SANS NewsBites

Focus on Reducing Time to Detect to Lower Ransomware Impact; CircleCI Incident Highlights Need to Harden All CI/CD Pipeline Credentials and Access; It Is Long Past Time to Sunset Windows Server 2012

January 6, 2023  |  Volume XXV - Issue #02

Top of the News


2023-01-03

Rail Technology Company Wabtec Suffers Apparent Ransomware Attack

In June 2022, rail technology company Wabtec learned of suspicious activity on its network and following an investigation, learned that intruders had managed to install malware on the company’s systems in mid-March 2022. Wabtec determined that sensitive data, including non-US national ID numbers, non-US social insurance numbers or fiscal codes, passport numbers, medical record/health insurance information, and biometric information, were compromised; the company began notifying affected customers in late December 2022.

Editor's Note

Falling victim to a ransomware attack given its pervasive use over the last few years is one thing. Only beginning to notify affected customers six months later is something entirely different. Wabtec customers should have been notified faster. The lesson to learn, as has been reported in other NewsBites, is to have a response plan in place and regularly tested.

Curtis Dukes
Curtis Dukes

LockBit strikes again. Dwell time continues to be a challenge: in this case the attackers had about 100 days between the compromise in March and breach June 26th. This would be a good time to review your detection capabilities to see if you could respond any more quickly. While Wabtec is not offering credit monitoring, their notification includes good information on data protection, fraud reporting and credit freeze for US, UK, Canada and Brazilian customers, with relevant sections in English, Portuguese and French. Something to file away if you find yourself in a similar situation. While it seems like a long time between the breach and notification to affected customers, it wasn't until late November that the investigation determined the personal information was included in the breached data. Additionally, law enforcement involvement, in this case the FBI, may have also put some constraints on disclosing information while the investigation was ongoing.

Lee Neely
Lee Neely

2023-01-05

CircleCI Urges Users to Rotate Secrets Following Security Incident

DevOps platform CircleCI is investigating a security incident. The company is urging its users to rotate all secrets that are stored in CircleCI, and to review internal logs to check for unauthorized access between December 21, 2022 and January 4, 2023. CircleCI has also invalidated Project API tokens as a precaution; users will need to replace those as well.

Editor's Note

This is probably the most severe breach out of the recent set of breaches. Continuous integration tools must have access to credentials to do their job and need to store them in an accessible format. Your best bet is to limit the capabilities of these credentials, and to regularly rotate them. Rotate them not because they are leaked, but to make sure you are able to rotate them in case they are leaked. And remember the first rule of cloud security: All data in the cloud will eventually leak. Be ready for when it happens.

Johannes Ullrich
Johannes Ullrich

When you get to the end of the list of "What you should continue to do now" on the CircleCI alert, continue down to the "Additional security recommendations" to raise the bar even higher for your build (CI) process.

Lee Neely
Lee Neely

2023-01-04

Windows Server 2012 Extended Support will End in October

Extended support for Windows Server 2012 and Windows Server 2012 R2 will end in early October of this year. Microsoft discontinued general support for Windows Server 2012 in October 2018; the company offered five years of extended support to allow users ample time to migrate to newer, supported versions of Windows Server.

Editor's Note

Keep track of the end of live / end of support of critical software and hardware, and create life cycle management to anticipate it. In January, Windows 8.1 will reach end of support, and Windows 7 will reach the end of the extended security support. InFebruary, Google Chrome will stop supporting any Windows version prior to Windows 10. At this point, you really should only have Windows 10 or Windows 11 running on Windows workstations.

Johannes Ullrich
Johannes Ullrich

The good news is that Windows Server 2012 market share seems to be in the .5% range, the bad news is that still means more than 2,000 businesses have it running somewhere. Paying for extended support for 10-year-old versions of operating systems is always going to be more expensive than migrating to current supported version.

