SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact UsIn December, Auth0 released an updated version of JsonWebToken open source library to address a remote code execution vulnerability. The flaw was detected by researchers at Palo Alto Networks Unit 42; they reported the issue to Auth0 in July. Users are urged to update to JsonWebToken version 9.0.0 or newer.
Interesting vulnerability, in particular as the library is very popular. However, I don't see a clear way to exploit this vulnerability to gain the claimed code execution. There are quite a few dependencies to make this work. So, in other words: Not an emergency, but get this patched before someone more creative in exploit writing figures out a way to exploit this.
JsonWebToken is a open source Javascript package that allows you to verify/sign JWTs, which are mostly used for authorization/authentication. In that context, getting the crypto right is critical. Specific to CVE-2022-23529, lack of data validation of the data type for the secrretOrPublicKey input, which is fixed in version 9.0.0. Two actions here: first, update to the newer version; second, take this to your developers to underscore the importance of input validation (and yes, I've been the guy who incorrectly stated "they would never do that" about data passed to my app....)
This is another example that calling something “cryptography-based” is easy, safely implementing cryptographic and key/secret management functions is NOT easy. This is especially true for efforts like JWT to implement using “URL-safe parts” in order to work in a browser/server through multiple firewalls path. Take special precautions anytime you are an early adopter of security approaches that claim to work in “constrained environments.”
Not "patched!" There is a gap between the availability and the application of patches. While necessary, availability is only part of a solution.
Unit 42
GitHub
NPMJS
Dark Reading
Bleeping Computer
Researchers have detected security bugs affecting vehicles from 16 companies in the automotive industry. The flaws could be exploited to lock and unlock cars, to start and stop engines, take over accounts, execute code remotely, and track the location of vehicles, and conduct other troublesome activity.
This write-up reads like car makers (or the app developers they hire) trying to play OAWASP Bingo by hitting all the OWASP Top 10 in their apps. Just because your app is new and cool doesn't mean you can forget about the basics.
A common thread here is customer service sites using weak single sign on implementations to make it easier for customers to access services via apps and web browsers. But really, you can find pretty much every one of the OWASP Top 10 vulnerabilities being found in just this one effort. Very obvious that no meaningful security testing has been done on many of the automotive sites before opening them to the public. If you work for an automotive company, use this to drive immediate attention to customer facing sites and apps. If you own one of those vehicles, if you have to use those apps at least use a unique password to reduce impact of an inevitable breach.
Back when we just had to worry about static vs. rolling code capture to impersonate the key-fob, this was less of a deal. Now that we have network connections, mobile apps, ties to services operated by the manufacturer, the cliche of the weakest link is in play. As consumers expect de-facto remote access/control of their vehicles, manufacturers are rolling out products faster than they can secure them. This is a case of compromise of the applications and infrastructure which can access the vehicle as opposed to compromising the vehicle itself, with attacks leveraging SQLi, flawed SSO, CMS issues and even scrutinizing publicly reachable code repositories. Note that the discovered flaws have been patched. Takeaway for you: make sure that you are checking externally produced components (such as an API interface) to make sure it's secure, address identified flaws immediately.
As manufacturers use more and more software in auto designs, the need for developers with a background in secure software development increases dramatically. Currently, that is a commodity in short supply, so they do the next best thing: leverage existing functionality across the industry. Software from third party suppliers has to be fully tested, as would in-house developed code. The outcome of this research is that secure software design and testing will become an increasingly important part of the automotive manufacturing process.
Sam Curry
Vice
Cyberscoop
Amazon Simple Storage Service (Amazon S3) now encrypts all new buckets by default. S3 will apply server-side encryption for all new objects unless users specify otherwise. Users can currently choose between three encryption options: S3 default encryption (SSE-S3, the new default), customer-provided encryption keys (SSE-C), or AWS Key Management Service keys (SSE-KMS).
Nice move by Amazon. Compare this to full disk encryption on a laptop: It helps if the laptop gets stolen, but doesn't help if someone can guess your password. You still need to be careful who has access to your data. Client-side encryption should be preferred (and AWS has great tools for that), but it is more work, so only do it to customer data if you care about customer privacy.
