SANS NewsBites

Court Approves Microsoft/Fortra Taken Down of Cobalt Strike Evil Use; Unplug Nexx WiFi Garage Door Openers; Many Simple Techniques Can Prevent Malware/Pirated Software Downloads

April 7, 2023  |  Volume XXV - Issue #28

Top of the News


2023-04-06

Microsoft, Health-ISAC, and Fortra Aim to Thwart Misuse of Cobalt Strike

Microsoft’s Digital Crimes Unit, the Health Information Sharing and Analysis Center (Health-ISAC), and software company Fortra have obtained a court order allowing them to disrupt the infrastructure of cybercriminals who are using the Cobalt Strike penetration testing tool for nefarious purposes. Specifically, the court order allows the organizations to seize domains associated with criminal activity involving Cobalt Strike, which is a Fortra product.

Editor's Note

On one level, this is a straightforward issue: since criminals are using “attack tools as a service” platforms to reduce their costs/barriers to entry, they make it easier for such legally authorized disruption efforts. But two complexities: (1) Are the laws and process behind legal authorization modern and transparent? and (2) Should all software vendors be expected, or required to do what Microsoft and Fortra are doing to try to stop malicious use of their products? Getting a yes answer to both those questions is going to be tough.

John Pescatore
John Pescatore

This is about choosing good partners to effect a change. It can be frustrating when your tool is used for malfeasance, and getting a court order to back actions needed to respond even harder to obtain. Microsoft has size and reputation/legitimacy, Cobalt Strike is getting a bit of a black eye for it being used nefariously - underscoring the problem, and with all the attacks on the healthcare industry, having the Health-ISAC reinforces the need to take action. One hopes that they can make a dent in the problem, and this is a viable model for others to follow.

Lee Neely
Lee Neely

Almost from the dawn of computing, infrastructure management tools have been used by evil-doers. Today, it’s referred to as living off the land, where adversaries use what’s available to them to enable the attack. Cobalt Strike is but an extension of that concept, where miscreants have manipulated a commercial product for their own purposes. What’s interesting though, is the use of the court to target specific domains where the tools are kept.

Curtis Dukes
Curtis Dukes

We can rely upon the courts to resist over-reach but only if they are consulted. Reference to the courts will offer some protection to those considering such an effort. We can also rely upon the involvement of multiple agencies. In the presence of both of those we should encourage this kind of activity to broadly reduce our collective risk.

William Hugh Murray
William Hugh Murray

2023-04-05

Vulnerabilities in Nexx Smart Home Devices

Vulnerabilities affecting Nexx Smart Home Garage Door Controller, Smart Plug, and Smart Alarm could be exploited to take control of the devices. The vulnerabilities include hard coded credentials, authorization bypass, improper input validation, and improper authentication. Nexx has not responded to communication from the researcher who found the flaws or to requests to work with the US Cybersecurity and Infrastructure Security Agency (CISA) to mitigate the issues.

Editor's Note

There is no patch available for these devices, and the vulnerability is easily exploited. Unlike weaknesses in "old fashioned" garage door openers, an attacker does not have to be close to the device, attacks may be launched remotely. This vulnerability may lead to pranksters opening garage doors in large numbers. Your best defense right now is to disconnect the controller from the network.

Johannes Ullrich
Johannes Ullrich

Sending a hard coded credential, between the device and the cloud service, broadcasting email addresses and device ID, not properly validating input, and the devices not implementing consistent access control, and more, would allow someone to access the Nexx service and manipulate any device. Also, traffic between the Nexx devices and servers can be replayed. There are multiple CVEs. The most severe, CVE-2023-1748, use of hard coded credentials, has a raw CVSS score of 9.3. If you have these devices, you have a couple of choices, there are no updates as yet, you can either disconnect them or isolate them to limit access as much as possible using segmentation and not exposing them directly to the Internet. Given the nature of the flaws, disconnection is best, at least until Nexx brings services back online and offers a fix.

