SANS NewsBites

US Dept. of Commerce Rule Regulates Hacking Tool Export; Microsoft's Cybersecurity Tools for Nonprofits; DoJ Wants Private Sector to Coordinate with Law Enforcement on Cybersecurity; CISA Backs 24 Hour Cyber Incident Disclosure Time Frame for Critical Infrastructure

October 22, 2021  |  Volume XXIII - Issue #83

Top of the News


2021-10-21

Commerce Export Rule for Spyware and Hacking Tools

The US Commerce Department’s Bureau of Industry and Security (BIS) has published an interim rule that regulates the “export, reexport, or transfer (in-country) of certain items that can be used for malicious cyber activities.” The rule bars companies from selling spyware and other technologies to China, Russia, and several other countries without first obtaining a license from BIS. In determining whether or not to grant a license, BIS will look closely at the intended end-user of the technology. The rule takes effect in 90 days.

Editor's Note

This follows the changes made to the Wassenaar Arrangement (WA) in 2013 when they added cybersecurity items to the WA list, which resulted in comments and refinement of that language in the WA 2017 amendment. This rule attempts to implement that language. There is a 45-day comment period, which started October 20, 2021. A concern remains that tools can be used for malicious or sanctioned activities; and once licensed for an approved use, a malicious insider can use them for malfeasance. Further, researchers and our cyber security teams need the tools the advisories have to understand attacks, verify security and prepare response measures.

Lee Neely
Lee Neely

As CTO of a company that sells a platform that will most likely fall in scope, I welcome this regulation. Current requirements are limited to export control checks. I do not want our attack platform (or any other platform for that matter) in the wrong hands. Current due-diligence background checks are based on ethics that other companies may not have.

Jorge Orchilles
Jorge Orchilles

Many otherwise useful tools “can be used for malicious cyber activities.”

William Hugh Murray
William Hugh Murray

2021-10-21

Microsoft Releases Cybersecurity Tools for Nonprofits

Microsoft has launched its Security Program for Nonprofits. The company’s 2021 Digital Defense Report found that nongovernmental organizations (NGOs) and think tanks were the second-most targeted sector in cyberattacks; the most targeted sector was government. The program includes free access to AccountGuard, which alerts organizations when their Office365 accounts are being targeted by nation-state actors; free security assessments; and free training resources for administrators and end-users. Microsoft plans to make the tools available to 10,000 organizations within the first year, and 50,000 over the next three years.

Editor's Note

We have seen several times in the past where NGOs and similar organizations were used as “proving grounds” for new techniques connected to state actors. NGOs have an even harder time defending against these attacks due to their lack of resources, but are also often more willing to share providing the defensive community with valuable insight. Google has had similar programs as well protecting at risk organizations.

Johannes Ullrich
Johannes Ullrich

This is a further expansion of the AccountGuard program, which was launched in 2018 for political customers, including campaigns, which then expanded into HeathCare, Human Rights Organizations and Journalists. Read the guidelines for eligibility (https://www.microsoft.com/en-us/nonprofits/eligibility: Nonprofit eligibility) and if eligible, leverage this service, including the free assessments, to assure you’re maintaining a solid security posture.

Lee Neely
Lee Neely

I’m very excited about this initiative and applaud Microsoft for it. In many ways this is similar to Google’s efforts to provide extra notifications and security options for highly targeted individuals. My one concern is that when you visit Microsoft's landing page for this new program, it’s overwhelming with a huge number of resources. While to most security professionals this looks great, when you look at it from the lens of a NGO, it's complicated and confusing. The problem for most NGOs is they are overwhelmed and horribly understaffed, they don’t know where to start with security. Hoping MS can make security simple for NGOs.

Lance Spitzner
Lance Spitzner

2021-10-20

DoJ Wants Private Sector to Work More Closely with Law Enforcement on Cybersecurity

Deputy Attorney General Lisa Monaco wants to know what gets in the way of private sector companies coordinating with law enforcement on cybersecurity. Monaco was speaking at a Department of Justice (DoJ) Criminal Division roundtable on Wednesday, October 20. She noted that companies experiencing cyberattacks “can help avoid liability through working with law enforcement.” Monaco also noted that law enforcement could help recover ransomware payments and discover decryption keys.

Editor's Note

The time to properly investigate and act may exceed your risk tolerance. Even so, develop a relationship with your local law enforcement and FBI offices and discuss the mechanisms and merits of providing the information and evidence they need to take action to help others before they are in the same situation.