The “crypto done right, good; crypto done poorly, bad” thread is pretty obvious in this issue of NewsBites. Amazon makes it easy but not trivial to do S3 stored data encryption right. Once you get it (and “it” includes authentication) right for new storage, you can also retroactively encrypt previously stored data.
Cloud services have made it increasingly easy to encrypt everything at rest, don't pass go, select your key management option, and enable it. You can verify the encryption status in the AWS CloudTrail event logs, and soon you'll have more information in other tools like the AWS Management Console, AWS S3 Inventory, etc. Best of all, there is no added cost for the default encryption on S3.
An easy change that will have dramatic cybersecurity results – moving from opt-in to opt-out by default results in encrypted S3 buckets. This change has the added benefit of automating one of the compliance checks required by cybersecurity audits.
A decryptor for the MegaCortex ransomware is now available. The tool was developed as a joint effort by Europol, Bitdefender, the NoMoreRansom Project, the Zürich Public Prosecutor's Office, and the Zürich Cantonal Police. Bitdefender has also published a tutorial for using the decryptor.
This is a cool free tool, can run from wherever you drop it, no install required, and even has email support and instructions (see the No More Ransom link below.) BitDefender's decryptor will handle data encrypted by "LockerGoga" or "MegaCortex." It has options to scan a system automatically and make a backup of the encrypted files in case something goes wrong. If you have encrypted files that didn't previously decrypt properly, you could try again with this tool, assuming you've not already recreated the contents.
While certainly good news for some victims, it isn’t the long-term solution. As we have come to expect, criminal gangs will modify their ransomware in future releases to continue to exploit victims. The real solution has to focus on the root cause of successful ransomware attacks – human error, coupled with lack of configuration and patch management. The recently published ‘Blueprint for Ransomware Defense’ can serve as an action plan for ransomware mitigation, response, and recovery.
These ransomware decryptors are nice stop gaps, but let's be honest: this isn't a full solution for every piece of ransomware. It will eliminate one specific variant of the problem, and help shut this one down, but if there is a badly written software package the authors will learn and adjust. We really need to go back to basics to solve this problem which is the ugly truth.
Well done to all involved in this research and a reminder to those that become victims of ransomware that it may be worth retaining an infected device(s) as a decryptor tool may become available at a later date.
Lessons for the rest of us: Cryptography is harder than it looks. --Bruce Schneier Systems and implementations are at least as hard as codes and ciphers. --Brian Snow
Bleeping Computer
The Register
No More Ransom
The US Federal Communications Commission (FCC) is seeking “to strengthen the Commission's rules for notifying customers and federal law enforcement of breaches of customer proprietary network information.” According to the notice of proposed rulemaking, telecommunications companies would be required to report breaches to law enforcement and customers as soon as the breaches are detected. In addition, inadvertent customer data exposure would also be deemed a breach.
The FCC regulatory efforts have long lagged behind advances in technology and threats. These issues were last addressed by the FCC in 2007 and this is just the first step in gathering feedback on proposed changes in breach reporting requirements and doesn’t even address more important issues like stopping cell phone number spoofing or “pretexting.”
This is the second of recent actions by the FCC to establish cybersecurity obligations on US telecommunication providers. The first NPRM, which recently concluded its initial comment period, deals with wireless emergency alerts and establishes a minimum set of cybersecurity requirements. This NPRM seeks to update data breach reporting requirements. It’s my opinion that both form the basis for a set of cybersecurity and reporting requirements that are easily achievable by all telecommunication providers.
In today’s environment, a mandatory seven-day waiting period before customer notification is too long. Your customers need as early a warning as possible once you've confirmed their data has been breached. The proposed change also includes required reporting top the FCC, FBI and U.S. Secret service, for breaches that meet the criteria of being reportable. The proposed rulemaking comment period goes for 30 days after, with replies due in 60 days.
This measure is so obvious that it should hardly require regulation. However, one may well prefer late and a light touch to early and heavy handed. That said, telecoms are infrastructure; safety regulation of infrastructure may not be essential, but it is a legitimate and useful role of government.
