SANS NewsBites

Nations Target COVID-19 Research; 250,000 Windows Systems Not Patched Against Critical Vulnerabilities

November 17, 2020  |  Volume XXII - Issue #91

Top of the News


2020-11-13

State-Sponsored APTs Target COVID-19 Research

Microsoft says that State-sponsored hackers operating on behalf of the Russian and North Korean governments have been targeting organizations involved in COVID-19 vaccine research and development. Microsoft found evidence of three hacking groups targeting a total of seven organizations in South Korea, India, France, Canada, and the US. (Please note that the WSJ story is behind a paywall.)

Editor's Note

With the pressure to be first to market with an effective vaccine, countries are willing to reach that goal by any means necessary. Organizations working to create the drugs are in the crosshairs, in ways they are not prepared for or resourced to defend against. Microsoft is offering AccountGuard as a free service to healthcare organizations to help raise the bar on their email account security. (See https://www.microsoftaccountguard.com/healthcare/) It also includes notifications, direct links to Microsoft Customer Security and Trust team and security webinars and workshops, which should help focus limited resources as well as better prepare to protect systems without a significant time or cash outlay.

Lee Neely
Lee Neely

2020-11-17

Hundreds of Thousands of Windows Systems are Not Patched Against Known, Critical Vulnerabilities

The Internet Storm Center has found that nearly 250,000 Windows systems have not been patched against the BlueKeep remote desktop protocol (RDP) vulnerability; BlueKeep was disclosed in spring 2019. More than 100,000 Windows systems remain unpatched against the SMBGhost vulnerability in the Server Message Block v3 protocol; SMBGhost was disclosed in March 2020.

Editor's Note

Before anybody blames the pandemic for this, going back to the "early day" of Code Red and SQL Slammer, the result has been the same: most systems get patched in 30 days. The rest never get patched. Some organizations care, others do not. Many of these systems are essentially abandoned from any meaningful maintenance and are waiting to die a slow dead of ransomware and hardware neglect, lonely and forgotten in some server closet. We are not talking about hard-to-patch IoT devices for which it can be difficult to even find updates. These are for the most part Windows and Linux systems. Microsoft has provided more and better tools to make patching easier, more reliable, and less risky. Same for all major Linux distributions. But if organizations do not care to learn about these new tools, and just do what they always did (= nothing), we will end up with the equivalent of loaded unsecured shotguns scattered over the Internet waiting to be picked up and used by a random kid walking past them.

Johannes Ullrich
Johannes Ullrich

With everyone working remotely, patching those systems is challenging but is a solvable problem. Options to increase success include providing update services which can be reached without VPN by authorized systems, notifying users when to leave systems connected during patch windows, rather than patching while working and allowing the VPN to connect prior to login to mitigate risks of cached credential loss.

Lee Neely
Lee Neely

Lots of indication that IT operations have been consumed with keeping Work from Home up and running and patching performance has declined even at organizations that had strong SLAs pre-pandemic.

John Pescatore
John Pescatore

The Rest of the Week's News


2020-11-16

Capcom Says Ransomware Actors Stole Customer and Employee Data

Video game publisher Capcom has disclosed that the attackers behind a ransomware attack on the company's network stole customer and employee data as well as sensitive company information. The attack occurred on November 2. The breach affects as many as 350,000 people.

Editor's Note

Data stolen includes both customer and employee PII. Beware of password reset actions attempting to use this data. The Ragnar Locker group is seeking ransom for both the decryption key and for not publishing the data. If you've used the password from your Capcom account anywhere else, change it now to something unique for each service.

Lee Neely
Lee Neely

2020-11-13

ICO Fines Ticketmaster UK Over 2018 Data Breach

The UK Information Commissioner's Office (ICO) has fined the Ticketmaster's UK division 1.25 million GBP (1.65 million USD) for a breach that affected 9.4 million individuals. The ICO found that Ticketmaster "failed to put appropriate security measures in place to prevent a cyber-attack on a chat-bot installed on its online payment page." The breach affected UK customers who made purchases between February and June 2018.

Editor's Note

This is the second fine in recent weeks that the ICO has issued in relation to insecure implementations on a company's website; the other company is British Airways. Of note with this fine is the ICO not only highlighted the failure of Ticketmaster to properly assess the risks associated with the installation of the chat-bot onto its website, but also its failure to "Identify the source of suggested fraudulent activity in a timely manner." https://ico.org.uk/about-the-ico/news-and-events/news-and-blogs/2020/11/ico-fines-ticketmaster-uk-limited-125million-for-failing-to-protect-customers-payment-details/: ICO fines Ticketmaster UK Limited #1.25million for failing to protect customers' payment details.

Brian Honan
Brian Honan

2020-11-16

Hackney Council Struggling to Recover from Cyberattack

London's Hackney Council, which experienced "an advanced, criminal cyberattack" in mid-October, says it could be months before all services are restored. The Hackney Council websites notes that its "services are currently significantly disrupted and you may experience difficulty contacting us or using our services."