Lee Neely
Lee Neely

A key issue many private firms to cooperate with law enforcement is the lack of feedback or visibility of how their cases are progressing. While this lack of sharing back by law enforcement is understandable due to operational and investigative issues, it can be frustrating for private firms to see little or no return for the time and effort they often expend into assisting law enforcement. Law enforcement need to better understand this and examine ways that firms can see the benefits provided by their cooperation, even if it is just at a high level.

Brian Honan
Brian Honan

Business is anxious to remediate attacks while law enforcement wants to preserve evidence. These motives are often at odds.

William Hugh Murray
William Hugh Murray

2021-10-20

CISA Favors 24 Hour Cyber Incident Reporting Time Frame

US Cybersecurity and Infrastructure Security Agency (CISA) executive director Brandon Wales said his agency supports a 24 hour cyber incident reporting time frame for critical infrastructure operators. Speaking at a Bloomberg event earlier this week Wales said, “We think 24 hours is the right amount of time, that brings it in early enough for us to use the information, but does give the company some time to determine whether this is a real incident or not.” A Senate bill currently in committee also proposes a 24 hour time frame; other proposed legislation would impose a 72 hour notification time frame.

Editor's Note

Some early interpretation of GDPR rules led to a flood of reports as companies over-reported to avoid fines. Reporting an incident within 24 hours after discovery is possible, but do not expect to have all the details and be ready for some errors that happen during the initial phases of the analysis.

Johannes Ullrich
Johannes Ullrich

Any notification window needs to start after the incident is verified. Are you prepared to notify an external entity of an incident whether you have 24 or 72 hours to do so? Make sure you understand who needs to be involved in reporting, what constraints and concerns are present. This reporting would likely be an extension of the CISA’s Joint Cyber Defense Collaborative which you should be leveraging to extend and augment your planning, communications, joint cyber defense plans, etc.

Lee Neely
Lee Neely

Until we can measure time-to-detection in hours to days, rather than weeks to months, this kind of legislation will have little impact.

William Hugh Murray
William Hugh Murray

The Rest of the Week's News


2021-10-21

International Effort Disrupts REvil Ransomware Group

In a cooperative effort, law enforcement agencies and cybersecurity experts from multiple countries took steps to disrupt the REvil ransomware group. This is the second time that the REvil group has gone dark. Confirmed details are scarce.

Editor's Note

Multi-sector and country law enforcement collaboration is key to taking down these activities. As tempting as it is to take action when personally attacked, don’t. Leverage your relationship with law enforcement to let them take the action.

Lee Neely
Lee Neely

This is good news and kudos to all those involved. With any luck any intelligence gathered as part of this operation will eventually lead to the arrest of those behind the REvil attacks. A note of caution on these type of operations is that hopefully they are being conducted with the appropriate court oversight and transparency.

Brian Honan
Brian Honan

I welcome action being taken to disrupt any ransomware group. This will impact other groups and is a step in the right direction.

Jorge Orchilles
Jorge Orchilles

2021-10-21

US Legislators Question Cybersecurity Emergency Measures for Railways and Aviation

Some US legislators are questioning whether the Transportation Security Administration’s (TSA’s) new cybersecurity rules for the railway and aviation industries are “appropriate absent an immediate threat.” The legislators are concerned that the prescriptive measures do not account for industry-specific issues.


2021-10-21

MITRE Releases New Version of ATT&CK Framework

MITRE has released ATTA&CK v10. The newest version of the framework includes “a new set of Data Source and Data Component objects in Enterprise ATT&CK, complimenting the ATT&CK Data Source name changes released in ATT&CK v9.”

Editor's Note

ATT&CK is the industry standard and common language that allows our security teams to collaborate and work together. Apart from data sources, (sub)techniques, groups, and software have been updated based on contributions from the community. Other updates to look at are MacOS, Linux, ICS, mobile, and cloud. If you are not leveraging ATT&CK yet, now is a great time to start.

Jorge Orchilles
Jorge Orchilles

2021-10-20

Chrome No Longer Supports File Transfer Protocol

The most recent stable build of Google’s Chrome browser no longer supports File Transfer Protocol (FTP). Earlier builds had disabled FTP but still allowed users to choose to turn it back on; in Chrome 95, FTP support has been stripped from the codebase.

Editor's Note

Chrome just released a security update (See the CISA Alert: https://us-cert.cisa.gov/ncas/current-activity/2021/10/20/google-releases-security-updates-chrome), which means you need to deploy Chrome 95 now. FTP support was removed from Firefox back in July. This is no longer a feature you can turn back on. While you can deploy other FTP clients, a better solution is to move to secure file transfer/sharing options.

