SANS NewsBites

Windows Exposes Password Hashes; Patch Your D-Link Routers; CISA Details TTPs Used by Chinese Threat Actors

July 20, 2021  |  Volume XXIII - Issue #56

Top of the News


2021-07-20

Vulnerability Leaves Password Hashes Exposed in Recent Versions of Windows

Some recent versions of Windows leave the SAM and SYSTEM hive exposed to be read by all local users. These hives contain hashed passwords, and are often the target of privilege elevation exploits. But as security researchers Jonas Lyk and Benjamin Deply found, some recent versions of Windows leave these hives exposed as shadow copies. Initially, only the brand new beta of Windows 11 was found vulnerable, but additional research showed that some recent versions of Windows 10 are vulnerable as well.

Editor's Note

"Summer of SAM" as well as the remnants of "PrintNightmare" are offering two different relatively straight forward privilege escalation exploits to attackers. Make sure your end point visibility is sufficient to detect these attacks. As I am writing this, "Summer of SAM" is still developing. Watch out for guidance from Microsoft for mitigation and detection techniques. Do not fall for random "patches" that will be offered by malicious actors.

Johannes Ullrich
Johannes Ullrich

2021-07-16

Hotfix Available for D-Link Router Vulnerabilities

Multiple vulnerabilities in the D-LINK DIR-3040 wireless router could be exploited to expose data, execute code, and cause denial-of-service conditions. D-Link has released a firmware hotfix to address the flaws. Users are urged to update to firmware version 1.13B03.

Editor's Note

So sad to see another hardcoded password. I will take the log disclosure vulnerability. But hardcoded passwords? And before I forget: Turn off internet access to administrative interfaces on these devices. Even if your router isn't affected by this particular vulnerability.

Johannes Ullrich
Johannes Ullrich

The update, released July 15th, addresses the five vulnerabilities, which include both hard-coded passwords and a telnet server which can be launched without authentication. The telnet server allows logging into the CLI using a default credential stored in the firmware. D-Link is working to further refine the update, so watch for added updates after you apply this fix now.

Lee Neely
Lee Neely

Enterprises that use large numbers of these routers should systematically apply the fix. SOHO users who have only one or two may find it cheaper to simply replace or upgrade the device. Given that these vulnerabilities were more the result of design and intent, rather than error or omission, consider changing brands. That said, it is likely that many vulnerable devices will never be replaced or updated.

William Hugh Murray
William Hugh Murray

2021-07-19

CISA Alert AA21-200A - Tactics, Techniques, and Procedures of Indicted APT40 Actors

A Joint Cybersecurity Advisory from the Federal Bureau of Investigation (FBI) and the Cybersecurity and Infrastructure Security Agency (CISA) provides information about the Chinese Advanced Persistent Threat (APT) group APT40. The advisory lists tactics, techniques, and procedures (TTPs) and indicators of compromise (IOCs) to help cybersecurity practitioners identify and remediate APT40 intrusions and established footholds.

Editor's Note

These CISA alerts are great to direct your hunt team. You may not be a victim of this particular actor, but the same TTPs are used by others as well and these reports are a great reality check for your detection tools to make sure you have visibility where it matters.

Johannes Ullrich
Johannes Ullrich

I welcome the focus on adversary behaviors (TTPs) over Indicators of Compromise (IoCs). If organizations can detect and respond to these TTPs, it will force the actor to change, which will cost them resources. Operate under assumed breach to focus on detecting adversary behaviors.

Jorge Orchilles
Jorge Orchilles

While this focuses on ATP40, the mitigations apply broadly and should be reviewed for general applicability in your organization. In combination, these mitigations are extremely powerful defenses, and many should look familiar. Hand the IOCs to your SOC to ensure they are incorporated in your SIEM, then check for any matches.

Lee Neely
Lee Neely

The Rest of the Week's News


2021-07-16

REvil Disappearance Leaves Kaseya Victims in the Lurch

The REvil ransomware group‘s disappearance from the Internet has left some of its victims in a tough spot. Victims lacking adequate backups currently have no recourse unless the REvil operators release the master keys or law enforcement seizes the keys. One unnamed victim paid the ransom but the key they received did not work to decrypt their data.