FCC
Bleeping Computer
Security Week
Cyberscoop
Gov Infosecurity
In November 2022, OpenAI released an interface for its large language module known as ChatGPT. In a recent blog post, researchers at Check Point write that people on cybercrime forums have begun using ChatGPT to help them develop malware.
As with many tools, ChatGPT is neither good nor evil. In fact, OpenAI has terms of service which prohibit the use of its technology for illegal or harmful activities. The issue is that while it was expected that ChatGPT could be leveraged to develop malware, it was not expected how rapidly that would happen. The new malware is more convincing/realistic, making it harder to detect. Now we need our defenders (technology and human) to up their game a bit more rapidly than we would have otherwise expected.
We are not ready as a society for the implications of this technology. The current version of ChatGPT is one that currently provides specific answers to questions based on predictive M/L. It's gotten to the point where we can use it somewhat to solve software challenges. What's really going to be interesting is that this isn't the final version this is only the first version we have publicly seen. It's currently learning from our prompts. Maybe the silver lining is that defenders can use it to you also come up with solutions based on ChatGPT.
While this is interesting research, it highlights only one small part in the whole infrastructure that criminals need to manage and operate in order to support malware campaigns. Whether the malware is written by humans or an AI there is still a lot of work required by criminals to distribute and support that malware which hopefully also gives time for security researchers to identify counter measures against that malware.
Check Point
Ars Technica
ZDNet
SC Magazine
Dark Reading
Gov Infosecurity
The American Farm Bureau Federation (AFBF) and agricultural machinery maker John Deere have signed a Memorandum of Understanding that will allow owners of John Deere equipment to repair their own machines or have them repaired by independent third-parties. AFBF’s president said that the memorandum “ensur[es] farmers and independent repair facilities [will] have access to many of the tools and software needed.”
This is huge. These are very expensive machines, and when needed, they are needed, often running 24x7 during peak seasons. As such, they need to be able to be repaired without waiting for a factory representative to be sent, let alone trying to purchase a replacement or borrow from a neighbor with as much need and time crunch as you have. This should also encourage in-field changes to help them better suit the needs in “the field.” Often these innovations/modifications (hacks) make their way back to mainstream production when discovered in the field. That said, be sure you know what you're doing before offering to alter a $1M combine.
Deere's policies have been a prime public example of those that have motivated the "right to repair" initiatives. The threat of legal redress may have been essential to this agreement. That said, such specific agreements may be preferable to broad legislation.
The US Cybersecurity and Infrastructure Security Agency (CISA) has published three Industrial Control System (ICS) advisories regarding vulnerabilities in Hitachi Energy products. The flaws affect Hitachi Energy UNEM, Hitachi Energy FOXMAN-UN, and Hitachi Energy Lumada Asset Performance Management. Hitachi has addressed the vulnerabilities and urges users to update to the most current versions.
Hitachi released the updates in December, and with the holidays you probably haven't had a chance to deploy them. Ok, let’s go. Also make sure that you're limiting access to your control systems, monitoring for malicious activity, and for real, DO NOT expose them to the Internet. Have a conversation with your team about what their update cadence is, how they monitor for issues like this, and how access restrictions can be implemented while continuing to meet mission and service expectations. Don't forget to ask what security model they are using; you may be surprised.
Security Week
Hitachi Energy
CISA
CISA
CISA
MedStar Mobile Healthcare, which provides ambulance services to 15 cities in Tarrant County, Texas, has disclosed a data breach. The incident affected sensitive health data for some of the organization’s patients. The breach affects as many as 612,000 people. The incident occurred in October 2022; MedStar reported to the US Department of Health and Human Services Office for Civil Rights (HHS OCR) in December.
MedStar jumped on this and locked things down, to stop the attack and prevent recurrence. What they have not yet determined is what, if any, data was exfiltrated. As such, they haven't notified customers of any impact. If you're a MedStar customer, and worried, you can take steps to lock down your credit and purchase credit monitoring, and given the current breach climate, it's not a bad idea to have this in place regardless of being impacted. By the way, once you have monitoring in place, don't ignore the alerts: you're going to want to learn what they mean and what you can and cannot do in response.
