SANS NewsBites

DMCA Broadens Exemptions; More Adobe Patches; Google, Salesforce, Slack, and Okta Create Baseline Product Security Checklist, Malicious NPM Packages Masquerade as Roblox Libraries

October 29, 2021  |  Volume XXIII - Issue #85

Top of the News


2021-10-27

New DMCA Exemptions from Library of Congress

The US Library of Congress has published its triennial list of exemptions to Section 1201 of the Digital Millennium Copyright Act (DMCA). Section 1201 prohibits the circumvention of digital copy protections. The final rule grants visually impaired individuals permission to bypass copyright protections on digital books. The exemption is good for three years; advocates must petition again in three years. Other exemptions in the 2021 rule grant users broader permissions to fix cars, medical devices, and other digital devices.

Editor's Note

Technology moves much faster than legislation. The Library of Congress seems to have done a good job of listening to public comment and expanding legal access while still trying to maintain a line between allowing fair use while maintaining legal protection against malicious access.

John Pescatore
John Pescatore

According to Google, the Biden Administration and half the states are considering "right to repair" legislation, motivated in part by the unintended consequences of the DMCA.

William Hugh Murray
William Hugh Murray

2021-10-27

Adobe Issues Out-of-Band Updates

On Tuesday, October 26, Adobe released updates to address more than 80 vulnerabilities affecting 14 products. Of those 66 are rated critical. Adobe normally releases security updates on the second Tuesday of each month.

Editor's Note

Adobe is still publishing security updates on the second Tuesday of the month (Microsoft's Patch Tuesday). However, for at least a year, Adobe has been releasing updates on other days as well. These updates are not necessarily more important and in this case, can be considered "regular" updates without a need to expedite patching.

Johannes Ullrich
Johannes Ullrich

Fortunately, this doesn’t include Acrobat, so it’s going to impact a smaller set of users. Even so, make sure they are applying the updates from Creative Cloud. Make sure that old versions are exited so the update can be applied. Hopefully, you’ll hear from your users, as I heard from my wife, “I applied all those updates yesterday.”

Lee Neely
Lee Neely

2021-10-28

Minimum Viable Secure Product Security Checklist

Technology companies have developed the Minimum Viable Secure Product checklist, which “is a collaborative baseline focused on developing a set of minimum security requirements for business-to-business software and business process outsourcing suppliers.” The vendor-neutral checklist allows organizations to select third-party vendors whose cybersecurity profiles match their needs.

Editor's Note

Lists of minimal levels of required security controls are often pooh-poohed as “checklists” in security but they are a required critical starting point. Think about pilots before takeoff or NASA before a rocket launch. They always go through a structured checklist to make sure that minimum safety standards are being met – but obviously they don’t then sit back and say “my job is over.” The MVSP is a good starting point for supply chain security – should require really high level of approval for using any vendor that can’t meet those requirements.

John Pescatore
John Pescatore

This provides an answer to the question of where we start assessing the security of a product. Review questions you’re using today to assess products to see if you have gaps. Schedule reviews of those baseline standards to see if you can or need to raise the bar.

Lee Neely
Lee Neely

2021-10-27

More Malicious NPM Libraries

Researchers from Sonatype have detected malicious NPM packages that masquerade as Roblox libraries, but which actually deliver ransomware and trojans. Last week, the US Cybersecurity and Infrastructure Security Agency (CISA) released an advisory about malicious versions of the ua-parser.js library, just several days after Sonatype disclosed several malicious NPM packages.

Editor's Note

Typo squatting, or packages being taken over by malicious actors are an almost daily (maybe weekly) occurrence for NPM these days. I have not yet seen a solution I like. But start by figuring out what libraries you use. Then include any modules in your security scans. Do not just scan your own code.

Johannes Ullrich
Johannes Ullrich

Developers are responsible for the quality and integrity of all the code in their products, whether original or reused from other sources.

William Hugh Murray
William Hugh Murray

The Rest of the Week's News


2021-10-27

PAX Point-of-Sale Manufacturer Raided; FIS Removes PAX Terminals from its Infrastructure

The FBI raided the offices of PAX Technology, Inc., a Chinese point-of-sale (PoS) device provider. The raid is likely related to reports that PAX devices were used in cyberattacks against organizations in the US and the EU. FIS WorldPay has reportedly taken PAX PoS terminals from its infrastructure. The company said it made the decision “because it did not receive satisfactory answers from PAX regarding its POS devices connecting to websites not listed in their supplied documentation.”

Editor's Note

Based on news reports, it sounds like someone paid attention to network traffic from these devices. Dealing with "black boxes" connected to your network is a common challenge faced by many enterprises. A skilled and well-instrumented network monitoring team is your answer and you shouldn't live without one. PCAPs or it didn't happen.

Johannes Ullrich
Johannes Ullrich

Monitoring detected packet sizes which were larger than necessary for PoS transactions as well as attempted connections to websites not included in their documentation, which triggered this investigation. Anomalous behavior detection like this is critical with today’s cyber threats. PoS systems remain a prime cyber target. Protection needs to include segmentation and allow network connectivity to services they need.

Lee Neely
Lee Neely

There are decades of examples of national intelligence agencies convincing manufacturers to build malicious capabilities into commercial products. More modern times have added the ability of those nation states to also sponsor efforts (such as what happened to Solar Winds and others) to penetrate vulnerable company networks and insert such capabilities into commercial products. The bottom line is supply chain security and certification of high impact products needs to be focused on just as we had to learn how to do risk assessments, segmentation and monitoring when business units needed to allow third parties to directly connect to our networks.