Editor's Note

Don’t plan on the ransomware operator providing you a working decryption key or tool, and don't expect them to remain in business/reachable. This becomes even more complex with services such as REvil which offers services to affiliates, but you have no direct interaction with the affiliate. Focus now on being prepared for a ransomware attack: disconnected differential backups, updated user training, MFA your accessible services, and administrator accounts, verify you are running secure configurations and patches/updates are applied in a timely fashion. Leverage the StopRansomware.gov site for even more comprehensive guidance.

Lee Neely
Lee Neely

2021-07-19

Law Firm Discloses February Ransomware Attack

A law firm that handles cases for “dozens of Fortune 500 and Global 500 companies” has acknowledged that it suffered a ransomware attack in February 2021. Campbell Conroy & O'Neil, P.C., says that the attackers compromised client information, including “names, dates of birth, driver's license numbers / state identification numbers, financial account information, Social Security numbers, passport numbers, payment card information, medical information, health insurance information, biometric data, and/or online account credentials.”

Editor's Note

The information release so far does not detail how the malware got installed, but odds are very high it started with a phishing attack that compromised reusable passwords. This is a good item to show your Chief Legal Counsel to get some backing for requiring all privileged accounts to use multi-factor authentication and checking that key services firms (like law firms) are doing so.

John Pescatore
John Pescatore

Campbell is offering 24 months of credit monitoring, fraud consultation and identity theft restoration to individuals with compromised SSN’s or equivalent. Because Campbell is a legal firm, one would expect they would rely on their ability to litigate as an attack response; even so, ransomware preparedness and cyber hygiene must be in place no matter who you are.

Lee Neely
Lee Neely

2021-07-16

Moldova Court of Accounts Suffers Cyberattack

The Moldovan Court of Accounts has suffered a cyberattack that wiped out its data, including its audits of public financial organizations and government agencies. The Court of Accounts has taken down its website while it investigates the attack and restores its data.


2021-07-19

Microsoft Takes Down 17 Domains Used in Business eMail Compromise Campaign

Microsoft obtained a court order that allowed the company to take down malicious “homoglyph” domains that are being used to conduct fraud. In all, Microsoft took down 17 domains that were crafted to appear legitimate through variations in spelling or the use of characters that are similar in appearance.

Editor's Note

A homoglyph is one of two or more graphemes, characters or glyphs with shapes that appear identical or very similar. The idea is user<@>legitdomain.com and user<@>hoimoglyph.com are visually identical so the message will be accepted as genuine. E.g., replacing upper case I with lower case L. The attack targeted small businesses in North America and solicited a fraudulent wire transfer using the logos and otherwise legitimate email addresses from the business they were impersonating.

Lee Neely
Lee Neely

2021-07-19

MITRE Engenuity Evaluates ICS Cybersecurity Solutions

MITRE Engenuity has published the results of its evaluation of five industrial control systems (ICS) cybersecurity solutions. The solutions were voluntarily submitted by Armis, Claroty, Microsoft/CyberX, Dragos, and the Institute for Information Industry. The report examines the solutions’ responses to a simulated Triton attack.

Editor's Note

I’m a big fan of more testing for security products and in general the MITRE Engenuity ATT&CK evaluations are well done. But MITRE admits they do *not* directly address false positives. With so many products claiming to use machine learning/artificial intelligence to raise detection rates, false positive rates (or how much tuning is required to keep false positives at a workable level) is key to evaluating. These evaluations can give you good data on doing your own POC/bakeoff, but don’t replace the need to do so.

John Pescatore
John Pescatore

All testing has limitations, late testing particularly so. Not all systems are as easily tested as others; complex systems should be designed to facilitate effective testing. Tests should be part of the product specification (rather than something thought up after the fact). Testing should be continuous throughout development, from component testing to final system test Testing should first demonstrate that the system performs as intended and only then that it is resistant to attack. The attack modes should be identified and addressed during development rather than sprung as a surprise at the end.

