SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact UsGoogle has released an emergency update for its Chrome desktop browser to fix a vulnerability that is being actively exploited. The type confusion vulnerability in the Chrome V8 JavaScript engine could “allow a remote attacker to potentially exploit heap corruption via a crafted HTML page.”
A lot of times you hear advice to "update your browser" (I may have said that myself). For Chrome, and most other browsers, you never need to actually do anything to update the browser, but the browser will do it for you behind the scenes. Just make sure you fully exit the browser once a day to allow it to apply the update. Bad actors are using news like this to distribute malware via fake browser updates.
Check out the Chrome Enterprise settings to ensure that users are required to relaunch to finish the update process. Encourage users to click the relaunch prompt when shown rather than waiting for it to timeout, or your processes to intervene. Google reports an exploit for CVE-2023-2033 exists in the wild. Don't overlook updates for Chromium based browsers, Brave, Opera, Vivaldi, etc.
Since most browsers and even mobile operating systems push patches out constantly, “Emergency Fix” is pretty much an outdated term that largely only applies to Windows these days. Convince your CIO that all since all those cloud services you use are able to patch continually, the same should be true for data center and fat client apps.
The type confusion vulnerability allows remote code execution and should be patched immediately. Several years ago, Google greatly simplified the patch management process for Chrome, now mirrored by all major browser vendors. It’s as simple as closing and reopening the browser.
Browsers, the universal clients, are open, general, flexible, feature rich, complex, and vulnerable. Prefer purpose built clients for sensitive applications.
Chrome Releases
The Register
Bleeping Computer
Dark Reading
SC Magazine
NIST
Google’s Cybersecurity Action team has published a new edition of its Cloud Threat Horizons Report. Among the findings: A Chinese state-sponsored hacking group used the Google Command and Control (GC2) red teaming tool in attacks against organizations in Taiwan and Italy. Weak passwords and API compromise are the most frequently used methods of cloud compromise.
The takeaways: (1) Move away from reusable passwords; (2) You can and should patch Google Kubernetes Engine faster; and (3) Adding a few essential security hygiene practices to (1) and (3) will thwart/mitigate most attacks and allow you to concentrate on and more quickly detect more complex API and Living off the Land attacks.
This report, and many others, reinforce that the primary attack vector for criminals is via compromised credentials, if you haven’t done so by now you really need to look at implementing Multi-Factor Authentication for all systems, especially cloud based ones. Now is also the time to review your Identify and Access Management strategy to ensure it addresses current threats and risks.
The report finds that attackers are using more and more red teaming tools, which isn't a huge surprise. We've all spent a lot of energy being ready to detect the use of Cobalt Strike, because it's become a tool of choice for attackers; it'd be easy to overlook other red teaming tools as well as the ease of shifting their attack using cloud-based resources. Make sure that you're set for broad based detection and are prepared for a changing attack source. While your threat hunters are making sure they're on their A game, also make sure that your ICAM folks are as well, that accounts are being actively managed, reviewed and removed. Get rid of reusable passwords wherever possible. That account for that person who was invaluable but retired and will be coming back in a few months, so you keep it open - maybe reconsider that approach?
For those in the cybersecurity business, an excellent read. The strategic perspective was particularly informative as it highlighted the symbiotic relationship between cyber criminals and state-sponsored threat actors. The more troubling finding is that passwords and API compromises continue to be the leading method of compromise. Use MFA and the guidance provided by OWASP for API security.
Strong authentication continues to be the most efficient cybersecurity measure. While it has limits, it dramatically raises the cost of attack. Even when compromised, it permits only session stealing but resists session initiation.
QuaDream, an Israeli spyware company, is reportedly shutting down operations just days after Citizen Lab and Microsoft released reports detailing the company’s tools and victims. QuaDream’s spyware “framework” was reportedly used against dissidents, NGO workers, and journalists in North America, Asia, Europe, and the Middle East.
Skewing old here, but when I worked for the US Secret Service in the 1980s, same issues existed: commercial entities would pop up claiming to sell “law enforcement technology” but they were really selling “criminal technology for detecting/thwarting law enforcement” technology. Like weeds, almost impossible to eradicate but still important to make it unprofitable to sell to criminals. This is one reason there are many fewer virtual “currency” exchanges than just a few years ago.
