SANS NewsBites

Colleges New Target Of Ransomware Wave; and Ransomware Attacks on Compromised Exchange Servers

March 16, 2021  |  Volume XXIII - Issue #21

Top of the News


2021-03-16

Universities and Colleges Targeted In Rash of Ransomware Attacks

Today the FBI issued a rare “FLASH” report notifying “trusted partners” of a sharply accelerating wave of PYSA ransomware already targeting education institutions in 12 US states and the United Kingdom. PYSA, also known as Mespinoza, is a malware capable of exfiltrating data and encrypting users’ critical files and data stored on their systems. The unidentified cyber actors have specifically targeted higher education, K-12 schools, and seminaries. These actors use PYSA to exfiltrate data from victims prior to encrypting victim’s systems to use as leverage in eliciting ransom payments. Colleges that are not members of another FBI trusted partner group can get a copy of the report through their student cyber clubs that are wisely using this notification to practice locating IOCs both to help their schools and as preparation for the National Cyber Scholarship competition coming on April 5. The Cyber FastTrack College Coalition of 120 colleges is sharing the FBI FLASH report and more than 100 practice labs contained in the CyberStart learning labs game. Have your college cyber club president request the FBI FLASH report (and learning labs) by emailing haya@nationalcyberscholarship.org.


2021-03-12

Compromised Exchange Servers Targeted with Ransomware

In a new phase of attacks against on-premises Exchange Servers, systems that have already been compromised are now being targeted with ransomware. Microsoft says it “protects against this threat known as Ransom:Win32/DoejoCrypt.A, and also as DearCry.”

Editor's Note

These Exchange Server exploits follow an accelerated timeline of adoption by new criminals: from nation state attacks -> organized crime -> commodity ransomware attacks. Again: If you are not patched, you are compromised. Also consider Business E-Mail Compromise (BEC) attacks a possibility. They are more difficult to detect and may not make the news, at first.

Johannes Ullrich
Johannes Ullrich

Microsoft released a one-click tool aimed at companies, in particular SMEs, to use to identify whether they have been compromised and/or vulnerable, and to help remedy if they are. The tool is available at https://msrc-blog.microsoft.com/2021/03/15/one-click-microsoft-exchange-on-premises-mitigation-tool-march-2021/

Brian Honan
Brian Honan

2021-03-13

Linux Kernel Flaws Could be Exploited to Gain Root Privileges

A trio of vulnerabilities in the iSCSI module of the Linux kernel could be exploited to allow anyone with a user account to obtain root privileges. The vulnerabilities have been present since 2006 and they affect all Linux distributions. They were only recently detected by researched from GRIMM, which notified the Linux Security Team in mid-February. The issues are fixed in these kernel releases: 5.11.4, 5.10.21, 5.4.103, 4.19.179, 4.14.224, 4.9.260, and 4.4.260.

Editor's Note

Not an emergency. Patch as updated packages become available. Sadly, privilege escalation vulnerabilities are too common to really worry about them too much.

Johannes Ullrich
Johannes Ullrich

While you may no longer have SCSI or iSCSI devices, the loadable modules are still installed with the OS. As kernel modules can be loaded by non-privileged users, it’s a good idea to look at hardening the processes around loading kernel modules and allowing only authorized/approved modules to load. While each Linux distribution is slightly different, modules can be denied by editing the modprobe configuration files to not only prevent the loading, but also to change the install for a given module to /bin/false.

Lee Neely
Lee Neely

The key issue with Linux vulnerabilities is all the different flavors of Linux that might be in use in your environment, especially in appliances and ICS-type equipment. That impacts not only the level of severity of the vulnerability but also the availability and timeliness of patching. This type of vulnerability – “vestigial” capabilities that aren’t used much but are left in software to end\sure backwards compatibility – are a continuing goldmine for attackers that Windows and Linux suffer because of the broad base of hardware that runs those OSs and the many, many, many years they have been out. It really is time to change the planning around IT lifecycle/depreciation schedules to be closer to mobile device short timeframes than the current schedules which really date back to mainframe days.

John Pescatore
John Pescatore

2021-03-15

Analysis Shows Security Agencies Need to Adopt Better PDF Sanitization Methods

Researchers from the University of Grenoble (France) Alpes and France’s Institut national de recherche en informatique et en automatique (INRIA) have published a paper detailing data exposure concerns in PDFs published by security agencies. The researchers analyzed 40,000 PDFs published by security agencies in 47 countries. Just seven agencies used sanitization to remove sensitive information from PDFs, and 65 percent of the sanitized files still contained sensitive information. PDFs contain layers of hidden data. Inadequate sanitization can reveal “sensitive information like authors names, details on the information system and architecture.” The researchers urge agencies to change sanitization methods.

