SANS NewsBites

Report: Exploitation Rate of Microsoft Proxy, Log4j and Atlassian Show Faster Patching and Architecture Changes Needed; High Rate of Vulnerable Log4j Downloads Means Software Inventory to the Library Level is Needed; Prioritize Patching Linux Privilege Escalation Vulnerabilities When Fix Is Available

April 29, 2022  |  Volume XXIV - Issue #34

Top of the News


2022-04-28

Five Eyes List Most Exploited Vulnerabilities

The Five Eyes countries – Australia, New Zealand, Canada, the UK, and the US – have published a list of the top 15 most routinely exploited vulnerabilities in 2021. The list includes the Log4Shell vulnerability and the ProxyShell and ProxyLogon vulnerabilities.

Editor's Note

Note the dominance of Microsoft Exchange. Currently, one of the most impactful security initiatives may be to move away from Exchange or at least substantially reduce its exposure.

Johannes Ullrich
Johannes Ullrich

The report points out that the majority of the top 15 CVEs were exploited within two weeks of disclosure – monthly patching is not fast enough. The Atlassian exploitation rate jumped to near the top after a proof-of-concept exploit was released – reports of POC attack code should be triggers for immediate action. The Mitigations section has action recommendations specific to the top vulnerabilities.

John Pescatore
John Pescatore

Life moves pretty fast these days, and there isn't a lot of time to contemplate what to remediate. Key off of actively exploited and POC's being available. Consider requiring critical vulnerabilities be addressed in 7-10 days. Don't accept workarounds as permanent fixes: require a timeline for deploying the complete fix, with appropriate consequences for failure to execute, then follow-up. Make sure that you're subscribed to the CISA alerts, in addition to your other threat feeds; CISA has recently upgraded their mailing list and supporting processes.

Lee Neely
Lee Neely

This is good insight to push for much faster patching cycles for these products, migrate to newer platforms, or make architectural changes that lower the risk of these products being exploited. Unfortunately, if you have any of these vulnerabilities in your environment, they were most likely already exploited.

Jorge Orchilles
Jorge Orchilles

2022-04-28

Log4Shell Attack Surface Remains Large

Researchers from Rezilion found that more than 90,000 Internet-facing applications are running vulnerable versions of the Apache Log4j library. The Log4Shell vulnerability was first disclosed in December 2021. It is easy to exploit and has a CVSS v3 score of 10.

Editor's Note

The real takeaway from this report: A large number of downloads of log4j done today will install the vulnerable versions on systems. New vulnerable systems are diminishing the impact of patching of existing systems. Maybe instead of signatures to detect log4j attacks, we need signatures to detect the download of log4j legacy versions.

Johannes Ullrich
Johannes Ullrich

This was expected because most organizations do not keep an inventory of where the vulnerable library is used. We went through similar exercises with Struts and Heartbleed. Keeping an inventory is tough but needs to go down to the library level.

Jorge Orchilles
Jorge Orchilles

You may want to reset your expectations on the remaining Log4j attack surface after reading this report. Then knuckle down and look to your organization to see what may be skipped or tabled. Don't overlook your internal/non-internet facing systems, there are scenarios where they can also be exploited.

Lee Neely
Lee Neely

2022-04-27

Nimbuspwn Linux Security Issue Can be Exploited to Gain Elevated

A collection of vulnerabilities affecting Linux systems could be exploited by local attackers to gain elevated privileges and deploy malware on unprotected systems. Dubbed Nimbuspwn, the security issue involves vulnerabilities affecting the networkd-dispatcher component.

Editor's Note

If you want a cool example of two race conditions (symlink, time-of-check-time-of-use) the Microsoft report (https://www.microsoft.com/security/blog/2022/04/26/microsoft-finds-new-elevation-of-privilege-linux-vulnerability-nimbuspwn/) explains why they work and how to exploit. Note that manual exploitation is challenging because this is a race condition, so you're going to want to script that if you want to see it work, particularly if you want to reliably show others how this works. The developer has patched networkd-dispatcher, make sure to deploy the update when its available for your Linux distro.

Lee Neely
Lee Neely

Privilege escalation vulnerabilities have a lower CVSS score because they require access to the local system. Therefore, these vulnerabilities may not hit your prioritization baselines. However, you should investigate these in your environment for expedited patching.

