SANS NewsBites

Attackers Exploiting Admin Privileges Delegated to Service Providers; BQE Software’s BillQuick Web Suite Vulnerabilities Being Actively Exploited; Emsisoft Works With Law Enforcement to Decrypt Ransomed Data

October 26, 2021  |  Volume XXIII - Issue #84

Top of the News


2021-10-25

Nobelium is Targeting Global IT Supply Chain Again

In a blog post, Microsoft says that they have observed new activity from the Nobelium cyberthreat actor. Nobelium has been linked to Russian foreign intelligence and was responsible for the Solar Winds attacks. The most recent activity is targeting “resellers and other technology service providers that customize, deploy and manage cloud services and other technologies on behalf of their customers.” Microsoft has released advice for mitigation and remediation.

Editor's Note

The key point here is that managed service providers are often granted admin privileges on customer systems and these “… delegated administrative privileges are often neither audited for approved use nor disabled by a service provider or downstream customer once use has ended, leaving them active until removed by the administrators.“ When signing on for cloud services, all such delegated admin privileges should be minimized and processes need to be establish to ensure that they are removed whenever that service provider is terminated.

John Pescatore
John Pescatore

Monitor all accounts with administrative privileges, whether used for insourced or outsourced support. Make sure that your account disablement procedures include provisions for changes of staff at a MSP and that they are not all using the same account, just as you would with your staff. If you terminate an external support contract, make sure all associated accounts and access is also disabled or deleted promptly.

Lee Neely
Lee Neely

Another way to look at this is the SolarWinds attack was so successful, and the cost was so minimal, that Russian Intelligence has simply accelerated their efforts to continue to infiltrate and/harvest as much as they can targeting 3rd party infrastructure. Makes you wonder just how many of their attacks have been successful and we have yet to discover them.

Lance Spitzner
Lance Spitzner

Caveat Emptor cannot address the supply chain as a means of distributing malicious code. Neither can we simply accept the risk. We must hold suppliers accountable, if not for the quality of their own code, at least when they recklessly distribute the code of others. Am I the only one that thinks that our tools and processes for managing the quality and content of software are inadequate?

William Hugh Murray
William Hugh Murray

2021-10-25

Billing Software Flaw Exploited to Spread Ransomware

A critical vulnerability in BQE Software’s BillQuick Web Suite time and billing system is being exploited to deploy ransomware. The flaw can be exploited through SQL injection to remotely execute code. The vulnerability was detected by researchers from Huntress; they found nine vulnerabilities in all. BillQuick says an interim fix for some of the flaws will be available soon.

Editor's Note

The blog post by Huntress suggests that there are multiple exploits that are not yet patched. Get ready to patch this software again shortly. If possible: add additional access restrictions.

Johannes Ullrich
Johannes Ullrich

Sqlmap was able to execute xp_cmdshell as well as bypass authentication to the BillQuick application. Note that the Huntress researchers worked to create a separate copy of the application rather than testing the live system as part of finding the root cause for malicious activity noted in production.

Lee Neely
Lee Neely

2021-10-25

Emsisoft Has Been Quietly Helping BlackMatter Victims Decrypt Data

Emsisoft found a flaw in the BlackMatter ransomware encryption algorithm that allowed the cybersecurity company to develop a decryptor. Emsisoft has been working with law enforcement to help organizations affected by BlackMatter regain access to their data without paying a ransom. The BlackMatter group learned about the decryptor a month ago and fixed the flaw.

Editor's Note

There is inherent risk in using a decryptor from the attackers. Check to see if a decryption key and tool are published for your particular ransomware before seeking the key from the ransomware gang. If you have the decryption key, look to companies such as Emsisoft for a decryptor which can use that key before using the attacker provided tool.

Lee Neely
Lee Neely

The Rest of the Week's News


2021-10-23

NPM Library Hijacked

Three versions of the ua-parser-js NPM library were found to contain malicious code. The supply chain attack affected three versions of the library: 0.7.29, 0.8.0, and 1.0.0. The NPM library is downloaded millions of times a week, and is used in thousands of projects. The library’s developer said, “I believe someone was hijacking my npm account and published some compromised packages.” The problem has been addressed in versions 0.7.30, 0.8.1, and 1.0.1.

Editor's Note

npm is the dumpster fire that keeps on giving. You MUST scan any libraries that you are including in your projects, or stop using node.js/npm if you can't perform these scans.

Johannes Ullrich
Johannes Ullrich

Make sure you’re incorporating the updated library in your build process. If you’re publishing code for others to use, make sure that you’ve followed the security practices for your source code repository such as using two-factor authentication, making sure accounts are not shared, managing access to data only giving contributors the specific rights needed and revoking access to users no longer working with you.

Lee Neely
Lee Neely

2021-10-22

Healthcare Breaches

Recent cybersecurity incidents affecting organizations in the healthcare sector include a ransomware attack against Central Indiana Orthopedics, a phishing incident affecting Professional Dental Alliance providers, a data exfiltration incident affecting the American Osteopathic Association, and a ransomware attack against PracticeMax.

Editor's Note

There is no such thing as being too small to be a target. There is such a thing as not having enough resources to assess your security or implement a good cyber security program. This you can outsource, and likely spend less than you would recovering from a breach. If you’re looking for a starting place, you can reach out for references is your local cyber security organizations or chapters (ISSA, CSA, ISACA, ISC2, etc.).

Lee Neely
Lee Neely

Healthcare is very slow to roll out security changes. In the past, those organizations have been hiding behind the thought, “What are attackers going to do with our data? They can’t monetize it!” PHI wasn’t as directly monetizable. Of course, ransomware has significantly changed the game and healthcare orgs are significantly behind and aren’t nimble enough to take big steps forward. I predict more and more of this happening in healthcare in the next few years.

