SANS NewsBites

Kaseya Critical Updates to be Released on Sunday 11 July; Flawed Microsoft Emergency Fix Doesn’t Stop PrintNightmare; Cyber-insurers Form Consortium to Address Cyberinsurance Policy Deficiencies and Losses

July 9, 2021  |  Volume XXIII - Issue #53

Top of the News


2021-07-07

Kaseya Plans to Have VSA SaaS and On-Premises Updates Ready by Sunday, July 11

Kaseya is still working on patching both the software-as-a-service (SaaS) and the on-premises versions of its VSA software. The attackers managed to infect about 60 Kaseya on-premises customers, and from there, infect about 1,500 of those customers’ clients with REvil ransomware. Kaseya plans to have patches available for SaaS and on-premises VSA software by 4PM EDT Sunday, July 11. Kaseya has released a start-up readiness guide for on-prem VSA customers to “ensure [their] VSA server(s) is prepared to receive the VSA release patch, which contains critical security fixes.”

Editor's Note

Be aware of fake updates circulating. These fake updates will attempt to install backdoors instead of fixing the flaw. Be careful with any detection tools, patches, or protection tools distributed and always verify the source as well as the integrity of the file.

Johannes Ullrich
Johannes Ullrich

The Kaseya article below lays out what you need to do for an on-premise server to prep for the upcoming patch, including isolation and checking for provided IOCs. Note that they have an agreement with FireEye to provide complementary endpoint security agents for your VSA server which you should implement.

Lee Neely
Lee Neely

2021-07-07

PrintNightmare Emergency Fix Can be Bypassed

Microsoft issued an emergency patch top address the critical Windows print spooler vulnerability known as PrintNightmare, but the patch falls short. Hours after Microsoft released the patch, a researchers demonstrated that it could be bypassed.

Editor's Note

Windows suffers from an architectural problem in running printer drivers as SYSTEM. The only way to properly mitigate this risk is to allow only administrators to install printer drivers. The latest patch does offer this option and it should be enabled.

Johannes Ullrich
Johannes Ullrich

If you’ve already pushed out the patch, as many did, enable the “RestrictDriverInstallationToAdministrators” registry value to only allow administrators to install printer drivers. If end users are operating with administrative privileges on their endpoints, make sure that UAC is set to always prompt for credentials, which slows inadvertent installations. Other UAC settings have historically had bypass options which reduces their effectiveness. Test these settings before deploying widely.

Lee Neely
Lee Neely

2021-07-06

Cyberinsurance Companies Respond to Ransomware Situation

The insurance industry is taking steps to address the issue of ransomware. In June, a consortium of seven major cyber insurers established CyberAcuView, which “will compile and analyze cyber-related data to enhance value and service to policyholders and help ensure a competitive market for cyber insurance.” And earlier this month, the American Property Casualty Insurance Association (APCIA) published its Cyber Extortion/Ransomware Guiding Principles.

Editor's Note

In the long run, an effort like CyberAcuView could have positive impact by standardizing insurer requirements for “essential security hygiene” based on meaningful standards such as the CIS Critical Security controls. But, two things to keep in mind: (1) Long term means no likely meaningful impact before 2023 at the earliest; and (2) in both the long term and the short term, the presence or absence of cyberinsurance does not reduce what needs to be done to protect business and customer data and services.

John Pescatore
John Pescatore

The phrase “closing the barn door after the horse has bolted” came to mind when reading this. There is a very strong argument that cyber insurance companies encouraged the growth in ransomware attacks by their preference to pay ransom demands for their clients who fell victim to attacks. It also highlights that cybersecurity has many complex challenges and simple solutions that seem attractive to business sponsors, such as cyber insurance, may not work as expected and can have serious implications in the long term.

Brian Honan
Brian Honan

Cyber insurance companies got really good at negotiating payments for ransomware, resulting in a position where payment was virtually assured. Subsequently, while the rise in premiums in the last year has been 20%, the rise in claims has been 39% which results in a financially unsustainable position for the insurance companies. The good news is this has forced them to publish guiding principles and form alliance such as CyberAcuView to strengthen risk mitigation and stem this tide.

Lee Neely
Lee Neely

Insurance, the assignment of risk to underwriters, should be used for things that have low rates of occurrence, high consequences, and which are difficult to mitigate.

