SANS NewsBites

Active Follina Exploits and No Patch From Microsoft Drive Need for Immediate Action; TVA Has to Address Basic Security Hygiene and Governance of Federal Dam IT/OT Systems; Preview Windows Autopatch and Prioritize Implementation

June 7, 2022  |  Volume XXIV - Issue #45

Top of the News


2022-06-03

Follina Vulnerability Remains Unpatched

Microsoft has not yet released a patch to address the vulnerability known as Follina. The flaw affects the company’s Support Diagnostic Tool and can be exploited to take control of vulnerable devices. Microsoft has acknowledged that the flaw is being actively exploited and has published guidance that include temporary mitigations. The vulnerability can be exploited through a maliciously-crafted Word document. The flaw affects all currently supported versions of Windows. Microsoft has not said whether or not plans to release a patch for the vulnerability.

Editor's Note

This vulnerability should still be at the top of the list of things to worry about. You must implement the workaround to prevent exploitation. While anti-malware vendors are quickly updating signatures, they are inadequate to protect against the wide range of exploits that may take advantage of this vulnerability.

Johannes Ullrich
Johannes Ullrich

The Microsoft guidance includes a workaround of disabling the MSDT service on each endpoint. Many endpoint protection tools are also now able to detect and block the attack, check to see if you're covered there. Additionally verify your email security services are enabled, and are detecting and blocking this attack. While blocking externally sourced office documents is also an approach, use caution as this is likely impactful to the business and likely will be worked around by users.

Lee Neely
Lee Neely

Just a reminder that SANS had a webinar on Follina you can view at https://www.sans.org/webcasts/emergency-webcast-msdt-ms-word-0-day/ and published a Follina Q&A with SANS instructor Jake Williams at https://www.sans.org/blog/follina-msdt-zero-day-q-a/

John Pescatore
John Pescatore

2022-06-05

Follina is Being Actively Exploited

Threat actors believed to be acting on behalf of an as-yet unidentified government have been exploiting the Follina vulnerability to target US and European government organizations. The threat actors sent at least 1,000 phishing messages that contained a maliciously-crafted document that pretended to be information about a salary increase.

Editor's Note

One set of Follina exploits sighted is taking advantage of a digital signature that was created using a key stolen from software company Clickstudio. More sophisticated exploits like this will often bypass defenses.

Johannes Ullrich
Johannes Ullrich

Make sure your shields are up, IOCs in place and you've implemented your plan to mitigate the risks of a Follina attack.

Lee Neely
Lee Neely

2022-06-03

Audit Raises Questions About Federal Dam Cybersecurity Accountability

The Tennessee Valley Authority (TVA) Office of Inspector General’s audit of the TVA’s non-power dam control system cybersecurity “found no clear ownership of the non-power dam control system; vulnerable versions of operating systems and control system software; inappropriate logical and physical access; [and] internal information technology controls [that] were not operating effectively or had not been designed and implemented.”

Editor's Note

The deficiencies are mostly basic security hygiene issues – Implementation Group 1 of the Critical Security Controls. Most of IG1 are really related to shortcomings in IT (or in this case OT) operations and governance – updating applications and operating systems to current versions, having clear business ownership of systems, etc. The TVA has said it will remedy deficiencies by May 2023 but the OT operations and governance issues should be addressed ASAP.

John Pescatore
John Pescatore

This is foundational cyber hygiene. Make sure that you have a comprehensive inventory of systems and that ownership, particularly of the security, is well defined. Then make sure that you are verifying the security posture, remediating gaps when discovered. Verify you have policies and procedures to support systems being deployed as securely as possible with open lines of communication on not only how to approach that, but also how to remediate discovered issues without throwing anyone under the bus.

Lee Neely
Lee Neely

2022-06-06

Windows Autopatch Now in Preview

Microsoft has made its Windows Autopatch service available for public preview. The service will be generally available in July to customers with Windows Enterprise/Microsoft 365 E3 or E5 licenses.

Editor's Note

Per earlier NewsBites comments on Windows Autopatch, if you have the right licenses, try it out across a controlled test environment. The security gain is a given and application issues due to the patches are very likely to be less than you anticipate.

John Pescatore
John Pescatore

Reducing the workload of keeping endpoints updated is a big win. This service is designed to work with enterprise devices, without necessitating a VPN connection. Note the prerequisites which include device management via Intune or Configuration Manager co-management, user accounts in Azure Active Directory or Hybrid Azure Active Directory Join. You may already meet these requirements for your enterprise systems.

Lee Neely
Lee Neely

This should be enabled by default across all enterprises and systems. Fear of breaking applications is overstated. The risk of unpatched systems is a demonstrable problem.

William Hugh Murray
William Hugh Murray

The Rest of the Week's News


2022-06-04

Atlassian Releases Patches for Critical Confluence Server and Data Center Vulnerability

Atlassian has released fixed to address a vulnerability affecting its Confluence Server and Data Center. The flaw can be exploited by an unauthenticated user to execute arbitrary code. The issue affects all supported versions of Confluence Server and Data Center; the updated versions are 7.4.17, 7.13.7, 7.14.3, 7.15.2, 7.16.4, 7.17.4, and 7.18.1. Customers who access their Confluence sites through an Atlassian.net domain are not affected.

Editor's Note

The flaw dates to Confluence Server and Data Center products version 1.3.0. The long-term fix, if you're continuing to host your Atlassian instance, is to update to the latest long term support release. If you're in a cluster, make sure that you don't forget to update all the nodes. Atlassian is pushing customers towards a hosted solution; after you apply the updates, this would be a good time to have those conversations, to include recording any show-stoppers to avoid re-hashing known issues.