Tim Medin
Tim Medin

2021-10-22

CISA Advisory on B. Braun Infusion Pump Vulnerabilities

The US Cybersecurity and Infrastructure Security Agency (CISA) has issued an advisory urging users to apply updates to address multiple vulnerabilities affecting certain B. Braun infusion pumps and battery packs. The flaws could be exploited to gain remote access to the devices.

Editor's Note

Beyond applying the update, make sure these types of devices are isolated. If you’re using Wi-Fi, it should be a separate network, with limited access, much as you would use segmentation on a wired network for control systems. Don’t expose these to the Internet and if remote access is required, use a VPN and an authorized secure bastion host.

Lee Neely
Lee Neely

I'm so glad folks are giving this kind of device attention. I wish those with the skills to find these flaws good hunting. And for manufacturers, please hire quality pentesters and consider shipping devices (or at least firmware) to bug bounty hunters. This is a prime case of, "Find the bugs before the bad guys do."

Christopher Elgee
Christopher Elgee

2021-10-25

HHS Bulletin Lists Cybersecurity Issues Relevant to Healthcare Sector

The US Department of Health and Human Services Monthly Cybersecurity Vulnerability Bulletin for October 2021 lists the BrakTooth vulnerabilities, Conti ransomware, and the Medusa TangleBot as top security concerns for the healthcare sector. The bulletin also lists relevant vulnerabilities in products from Microsoft, Adobe, Apple, Cisco, WordPress and other companies.

Editor's Note

A recurring theme is to secure your remote access components and keep products updated/patched. Go through the list to make sure you didn’t miss any tricks. Also make sure that you’re not only getting security bulletins for all your installed products but also that they are acted upon, which may mean you need to change the distribution.

Lee Neely
Lee Neely

2021-10-25

Fix Available for Critical Vulnerability in Discourse

A critical remote code execution vulnerability in the Discourse opens source discussion platform affects versions 2.7.8 and earlier. The flaw has a CVSS severity score of 10. A fix was released on Friday, October 22.

Editor's Note

The blog post describing the vulnerability includes sufficient details to write an exploit. I would not be surprised to see vulnerable sites already being targeted while you read this. Please expedite this update if you run Discourse.

Johannes Ullrich
Johannes Ullrich

If you cannot apply the update, you can add a rule to block requests with a path starting ‘/webhooks/aws’ in your WAF or other security module.

Lee Neely
Lee Neely

2021-10-25

South Korea’s KT Telecommunications Company Outage Blamed on Routing Error

South Korean telecommunications company KT Corporation suffered an outage on Monday, October 25. The company initially said the issue was caused by a distributed denial-of-service (DDoS) attack, but later clarified that the problem was due to a border gateway protocol (BGP) configuration error. The incident affected all of KT’s 16.5 million customers, and lasted less than an hour.

Editor's Note

Bad BGP updates cause the network to fail rapidly and are slow to back-out and recover from. When needing access to the console port on your routers (remember that teal cable that came in the box you tossed in the back of the drawer?) – know what you would have to do to back out an erroneous update, verify that you have the access to your network gear when the routing is impacted, document the process.

Lee Neely
Lee Neely

2021-10-25

Guilty Plea in 2019 Kansas Water Utility System Breach

Wyatt Travnichek has pleaded guilty to damaging a computer during unauthorized access and tampering with a public water system. Travnichek was employed by Post Rock Rural Water District in Ellsworth County, Kansas between January 2018 and January 2019. His responsibilities included remotely monitoring the facility. In March 2019, Travnichek used the remote login capability to shut down the facility and shut off one of its filters.

Editor's Note

The system tampering happened two months after he resigned, and he used the company remote access system to do it. Disabling accounts when staff leave is critical. If you don’t remove disabled accounts, monitoring for their re-activation is also critical to detect malfeasance. Consider deactivating accounts which are not used frequently, particularly those used for remote access. When looking at this make sure that low frequency, but known/regular, events/use cases are factored in.

Lee Neely
Lee Neely

Internet Storm Center Tech Corner

Malware Quiz

https://isc.sans.edu/forums/diary/October+2021+Contest+Forensic+Challenge/27960/


Odd Zip Files

https://isc.sans.edu/forums/diary/Phishing+ZIP+With+Malformed+Filename/27966/


Decrypting Cobalt Strike Traffic

https://isc.sans.edu/forums/diary/Decrypting+Cobalt+Strike+Traffic+With+a+Leaked+Private+Key/27968/


Decrypting Cobalt Strike Configurations Using Known Secret Keys

https://blog.nviso.eu/2021/10/21/cobalt-strike-using-known-private-keys-to-decrypt-traffic-part-1/


Vulnerable Billing Software BillQuick Web Used to Deploy Ransomware

https://www.huntress.com/blog/threat-advisory-hackers-are-exploiting-a-vulnerability-in-popular-billing-software-to-deploy-ransomware


Critical Discourse Vulnerability

https://us-cert.cisa.gov/ncas/current-activity/2021/10/24/critical-rce-vulnerability-discourse


Discourse Discussion Platform RCE

https://github.com/discourse/discourse/security/advisories/GHSA-jcjx-pvpc-qgwq

https://0day.click/recipe/discourse-sns-rce/


ua-parser-js malware

https://github.com/advisories/GHSA-pjwm-rvh2-c87w


Tracking BLE Fingerprints

https://cseweb.ucsd.edu/~nibhaska/papers/sp22_paper.pdf


GPS Software Bug

https://us-cert.cisa.gov/ncas/current-activity/2021/10/21/gps-daemon-gpsd-rollover-bug

https://isc.sans.edu/forums/diary/Keeping+Track+of+Time+Network+Time+Protocol+and+a+GPSD+Bug/27886/