Jorge Orchilles
Jorge Orchilles

The Rest of the Week's News


2022-04-27

Microsoft Report on Russian Cyber Warfare

Microsoft has published “a report detailing the relentless and destructive Russian cyberattacks we’ve observed in a hybrid war against Ukraine.” The report lists nearly 250 cyber operations conducted by six separate groups of threat actors who all have ties to Russia.

Editor's Note

The report notes that cyber-attacks are being coordinated with kinetic actions, increasing the reach and disruption of both actions. The old model of going to ground while continuing to operate becomes much more complex. Note that the Russian military defines information warfare as "confrontation in the information space with the goal of causing damage to critical information systems, undermining political, economic, and social systems, psychologically manipulating the public to destabilize the state and coerce the state to make decisions to benefit the adversary party."

Lee Neely
Lee Neely

This is a fascinating report and one I highly recommend you read. The number and type of attacks is just breathtaking. Three key Russian intelligence services are actively involved (GRU, FSB, SVR). What is amazing is not just the TTPs used in the attacks, but the breadth of goals. Russia is undertaking everything from psychological warfare targeting an entire population to targeted infrastructure attacks. This is not a small-scale effort to support the kinetic side of warfare; this is an entire another battlefield, one Russia prioritizes just as much as their physical military forces.

Lance Spitzner
Lance Spitzner

Read more in

Microsoft: The hybrid war in Ukraine

Microsoft: Special Report: Ukraine An overview of Russia’s cyberattack activity in Ukraine

SC Magazine: Microsoft details rampant cyber warfare corresponding to Russian invasion

ZDNet: Microsoft: Russia has launched hundreds of cyberattacks against Ukraine

Ars Technica: Russia wages “relentless and destructive” cyberattacks to bolster Ukraine invasion





[[90]] HSCC: MedTech Vulnerability Communications Toolkit

Health Sector Council: Medtech Vulnerability Communications Toolkit (MVCT)

Health IT Security: HSCC Publishes Medical Device Vulnerability Communications Toolkit





[[100]] French Fiber Optic Cable Attack

Cyberscoop: How the French fiber optic cable attacks accentuate critical infrastructure vulnerabilities

Washington Post: French investigate who is behind fiber optic cables sabotage

Le Parisien: Fiber optics: sabotaged cables in several regions, an open criminal investigation (in French)


2022-04-26

Tenet Healthcare Cybersecurity Incident

Dallas, Texas-based Tenet Healthcare experienced a cybersecurity incident earlier this month. Once the company became aware of the situation, its security team “immediately suspended user access to impacted information technology applications, executed extensive cybersecurity protection protocols, and quickly took steps to restrict further unauthorized activity.”

Editor's Note

Tenet’s response, recovery and communications all seem to have happened quickly. Their press release on the incident is a good model for clear and timely disclosure – good template to use.

John Pescatore
John Pescatore

Rapid authoritative communication, which not only acknowledges the situation, describes actions taken and manages expectations on future actions is a mad skill we all need to have and hope to rarely use after such an incident. Note they also praised their staff who are working do deliver services through the situation. Store this one in a file in case you need a template.

Lee Neely
Lee Neely

2022-04-28

Cloudflare Blocked Huge DDoS Attack

In an April 27 blog post, Cloudflare that its “systems automatically detected and mitigated a 15.3 million request-per-second (rps) DDoS attack — one of the largest HTTPS DDoS attacks on record.” The attack against the unnamed cryptocurrency platform lasted less than 15 seconds.

Editor's Note

Of note here is that this was an HTTPS attack, which is considerably more resource intensive due to establishing a TLS connection, and the duration was less than 15 seconds. Another change was this attack came from cloud compute centers, not a residential computer botnet. This is a case where automated detection and response performed as intended. You know the questions you need to go ask your defenders and service providers.

Lee Neely
Lee Neely

2022-04-28

GitHub Repositories Breached with Stolen OAuth Tokens

GitHub has updated its alert regarding breaches using stolen OAuth token to include a timeline of the attackers’ activity. The threat actor used the tokens to steal repositories belonging to dozens of organizations.

Editor's Note

GitHub has completed notification of all directly impacted customers and recommends continued monitoring of Heroku and Travis CI's investigations. Check your repositories for unexpected clone activity, double check for any authentication secrets or keys you forgot were still stored there.