Editor's Note

Redacting information requires a careful choice of tool and technique to avoid using mechanisms which can be bypassed. With PDF and other modern document types, it’s easy to overlook the hidden data included by default, from embedded files, to information about the author, organization and even software versions used. The published paper enumerates 11 types of hidden data in PDF files. The best tool for removing metadata from PDF files is Adobe Acrobat.  NSA has published a guide for redacting files using Adobe Acrobat Pro. https://apps.nsa.gov/iaarchive/library/ia-guidance/security-configuration/applications/redaction-of-pdf-files-using-adobe-acrobat-professional-x.cfm

Lee Neely
Lee Neely

Or maybe we need fewer PDFs? Reviving the art of creating readable plain text documents may be easier and more effective than sanitizing PDFs.

Johannes Ullrich
Johannes Ullrich

The Rest of the Week's News


2021-03-12

Cyberattack Disrupted Molson Coors Production

The Molson Coors brewing company says that a cyberattack “caused a system outage,” disruption operations. Molson Coors disclosed the information in Form 8-K filed with the US Securities and Exchange Commission (SEC). The company has not provided details about the attack.


2021-03-15

OVH Data Center Fire Occurred After UPS Unit Maintenance, Some Backups Non-recoverable

A fire that destroyed an OVH data center in Strasbourg, France, was likely caused by problems with an uninterrupted power supply (UPS) unit. Firefighters’ thermal cameras showed that a recently-serviced UPS unit and an adjacent unit were burning. The company has also said that internal backups for some systems are “non-recoverable.”

Editor's Note

When outsourcing functions, whether to a hosting center or a cloud provider, look carefully at geographic separation to prevent single points of failure. When services were in your data center, you had discussions about separations to prevent a single incident taking down your systems and you sent backups to an offsite facility for storage. These same risks apply here. Cloud services make it easy to have regional separations, most often considered for availability, but also consider separations for recovery as well, separate backups and services. Similarly, have backups in a separate co-location service from your hosted systems if you’re not retaining them in your data center.

Lee Neely
Lee Neely

Fire safety is usually outside the expertise of cybersecurity teams, but it is just as complex – putting one group in charge of both has been promoted, but often makes no sense. Many UPS systems involve batteries and there are numerous scenarios where batteries can be mismanaged or undermaintained and burst into flames. There are also many storage scenarios which innocuous maintenance materials (antifreeze, fertilizer, burlap sacks, etc.) may be stored too close together and lead to fires. This is a good example to use to drive inspection if your group is responsible for fire safety.

John Pescatore
John Pescatore

Too many people feel that once their data is in the cloud they no longer need to worry about backups.

Brian Honan
Brian Honan

2021-03-15

Microsoft Investigating Possible Leak of Exchange Server Proof-of-Concept Code

Microsoft is investigating whether information about the Exchange Server vulnerabilities was leaked prior to the patches’ release. Microsoft shared information about the vulnerabilities with its security partners through its Microsoft Active Protections Program (MAPP). On February 23, some MAPP partners received information about the Exchange Server vulnerabilities, which included proof-of-concept exploit code. (Please note that the WSJ story is behind a paywall.)

Editor's Note

Microsoft sources say they suspect that one of their MAPP business partners released the code. Vulnerability and supporting information, such as proof-of-concept code is released to these partners as part of their patch release process. If a partner was the source of the leak, they will face consequences, including ejection from the MAPP program. The possible risks of the MAPP program indicate timely application of released updates is prudent.

Lee Neely
Lee Neely

2021-03-15

Sky Global CEO and Associate Indicted

A US federal grand jury has returned an indictment against Sky Global CEO Jean-Francois Eap and a former distributor of Sky Global devices, Thomas Herdman. Suzanne Turner, FBI Special Agent in Charge of the San Diego Field Office, said “Eap and Herdman allegedly provided a service designed to allow criminals to evade law enforcement to traffic drugs and commit acts of violent crime without detection.” Sky Global devices are allegedly designed to prevent law enforcement from monitoring communications.


2021-03-15

UK ISPs and Law Enforcement Have Been Testing Internet Surveillance Technology

Internet service providers, the UK Home Office, and the National Crime Agency have been testing surveillance technology that could be used to retain all UK residents’ browsing histories. The Investigatory Powers Act 2016 allows the collection of data to create Internet Connection Records, and allows the information to be stored for up to 12 months.

Editor's Note

This will be watched very closely by the EU because the UK has now left the EU via Brexit. The UK has been granted temporary adequacy (meaning companies within the EU can continue to transfer personal data to organisations within the UK) until the end of June this year. However, should the EU deem the measures the UK are testing with this project to be in breach of the rights of EU citizens, the EU may not grant the UK ongoing adequacy from July 1, leading to major personal data transfer issues between the EU and the UK.