Editor's Note

A full restoration from backup can be painful and involved. Verify that your backups and restoration procedures are sufficient for a full-service restoration, including interdependencies. Practice service restoration, including rebuilding and operating services on fresh hardware or instances. Verify these are accurate and functional annually. Make sure that you don't overlook processes performed locally on end-user systems.

Lee Neely
Lee Neely

Many small enterprises, including small municipalities, often lack the resources to create effective plans to cope with breaches. While outside services may be helpful, any effective plan will require the participation and training of those responsible for implementing the plan.

William Hugh Murray
William Hugh Murray

2020-11-16

Hackers Targeting South Korea's Supply Chain

Researchers at ESET have found that a hacking group with ties to North Korea's government has been using stolen certificates to launch supply chain attacks in South Korea. In South Korea, Internet users are often required to install security software to allow them to visit government and banking websites. To facilitate these downloads, many users have an integration installation program known as WIZVERA VeraPort installed on their computers. ESET researchers say, "the attackers [are likely replacing] the software to be delivered to WIZVERA VeraPort users from a legitimate but compromised website."


2020-11-14

Recently-patched Intel Flaws Can be Exploited to Bypass Boot Guard

Several recently-patched vulnerabilities affecting Intel products could be exploited to override the Boot Guard protection, which is designed to prevent unauthorized code from running during the boot process. Attackers could install malicious firmware or obtain decrypted files from the targeted computer. The exploit requires that the attacker have physical access to vulnerable computers.

Editor's Note

As these exploits require physical access, your servers aren't the target as much as all those systems now running at home. Make sure that your threat model not only includes protections for mitigations for system on travel, in cars, etc. but also those in homes, or being delivered to users, particularly where the system configuration is completed externally. Consider disabling sleep mode for hibernate to mitigate vulnerabilities which access encryption keys in memory.

Lee Neely
Lee Neely

2020-11-13

CISA Warns of Vulnerability in BD Alaris Infusion Pumps

An alert from the US Cybersecurity and Infrastructure Security Agency (CISA) describes an improper network session authentication vulnerability in the BD Alaris 8015 PC Unit and BD Alaris Systems Manager. The flaw could be exploited to cause denial-of-service conditions. CISA's alert urges organizations using these products to employ mitigations provided by the manufacturer.

Editor's Note

Exploitation involves accessing the network associated with the devices and vulnerable services. Mitigations include regularly patching the servers and segmenting services utilizing firewalls and ACLs so only authorized devices able to interoperate.

Lee Neely
Lee Neely

2020-11-14

Texas Driver's License Data Compromised

A data breach affecting systems at an insurance software company has compromised driver's license information belonging to more than 27 million Texas residents. The company, Vertafore, "determined that, at some point between March 11 and August 1 of this year, there was potential unauthorized access to the three data files." Vertafore

disclosed the breach on November 10. Intruders accessed the system sometime between March 11 and August 1. The incident was detected in mid-August. The statement suggests that the data were compromised because the three data files were stored in an unsecured external storage service.

Editor's Note

Vertafore is offering a year of credit monitoring and repair to affected individuals, which is a good start. If you are affected and don't already have that service, sign up, and expect to keep it long term. While passing verification of security requirements to external providers is not new, the consequence of error is much higher with Internet-facing systems they use, particularly as those systems may have third-party services which also need to follow those requirements. Remember to regularly verify controls are in place and working beyond the initial acquisition and acceptance testing phases, including breach notification and indemnity agreements.

Lee Neely
Lee Neely

2020-11-13

US Mental Healthcare Provider Discloses Patient Data Breach

People Incorporated, a Minnesota-based mental health services provider, has disclosed that several employee email accounts were accessed by an unauthorized third party earlier this year. According to a statement from the company, "the accessed email accounts contained the personal and protected health information of certain patients, including their names, dates of birth, addresses, treatment information, insurance information, and medical record number." The incident affected approximately 27,500 individuals.

Internet Storm Center Tech Corner

Oledump Removed Macro Indicator

https://isc.sans.edu/forums/diary/oledumps+Indicator/26794/


Old Worm But New Obfuscation Technique

https://isc.sans.edu/forums/diary/Old+Worm+But+New+Obfuscation+Technique/26792/


Old Vulnerabilities Don't Die

https://isc.sans.edu/forums/diary/Heartbleed+BlueKeep+and+other+vulnerabilities+that+didnt+disappear+just+because+we+dont+talk+about+them+anymore/26798/


MacOS OCSP Disaster

https://blog.cryptohack.org/macos-ocsp-disaster


Citrix Virtual Apps and Desktops Security Update

https://support.citrix.com/article/CTX285059


Zoom Security Improvements

https://blog.zoom.us/new-ways-to-combat-zoom-meeting-disruptions/


Firefox File Read Vulnerability Details

https://medium.com/@kanytu/firefox-and-how-a-website-could-steal-all-of-your-cookies-581fe4648e8d


VoltPillager: Hardware-based fault injection attacks against Intel SGX Enclaves using the SVID voltage scaling interface (PDF)

https://www.usenix.org/system/files/sec21summer_chen-zitai.pdf