William Hugh Murray
William Hugh Murray

The Rest of the Week's News


2021-07-09

Kaseya Overview

Guidance from the FBI and CISA describes Kaseya situation as a “supply-chain ransomware attack leveraging a vulnerability in Kaseya VSA software against multiple managed service providers (MSPs) and their customers.” The attack began on July 2; just hours after Kaseya VSA servers were compromised, between 800 and 1,500 organizations became infected with ransomware. The attack affected Kaseya VSA on-premises customers; the company urged those customers to shut down their VSA servers. Kaseya also made the decision to take its software as a service (SaaS) servers offline as a precautionary measure.

Editor's Note

I hesitate to call this a supply chain attack as the malicious actors didn’t compromise the code base as much as they exploited a zero-day flaw. Even so, read and implement the guidance from CISA and Kaseya on improving your VSA instance security before returning it to operational status.

Lee Neely
Lee Neely

2021-07-08

Kaseya Flaw Reported in April

One of the vulnerabilities recently exploited in Kaseya’s Virtual System Administrator (VSA) software was reported to the company earlier this year. In April, the Dutch Institute for Vulnerability Disclosure privately reported seven security issues to Kaseya. Four of the flaws were addressed un April and May updates. The remaining three vulnerabilities were scheduled to be fixed in a forthcoming update. (Please note that the WSJ story is behind a paywall.)

Editor's Note

It does look like Kaseya dropped the ball fixing these vulnerabilities, causing harm to its customers. A robust vulnerability remediation program is a must-have for a software company and interactions with researchers reporting vulnerabilities need to be managed well. A well-managed bug bounty program can help streamline the process and set expectations for researchers reporting vulnerabilities.

Johannes Ullrich
Johannes Ullrich

Prioritization of fixes is tricky. Kaseya is a great example of working with researchers who disclosed vulnerabilities, and assisted in verifying the patches resolved the issues. As with any vulnerability, there is a race condition of developing, verifying and deploying fixes versus malicious actors discovering and exploiting those weaknesses. In this case, one flaw – CVE-2021-30116, slated for a June patch release, lost the race. While it’s easy to second-guess here, note that the rapidly released PrintNightmare fixes fell short of resolving that issue, resulting in added fixes which can be just as disruptive as failing to release an update at all.

Lee Neely
Lee Neely

This failure raises a number of questions. During this window, did Kaseya caution their customers or suggest workarounds? Did they have a duty to do so? Is our infrastructure too porous? Can we live with an infrastructure that is based upon late quality by patching? Raise your own questions, as well.

William Hugh Murray
William Hugh Murray

2021-07-08

Kaseya Attack Takes Two Maryland Towns Offline

Among the victims of the Kaseya supply chain attack are two Maryland towns. The computer networks of Leonardtown and North Beach have been infected with REvil ransomware. Neither town has its own IT staff, and both were infected through Kaseya customers’ systems.

Editor's Note

The beauty of hiring an MSP is that they have expertise you don’t, common tools and processes, including 24x7 support for less than you can insource. That comes with a cost of having remote privileged access to your systems, and the risk of compromise, either through a flaw in their tools or staff. In a little to no IT staff model, make sure that you still have staff that knows how and where to shutdown impacted services as well as clear understanding of what service restoration entails. Lastly, irrespective of IT staff size, make sure that you have proven fallback procedures for IT failures.

Lee Neely
Lee Neely

Small businesses and state, local, and tribal agencies that are totally dependent on service providers will unfortunately always have this kind of risk. However, one common “trick” that Leonardtown, MD was able to use to start restoring backups manually was to have a at least one PC that is never used be part of the backup strategy. Leonardtown (and others in the past) have taken advantage of the PCs of employees who were on vacation when the malware attack hit – have one PC where the user is always “on vacation.”

John Pescatore
John Pescatore

Managed Service Providers owe a high standard of care.

William Hugh Murray
William Hugh Murray

2021-07-08

US Will Take Action Against Russian Cybercriminals if Russia Does Not

In a July 6 briefing, White House Press Secretary Jen Psaki said that “if the Russian government cannot or will not take action against criminal actors residing in Russia, we will take action or reserve the right to take action on our own.” Psaki also noted that the Kaseya supply chain attack has not yet been attributed to a specific threat actor.