Medstar911
Gov Infosecurity
OCR Portal
The Federal Energy Regulatory Commission (FERC) has ordered the North American Electric Reliability Corporation (NERC) to evaluate current power grid physical security guidelines and develop a report from the findings. The order follows a series of physical attacks on electrical substations in December that left 45,000 people without power for days.
This is focused on physical security and monitoring of that security. Physical security can be hard, no pun intended, when you learn about not only bypass scenarios, but also common shortcuts such as using a standard lock plate which prevents lock plunger security from properly engaging or motion/heat sensing door releases which are placed so they can be bypassed from the outside. If you've not had a physical pen-test recently, it's not a bad idea to validate your assumptions. Don't roll your eyes at bypass options, instead look at how they can be mitigated and where your greatest risks lie.
Recent attacks on electrical substations in both NC and WA serve only to highlight the need for such a review. While the focus rightfully is on the physical security of substations, a review of cybersecurity guidelines should also be conducted. Increasingly we find that OT systems are being connected with IT systems creating a pathway for adversary access.
Is it too early to conclude from the experience in Ukraine that the power grid might be more resistant to attack from the network than to kinetic attack?
While conducting tests for a report on password management with US Department of Interior (DoI) systems, DoI Office of Inspector General (OIG) staff were able to crack 16 percent of DoI passwords within an hour-and-a-half. According to the DoI OIG report, five percent of active credentials within the department’s network used the word “password.” The report also notes that DoI has not consistently implemented multi-factor authentication.
In 2019, SANS recognized Jefferson Gilkeson, Director of Information Technology Audit, U.S. Department of the Interior, with a SANS Difference Makers award and it is good to see DoI keeping up the good work in making Office of Inspector General audits include active testing rather than just be data call/review exercises. Not all the results were negative – the audit pointed out that 99% of DoI admin privileged accounts required MFA and the DoI says that is now 100%. Can you make the same claim?
Make sure that you're rolling out/requiring MFA wherever possible. You will likely still have places which still need reusable passwords. Users need all the help you can provide to select good passwords. You need policy, training, and technical measures to help them out. You can get services that integrate with your AD to check passwords against data breach notification; where the checks are made locally, they use a fraction of the password hash to collect possible matches from their database. Also, tools exist to help us configure password rules to modern (NIST 800-63-3) guidance. Trade-off long passphrases, which only have to be changed when breached, with shorter (weaker) passwords which require frequent update.
Nextgov
Fedscoop
DOIOIG
New Year, Old Tricks: Hunting for CircleCI Configuration Files
https://isc.sans.edu/diary/New+year+old+tricks+Hunting+for+CircleCI+configuration+files/29416
Reversing AutoIT Scripts
https://isc.sans.edu/diary/AutoIT+Remains+Popular+in+the+Malware+Landscape/29408
Amazon S3 Encrypts New Objects By Default
https://aws.amazon.com/blogs/aws/amazon-s3-encrypts-new-objects-by-default/
MatrixSSL Buffer Overflow
https://github.com/matrixssl/matrixssl/security/advisories/GHSA-fmwc-gwc5-2g29
Auth0 JsonWebToken Vulnerability CVE-2022-23529
https://unit42.paloaltonetworks.com/jsonwebtoken-vulnerability-cve-2022-23529/
Can You Trust Your VSCode Extensions
https://blog.aquasec.com/can-you-trust-your-vscode-extensions
A Deep Dive Into poweRAT
https://blog.phylum.io/a-deep-dive-into-powerat-a-newly-discovered-stealer/rat-combo-polluting-pypi
Catch up on recent editions of NewsBites or browse our full archive of expert-curated cybersecurity news.
Browse ArchiveThe state of software supply chain security report: Top takeaways for development and SOC teams.
Tune in on January 17th at 10:30am ET for Zero Trust – Securing Your Business Applications’ Connectivity Within and Beyond the Perimeter | Register now: https://www.sans.org/info/224950
Join us on January 19th at 1:00pm ET for Finding Dangerous Hardcoded Secrets You Don’t Know Exist in Your SDLC | Register now: https://www.sans.org/info/224955
Join John Pescatore on February 9th at 1:00pm ET for What Works in Improving End User Phishing Awareness, Recognition and Resistance | Register now: https://www.sans.org/info/224960