SANS NewsBites

Details on Cost of Baltimore County Schools Ransomware Attack Uncovered; Patch vCenter Servers Now; Google Details Solid Software Supply Chain Security Framework; Apple Issues Update to Thwart Current Attacks on Older iOS Devices

June 18, 2021  |  Volume XXIII - Issue #48

Top of the News


2021-06-16

Baltimore County Public Schools Ransomware Recovery is Expensive

According to information obtained by a local television news station, Baltimore County (Maryland) Public Schools has already spent more than $8 million recovering from a November 2020 ransomware attack. The incident prevented 115,000 students from accessing remote instruction for a week. The school system’s insurance covered $2 million of the incurred costs.

Editor's Note

This was a different event from the Baltimore City incident of 2019. There haven’t been many details made public on the cause of the incident, but odds are high that it started with a phishing attack obtaining reusable passwords. That means the $9,180 cost of Duo (Presidio) multi-factor authentication would have been a very high ROI expenditure if it had been done *before* the attack. Let’s throw in the $743,500 for Dell/Carbon Black “Windows Security Software” and the cost of those two items done proactively is still less than the $860K paid to Kroll for Forensics Investigation and Triage, and significantly less than the $6M+ cost of the incident even after the insurance payout.

John Pescatore
John Pescatore

Take the cost of recovery into consideration when proposing security measures. Remember you may have to provide identity protection When personal information is exfiltrated. Once you have funding, execute fully; don’t stop with a partial solution.

Lee Neely
Lee Neely

Another example of how cyber criminals will target and attack anyone, including elementary schools, hospitals, non-profits and small mom-and-pop stores, the very organizations where ransomware costs can be devastating and wipe out their ability to operate.

Lance Spitzner
Lance Spitzner

2021-06-15

Thousands of VMware vCenter Servers Still Unpatched

Researchers from Trustwave say that there are thousands of instances of unpatched VMware vCenter Server that are publicly exposed. VMware released fixes for flaws in its vCenter Server in late May. The flaws could be exploited to take control of vulnerable systems.

Editor's Note

They may still be unpatched. But by now, they are almost certainly exploited. Please check any unpatched system you find for compromise.

Johannes Ullrich
Johannes Ullrich

Much like was seen with the equally high severity Exchange and Pulse Secure flaws, IT ops patching performance of these high leverage attack targets has suffered as IT ops has been consumed with keeping work-from-home going and now trying to transition to some level of back to work. Realistically, workaround, mitigation and enhanced monitoring will be needed by many organizations – more trouble tickets pointing out missing patches is not the solution.

John Pescatore
John Pescatore

If you haven’t patched, isolate your VCenter services now. Catch your breath and plan your update. Implement now.

Lee Neely
Lee Neely

2021-06-18

Google’s SLSA Framework for Supply Chain Security

Google’s Supply chain Levels for Software Artifacts (SLSA) framework aims to “ensure the integrity of software artifacts throughout the software supply chain.” SLSA was inspired by Google’s internal code review process, Binary Authorization for Borg.

Editor's Note

SLSA is a well thought out, multi-level framework that includes code review, testing, authorization and policy definition at various levels. As organization create new app dev processes to move to newer methodologies like DevOps, there is an opportunity to embed these concepts into those processes and the tools used.

John Pescatore
John Pescatore

Kudos to Google for this effort. Well-structured code is efficient to review. Too much product code is not well structured or reviewed. If review was working we would not be spending so much on patching. Suppliers must be held accountable for what they distribute for code review to be even marginally effective.

William Hugh Murray
William Hugh Murray

2021-06-16

Apple Releases Emergency Update for Older iOS Devices

Apple has released iOS 12.5.4, which patches three vulnerabilities, including two flaws that “may have been actively exploited.” The two zero-days – a memory corruption flaw and a use-after-free issue – affect the Safari browser WebKit engine. These vulnerabilities are the eighth and ninth zero-day flaws Apple has patched since the start of the calendar year.