John Pescatore
John Pescatore

With the possible exception of OT systems, you should be well off Server 2012, ideally finalizing your standard configuration for server 2022 and working to replace Server 2016. Yes, you can get extended security updates as far out as October 2026 and ask yourself should you be running an OS released October of 2012, in October 2026. Not just for security challenges over that 14-year period, but also changes in technology which are not going to be available on that platform.

Lee Neely
Lee Neely

Of the roughly 2000 such systems, one wonders how many are actually paying for extended support and how many are running naked.

William Hugh Murray
William Hugh Murray

The Rest of the Week's News


2023-01-05

Frameworks for Addressing Satellite Cybersecurity

Two recently-released cybersecurity frameworks address cybersecurity issues faced by the ground control systems and the space-based infrastructure of the space sector. New guidance from the US National Institute of Standards and Technology (NIST), “applies the NIST Cybersecurity Framework to the ground segment of space operations with an emphasis on the command and control of satellite buses and payloads.” The Space Attack Research & Tactic Analysis (SPARTA) framework “is intended to provide unclassified information to space professionals about how spacecraft may be compromised via cyber means.”

Editor's Note

This is intended as guidance, not a regulatory requirement, to raise the bar on the security of the ground-based components of satellite systems. They start with the basics: know what hardware you have, know what software is running, know what it is connected to and what your information protection requirements are. Each of the sections of the CSF (Identify, Protect, Detect, Respond and Recover) include sub-categories you should review, including applicability and references to identify gaps or things you may not have considered.

Lee Neely
Lee Neely

Since the NIST profile applies to ground segments of satellite systems, the guidance in NIST IR 8401 is pretty much the same as any guidance for any computer system. The key phrase in it is “Traditionally, ground segment isolation was accomplished through air gapping or limited connections. Increasingly, isolation is being accomplished via accounts, tenant isolation, and identities when using third-party services.” If you run, or are paying for, ground systems for satellite systems that are still claiming to be air gapped and no external connections, big red flags should be flapping.

John Pescatore
John Pescatore

Satellites and the ground stations that control them use the same IT and communication technologies found in other critical infrastructure. The threat is really about who can access the ground station, directly or via remote means. Not surprisingly, the same set of basic security safeguards need to be employed to protect this critical infrastructure.

Curtis Dukes
Curtis Dukes

2023-01-04

The Guardian is Still Working to Recover From Cyber Incident

UK news publication The Guardian is still working to recover from a “serious network disruption” due to what is likely a ransomware attack that began on December 21. Two weeks after the fact, employees are being told to continue to work from home.

Editor's Note

Traditionally, like satellite ground systems, publishers often relied on air-gap separation between “research” networks like the internet and business critical publishing systems. Too often, even after all the pandemic work at home changes, publishing companies are still relying on isolation that no longer exists. Using NIST IR 8401 as a starting point, block-replacing “satellite ground control segment” with “your name here” would be a decent starting point.

John Pescatore
John Pescatore

Ransomware gangs didn't take a holiday break, and if anything, are upping their game. Take a pause and make sure that your response plan is still good to go, and as the workforce dynamic of local and home workers continues to evolve, make sure services you planned to rely on during a disruption are still in place, e.g., increased VPN capacity at the height of the pandemic, incorporating any lifecycle activities into your planning.

Lee Neely
Lee Neely

2023-01-03

New Jersey Hospital Discloses Cyber Incident

CentraState Medical Center in New Jersey is operating under electronic health record (EHR) downtime following a cybersecurity incident that began last month. The medical center is also sending patients to other hospitals in the area due to the IT disruptions.

Editor's Note

Despite LockBit's actions, hospitals and medical remain top targets for attackers. Even so, don't assume those not in that sector aren't also targets, assume you are and plan accordingly. There are a lot of lessons learned from the medical sector on how they are minimizing impact to their customers as well as leveraging partners in a crisis. Consider hosting their CISO or Incident Responders to tell their story to your staff, board or even cyber association meetings.

Lee Neely
Lee Neely

Whether this turns out to be a ransomware attack or as described, IT security failure, it underlines the importance of response and recovery functions. These functions should be regularly exercised, to include public communication by the executive leadership team.