Lee Neely
Lee Neely

The most egregious of the vulnerabilities listed is the hard-coded credential. I thought we were past vendors hard coding passwords into their products; guess not. The security researcher did the responsible thing in trying to work with the vendor. Now it’s time for public shaming. Unfortunately, it’s also an opportunity that cyber adversaries will take advantage of. The clock is ticking, Nexx, take ownership and fix your products.

Curtis Dukes
Curtis Dukes

This is likely a case where it is cheaper to replace the devices than to patch them.

William Hugh Murray
William Hugh Murray

2023-04-04

Ukrainian Utility Company Infected with Malware Because of Pirated Software

Ukraine’s Computer Emergency Response Team (CERT-UA) says that a utility company employee downloaded pirated software, which led to the utility’s network becoming infected with malware earlier this year. The illicit software, which was downloaded from a torrent site, contained both the DarkCrystal RAT and the DWAgent remote administration tool.

Editor's Note

Stories like this make me cringe. It's really easy to fall into the trap of finding the "free" version of an application rather than risking management won't fund it. The cost of a license will be eclipsed many times by the cost of incident response and recovery. Make sure that staff know that you're willing to fund the tools they need to meet mission objectives, including escalating to other funding sources if your budget is spent. Re-enforce that by coming through. Additionally, make sure that you have EDR solutions to cover all your endpoints, not just your Windows desktops. There are EDR products which will work on air-gapped networks, don't leave these out.

Lee Neely
Lee Neely

I was recently on a panel discussion on what has become called “Protective DNS” – DNS services to block or at least alert on DNS resolution to both malicious and suspicious sites. This goes beyond simple URL blocking and really should be mandatory for any critical infrastructure service provider. In the US, if you are part of the Defense Industrial Base, you can use NSA’s service for free - https://www.nsa.gov/About/Cybersecurity-Collaboration-Center/PDNS/

John Pescatore
John Pescatore

don't think we have to worry about which exact ICS security framework to follow if workers at utilities are able to run pirated software.

Johannes Ullrich
Johannes Ullrich

It should not be the case that compromising one end user system is sufficient to compromise the entire enterprise. Think Sony and Aramco. We should be striving for least privilege, but at a minimum we can structure the network.

William Hugh Murray
William Hugh Murray

The Rest of the Week's News


2023-04-06

Google to Require Android Developers to Make it Easy for Users to Delete Apps and Data

Google has announced a forthcoming policy for the Google Play Store, requiring that Android developers provide users with an online option to delete their accounts and associated data in addition to an option to delete from within the app. The new rule will take effect in early 2024; developers will have to provide details about their data deletion processes by December 7, 2023, or risk not being permitted to release new apps or update existing ones.

Editor's Note

Good to see continued movement towards users owning their data, but the first wave of response will be obtuse click-through agreements by many app owners. But consumer sentiment is continuing to push towards more of this, even in the US – software architects are increasingly having privacy requirements as part of their list of business requirements, a very good thing. Google has also detailed privacy/security improvements in Android 14 when it ships later this year.

John Pescatore
John Pescatore

I was hoping this meant there was a requirement to allow users to remove OEM and Carrier provided applications. It is not, and it's still a move in the right direction. This helps align Android users with increasing privacy regulation which grants users the right to be forgotten. It also should allow users to delete the account and data without having to reinstall the application, which is something I would have preferred from time to time.

Lee Neely
Lee Neely

A net positive by Google in giving users more control over their data, albeit a year behind their chief competitor. Providing the notice now, and a year to implement gives app developers time to make the necessary changes.

Curtis Dukes
Curtis Dukes

As an essentially open system, Android requires user management. However, there is a limit to how much the user can be expected to know and do. That said, this seems like a policy that will improve security without imposing too much of a burden on users.

William Hugh Murray
William Hugh Murray

2023-04-05

International Law Enforcement Operation Disrupts Genesis Market

A coordinated effort involving authorities from 17 countries and ked by the US Federal Bureau of Investigation (FBI) and the Dutch National Police (Politie) has seized the infrastructure – website, domains, and servers – of Genesis Market, a criminal online marketplace. The operation led to 119 arrests and 208 property searches.