Editor's Note

Apple will not continue to provide updates to IOS 12 much longer given the release of iOS 15 is planned for this fall. While you’re getting these updated, initiate plans to replace them with current devices.

Lee Neely
Lee Neely

The Rest of the Week's News


2021-06-16

Ukrainian Police Arrest Alleged Ransomware Operators

Police in Ukraine, with help from US and South Korean law enforcement agencies, have arrested six alleged members of the Cl0p ransomware group. Police also seized cash, computers, and automobiles. Cl0p’s recent targets include the University of Maryland, the University of California, and Stanford University Medical School.

Editor's Note

Great news and good to see another take down like this in Ukraine. Eliminating safe havens for cyber crime will go a long way to reducing and limiting the impact of these groups.

Johannes Ullrich
Johannes Ullrich

Effective supranational law enforcement is essential to discouraging what, in its absence, will continue to be seen as a crime.

William Hugh Murray
William Hugh Murray

2021-06-17

CISA Advisory: ZOLL Defibrillator Dashboard Vulnerabilities

The US Cybersecurity and Infrastructure Security Agency (CISA) has issued an alert warning of multiple vulnerabilities in the ZOLL defibrillator dashboard. The six flaws could be exploited to remotely execute code, access information, elevate privileges, and obtain application credentials. The flaws affect all versions of the ZOLL defibrillator dashboard prior to 2.2. Users are urged to update to the most current version.

Editor's Note

The flaw affects the monitoring dashboard, not necessarily the devices themselves. But by compromising the dashboard, service alerts from devices may go unnoticed leading to faulty defibrillators. It is sad that the list of flaws in the dashboard reads like a list commonly found in low cost consumer devices.

Johannes Ullrich
Johannes Ullrich

Bastion devices and services, which sit between your control systems and users, need to be hardened and monitored. This service was marketed for wide access to manage defibrillators remotely, so you may have Internet accessible services. Prefer a model where you provide secure access VPN, VPN tunnel, etc. over bastion services for control systems.

Lee Neely
Lee Neely

2021-06-16

Vulnerability in Peloton Bike+ and Tread Interactive Tablet

A vulnerability in the Peloton Bike+ and Peloton Tread interactive tablet could be exploited to gain root device access. From there, attackers could install malware, spy on Internet traffic and user data, or control the equipment’s camera and microphone. The flaw was discovered by McAfee’s Advanced Threat Research (ATR) team. Exploiting the vulnerability would require physical access to the equipment or access somewhere in the supply chain. The ATR team notified Peloton of the vulnerability in March; Peloton pushed out a fix in early June.

Editor's Note

Apply the June update. You will need to actively monitor the peloton site for update notifications. Don’t allow unauthorized usb devices to be connected.

Lee Neely
Lee Neely

Exploitation of the vulnerability requires physical access to the device. Patch, but do not panic.

Johannes Ullrich
Johannes Ullrich

2021-06-15

NATO Members Say Article 5 Could be Invoked for Cyberattacks

NATO members have endorsed NATO’s Comprehensive Cyber Defence Policy, which affirms that Article 5 could be invoked in response to a cyberattack. Article 5 says that “an attack against one Ally shall be considered an attack against us all.” The decision to invoke Article 5 would be made on a “case-by-case basis.”

Editor's Note

Ten / twenty years ago we used to say that no-one died from cybersecurity. In today’s world that has changed. As our world has become so interconnected the physical and cyber lines are blurring. My concern is not so much all-out cyberwar, but more like NotPetya where one country targets another country, and then accidentally impacts critical infrastructure at a global level. If you look at history that is how so many the largest wars started, from smaller nation-state incidents with un-intended, cascading consequences.

Lance Spitzner
Lance Spitzner

News reports yesterday suggested that President Biden is considering “response in kind.” However, because the US and Western Europe are so much more vulnerable than their potential adversaries, this is, at least, an arguably bad idea. “People who live in glass houses should not throw stones.” They may find the same stones thrown back at them. Remember Stuxnet.