Lee Neely
Lee Neely

2021-10-22

AWS Fixes SQL Injection Vulnerability

A bug in MySQL left AWS Web Application Firewall customers vulnerable to SQL injection attacks. AWS fixed the flaw on October 1. The scientific notation bug dates back to 2013. The issue also affects MariaDB.

Editor's Note

Consider using ModSecurity with your Apache and nginx web services to augment SQL injection attack defenses. Applications must sanitize ALL inputs.

Lee Neely
Lee Neely

2021-10-21

WinRAR Vulnerability

A remote code execution flaw exists in WinRAR version 5.70. This version of the free file archiver utility is two years old. The vulnerability was fixed in July 2021; users are advised to ensure that they are running WinRAR version 6.02 or later.

Editor's Note

Exploitation of this vulnerability is difficult. It only affects expired trial versions of the software. An attacker would have to intercept and manipulate the HTML contact retrieved by the applications license reminder. This reminder is only displayed if the trial license expired, and only every third time the software is used.

Johannes Ullrich
Johannes Ullrich

This is a two-year old version of WinRAR running in free-trial mode. CVE-2021-35052 is fixed in 6.02. Make sure that installed versions are 6.0.2. The free-trial is only good for 40 days, either uninstall older copies or license them. The license is perpetual and cross-platform.

Lee Neely
Lee Neely

One hopes that enterprise users of this product will see this warning. Many private users will not.

William Hugh Murray
William Hugh Murray

2021-10-21

Candy Corn Maker Hit with Ransomware

Ferrara Candy, the company that makes numerous confections, including Brach’s candy corn, was the target of a ransomware attack earlier this month. While the attack disrupted production, Ferrara says that they filled most of their Halloween orders in August. Ferrara has resumed production at some facilities.

Editor's Note

As a parent and grandparent who loves Halloween, my first reaction is this is hitting below the belt. Ferrara Candy makes 85% of the candy corn in the US during the Halloween season. Take this as a reminder that nobody is “safe” from attack, review your readiness, check to be sure that changes made recently were done securely. If appropriate, verify that your OT is separated from IT systems, allowing communication only to authorized systems via controlled interfaces.

Lee Neely
Lee Neely

I can do without candy corn. But please ransomware actors: Leave the full size chocolate bars alone. All joking aside: No industry is safe when it comes to ransomware.

Johannes Ullrich
Johannes Ullrich

2021-10-20

Seven Year Sentence for Medical Center Data Theft

A federal judge in Pennsylvania has sentenced Justin Sean Johnson to seven years in prison for breaking into University of Pittsburgh Medical Center databases and stealing personal information. Johnson was found guilty of conspiracy to defraud the US and aggravated identity theft. Johnson sold the data to others who used it to file fraudulent income tax returns and to commit other forms of identity fraud. Three co-conspirators pleaded guilty to various charges in 2017.

Internet Storm Center Tech Corner

Can You Make the Great Chinese Firewall Work For You?

https://isc.sans.edu/forums/diary/Can+you+make+the+Great+Chinese+Firewall+work+for+you/27948/


Thanks to Covid 19: New Types of Documents are Lost in the Wild

https://isc.sans.edu/forums/diary/Thanks+to+COVID19+New+Types+of+Documents+are+Lost+in+The+Wild/27952/


Stolen Images Evidence Campaign Pushes Sliver Based Malware

https://isc.sans.edu/forums/diary/Stolen+Images+Evidence+campaign+pushes+Sliverbased+malware/27954/


BlackByte Decryptor Released

https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/blackbyte-ransomware-pt-1-in-depth-analysis/

https://github.com/SpiderLabs/BlackByteDecryptor


FiveSys Rootkit Signed By Microsoft

https://www.bitdefender.com/files/News/CaseStudies/study/405/Bitdefender-DT-Whitepaper-Fivesys-creat5699-en-EN.pdf


Oracle Critical Patch Update

https://www.oracle.com/security-alerts/cpuoct2021.html


WinRAR Vulnerability

https://thehackernews.com/2021/10/bug-in-free-winrar-software-could-let.html


Crypto Mining npm Libraries

https://blog.sonatype.com/newly-found-npm-malware-mines-cryptocurrency-on-windows-linux-macos-devices


Google Chrome 95 Released

https://chromestatus.com/roadmap


Squirrel VM Bug

https://thehackernews.com/2021/10/squirrel-engine-bug-could-let-attackers.html


Fake Government Assistance Websites

https://www.ic3.gov/Media/Y2021/PSA211015


TA505 Coming Back

https://www.proofpoint.com/us/blog/threat-insight/whatta-ta-ta505-ramps-activity-delivers-new-flawedgrace-variant


BlackMatter Ransomware

https://us-cert.cisa.gov/ncas/alerts/aa21-291a