Editor's Note

Genesis Marketplace, instead of dealing with potential passwords and password dumps, specialized in already established sessions. Most notable was the Electronic Arts (EA) incident in which the Slack cookie was used to gain access to EA’s Slack instance; from there, an attacker gathered enough information to steal pre-released games. This forum also had some innovations allowing its users to use browser plugins to simulate better being the attack victim.

Moses Frost
Moses Frost

This was also known as "Operation Cookie Monster" and is the latest success in international cooperation shutting down or disrupting criminal activity. The Genesis Market was an invite-only shop which sold tools to help hackers avoid detection when using compromised accounts, fingerprint generating tools, Genesium browser and Genesis Security plugin. They also sold data from compromised devices such as fingerprints, cookies, logs and saved logins as well as credentials for Amazon, eBay, Facebook, Netflix, Gmail, PayPal, Zoom and Spotify.

Lee Neely
Lee Neely

And the law enforcement hits keep coming. Over the last six months, international law enforcement has arrested cyber criminals, infiltrated online criminal organizations, shuttered digital currency sites, taken off-line criminal domains, and closed online marketplaces where cyber criminals operate. As we look back over 2023, this will be the story; and who knows, perhaps the cover of Time magazine.

Curtis Dukes
Curtis Dukes

2023-04-04

HP Will Patch LaserJet Vulnerability Within 90 Days

In a security bulletin released on Monday, April 3, HP disclosed a critical vulnerability affecting some of its printers that could lead to information disclosure. The flaw affects certain HP Enterprise LaserJet and HP LaserJet Managed Printers when IPsec is enabled with FutureSmart version 5.6. HP plans to have firmware updates available within 90 days. Until then, HP suggests that users “currently running FutureSmart 5.6 with IPsec enabled on potentially impacted products … revert to a prior version of the firmware (FutureSmart version 5.5.0.3).”

Editor's Note

If you're not running IPsec on your HP Enterprise LaserJet and HP LaserJet Managed Printers, you're not affected. The appeal of IPsec on these devices is to protect credentials and other sensitive data in transit, such as an emailed job or scan data. To prevent re-introduction of the flawed firmware, HP has removed it from their download site. If you have local copies you're using for updates, you need to remove these as well so your processes will not reinstall after you've rolled back to the earlier firmware.

Lee Neely
Lee Neely

Ninety days seems a little long. There are workarounds (there are always workarounds) but firmware updates are sufficiently difficult that many will accept the risk of data leakage until the patch becomes available.

William Hugh Murray
William Hugh Murray

2023-04-05

QNAP OS Vulnerabilities Affect 80,000 Devices

Two memory access issues affecting multiple QNAP operating systems (OSes) for network-attached storage (NAS) devices could be exploited to allow arbitrary code execution. The vulnerabilities affect QNAP’s QTS, QuTS hero, QuTScloud, QVP Oses. QNAP has released fixes for QTS and QuTS hero; users are urged to update to QTS 5.0.1.2346 build 20230322 or later, and QuTS hero h5.0.1.2348 build 20230324 or later. QNAP is working on fixes for QuTScloud and QVP.

Editor's Note

QNAP devices remain "Cyberattacker Catnip." The DeadBolt ransomware group has been continually running campaigns to discover and exploit QNAP devices. As such, you need to make sure you don't directly expose them to the Internet, make sure only expected applications and user accounts are present, ensure they are kept patched. If you discover them on your corporate network, make sure they are being managed as mainstream (not shadow) IT.

Lee Neely
Lee Neely

2023-04-06

ACRO Confirms Cyber Security Incident

British Criminal Records Office (ACRO) has been experiencing customer portal issues since mid-January. This week, the organization confirmed that the problems are due to a cyber security incident. ACRO has reportedly contacted individuals who may be affected by the incident by email. As of Thursday afternoon, April 6, the ACRO website says, “Thank you for your patience as we work through our technical issues.”

