SANS NewsBites

National Intelligence Council Report on 2020 Elections; FBI Internet Crime Report for 2020; Threat Actor Breached Mimecast Production Grid; CISA Tool Detects SolarWinds IoCs

March 19, 2021  |  Volume XXIII - Issue #22

Top of the News


2021-03-16

ODNI Report on 2020 Elections: Russia Pushed Influence Narratives

The National Intelligence Council’s (NIC’s) Intelligence Community Assessment, Foreign Threats to the 2020 US Federal Elections, says there is evidence that foreign actors, most notably Russia, attempted to influence the election and undermine confidence in the electoral process. “A key element of Moscow’s strategy this election cycle was its use of proxies linked to Russian intelligence to push influence narratives … to US media organizations, US officials, and prominent US individuals, some close to [the] former president and his administration.” NIC says that they “have no indications that any foreign actor attempted to alter any technical aspect of the voting process in the 2020 US elections.”

Editor's Note

Back in the late 1950’s a faked experiment led to concern over subliminal advertising frames inserted into films shown in movie theaters. In the early 2000s scientific research proved subliminal advertising did lead to unknowing influence and many countries banned it, while in the US the FCC “discouraged” its use. Much of the influence techniques used by nation states and terrorist groups on social media is essentially subliminal advertising and legislation needs to evolve – it is not something market forces will address.

John Pescatore
John Pescatore

Social engineering, influencing others to act in a fashion that supports your desired outcomes, is not new. Often this manifests itself in advertising, or social media posts where the legitimacy is difficult to discern. Changes in legislation can make it harder or add consequences, but it still falls to the consumer to verify information provided.

Lee Neely
Lee Neely

2021-03-18

FBI Internet Crime Report 2020

The FBI’s Internet Crime Complaint Center (IC3) has published the 2020 Internet Crime Report. IC3 received more than 790,000 complaints regarding Internet-related crime in 2020. Phishing was the most often reported crime, followed by non-payment/non-delivery, and extortion. The total losses reported to IC3 total more than $4 billion. Business email compromise accounted for the largest portion ($1.8 billion) of those losses.

Editor's Note

Just to put that $4B number in perspective: the 2020 National Retail Federation shrinkage survey estimated that 2019 shrinkage (inventory loss from shoplifting, employee theft, supplier error/fraud, cashier errors and other causes) was $62B in the retail sector alone. Three key points here: (1) the FBI IC3 data comes from complaints filed with the FBI, the numbers don’t reflect overall losses in anyway; (2) in many industries, traditional crime continues to have a much larger business impact that cybercrime; (3) retail has kept shrinkage in the range of 1.5 – 2% over the years, while spending 1-1.5% of revenue on loss prevention/shrinkage control, meaning a 3% loss of revenue to shrinkage and the loss prevention program is an acceptable cost of doing business. Increasing spending in loss prevention without reducing shrinkage enough would result in a loss of profit, even if the absolute level of shrinkage went down. Can you talk similar language about the effectiveness of  your spending on security controls to justify increases or changes?

John Pescatore
John Pescatore

2021-03-18

Mimecast Says SolarWinds Threat Actor Stole Source Certificates and Customer Server Connection Information

Cloud-based email management company Mimecast says that a threat actor linked to the SolarWinds supply chain breach gained “access to part of our production grid environment… [and] accessed certain Mimecast-issued certificates and related customer server connection information.” The threat actor also accessed and downloaded some Mimecast source code repositories.

Editor's Note

When implementing MFA, make sure to not leave exceptions. Verify that remains in effect. Make sure that access credentials, including certificates, are only accessible where absolutely needed. This also raises the question – when you discover a credential is compromised, and change it, and then discover you still have attackers in your system, do you update it again? Or do you wait to make the initial update until you’re absolutely certain the attackers are gone?

Lee Neely
Lee Neely

Private keys should not be stored online when not in use.

William Hugh Murray
William Hugh Murray

2021-03-18

CISA’s CHIRP Tool Detects SolarWinds Indicators of Compromise

The US Cybersecurity and Infrastructure Security Agency (CISA) has released a tool that can detect indicators of compromise related to SolarWinds in on-premises environments. “The tool looks for the presence of malware identified by security researchers as TEARDROP and RAINDROP; credential dumping certificate pulls; certain persistence mechanisms identified as associated with this campaign; system, network, and M365 enumeration; and known observable indicators of lateral movement.”

