SANS NewsBites

Patch Microsoft Exchange On-Premises Servers Faster or Change to Something Else; Update OpenEMR to Eliminate Vulnerabilities; The Surprise is That This Batch of BIND Vulnerabilities Only Enable DoS

January 31, 2023  |  Volume XXV - Issue #09

Top of the News


2023-01-31

CIS Establishes the Alan Paller Laureate Program

SANS founder Alan Paller, who passed away in November 2021, was also a co-founder and longtime board member of the Center for Internet Security. As part of SANS commitment to “fighting the good security fight,” Alan recognized early on that community efforts like the CIS Security Benchmarks and later the Critical Security Controls were tremendously powerful and valuable.

To honor Alan’s memory, CIS has established the Alan Paller Laureate Program. The Alan Paller Laureate Program will award up to $250,000 annually to eligible organizations, academic institutions, or individuals whose active efforts are making cybersecurity controls demonstrably more effective, simpler, and more automated; showing proven results in developing and equipping highly skilled cyber experts; or improving the teaching of cyber defense at any level. The funds may only be used to enable technical efforts, not overhead or administrative tasks.

Full details on applying to the Alan Paller Laureate Program can be found at

https://www.cisecurity.org/about-us/alan-paller-laureate-program


2023-01-30

Microsoft Urges Organizations to Patch On-Premises Exchange Servers

Microsoft is warning customers that “attackers looking to exploit unpatched Exchange servers are not going to go away” and exhorting them to apply the most recent Cumulative Update and Security Update for Exchange server. The post also notes that users should  “occasionally perform manual tasks to harden the environment, such as enabling Extended Protection and enabling certificate signing of PowerShell serialization payloads.”

Editor's Note

As recent breaches have shown, mitigations are just buying you (a little bit) of time. Patch early, patch often is your best bet if you insist on running Exchange on premise.

Johannes Ullrich
Johannes Ullrich

One reason “attackers looking to exploit unpatched Exchange servers are not going to go away” is that there is a never ended stream of serious vulnerabilities in Microsoft Exchange software! For some enterprises, switching to Google Workspace or Zoho might be feasible, but for many who just can’t keep up with patching demands, moving to cloud-based or hosted/managed Exchange is way better than doing nothing.

John Pescatore
John Pescatore

Yes, this threat isn't going away. Make sure that you are doing three things: First, patch your exchange servers rigorously, whether or not they are Internet accessible. Second, make sure they are hardened to the current guidelines. Require justification for settings which differ. Third, make sure that you are actively hunting for IOCs relating to exploitation. You know I'm going to say this: move to hosted email, if not MS 365, another solution allowing you to focus more on the security of mission specific systems.

Lee Neely
Lee Neely

Microsoft’s advice focuses on three critical security controls: data protection [know where your sensitive data resides], secure configuration [harden the operating system to a known standard], and vulnerability management [scan and patch vulnerable systems]. Each of these controls is core to an effective cyber defense program. Be warned, it costs the adversary very little in time and money to target vulnerable servers.

Curtis Dukes
Curtis Dukes

2023-01-30

Update Available to Fix OpenEMR Vulnerabilities

Researchers from Sonar have detailed three vulnerabilities in the open-source health record and medical practice management software OpenEMR. The flaws – an unauthenticated file read, authenticated local file inclusion, and authenticated reflected XSS – could be exploited to execute arbitrary system commands and steal patient data. All three flaws are fixed in OpenEMR version 7.0.0.

Editor's Note

Chris Patterson, one of our SANS.edu students, did a systematic code review of OpenEMR last year, also finding a few vulnerabilities. His research paper can be found here: https://www.sans.edu/cyber-research/how-secure-is-your-health-information-electronic-medical-record-vulnerability-discovery/

Johannes Ullrich
Johannes Ullrich

The flaws are fixed in OpenEMR 7-0-0-Patch-2. Be sure to cross check the files in the patch as it will overwrite these if you've customized them.

Lee Neely
Lee Neely

2023-01-28

ISC Patches Multiple BIND Vulnerabilities

The Internet Systems Consortium (ISC) has published four advisories to address high severity vulnerabilities in its Berkeley Internet Name Domain (BIND) 9. All of the flaws affect the named BIND9 daemon, which is an authoritative name server and a recursive resolver.

Editor's Note

The fix is to update to the patched version of BIND 9 most closely related to the version. you're running. 9.16.37, 9.18.11 or 9.19.9. If you're not sure talk to your DNS team. While you can set the stale-answer-climate-timeout to 0, off or disabled to mitigate two of the vulnerabilities, to get all three you have to update. If you're still on BIND 9.11, read the alerts carefully to determine your risk.

Lee Neely
Lee Neely

Those of you who had January in the “First critical BIND vulnerability found” 2023 betting pool can collect your winnings! The good news is only denial of service impacts in this batch.

John Pescatore
John Pescatore

The Rest of the Week's News


2023-01-25

Maryland OIG Report on Baltimore County Public Schools Breach

In November 2020, Baltimore County Public Schools disclosed that its network was hit with a ransomware attack. The incident caused the district to cancel classes for two days. A report released last week by the Maryland Office of the Inspector General says that the attack was initiated through a malicious email message in early November 2020. The district’s security contractor “mistakenly opened the email with the attachment using their unsecured BCPS email domain account and not in their secured email domain.”

