SANS NewsBites

Sloppy IT Migration Can Lead to Data Loss; Colonial Pipeline Advises 5000+ Customers Their Data Was Breached; Active Exploits Against Patchable PrintNightmare Vulnerabilities

August 17, 2021  |  Volume XXIII - Issue #64

Top of the News


2021-08-16

Texas Police Dept. Lost 8TB of Data During Migration

The Dallas, Texas, Police Department has disclosed that it lost 22 terabytes of data during a network drive migration earlier this year. Fourteen TB were recovered, but 8TB “are believed to be unrecoverable,” according to a statement from the Dallas County Criminal District Attorney’s office. The affected data include criminal case files created prior to July 28, 2020. The Dallas Police Department (DPD) and City of Dallas Information and Technology Services Department (ITS) notified the DA’s office on August 6.

Editor's Note

Business interruption from accidents and other self-inflicted wounds isn’t as sexy as cyber attacks but is equally as likely to happen and equally as disruptive in many cases. Any talk of “resiliency” needs to include critical IT operations that can put data at risk, and the processes need to be tested – just like testing the switchover to UPS power or backup internet connections periodically to make sure they work correctly.

John Pescatore
John Pescatore

Irrespective of how you are migrating, be certain you not only have backups, but also are able to restore them fully. Some technology is harder to restore and some restore operations don’t put files back where they originated. Run annual tests to make sure you really can restore the technology mixes in your environment. Lastly, make sure migration plans include a full function test before retiring the old.

Lee Neely
Lee Neely

2021-08-16

Colonial Pipeline Notifies 5,000+ People Their Data Were Compromised in Ransomware Attack

Colonial Pipeline has sent data breach notifications to 5,810 current and former employees, informing them that their personal information was compromised in the May ransomware attack that shut down the company’s operation for several days. The affected data include government-issued ID numbers and health-related information.

Editor's Note

Even though Colonial paid the ransom, the data was still exfiltrated. The question now becomes one of do you report a data loss even after the ransom is paid and the attacker “promises” to delete your data. For sensitive data, err on the side of caution, notifying impacted parties and offering credit protection is the honorable thing to do. The compromised information, the company says, includes names, birth dates, contact information, driver’s license information, Social Security numbers, government-issued ID (such as military ID and tax ID), as well as health-related information, health insurance information included.

Lee Neely
Lee Neely

In every large scale incident response investigation there will be tremendous pressure to provide rapid answers about the implications of a breach. Getting the analysis correct to provide informed answers takes time though, and it's positive to see Colonial Pipeline continuing their investigation so thoroughly.

Joshua Wright
Joshua Wright

2021-08-13

Ransomware Actors Exploiting PrintNightmare Vulnerabilities

Ransomware groups are exploiting PrintNightmare Windows Print Spooler vulnerabilities to infect targeted systems. The flaws can be exploited to execute arbitrary code which helps the threat actors alter data, create new accounts, and move through networks. Microsoft has released fixes for two of the vulnerabilities and a workaround for the third.

Editor's Note

Make sure that you’ve pushed out the fixes from Microsoft. Include checking for the fixes in your VPN posture check if possible. Triple check that you’re monitoring for IOCs and SMB is still blocked at the perimeter, to include Internet facing servers.

Lee Neely
Lee Neely

The Rest of the Week's News


2021-08-16

Memorial Health System Cyber Incident Leads to EHR Downtime at Multiple Facilities

A healthcare system serving parts of West Virginia and Ohio was the target of a cyber incident on Sunday, August 15. Memorial Health System comprises 64 clinics, including three hospitals; all are operating under electronic health record (EHR) downtime. Urgent surgeries and other procedures have been cancelled, and emergency cases at some Memorial Health System facilities are being diverted to other hospitals.

Editor's Note

Hospitals are organizing into groups in order to enjoy efficiencies of scale, both in medicine and management. IT in general, and IT security in particular, is just one area that may benefit. However, consequences increase with scale. Cost of attack must increase with scale or risk surely will. This is an illustrative case. Note that EHR detail will be lost forever.

William Hugh Murray
William Hugh Murray

2021-08-16

SEOPress WordPress Plugin Vulnerability Fixed in Version 5.0.4

The developers of the SEOPress WordPress plugin have fixed a cross-site scripting (XSS) vulnerability that could be exploited to take control of unpatched websites. SEOPress is installed on more than 100,000 sites. Users are being urged to update to SEOPress version 5.0.4.

Editor's Note

The fix was released August 4th, and firewall rules were released to the paid Wordfence version July 29th; free versions will have rules August 28th. The flaw, now fixed, was the REST-API code to verify access used a nonce which could be generated by any authenticated user, not just the intended authorized user group.