Lee Neely
Lee Neely

2022-06-06

US Draft Legislation Would Create National Data Privacy and Security Framework

US legislators on both the House of Representatives and the Senate have released a discussion draft of legislation described as “a comprehensive national data privacy and data security framework.” The draft bill would designate the Federal Trade Commission (FTC) as regulator for the proposed rules, which would pre-empt some state data privacy and security laws.

Editor's Note

The US Congress has failed to pass federal data privacy laws many times over the past 15 years, so hard to be optimistic that this will actually pass, but some of the thornier issuers (like the preemption issue) have been addressed in this draft. The FTC has a good track record in this area – SANS gave the agency a Difference Makers award back in 2013. If the law passes, the FTC will have a year to establish the new office and define squishy terms such as “reasonably necessary, proportionate, and limited…” The draft also attempts to address social media algorithms, a controversial area.

John Pescatore
John Pescatore

One hopes this time we get something enacted. Getting a common bar at the federal level should help raise the bar across the nation. One thing to keep an eye on is which state laws are preserved/not preempted. Generally, state laws to be preserved include consumer protection, civil rights, student and employee privacy, data breach notification, contract and tort, fraud, theft and identity theft, unauthorized access to electronic devices, and unauthorized use of personal information, cyber stalking, cyber bullying, sexual harassment, etc.

Lee Neely
Lee Neely

2022-06-03

New York’s Right to Repair Bill for Electronics

The New York State legislature has passed an electronics right-to-repair bill. The Fair Repair Act. The bill would require electronics makers to share diagnostic and repair information with consumers and independent repair shops and make software, tools, and part available to them. The governor has not yet signed the bill into law.

Editor's Note

This is a big step forward for local electronics repair shops in New York State, and offers hope for less expensive repair options, rather than wholesale replacement of damaged electronic devices. Once signed into law, there will be a year for implementation. Note the bill applies only to electronics; medical devices, home appliances, agricultural and off-road equipment, public safety communication equipment or motor vehicles are not subject to the bill.

Lee Neely
Lee Neely

Note that for most enterprises, repairing mobile devices yourself will be significantly more expensive than even what Apple charges, but this may help drive repair prices down in the long run.

John Pescatore
John Pescatore

2022-06-03

Security Flaws in BD Synapsis, BD Pyxis, and Illumina Medical Devices

The US Cybersecurity and Infrastructure Security Agency (CISA) and the Food and Drug Administration (FDA) have warned of security vulnerabilities in several medical devices. Flaws in BD Pyxis automated medication dispensing systems could be exploited to gain access to protected health information (PHI). A vulnerability in the BD Synapsis microbiology informatics software platform could be exploited to modify data, which could result in incorrect or delayed treatment. A handful of vulnerabilities in Illumina in-vitro diagnostic devices and research use only instruments could be exploited to take control of unpatched devices.

Editor's Note

Illumina has released a patch that protects against remote exploitation as a stopgap until the permanent fix can be released, BD is releasing Synapsis v4.20 SR2 later this month to address the weakness. BD Pyxis is working to remove hard coded credentials and is piloting a credential management solution as a long-term fix. In the interim, you're going to want to make sure the devices are properly segmented only allowing connections for authorized devices and users.

Lee Neely
Lee Neely

2022-06-06

Palermo, Italy Suffers Cyberattack

Computer systems belonging to the city of Palermo, Italy were targeted in a cyberattack late last week. Palermo has a population of 1.3 million and is also a popular destination for tourists. As of Monday morning (June 6), all public services, websites, and portals are offline.

Editor's Note

Details are sparse, actions taken align with a ransomware versus DDoS attack. Some services are operating with fax rather than digital communication mechanisms. The city has engaged an IT service restoration company, SISPI, which is also helping to coordinate updates as well as service restoration.

Lee Neely
Lee Neely

Internet Storm Center Tech Corner

Sandbox Evasion... With Just a Filename!

https://isc.sans.edu/forums/diary/Sandbox+Evasion+With+Just+a+Filename/28708/


MS-MSDT RTF Maldocs Analysis oledump Plugins

https://isc.sans.edu/forums/diary/msmsdt+RTF+Maldoc+Analysis+oledump+Plugins/28718/


Clickstudio (Passwordstate) Code Signing Cert Used by Follina Malware

https://clickstudios.com.au/advisories/Incident_Management_Advisory-03-20220607.pdf


Cybercriminals Exploit Reverse Tunnel Services and URL Shorteners

https://cloudsek.com/whitepapers_reports/cybercriminals-exploit-reverse-tunnel-services-and-url-shorteners-to-launch-large-scale-phishing-campaigns/


Unpatched Horde Webmail Bug

https://blog.sonarsource.com/horde-webmail-rce-via-email/


Atlassian Exploit Released

https://www.rapid7.com/blog/post/2022/06/02/active-exploitation-of-confluence-cve-2022-26134/


GitLab Critical Security Release

https://about.gitlab.com/releases/2022/06/01/critical-security-release-gitlab-15-0-1-released/


U-Boot Vulnerabilities

https://research.nccgroup.com/2022/06/03/technical-advisory-multiple-vulnerabilities-in-u-boot-cve-2022-30790-cve-2022-30552/


Unisoc Baseband Chip Vulnerability

https://research.checkpoint.com/2022/vulnerability-within-the-unisoc-baseband/