William Hugh Murray
William Hugh Murray

2021-06-16

US Government Agencies' Move to IPv6 Necessary but Brings New Risks

US government agencies have a mandate to migrate most Internet-connected systems from IPv4 to IPv6 by the end of fiscal year 2025. Office of Management and Budget (OMB) Deputy Federal Chief Information Officer Maria Roat said that the transition is necessary because “IPv4 ... can’t keep up with the continued growth of the number of users on the internet and the explosion of connected technologies.” Roat and OMB senior policy analyst Carol Bales noted that the move to IPv6 supports cybersecurity mandates made in the May 12, 2021, executive order on cybersecurity. CISA cybersecurity specialist Branko Bokan said, “IPv6 also opens up this whole new world of new threat landscapes and threat service.”


2021-06-16

Pacific Northwest National Laboratory Responds to DoE RFI on Securing Critical Electric Infrastructure

The Pacific Northwest National Laboratory (PNNL) has submitted comments in response to the Department of Energy’s (DoE’s) April 20 request for information on Ensuring the Continued Security of the United States Critical Electric Infrastructure. PNNL’s response comprises “six suggested concepts that should significantly improve the overall security and resilience of the electric infrastructure systems.”


2021-06-17

Akamai Prolexic DDoS Service Outage Has Worldwide Impact

On Thursday, June 17, an outage affecting one of Akamai’s Prolexic DDoS services disrupted online services of some airlines, financial institutions, and other businesses around the world. In a blog post, Akamai writes that the problem was caused by a routing table value that was “inadvertently exceeded.” Service has been restored.


2021-06-17

NSA Guidance on Securing Video and VoIP Communications

The US National Security Agency (NSA) has issued guidance on securing Unified Communications/Voice and Video over IP (UC/VVoIP) systems. The technical report “outlines best practices for the secure deployment of UC/VVoIP systems and presents mitigations for vulnerabilities due to inadequate network design, configurations, and connectivity.”

Internet Storm Center Tech Corner

Multi Perimeter Device Exploit Mirai Version Hunting For SonicWall, DLink, Cisco and more

https://isc.sans.edu/forums/diary/Multi+Perimeter+Device+Exploit+Mirai+Version+Hunting+For+Sonicwall+DLink+Cisco+and+more/27528/


June 2021 Forensic Quiz

https://isc.sans.edu/forums/diary/June+2021+Forensic+Contest/27532/


Network Forensics on Azure VMs

https://isc.sans.edu/forums/diary/Network+Forensics+on+Azure+VMs+Part+1/27536/


Stealing Tokens, emails, files and more in Microsoft Teams

https://medium.com/tenable-techblog/stealing-tokens-emails-files-and-more-in-microsoft-teams-through-malicious-tabs-a7e5ff07b138


ThroughTek IP Camera SDK Vulnerability

https://www.nozominetworks.com/blog/new-iot-security-risk-throughtek-p2p-supply-chain-vulnerability/


Peloton Insecure Boot Vulnerability

https://www.mcafee.com/blogs/other-blogs/mcafee-labs/a-new-program-for-your-peloton-whether-you-like-it-or-not/


Google Open Sourcing Homomorphic Encryption Libraries

https://developers.googleblog.com/2021/06/our-latest-updates-on-fully-homomorphic-encryption.html


Microsoft Defender for Endpoint Detecting Jailbroken Devices

https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/announcing-new-capabilities-on-android-and-ios/ba-p/2442730


Fake Ledger Hardware Wallets

https://www.ledger.com/phishing-campaigns-status#phishing-campaigns

https://www.reddit.com/r/ledgerwallet/comments/o154gz/package_from_ledger_is_this_legit/


Zoll Defibrilator Dashboard Vulnerability

https://us-cert.cisa.gov/ics/advisories/icsma-21-161-01


Akamai Prolexic Outage

https://threatpost.com/hiccup-akamais-ddos-outages/167004/