Editor's Note

Similar to the Sparrow tool which scans for signs of APT compromise in a MS 365 or Azure environment, CHIRP scans for signs of APT compromise in an on-premise environment. CHIRP is available as a PowerShell script or compiled executable and is a command line tool. Unlike the Microsoft tool, CHIRP makes no changes to systems and takes 1-2 hours to run. Ingest the JSON results in your SEIM.

Lee Neely
Lee Neely

Such tools will enable one to detect some, perhaps even most, but not all compromises. "The absence of evidence is not evidence of absence."

William Hugh Murray
William Hugh Murray

The Rest of the Week's News


2021-03-18

Three Year Sentence for Twitter Bitcoin Hack

One of the people involved in the Twitter cryptocurrency scam in July 2020 has pleaded guilty to 30 charges, including accessing a computer without authority causing more than $5,000 in damage. Graham Ivan Clark, who was 17 at the time of the incident, will serve three years in a detention facility. He has also surrendered the cryptocurrency he received in the scam. Two co-conspirators are facing charges as well.


2021-03-17

Public-Private Task Force to Focus on Exchange Server Response

The National Security Council has created a Unified Coordination Group (UCG), a task force focused on the government’s response to the Microsoft Exchange Server attacks. The task force members include representatives from the intelligence community and well as from private industry. White House Press Secretary Jen Psaki said the UCG met earlier this week and “discussed the remaining number of unpatched systems, malicious exploitation, and ways to partner together on incident response, including the methodology partners could use for tracking the incident.” Deputy National Security Advisor for Cyber and Emerging Technology Anne Neuberger said the Biden “Administration is committed to working with the private sector to build back better – including to modernize our cyber defenses and enhance the nation’s ability to respond rapidly to significant cybersecurity incidents.”

Editor's Note

Rather than “build back better,” use cloud or outsourced services which are built and maintained at a higher level of assurance. One of the appeals and challenges of using cloud services is that the provider is patching and updating, as well as setting the security parameters they can manage. This leaves the customer with a smaller set of responsibilities. In the FedRAMP cloud space, system security is based on the same security framework that agencies need to follow when securing their own systems, with the added benefit of an external auditing company which holds them accountable for fully meeting those controls. While a more aggressive update schedule may stress existing resources, they also provide guidance to minimize the risks associated with updates.

Lee Neely
Lee Neely

The "Exchange Server" problem pales in comparison to SolarWinds.

William Hugh Murray
William Hugh Murray

2021-03-18

TrickBot Warning

The US Cybersecurity and Infrastructure Security Agency (CISA) and the FBI have issued a joint alert warning of “continued targeting through spearphishing campaigns using TrickBot malware.” A group of cybersecurity companies took steps to dismantle the TrickBot infrastructure last fall. The effort disrupted TrickBot operations for several weeks. The CISA/FBI alert provides a list of suggested mitigations, including blocking suspicious IP addresses, using antivirus software, and providing phishing and social engineering training to employees.

Editor's Note

TrickBot is getting more exposure after legal actions shut down some competing botnets. Please do not focus too much on blocking specific IP addresses as they tend to change quickly. One interesting method to detect TrickBot is by inspecting TLS certificates. Tools like Zeek are excellent to collect this information and it tends to be quite useful not just for TrickBot.

Johannes Ullrich
Johannes Ullrich

Attackers use TrickBot to drop other malware such as Ryuk and Conti ransomware, or serve an Emotet downloader. The Alert warning below includes a layout of TrickBot’s techniques, mapped to MITRE ATT&CK techniques. That mapping can be used to help others understand the relevance of ATT&CK. Mitigations include user training, policy and procedures for reporting suspect email, firewall rules as well as segmenting systems to limit lateral movement. I have seen great success in reporting by adding a reporting button to email clients. Note: You will have to respond to reported messages for use to continue past the initial rollout.

Lee Neely
Lee Neely

2021-03-17

Cisco Issues Router Fixes

Cisco has released fixes to address a high-severity flaw that could be exploited to remotely execute code as root user or cause a denial-of-service condition. The issue exists in the web-based management interface’s improper validation of user-supplied input. Cisco has made fixes available for affected products: RV132W ADSL2+ Wireless-N VPN routers running a firmware release prior to 1.0.1.15; and RV134W VDSL2 Wireless-AC VPN routers running a firmware release prior to 1.0.1.21.