Brian Honan
Brian Honan

2021-03-15

Google Pushes Out Fix for Another Chrome Zero-day

A use-after-free vulnerability in Google Chrome’s Blink rendering engine is being actively exploited. This is the third zero-day flaw in Chrome that has been disclosed in as many months. The issue is fixed in the most recent version of Chrome on the stable channel for desktop, “89.0.4389.90 for Windows, Mac and Linux, which will roll out over the coming days/weeks.” The update fixes four additional vulnerabilities.

Editor's Note

Luckily, Google Chrome has a reasonably solid auto-update scheme. Just make sure to restart Google Chrome at least once a day.

Johannes Ullrich
Johannes Ullrich

The updates have not aligned with patch Tuesday, meaning you’re going to have to kick off an out-of-band patch sequence. Make sure to tell users to close Chrome, because you’re going to have to do that for them to apply the update. Make sure your other Chromium based browsers are up to date as well.

Lee Neely
Lee Neely

Browsers have become so general, flexible, feature-rich, and complex that they are inherently risky. Prefer purpose-built apps for sensitive applications.

William Hugh Murray
William Hugh Murray

2021-03-15

Google’s Proof-of-Concept Spectre Exploit

Google has published a proof-of concept exploit for the Spectre vulnerability. Google notes that “the goal of this proof of concept is to demonstrate the feasibility of a web-based Spectre exploit.”

Editor's Note

The POC demonstrates that current Spectre mitigations are incomplete. Google has published guidance on new security defenses to mitigate both Spectre-style and common web-level cross-site leaks (https://security.googleblog.com/2020/07/towards-native-security-defenses-for.html). These defenses are dependent on new security features introduced in Chrome 83 and Firefox 79 and if followed can help create applications more resistant to CSRF, XSS, DOM based and other information leak attacks.

Lee Neely
Lee Neely

2021-03-15

Buffalo Public Schools Cancels Classes Due to Ransomware

Buffalo (New York) Public Schools was hit with a ransomware attack on Friday, March 12. The district cancelled remote learning on Friday afternoon “due to an unanticipated interruption to BPS District network systems.” The district has cancelled all classes on Monday, March 15.


2021-03-10

House Committee Forms DOD Supply Chain Security Task Force

The US House of Representatives Armed Services Committee has created a task force to look into defense supply chain issues. Over the next three months, the Defense Critical Supply Chain Task Force will develop legislative solutions to supply chain and related issues that can be incorporated into the 2022 National Defense Authorization Act. Task force co-chair Representative Mike Gallagher (R-Wisconsin) also co-chaired the Cyberspace Solarium Commission.

Editor's Note

A much faster approach would be to simply photocopy the reports from any of the numerous other task forces that have been launched by the US Federal Government in the last decade or so on the same topic. I provided input to one in 2012 or so and would just cut and paste my same recommendations today.

John Pescatore
John Pescatore

Paying attention to your supply chain is really important, particularly when a known supplier is acquired by one who may not have your best interests at heart. Discovery may reveal hardware and software products no longer appropriate for your enterprise which will then have to be replaced or constrained. That analysis has to be supported by detection capabilities and response to prevent malicious activities not yet surfaced by your supply chain analysis.

Lee Neely
Lee Neely

Even if we are unable to hold vendors responsible for the quality of their own code, we must hold them accountable when they distribute malicious code from other sources. We will not secure the supply-chain by putting all the onus on the end-using enterprises.

William Hugh Murray
William Hugh Murray

Internet Storm Center Tech Corner

Wireshark Code Execution Exploit

https://gitlab.com/wireshark/wireshark/-/issues/17232


Google Chrome Vulnerability Exploited in the Wild

https://vulmon.com/vulnerabilitydetails?qid=CVE-2021-21193


Malware Installs Honeypot

https://www.bleepingcomputer.com/news/security/new-zhtrap-botnet-malware-deploys-honeypots-to-find-more-targets/


Windows 10 Emergency Update to Fix Printing Crashes

https://www.bleepingcomputer.com/news/microsoft/windows-10-emergency-updates-released-to-fix-printing-crashes/


Twitter "Memphis" Bug

https://www.bleepingcomputer.com/news/technology/twitter-bug-automatically-suspends-you-when-tweeting-memphis/


NimzaLoader Malware Written in "nim"

https://www.proofpoint.com/uk/blog/threat-insight/nimzaloader-ta800s-new-initial-access-malware


Windows Azure AD Outage

https://status.azure.com/status


IBM DB2 Patch

https://www.ibm.com/support/pages/node/6427855