missing is a standard for securing and assessing those systems such as Australia's Essential Eight, a series of baseline mitigation strategies which, when implemented, makes it much harder for adversaries to compromise systems.

Lee Neely
Lee Neely

Australia's 2018 Critical Infrastructure Act was mainly about requiring the original sectors to provide information to the Australian government, and establishing the legal authority of the government to issue directions to owners/operators of systems in those sectors. There was no mention of standards or raising the bar for cybersecurity in Australia. The proposed amendment is also very light on standards but there is a goal of "...setting clear security standards and creating a level playing field in the Australian market." A quick movement towards making the "Australian Essential Eight" practices be required would be very valuable, but the amendment is more aimed at a long term process.

John Pescatore
John Pescatore

The Rest of the Week's News


2020-11-09

Older Versions of Android Will Have Trouble Accessing Sites with Let's Encrypt Certificates

Starting next September, devices running older versions of the Android operating system may experience trouble accessing websites secured with Let's Encrypt root certificates. The Let's Encrypt root certificate was initially cross-signed by IdenTrust (DST Root X3). That certificate will expire on September 1, 2021. Let's Encrypt now has its own trusted root certificate (ISRG Root X1). Devices running Android versions older than 7.1.1 will need to be updated to trust that root certificate.

Editor's Note

Approximately 1/3 of Android devices are still running Android 7.1.1, which was released in December 2016. The current Let's Encrypt root certificate can be added to the device, manually or via MDM. Alternately, users can install Firefox which has its own root certificate store. The best option is to replace devices still running Android 7, which is unsupported, with those that can run Android 11.

Lee Neely
Lee Neely

2020-11-09

Laptop Manufacturer Compal Hit with Ransomware

Compal, a company that manufactures laptops for Apple, Acer, Dell, HP and other companies, was hit with a ransomware attack over the weekend. Compal detected the incident on Sunday, November 8. According to a company statement, the incident affected the internal office network, not the production network.

Editor's Note

Segmenting office and production/OT networks is a key defense, as are supply chain security measures such as cryptographic validation of firmware at the end of assembly and verification processes on media or files transferred to the production network to prevent or detect the introduction of malware.

Lee Neely
Lee Neely

While network engineers are rewarded for flat networks (maximum bandwidth and minimum latency between any two points in the network), security engineers recognize that network structure and segmentation are essential to resisting lateral malware spread within the enterprise. At a minimum, highly vulnerable user activities (e.g., e-mail, browsing) should be isolated from "production."

William Hugh Murray
William Hugh Murray

2020-11-09

X-Cart eCommerce Platform Hit with Ransomware

eCommerce platform X-Cart was hit with a ransomware attack in late October. The attack took down stores hosted on X-Cart. Some stores were completely unavailable, while others reported trouble sending email alerts. An executive for Seller Labs, which acquired X-Cart a year ago, says they did not pay a ransom to regain access to their systems.

Editor's Note

The attack affected only their shared server offering. While systems were recovered by restoration from backup, some customers will experience data loss relating to transactions that happened between the backup and restore date. Customers should review email or other transaction logs not contained on the X-Cart platform to identify gaps. Watch for a follow-up class-action lawsuit, particularly if the attack is related to the RCE vulnerability X-Cart had purportedly fixed previously.

Lee Neely
Lee Neely

2020-11-09

Gitpaste Worm Has at Least 12 Attack Modules

Malware recently detected by researchers at Juniper Threat Labs targets Linux-based x86 servers and Linux IoT devices. The worm, dubbed Gitpaste, stores code in GitHub and Pastebin. It has at least a dozen attack modules. Gitpaste appears to be adding infected devices to a botnet. Once a system is compromised, a shell script is installed, and that begins downloading and executing the malware's other components


2020-11-09

UVM Cyberattack Impacts Chemotherapy, Mammograms

Problems caused by a cyberattack that hit the University of Vermont (UVM) Health Network in late October have reduced the number of patients they can currently provide with chemotherapy treatments. UVM Health Network has been unable to administer mammograms, ultrasounds, and related screenings. In addition, 300 staff members have been furloughed or reassigned.


2020-11-09

Upcoming Chrome Feature Will Block JavaScript Redirects

Google will introduce a new feature to Chrome to help prevent a link that opens in a new tab from executing JavaScript. A security flaw in an attribute that tells the browser to open a link in a new tab allows the new page to redirect users to a URL that is different from the one they clicked on. The change to fix this issue has been made in Chrome Canary and is expected to be included in Chrome 88 when it is released in January 2021.

Editor's Note

This is characterized as a "tab napping" attack. The issue occurs when a URL includes target="_blank" without the rel="noopener" attribute. The bug fix makes that the default behavior. This behavior was added to Safari in 2018, and will be added to Chromium and is a change in the HTML standard. Note that the behavior can be restored if the attribute rel="opener" is specified.

Lee Neely
Lee Neely

2020-11-09

Zoom Agrees to Terms of FTC Settlement Over Misleading Security Claims

Zoom and the US Federal Trade Commission (FTC) have reached a settlement over charges that the company misled users about the encryption it offered. The original complaint alleged that Zoom misled its users when it claimed to offer "end-to-end 256-bit encryption." According to the terms of the settlement, "Zoom has agreed to a requirement to establish and implement a comprehensive security program, a prohibition on privacy and security misrepresentations, and other detailed and specific relief to protect its user base."

Editor's Note

It is a good idea to trust but verify vendor security claims. Understand the impacts and limitations of the security measure, rather than reading the marketing term chosen. For example, there are application limitations when using end-to-end encryption with VTC products like Zoom, which preclude joining before the host, cloud-based recording or use of the web-based applications to participate in the meeting. Understand where and how the system has been secured, so you can make a risk-based decision about what data you do, or do not, want transmitted using that service.

Lee Neely
Lee Neely

Internet Storm Center Tech Corner

Cryptojacking Targeting WebLogic TCP/7001

https://isc.sans.edu/forums/diary/Cryptojacking+Targeting+WebLogic+TCP7001/26768/


Extracting VBA Code From Maldocs

https://isc.sans.edu/forums/diary/Quick+Tip+Extracting+all+VBA+Code+from+a+Maldoc/26772/


How Attackers Brush Up Their Malicious Scripts

https://isc.sans.edu/forums/diary/How+Attackers+Brush+Up+Their+Malicious+Scripts/26770/


Let's Encrypt May No Longer Be Recognized by Older Android Versions

https://letsencrypt.org/2020/11/06/own-two-feet.html


Fake Microsoft Teams Updates Lead to Cobalt Strike Deployment

https://www.bleepingcomputer.com/news/security/fake-microsoft-teams-updates-lead-to-cobalt-strike-deployment/


Linux Kernel to Remove set_fs()

https://lwn.net/Articles/835181/


BigIP Vulnerability

https://support.f5.com/csp/article/K43310520


RansomEXX Trojan Attacks Linux Systems

https://securelist.com/ransomexx-trojan-attacks-linux-systems/99279/


More NPM Malware Found

https://blog.sonatype.com/discord.dll-successor-to-npm-fallguys-


The Internet is Getting Safer: Fall 2020 RPKI Update

https://blog.cloudflare.com/rpki-2020-fall-update/