Lee Neely
Lee Neely

2021-08-16

Pearson Settles SEC Charges for $1M

The US Securities and Exchange Commission (SEC) said that UK-based education publishing and services company Pearson has agreed to pay a $1 million civil penalty “to settle charges that it misled investors about a 2018 cyber intrusion involving the theft of millions of student records, including dates of births and email addresses, and had inadequate disclosure controls and procedures.”

Editor's Note

I think Pearson UK’s recent annual profit has been in the $4-5M range, so a $1M fine is significant, but I think the SEC can go as high as $25M in institutional stock price manipulation fines. Those lists of risk in SEC reports have turned into the long lists of possible side effects for every new drug – corporate lawyers are happy but pretty useless information for anyone trying to make a decision. Bigger fines to make CFOs and boards more proactive in making sure the reporting is honest would be a very good thing.

John Pescatore
John Pescatore

2021-08-16

Realtek SDK Vulnerabilities

Multiple vulnerabilities in software development kits (SDKs) from Realtek affect nearly 200 IoT products from more than 60 vendors. The flaws could be exploited to execute code with the highest privileges. Realtek was notified about the flaws in mid-May and began making patches available several weeks later.

Editor's Note

Affected Realtek hardware (and with that, software derived from its SDK) can be found everywhere. I see the list of affected vendors as a tip of the iceberg. Watch out for firmware updates for various WiFi gear like routers and cameras. Updates to this type of equipment are often not well advertised. Try to do a "Patch Day" a month, or at least once a quarter where you check for updates to your home network routers.

Johannes Ullrich
Johannes Ullrich

My personal experience as a pen tester for IoT technology has shown that SDKs are often problematic, creating systemic vulnerabilities for the vendors that adopt the underlying architecture. Product vendors need to remember that they are responsible for the security of the product end-to-end, not just the parts they develop internally but also for the third-party libraries, utilities, and SDKs they utilize. Static source code analysis (where possible) and penetration testing efforts are valuable for vulnerability discovery prior to product launch.

Joshua Wright
Joshua Wright

There is no way that end users can protect themselves from vulnerabilities originating far down in the supply chain. We must hold suppliers accountable.

William Hugh Murray
William Hugh Murray

2021-08-16

T-Mobile Acknowledges Data Breach

T-Mobile has acknowledged that company servers were breached and is investigating reports that customer data were stolen. An underground forum is reportedly offering a large cache of personal data for sale.

Editor's Note

The breached data reportedly includes social security numbers, phone numbers, names, physical addresses, unique IMEI numbers, and driver license information – sufficient information for either identity theft or cloning phones. T-Mobile reports they have fixed the issue which lead to the compromise. If you are a customer, you need to make sure that you’ve implemented both available security controls on your account and identity protection.

Lee Neely
Lee Neely

Maybe T-Mobile will learn that data isn't just an asset but also a liability. T-Mobile is asking for credit checks with all three major credit companies just to sign up for a wireless plan, collecting persona information to facilitate these checks. But maybe they will get away with it yet again.

Johannes Ullrich
Johannes Ullrich

According to Krebs, the damage borders on the catastrophic. T-Mobile is following e-Bay: "the less said, the better," rather than Target: transparency.

William Hugh Murray
William Hugh Murray

2021-08-16

Linux GNU C Library Bug Fix Introduced Another Security Issue

A fix released in June for a bug in the Linux GNU C Library (glibc) introduced a more serious vulnerability. The original vulnerability could lead to application crashes. The fix for that vulnerability introduced a bug that could trigger a segmentation fault within the library. That issue could crash all apps using the library and is much easier to exploit than the original flaw. Users are encouraged to upgrade to glibc version 2.34 or higher.

Internet Storm Center Tech Corner

Triage of Malware Bazaar's Daily Malware Batches

https://isc.sans.edu/forums/diary/Extra+Tip+For+Triage+Of+MALWARE+Bazaars+Daily+Malware+Batches/27754/


Realtek SDK Vulnerability

https://www.iot-inspector.com/blog/advisory-multiple-issues-realtek-sdk-iot-supply-chain/


STARTTLS Vulnerabilities

https://www.usenix.org/conference/usenixsecurity21/presentation/poddebniak


Raccoon Infostealer Self Infection

https://mobile.twitter.com/HRock/status/1427259563363950596


Exchange E-Discovery Scans

https://isc.sans.edu/forums/diary/Scanning+for+Microsoft+Exchange+eDiscovery/27748/


Danabot Distributed Through Malspam

https://isc.sans.edu/forums/diary/Example+of+Danabot+distributed+through+malspam/27744/


Weaponizing Middleboxes

https://geneva.cs.umd.edu/posts/usenix21-weaponizing-censors/

https://www.usenix.org/conference/usenixsecurity21/presentation/bock


Deep Blue Magic Ransomware

https://www.ehackingnews.com/2021/08/deepbluemagic-newly-discovered.html