Curtis Dukes
Curtis Dukes

Healthcare, more specifically hospitals, continue to be a favorite target of extortion attacks. Not only is patient care impacted but valuable clinical information will never be digitized. Consider proactively disconnecting from public networks unless and until patient care systems can be isolated from those that face the public networks. Patient care applications and systems that use the public networks must be encrypted end-to-end at the application layer.

William Hugh Murray
William Hugh Murray

2023-01-04

Cloud-based Records Management Service Discloses Cyberattack

Cloud-based digital records management company Cott Systems has notified customers that it suffered an “organized cyberattack” in late December. Cott disconnected its servers to isolate the infection. As a result, many local governments across the US have been forced to turn to manual processes for birth certificates, marriage licenses, and real estate transactions.

Editor's Note

This is impacting services in 21 states, who are fortunately able to revert to manual methods. While 93% of their infrastructure has been fixed, Cott Systems is still holding their service resumption date close, most likely as they want to be sure that prevent recurrence and know that recently breached companies are at the head of the line for attackers. Note to self - don't just address the discovered attack vector, look for, and address, other weaknesses.

Lee Neely
Lee Neely

The use of the term ‘organized cyberattack’ makes it sound as if the records management company had no way of protecting itself. Wouldn’t you say that all ransomware gangs are organized in their conduct of a cyberattack? Unless the attacker used a zero-day exploit, then security safeguards specified in best practice guidance like the Blueprint for Ransomware Defense are more than sufficient to protect against attack.

Curtis Dukes
Curtis Dukes

2023-01-05

Rackspace Says Attack was the Work of Play Ransomware Group

Managed cloud hosting provider Rackspace says that the December 2, 2022 attack that took down its hosted Microsoft Exchange service was conducted by the Play ransomware group. Rackspace is still working to recover email data. In a January 5, 2023 update, Rackspace explicitly states that the incident was not due to the ProxyNotShell exploit, as was being reported. Instead, the Play ransomware group used a zero-day vulnerability to gain access to the Rackspace Hosted Exchange email environment. Rackspace also writes that it does not plan to rebuild its hosted Microsoft Exchange service.

Editor's Note

If you were using Rackspace hosted Exchange, recovered email (in the form of a PST file) will only be available for 30 days. Also note they have only recovered about 50% of their mailboxes so far. This raises the question of what do you do if your service provider decides to no longer offer your service? Do you have a data retrieval (recovery)/migration strategy? Do you have a sense of how long it would take you to qualify, secure and configure a replacement service? How often are you checking the health of your service providers? Nothing against Rackspace here, it's due diligence. It wasn't so long ago we learned the irony of "too big to fail."

Lee Neely
Lee Neely

2023-01-03

Shadowserver: More than 60,000 Exchange Servers Still Vulnerable to ProxyNotShell

According to data gathered by the Shadowserver Foundation, more than 60,000 Microsoft Exchange servers remain unpatched against a known remote code execution vulnerability (CVE-2022-41082) that is exploited by ProxyNotShell. Microsoft released fixes to address that flaw and a second vulnerability that is also exploited by ProxyNotShell, in November 2022. The flaws affect Exchange Server 2013, 2016, and 2019.

Editor's Note

The work of keeping your in-house exchange services secure shows no sign of dropping off. In 2023, I'd be hard pressed to argue there are not hosted alternative email solutions which are viable and secure. Take a look at in-sourced services and make sure that you're not replicating commodity or commonly available services which are taking resources away from achievement of mission objectives.

Lee Neely
Lee Neely

While the reporting is troubling that such a large number of servers remain unpatched, I can’t say it is surprising. The EternalBlue exploit has been in the wild for five years, yet servers still remain vulnerable. Bottom line: if it’s a remote code execution vulnerability, it’s a must to elevate its priority in patching.