William Hugh Murray
William Hugh Murray

2021-07-19

DoJ Charges Alleged Members of Chinese Hacking Group

The US Department of Justice (DoJ) has unsealed an indictment charging four Chinese citizens with conspiracy to commit computer fraud and conspiracy to commit economic espionage. The individuals allegedly participated in “a campaign to hack into the computer systems of dozens of victim companies, universities and government entities in the United States and abroad between 2011 and 2018.”


2021-07-19

US Formally Blames China for Exchange Server Attacks

The US, along with a group of allies and partners, has accused the People’s Republic of China of being responsible for the Microsoft Exchange server attacks earlier this year and of exhibiting a “pattern of irresponsible behavior in cyberspace is inconsistent with its stated objective of being seen as a responsible leader in the world.” The Biden administration has not issued formal sanctions against China’s government.

Editor's Note

This action triggered two bulletins from CISA: one in Top of the News and one below. The actions behind making the accusation and implementing the sanctions are long and complex and, while welcome, should not change your approach to defending your systems, nor should you expect a measurable decrease in attempted attacks.

Lee Neely
Lee Neely

This is significant in the manner that it was coordinated and announced not only by the US but by NATO, the European Union, Australia, England, Canada, Japan, and New Zealand. At the same time, the US Department of Justice charged four Chinese nationals. The pressure on both China and Russia to stop protecting malicious actors operating out of their country will hopefully result in a positive outcome but we will have to wait and see.

Jorge Orchilles
Jorge Orchilles

2021-07-19

CISA Alert (AA21-200B) Chinese State-Sponsored Cyber Operations: Observed TTPs

A Joint Cybersecurity Advisory from the National Security Agency (NSA), Federal Bureau of Investigation (FBI) and the Cybersecurity and Infrastructure Security Agency (CISA) provides technical details about the tactics, techniques, and procedures (TTPs) used by Chinese state-sponsored cyber actors. The “advisory builds on previous NSA, CISA, and FBI reporting to inform federal, state, local, tribal, and territorial (SLTT) government, CI, DIB, and private industry organizations about notable trends and persistent TTPs through collaborative, proactive, and retrospective analysis.”

Editor's Note

Even if you’re not worried about APTs, read the information as to how a well-resourced adversary operates to better understand how you could be compromised. The information includes detection, defenses and mitigation options for most actions. Many of these are things that you should already be doing.

Lee Neely
Lee Neely

The TTP that jumped out the most for me on this one was the use of steganography to hide stolen data inside of other files stored on GitHub. This is very difficult to detect and probably not the focus of most organizations. As your detections mature, take a look at the more sophisticated TTPs for detection and response.

Jorge Orchilles
Jorge Orchilles

Internet Storm Center Tech Corner

Multiple BaseXX Obfuscations

https://isc.sans.edu/forums/diary/Multiple+BaseXX+Obfuscations/27640/


New Windows Print Spooler Vulnerability - CVE-2021-34481

https://isc.sans.edu/forums/diary/New+Windows+Print+Spooler+Vulnerability+CVE202134481/27648/


Juniper Patches: Radius Vulnerability

https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11180&cat=SIRT_1&actp=LIST


fail2ban vulnerability

https://github.com/fail2ban/fail2ban/security/advisories/GHSA-m985-3f3v-cwmm


NSO Group Victims Leaked

https://www.amnesty.org/en/latest/research/2021/07/forensic-methodology-report-how-to-catch-nso-groups-pegasus/


Dangers of Autofilling Passwords

https://marektoth.com/blog/password-managers-autofill/#analysis


iOS/WatchOS/tvOS/Safari Updates

https://support.apple.com/en-us/HT201222


iOS Format String Vulnerability Exploitable as RCE

https://blog.zecops.com/research/meet-wifidemon-ios-wifi-rce-0-day-vulnerability-and-a-zero-click-vulnerability-that-was-silently-patched/


Surfside Condo Collapse Scams

https://threatpost.com/attackers-target-florida-condo-collapse-victims/167917/