Editor's Note

Many major incidents involve multiple mistakes – this one is a good example: user falls for phishing, but luckily can’t get malicious attachment to run; user asks Tech Liaison for help, TL thinks attachment looks suspicious, forwards to contractor security staff; contractor mistakenly opens the attachment on an “unsecured BCPS email network” (which doesn’t sound like a good idea to have, no matter what) and infects the network, enabling the ransomware attack to succeed. Great scenario for a tabletop exercise. I hope the Tech Liasion gets promoted!

John Pescatore
John Pescatore

A couple security observations: 1) tools and processes were in place to initially block the malware and they worked [secure configuration]; and, 2) the email with attachment was recognized as suspicious by adjunct IT staff [security awareness training]. Usually, both of these security procedures are enough to defend against a ransomware attack. Unfortunately, the breakdown occurred with the contracted security staff likely not following established procedures for handling suspected malware. A final comment: incident response and data recovery only work if you follow well established backup rules and regularly test the recovery process.

Curtis Dukes
Curtis Dukes

Part of the problem is that findings from earlier assessments were either not addressed, or inadequately implemented. While there are always two sides to a story, make sure that you're clearly documenting why you're not addressing findings from a security assessment, and be doubly cautious about terms like delayed response to malware, as was configured in this case. As email continues to be a huge attack vector, consider carefully allowing access to personal email from corporate systems, possibly restricting that access to sandboxed browsers if at all.

Lee Neely
Lee Neely

2023-01-30

Hackney Council Still is Feeling the Effects of 2020 Ransomware Attack

The October 2020 ransomware that infected the network of Hackney Council in East London has had lasting repercussions. Many of its services, including housing benefits and social care, were unavailable for about a year. While Hackney did not pay the ransom demand, the associated costs to the Council have exceeded £12 million ($14.8 million).

Editor's Note

Think about that: more than two years and they still don't have all their services back. The question is how would you do in their situation? Yeah, you've got the isolated backups, but have you tried restoring key services -- e.g., rebuild AD from those backups? Restore and run a payroll? Open/close the financials? With all the services you've got in the cloud and/or outsourced, do you have a handle on all the ETL/API gateways you're now using? Any critical processes still running on a user workstation? Who can you call for help? Not trying to scare you, just want to make sure you're covering all your bases.

Lee Neely
Lee Neely

This is an important point to reiterate regarding ransomware attacks, the recovery from an attack, whether you pay the ransom or not, can take months if not years. Ransomware really is a case of where the prevention is better than the cure. Europol has excellent guidelines on how to prevent ransomware attacks https://www.nomoreransom.org/en/prevention-advice.html CISA have an excellent guide too at https://www.cisa.gov/stopransomware/ransomware-guide

Brian Honan
Brian Honan

2023-01-27

Firmware Patch is Available for Lexmark Printer Flaw

A critical server-side request forgery (SSRF) vulnerability affecting some Lexmark printers could be exploited to achieve arbitrary code execution. The issue lies in the Web Services feature of more than 120 models of Lexmark printers. A firmware patch to address the flaw is available, and Lexmark suggests disabling Web Services on TCP port 65002 as a work-around.

Editor's Note

Make sure that you, or your printer service company if you've outsourced, are applying the firmware update. If you're not using the WSD Print service (port 65002) then disable it, even after the update. No need to enable unused services.

Lee Neely
Lee Neely

2023-01-30

QNAP Releases Firmware Updates to Address Critical Flaw Affecting QTS and QuTS hero

QNAP has made firmware updates available for a flaw in QTS and QuTS hero that could be exploited to inject malicious code. The vulnerability affects QNAP network attached storage (NAS) devices running QTS 5.0.1 and QuTS hero 5.0.1.

Editor's Note

Just as a quick reminder: Do not expose your network storage to the internet. No matter the brand. If you absolutely must: Maybe a well locked down ssh server. For everything else you got a VPN.

Johannes Ullrich
Johannes Ullrich

This is essentially a SQL Injection flaw. Use the QNAP product support status site to see what the latest update for your device is, if your device is EOL or legacy, it's time to replace it and decommission (not repurpose) the old one. While you're at it, make sure that only intended user accounts and applications are present. Last, but not least, make sure it's not directly exposed to the Internet.

Lee Neely
Lee Neely

2023-01-27

Oracle Cerner EHR Systems at VA, DoD, and Coast Guard Hospitals Suffer Connectivity Issues

Oracle Cerner Electronic Health Record (EHR) Systems at hospitals run by the US Department of Veterans Affairs, the Department of Defense and the Coast Guard experienced problems with connectivity and response time last week. The problems affected all locations that are currently using Oracle Cerner EHR systems. The system has been the focus of criticism on several fronts: a VA OIG report last year said that nearly 150 veterans were harmed during the Oracle Cerner rollout at a center in Washington state; and Fedscoop published data last August that showed the system being partially or completely unusable nearly 500 times between September 2020 and June 2022.