Curtis Dukes
Curtis Dukes

2023-01-05

WhatsApp Proxy Support Will Help Circumvent Censorship

WhatsApp has launched a new feature that will allow people in countries where the government has blocked service to the app to connect via proxy servers. The feature is available on the most recent versions of the app. It also allows users to set up proxy servers to help others connect to WhatsApp.

Editor's Note

Like using a VPN to circumvent restrictions, this too is a cat-and-mouse game. Expect countries to discover and block these proxy servers over time. Be kind: these proxies are being installed by volunteers. Note that these will slow communications, particularly file transfers, but least these will work.

Lee Neely
Lee Neely

2023-01-04

US 2023 Spending Bill Includes Medical Device Cybersecurity Requirements

For the first time there is legislation in the US that requires medical device manufacturers to address the devices’ cybersecurity. The Consolidated Appropriations Act of 2023, which was signed into law in late December, includes provisions requiring medical device manufacturers to document that their products can be updated and patched and to provide a software bill of materials for the devices.

Editor's Note

While this is good news, it only applies to new devices and FDA has only received $5M to fund development of policy, procedures and enforcement efforts. There are almost 1,000 medical device manufacturers in the US alone – $5M is literally less than 1 week’s worth of direct to consumer marketing spending by the medical appliance and equipment sector in the US.

John Pescatore
John Pescatore

This moves the security of medical devices from desired to required by statute. The FDA has 180 days to issue premarket guidance for FDA staff and the device industry as well as publish a report identifying challenges in implementing cybersecurity for current and legacy devices within one year." This is a huge step in the right direction and expect it will be summer or fall before we see medical devices which align with these requirements.

Lee Neely
Lee Neely

Requiring device manufacturers to demonstrate ability to patch and update their products is a sufficiently low security bar for them to meet. The importance of product patching can’t be overstated. Over time let’s hope that device manufacturers include additional security safeguards.

Curtis Dukes
Curtis Dukes

Internet Storm Center Tech Corner

More Brazil Malspam Pushing Astaroth (Guildma) in January 2023

https://isc.sans.edu/diary/More+Brazil+malspam+pushing+Astaroth+Guildma+in+January+2023/29404


Update to RTRBK - Diff and File Dates in PowerShell

https://isc.sans.edu/diary/Update+to+RTRBK+Diff+and+File+Dates+in+PowerShell/29400


NTP Fingerprinting

https://isc.sans.edu/diary/Its+about+time+OS+Fingerprinting+using+NTP/29394


CircleCI Breach

https://circleci.com/blog/january-4-2023-security-alert/


Twitter Leak

https://www.bleepingcomputer.com/news/security/200-million-twitter-users-email-addresses-allegedly-leaked-online/


Slack Source Code Leak

https://slack.com/blog/news/slack-security-update


Control Web Panel Patch CVE-2022-44877

https://github.com/numanturle/CVE-2022-44877


Turla: A Galaxy of Opportunity

https://www.mandiant.com/resources/blog/turla-galaxy-opportunity


SHC used to compile cryptominer malware

https://asec.ahnlab.com/en/45182/


Google Chrome Sunsetting Legacy Windows Support

https://support.google.com/chrome/thread/185534985/sunsetting-support-for-windows-7-8-8-1-in-early-2023?hl=en


ManageEngine Password Manager Pro SQL Injection

https://pitstop.manageengine.com/portal/en/community/topic/manageengine-security-advisory—important-security-fix-released-for-manageengine-password-manager-pro-2-1-2023


FortiADC Command Injection in Web Interface

https://www.fortiguard.com/psirt/FG-IR-22-061


Raspberry Robin Developments

https://www.securityjoes.com/post/raspberry-robin-detected-itw-targeting-insurance-financial-institutes-in-europe


Misc Car Vulnerabilities

https://samcurry.net/web-hackers-vs-the-auto-industry/


Flipper Zero Phishing

https://twitter.com/AlvieriD/status/1609945425871609858


Trend Micro Patch

https://helpcenter.trendmicro.com/en-us/article/TMKA-11252


Packet Tuesday: IP Options

https://www.youtube.com/watch?v=HldNL3SLLwM