Editor's Note

ACRO helps provide criminal background checks for potential employers, providing up to ten years of data for a given applicant. In this case the data targeted was not related to their payment system, but data provided by perspective employees such conviction and identification information, email address, case reference numbers, etc. ARCO is working behind the scenes to notify affected individuals, as well as processing background checks manually, but may not be meeting the UK's privacy/incident reporting requirements. While working quietly to investigate, inform affected users, and recover sounds great for your reputation, it can get you crosswise with regulators, let alone in an awkward position when non-affected customers discover and demand an explanation. In today's climate, choose transparency, sharing what you're doing and what you know quickly and keep it updated until you get to the other side.

Lee Neely
Lee Neely

Increasingly, supply chain security has been a discussion topic over the last year. Here’s an example where a compromise of a third-party supplier (ACRO) has the ability to impact normal business operations for a wide range of commercial businesses. Another is the WD My Cloud Service which has been off-line for about 10 days now. The lesson here is that companies now need to ‘war game’ loss of key suppliers as part of their business risk management.

Curtis Dukes
Curtis Dukes

2023-04-04

New Website Aims to Attract More Participants to Hack the Pentagon Bug Bounty Program

The US Defense Department’s (DoD’s) Directorate for Digital Services (DDS) has launched a new website as an enhancement to its Hack the Pentagon bug bounty program. DDS hopes the website will encourage DoD organizations to launch their own bug bounty programs and attract cyber security talent to their ranks.

Editor's Note

The new DDS/Hack the Pentagon site looks nothing like a US Government web site. It has information for DoD partners desiring to implement a similar program, security researchers who want to participate, and even vendors who are a source of ethical hackers - albeit they need to work through the SAM.GOV site and process to bid on jobs. If you're thinking about how to publicize and build your own bug bounty program, take a look at this site: the look, access and message is probably not how you currently market services.

Lee Neely
Lee Neely

When DoD first launched their bug bounty program it was thought of as a novelty item. You know, make an announcement, get some free press and don’t expect to find any software bugs. Now it’s become a cybersecurity best practice used by every industry. Along the way, it’s saved hundreds of thousands dollars, and reduced the attack surface for both commercial and bespoke software applications. Seems as though DoD is doubling down on the program with a new website.

Curtis Dukes
Curtis Dukes

Internet Storm Center Tech Corner

Exploration of DShield Cowrie Data with jq

https://isc.sans.edu/diary/Exploration+of+DShield+Cowrie+Data+with+jq/29714

Analyzing the efile.com Malware

https://isc.sans.edu/diary/Analyzing+the+efilecom+Malware+efail/29712

Self-Extracting Archives

https://www.crowdstrike.com/blog/self-extracting-archives-decoy-files-and-their-hidden-payloads/

loldrivers

https://www.loldrivers.io

Trellix Privilege Escalation

https://kcm.trellix.com/corporate/index?page=content&id=SB10396

HP LaserJet Vuln.

https://support.hp.com/us-en/document/ish_7905330-7905358-16/hpsbpi03838

NEXX Garage Door Vulnerability

https://medium.com/@samsabetan/the-uninvited-guest-idors-garage-doors-and-stolen-secrets-e4b49e02dadc

OneNote Changes

https://learn.microsoft.com/en-us/deployoffice/security/onenote-extension-block

MSFT Changes to Auto-Update

https://learn.microsoft.com/en-us/windows/release-health/windows-message-center#3060

NPM Spam DDoS Attacks

https://www.helpnetsecurity.com/2023/04/05/flood-of-malicious-packages-results-in-npm-registry-dos/

ALPHV Ransomware Targets Backup Installations

https://www.mandiant.com/resources/blog/alphv-ransomware-backup

Sophos Web Appliance Vulnerability (and EoL)

https://www.sophos.com/en-us/security-advisories/sophos-sa-20230404-swa-rce

Zimbra Exploited in Targeted Attacks

https://www.proofpoint.com/us/blog/threat-insight/exploitation-dish-best-served-cold-winter-vivern-uses-known-zimbra-vulnerability