Editor's Note

Specific attribution is tricky as the REvil Ransomware Service is available to any affiliate to use, for a percentage of the ransom collected. Also Russia historically has had a “so long as you don’t hack us we’re good” posture for malicious actors operating there. The recent stories of takedown of international operations, similar to REvil, depend on cooperation of law enforcement in all countries involved, without which shuttering the service, or determining the actual actors behind any given attack become moot.

Lee Neely
Lee Neely

2021-07-06

Mongolian Certificate Authority Website Compromised

Attackers compromised Mongolian certificate authority MonPass’s website and installed Cobalt Strike in its installer software. The backdoored installer was available for about a month earlier this year.


2021-07-08

Right to Repair Movement is Gaining Traction

In a press briefing on Tuesday, July 6, White House Press Secretary Jen Psaki said that President Biden plans to issue an executive order (EO) that addresses right to repair. The EO will reportedly direct the Federal Trade Commission to draft rules that prevent manufacturers from limiting customers’ ability to repair products they have purchased, and direct the Department of Agriculture to establish rules allowing farmers to repair their own equipment. In a related story, the UK has rules that require manufacturers to make spare parts available to people who purchase electrical appliances, and the European Commission plans to introduce right-to-repair rules for smartphones, laptops, and tablets. Apple co-founder Steve Wozniak has voiced his support of the right to repair movement.

Editor's Note

Be careful what you ask for, you might get it. Agriculture and Cyber are different environments. The Apple founders fell out over the issue of “closed versus open” systems. I, for one, am glad that Jobs won.

William Hugh Murray
William Hugh Murray

2021-07-08

Sage X3 Vulnerabilities Fixed in Updates

Four vulnerabilities, one of which is critical, in the Sage X3 enterprise resource planning (ERP) platform could be exploited to execute arbitrary code and take control of vulnerable systems. Fixes for the flaws have been released.

Editor's Note

Attackers are going after applications (like Solar Winds, Kaseya, etc.) that get the highly privileged access inside networks, and ERP and financial management apps are certainly targets. SAP, Oracle, and Workday are the “big dogs” in this market but Sage, along with Acumatica, Financial Force and Infor customers should review segmentation around these products and accelerate patching.

John Pescatore
John Pescatore

2021-07-08

Joplin, Missouri’s Computer System Hit with Cyberattack

The city of Joplin, Missouri’s computer network suffered an apparent cyberattack; its phone lines and online presence were both unavailable as of Thursday, July 8. The city’s 911 service is operational. Various city departments, including planning and zoning, and code enforcement, have counter service available and are accepting only cash and checks for payment.


2021-07-08

Cisco Talos: SideCopy APT Group Increasing Attacks in India and Pakistan

Researchers from Cisco Talos have “observed an expansion in the activity of SideCopy malware campaigns, targeting entities in India.” The SideCopy advanced persistent threat (APT) group has been active since at least 2019.

Internet Storm Center Tech Corner

Microsoft Releases Patches for CVE-2021-34527 UPDATED

https://isc.sans.edu/forums/diary/Microsoft+Releases+Patches+for+CVE202134527/27610/


Microsoft Releases PrintNightmare Patch

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-34527


Using Sudo With Python For More Security Controls

https://isc.sans.edu/forums/diary/Using+Sudo+with+Python+For+More+Security+Controls/27614/


Kaseya Update

https://www.kaseya.com/potential-attack-on-kaseya-vsa/


Fake Kaseya Updates Include CobaltStrike Payload

https://www.theregister.com/2021/07/07/kaseya_malware_patches_/


Kaspersky Password Manager

https://donjon.ledger.com/kaspersky-password-manager/


Amazon Echo Dot After Reset Artifacts

https://dl.acm.org/doi/pdf/10.1145/3448300.3467820


GitLab Update

https://www.ehackingnews.com/2021/07/gitlab-fixes-several-vulnerabilities.html


Vulnerable NuGet Packages

https://blog.secure.software/third-party-code-comes-with-some-baggage


WildPressure macOS Trojan

https://www.kaspersky.com/about/press-releases/2021_wildpressures-multi-platform-malware-hits-macos-in-the-middle-east

https://www.patreon.com/posts/53462690


iCloud Password Reset Weaknesss

https://thezerohack.com/apple-vulnerability-bug-bounty