Editor's Note

This is a case of unintended consequences. DoD made changes to their network, which the VA uses, impacting connectivity to the Cerner EHR system. While you cannot entirely prevent your service provider from making impactful changes, you can make sure that you're on distribution for service changes and outage notifications as well as having verified contact and escalation processes for when that need, eventually, arises.

Lee Neely
Lee Neely

2023-01-30

RealTek Jungle SDK Vulnerability

Researchers at Palo Alto Network Unit 42 say that a vulnerability in RealTek Jungle SDK accounted for 40 percent of attacks they reviewed between August and October 2022. In a post, the researchers write, “As of December 2022, we’ve observed 134 million exploit attempts in total leveraging this vulnerability, and about 97% of these attacks occurred after the start of August 2022. At the time of writing, the attack is still ongoing.” The vulnerability in the SDK is the result of several memory corruption flaws and an arbitrary command injection issue. The vulnerability affects nearly 190 devices from more than 60 manufacturers.

Editor's Note

We have an embedded chip vulnerability, which is dependent on updates from your vendor (D-Link, Netgear, LG, Belkin, Zytel, or Asus) for the fix. Make sure that you're running the latest firmware on these devices. Check the firmware version on the vendor's support site against your routers version if you've not seen an update in a while. If you can, use the IOCs to see if you're impacted.

Lee Neely
Lee Neely

The large number of exploit attempts is not surprising given the high CVSS score for this vulnerability. I mean, cybercriminals can read and they see that it’s a RCE vulnerability that affects a large number of manufacturers and devices. The simple solution is to patch the vulnerable device. Until the patch is in place, monitor your network for signs that the device has been compromised.

Curtis Dukes
Curtis Dukes

2023-01-30

GitHub Revokes Stolen Certificates

GitHub will revoke three password-protected code-signing certificates for its Desktop and Atom applications on Thursday of this week. GitHub detected unauthorized access to repositories in early December 2022. The revocation will invalidate certain versions of Desktop and Atom as of February 2. Mac users are urged to update to the latest version of Desktop (2.3.1.5 as of this writing). Atom users will need to downgrade to a previous version of that application.

Editor's Note

This is actually an example of the PKI certificate model working. Encrypted signing certs were exfiltrated, no signs that the encryption passwords were compromised. Revocation is being done purely as a preventative measure, meaning time to do updates using standard processes.

John Pescatore
John Pescatore

Good move from GitHub to revoke these certificates. But remember that you must update GitHub Desktop and Atom this week.

Johannes Ullrich
Johannes Ullrich

The Windows version of Desktop isn't impacted. Read the guidance carefully, you're updating Mac versions of Desktop to the latest, while downgrading your Atom installs to 1.60.0 as 1.63.1 and 1.63.0 will stop working. Have a KB article handy, with download links, for when the calls start coming in on Thursday/Friday (and Monday.)

Lee Neely
Lee Neely

Code signing is an important security protocol to verify that software is authentic and developed by the vendor. The loss of code signing certificates could allow an adversary to create and distribute malicious versions of the software, where end user organizations simply install the update. Revoking the affected code signing certificates is both prudent and necessary to protect end-users.

Curtis Dukes
Curtis Dukes

Certificates are public information about asymmetric key pairs. They cannot be "stolen;" they cannot be used to sign code. Code is signed using the private key of the pair resulting in a certificate, containing the public key, which can then be used to authenticate the code. Revoking a certificate is a statement that, for whatever reason, including compromise of the private key, code associated with the key pair may not be authentic and should not be trusted. Private code-signing keys should not be stored online when not in use.

William Hugh Murray
William Hugh Murray

Internet Storm Center Tech Corner

Decoding DNS over HTTP(s) Requests

https://isc.sans.edu/diary/Decoding+DNS+over+HTTPs+Requests/29488

Action Needed for GitHub Desktop and Atom Users

https://github.blog/2023-01-30-action-needed-for-github-desktop-and-atom-users/

GitHub Checksum Mismatches for .tar.gz Files

https://github.com/orgs/community/discussions/45830

Facebook 2FA Bypass

https://medium.com/pentesternepal/two-factor-authentication-bypass-on-facebook-3f4ac3ea139c

Fortinet Exploit

https://wzt.ac.cn/2022/12/15/CVE-2022-42475/

QNAP Vulnerability

https://www.qnap.com/en/security-advisory/qsa-23-01

Microsoft Tips to Patch Your Exchange Servers

https://techcommunity.microsoft.com/t5/exchange-team-blog/protect-your-exchange-servers/ba-p/3726001

FCC Threatens to Take Action Against Twilio over Robocalls

https://www.fcc.gov/document/fcc-takes-mortgage-scam-robocall-campaign-targeting-homeowners

PlugX Variant Spreads via USB

https://unit42.paloaltonetworks.com/plugx-variants-in-usbs/

Adware in Google Play Store

https://www.bleepingcomputer.com/news/security/shady-reward-apps-on-google-play-amass-20-million-downloads/

Tails 5.9 Update

https://tails.boum.org/news/version_5.9/index.de.html