John Pescatore
John Pescatore

Malicious activity was apparently detected because of unexpected network traffic from POS devices. Is this something you could detect in your environment? Do you have network activity baselines to compare to? Does your pentest team do egress and DLP testing?

Christopher Elgee
Christopher Elgee

2021-10-27

Microsoft Force Installs PC Health Check

Microsoft is force installing PC Health Check on machines running Windows 10. While users can uninstall the diagnostics tool, some have reported that it re-installs when the computer checks for new updates. The app is primarily used to check machines’ hardware for Windows 11 compatibility issues.

Editor's Note

This updated applies to all editions of Windows 10, versions 2004, 20H2 and 21H1. While you’re making sure your enterprise tools, application and support are ready for Windows 11, you can leverage the health check to verify hardware is Windows 11 capable before attempting to deploy the upgrade.

Lee Neely
Lee Neely

2021-10-27

Another Food Supply Chain Cyberattack

Wisconsin-based Schreiber Foods was the victim of a cyberattack last week. The incident shut down the dairy company’s production and distribution networks for several days. A Schreiber spokesperson said the company has resumed production and shipping.

Editor's Note

Consider that small to medium businesses typically need four to six months to recover from a major attack, and in the case of ransomware, many never recover. Fortunately, Schreiber had an incident response plan ready to go. Having both an incident response plan and minimum cyber security posture are now acceptance criteria for most cyber insurers. Additionally, when reporting a claim, be prepared to demonstrate, to a review board, that you were following the cyber criteria agreed to in the policy.

Lee Neely
Lee Neely

2021-10-27

Cyberattack on Fuel Distribution System Shutters Iranian Gas Stations

National Iranian Oil Products Distribution Company (NIOPDC) gas stations are not operating in the wake of a cyberattack. NIOPDC has more than 3,500 gas stations across the country. The attack is under investigation.

Editor's Note

This is a targeted attack, likely nation state sponsored, taking the gas stations offline across the country as well as changing the displays on freeway billboards. The question is if you were under such an attack, would it take all your locations offline or have you employed isolations and redundant systems which would allow segmented/continuing operation?

Lee Neely
Lee Neely

2021-10-27

Vulnerability in WordPress Hashthemes Plugin Could be Exploited to Wipe Content

A vulnerability in the Hashthemes Demo Importer plugin for WordPress could be exploited to permanently wipe a website’s content. According to Wordfence, “the … plugin failed to perform capability checks for many of its AJAX actions. While it did perform a nonce check, the AJAX nonce was visible in the admin dashboard for all users.” Because The vulnerability has been fixed; users are urged to update to Hashthemes demo Importer version 1.1.2 or later.

Editor's Note

At one point it was reported the vulnerability could be used for site takeover. The “good” news is it can result in complete loss of site content. Not exactly what I’d define as good news. The better news is that the patched version was quietly released September 24, 2021, with Wordfence premium and free versions being provided rules August 25 and September 24 respectively. Double check to be sure you have the updated version.

Lee Neely
Lee Neely

WordPress plugins continue to be source of vulnerability. They should be used only by design and intent, not to say necessity, and never by default. They must be carefully managed and policed.

William Hugh Murray
William Hugh Murray

2021-10-28

Multiple Vulnerabilities in OptinMonster WordPress

WordPress users who have installed the OptinMonster plugin are urged to update to version 2.6.5 or later to patch multiple security issues that could be exploited to exfiltrate data, add JavaScript to vulnerable sites, and perform other malicious activities. The plugin is estimated to be installed on one million sites.

Editor's Note

This plugin allows for quick and easy creation of sales campaigns, and uses API endpoints for integration. Unfortunately, the majority of the REST API endpoints were not securely implemented. The fully patched version was released October 7th, so you should be all updated. Make sure your automatic plugin updates are working. Wordfence premium and free versions being provided rules September 28 and October 28 respectively.

Lee Neely
Lee Neely

Internet Storm Center Tech Corner

Outlook Web Access Phishing

https://isc.sans.edu/forums/diary/Hunting+for+Phishing+Sites+Masquerading+as+Outlook+Web+Access/27974/


Apple Security Updates Details Available

https://support.apple.com/en-us/HT201222


Adobe Patches

https://helpx.adobe.com/security/security-bulletin.html


More Malicious NPM Libraries

https://www.theregister.com/2021/10/27/npm_roblox_ransomware/


Critical Hikvision Patch

https://watchfulip.github.io/2021/09/18/Hikvision-IP-Camera-Unauthenticated-RCE.html

https://www.hikvision.com/en/support/cybersecurity/security-advisory/security-notification-command-injection-vulnerability-in-some-hikvision-products/


Shrootless Vulnerability in MacOS

https://www.microsoft.com/security/blog/2021/10/28/microsoft-finds-new-macos-vulnerability-shrootless-that-could-bypass-system-integrity-protection/


Jira Insight Patch

https://confluence.atlassian.com/adminjiraserver/jira-service-management-security-advisory-2021-10-20-1085186548.html


Craigslist E-Mail Hijack

https://www.inky.com/blog/urgency-mail-relay-serve-phishers-well-on-craigslist


UltimaSMS Android Malware

https://blog.avast.com/premium-sms-scam-apps-on-play-store-avast


Firefox Proxy Malware

https://blog.mozilla.org/security/2021/10/25/securing-the-proxy-api-for-firefox-add-ons/