Editor's Note

When configuring devices like these, limit access to the administration interface to authorized devices only. Do not enable remote administration without requiring a VPN. These routers were released in 2016; it’s a good time to consider replacing them with newer models, particularly if you are out of support and unable to apply the update.

Lee Neely
Lee Neely

2021-03-18

Man Extradited to US, Sentenced to Prison for Cyber Extortion

A US district judge sentenced Joshua Polloso Epifaniou to one year and one day in prison for breaking into websites, stealing user and customer data, and threatening to publish it unless he was paid. Epifaniou has paid nearly $1 million in restitution and forfeiture.


2021-03-18

Connecticut Will Consolidate State IT Operations

The governor of Connecticut said the state will consolidate its IT operations into one organization within Connecticut’s Department of Administration Services. Connecticut has close to 40 state agencies; some of the smaller agencies currently lack sufficient IT resources and expertise. The change is also expected to improve cybersecurity.

Editor's Note

Centralizing services like this enables leveraging a consolidated pool of expertise, and provide opportunities for increased coverage. The trick is not only relocation of services, but also having them operate in a consistent fashion, leveraging common  patching, updating and backup processes as well as common platforms and application stacks to eliminate pockets of specialized support staff and processes. Security boundaries also have to be considered, much like when merging businesses, including verification of resources and services before trusting them in the new environment.

Lee Neely
Lee Neely

2021-03-18

GAO: Department of Energy Needs to Increase Focus on Distribution System Cybersecurity

According to a report from the Government Accountability Office (GAO), the US power grid’s distribution systems are at an increased risk from cyberattacks. The distribution systems’ industrial control systems (ICSs) are increasingly remotely accessible and connected to business networks. The report says that the Department of Energy has focused on cybersecurity of the grid’s generation and transmission systems and needs to make sure the distribution system’s cybersecurity concerns are mitigated as well.

Editor's Note

With a giant distributed system such as the Grid, not only do remote connections for management and monitoring need to be secure, but data communication paths, whether wireless or ethernet over powerline, need to be verified to limit unauthorized interception. The most common mitigation response I have heard to malicious behavior on control systems is to revert to manual control. While good on paper, verify that is actually practical and timely before relying on that plan.

Lee Neely
Lee Neely

We have been saying this for a decade or more. Time to stop "admiring the problem." We need a narrow focus on what to do. Start with strong authentication (at least two kinds of evidence, at least one of which is resistant to replay) wherever controls are connected to the public networks. Then end-to-end application layer encryption and finally application content control.

William Hugh Murray
William Hugh Murray

Internet Storm Center Tech Corner

One-Click Microsoft Exchange On-Premises Mitigation Tool

https://msrc-blog.microsoft.com/2021/03/15/one-click-microsoft-exchange-on-premises-mitigation-tool-march-2021/


Microsoft Explains Authentication Issues with Azure Active Directory

https://www.documentcloud.org/documents/20515443-authentication-errors-across-multiple-microsoft-services-tracking-id-ln01-p8z


JavaScript Less Side-Channel Exploits

https://arxiv.org/abs/2103.04952


"American Rescue Plan" Used as Theme in Phishing Lures Dropping Dridex

https://cofense.com/blog/american-rescue-plan-phish/


Apple May Split Security Updates from Other Updates

https://9to5mac.com/2021/03/15/ios-security-fixes-could-soon-be-delivered-separately-from-other-updates-beta-code-suggests/


Polyglot Images on Twitter

https://twitter.com/David3141593/status/1371978592679309315


Magento 2 PHP Credit Card Skimmer Saves to JPG

https://blog.sucuri.net/2021/03/magento-2-php-credit-card-skimmer-saves-to-jpg.html


A Simple Python Keylogger

https://isc.sans.edu/forums/diary/Simple+Python+Keylogger/27216/


New macOS Malware XcodeSpy Targets Xcode Developers with EggShell Backdoor

https://labs.sentinelone.com/new-macos-malware-xcodespy-targets-xcode-developers-with-eggshell-backdoor/


Zoom Screen Sharing Leak

https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2020-044.txt


MyBB Remote Code Execution

https://blog.mybb.com/2021/03/10/mybb-1-8-26-released-security-release/