Lee Neely
Lee Neely

2022-04-28

“Package Planting” NPM Registry Flaw

Researchers from Aqua’s team Nautilus “found a logical flaw in npm that allows threat actors to masquerade a malicious package as legitimate and trick unsuspecting developers into installing it.” The issue, which the researchers have named “Package Planting,” was fixed on April 26.

Editor's Note

This is slick. You add a reputable/known maintainer or two to your malicious package, then remove yourself as a maintainer. The added maintainers don't know they've been added to your package, and your package now looks like one of their legitimate ones. The fix was to add a confirmation step. Maintainers must confirm being added to a package.

Lee Neely
Lee Neely

2022-04-28

HSCC: MedTech Vulnerability Communications Toolkit

The Healthcare and Public Health Sector Coordinating Council (HSCC) Cybersecurity Working Group (CWG) has published the Medtech Vulnerability Communications Toolkit. The HSCC CWG developed the toolkit by building on the US Food and Drug Administration’s (FDA’s) “Best Practices for Communicating Cybersecurity Vulnerabilities to Patients as well as information gathered in surveys of “healthcare professionals, journalists covering healthcare cybersecurity, security researchers, manufacturers, and regulators.”

Editor's Note

Think about this for a second - the average hospital patient bed has 15 medical devices which not only interact with the patient, monitoring and/or providing therapy/medications, but are also connected. Then consider how rapidly they are deployed when a patient needs them, which necessitates configuration and update processes need to be proactively managed ahead of needs. This report is designed to help communicate vulnerabilities to stakeholders in a way they can understand and support taking the required action.

Lee Neely
Lee Neely

2022-04-28

French Fiber Optic Cable Attack

Authorities in France are investigating the apparent sabotage of fiber optic cables as a criminal act. The severed cables disrupted Internet service in several regions of the country earlier this week.

Editor's Note

The photos of the cut cables re-enforce the value of path diversity. Also, an argument for locked and possibly alarmed grates/vaults/etc. Those cuts are going to be a bugger to fix; it's not clear how much dark fiber is available for re-routing of services. They are also faced with the decision of patching vs pulling new trunks. Understand what resiliency is deployed by your ISP and service disruption communication. should be part of your DR planning in addition to path diversity so you can capture possible risks of service availability.

Lee Neely
Lee Neely

Internet Storm Center Tech Corner

WSO2 Vuln Exploited to Install Crypto Coin Miners

https://isc.sans.edu/forums/diary/WSO2+RCE+exploited+in+the+wild/28586/


MITRE ATT&CK v11

https://isc.sans.edu/forums/diary/MITRE+ATTCK+v11+a+small+update+that+can+help+not+just+with+detection+engineering/28590/


A Day of SMB: What does our SMB/RPC Honeypot see? CVE-2022-26809

https://isc.sans.edu/forums/diary/A+Day+of+SMB+What+does+our+SMBRPC+Honeypot+see+CVE202226809/28594/


Azure PostgreSQL Privilege Escalation

https://www.wiz.io/blog/wiz-research-discovers-extrareplica-cross-account-database-vulnerability-in-azure-postgresql/


Security alert: Attack campaign involving stolen OAuth user tokens

https://github.blog/2022-04-15-security-alert-stolen-oauth-user-tokens


Netatalk Vulnerability Affecting Synology, QNAP, Others?

https://www.synology.com/en-global/security/advisory/Synology_SA_22_06


Microsoft Special Report: Ukraine

https://query.prod.cms.rt.microsoft.com/cms/api/am/binary/RE4Vwwd


Linux Privilege Escalation Nimbuspwn

https://www.microsoft.com/security/blog/2022/04/26/microsoft-finds-new-elevation-of-privilege-linux-vulnerability-nimbuspwn/


npm Package Planting

https://blog.aquasec.com/npm-package-planting


Core Impact Backdoor Delivered Via VMware Vulnerability

https://blog.morphisec.com/vmware-identity-manager-attack-backdoor


VirusTotal Exploit Update

https://twitter.com/bquintero/status/1518738072820670464


Emotet Experimenting With New Delivery Techniques

https://www.proofpoint.com/us/blog/threat-insight/emotet-tests-new-delivery-techniques