"Government Spyware" companies may have learned from the NSO Group's demise. Looks like they added the "Citizen Lab" scenario to their incident response playbooks, and are reacting with a more ephemeral business model. The talent behind these companies is likely going to reconstitute soon under a new name.
QuaDream's platform is called REIGN and is marketed to governments for "law enforcement" purposes. It is a suite of malware, exploits, and infrastructure designed to exfiltrate data from mobile devices. As long as governments are willing to purchase spyware like QuaDream's REIGN and NSO's Pegasus, companies like this will be in business. They prefer to have little to no public presence, discouraging employees from mentioning their employer in public or on social media, so when a disclosure like this crops up, they will go to ground, and I predict emerging in a new persona, with the same toolset.
Between the recently released EO and reports from Citizen Lab/MSFT, some spyware companies will find it difficult to stay in business. That said, the skillsets used by spyware vendors are in short supply; and there is increasing demand for those skills. It’s likely they will resurface in some other form; perhaps supporting sanctioned activities.
Citizen Lab
Microsoft
The Hacker News
Infosecurity Magazine
The US Department of Health and Human Services (HHS) 405(d) Program and the Health Sector Coordinating Council Cybersecurity Working Group (HSCC CWG) have released resources to help healthcare organizations address cybersecurity concerns: the 2023 edition of the Health Industry Cybersecurity Practices (HICP); Knowledge on Demand, an online educational platform that offers free healthcare-focused cybersecurity awareness training; and a report, Hospital Cyber Resiliency Initiative Landscape Analysis.
These documents work to relate cybersecurity to healthcare practices to help practitioners relate to the importance of the guidance. They are focused on relevant, cost-effective ways to raise the bar on cybersecurity as well as identifying top threats which can impact patient safety (social engineering, ransomware, data loss, network attacks of medical devices and lost/stolen equipment). Worth the time to read and leverage to work any gaps/omissions. If nothing else, use them to show decisions made to raise the bar were credible and necessary.
HHS has put together a compendium of cybersecurity practices for the Health Industry. It can be a little difficult to wade through with a main document, two technical volumes, and a separate resources/templates volume, but great awareness information nonetheless.
Healthcare remains vulnerable and a target of opportunity, in part because, HIPAA security guidance was not prescriptive. Strong guidance, prescription, is what is needed in healthcare.
HHS
405d
HHS
HHS
Health IT Security
SC Magazine
Nextgov
In a new report from CSC 2.0, the successor to the Cyberspace Solarium Commission, says, “The national security components of the space race today include not just weapons systems but also the security of critical infrastructure — much of which relies on global positioning satellites, remote imagery, and advanced communication.” As such, CSC 2.0 says that space systems should be designated as critical infrastructure.
In 2020, Space Policy Directive-5 (SPD-5) defined space systems to include ground systems, sensor networks, and space vehicles. This report builds on that, not only suggesting space systems be labeled critical infrastructure, but also recommending Congress provide NASA $15m per year with 25 FTEs to take on any added responsibilities as sector risk management agency. It's not clear if that amount, funding and staffing, is sufficient to solve the problem, but it is sufficient, if maintained, to move the bar in the right direction. Investment will be needed not only at NASA, but also partners such as JPL, who design and operate space systems. Moving the bar, particularly for existing space vehicles, will be both challenging and exciting.
The 2022 SANS Threat Report, based on Rob Lee’s portion of the RSA SANS Threat Panel, pointed out real world examples of space systems’ “dual use,” (military/commercial) meaning risk spills over to the commercial sector during conflicts.
No doubt, GPS has become critical to everyday life. When was the last time you used a map to navigate? As such, not surprising that we would want to designate satellites that enable GPS as critical infrastructure. That, perhaps, is the easy part. Now how does one protect those critical assets, some of which were launched into orbit over a decade ago?
Imagery is not quite as obvious as GPS and comms but has proven importance beyond foreign intelligence.
FDD
Duo
Cyberscoop
MeriTalk
The US State Department’s Bureau of Cyberspace and Digital Policy plans to have a diplomat with training in technology at each of its 168 embassies worldwide by the end of 2024. To meet the goal, the State Department is providing training sessions for its diplomats. The project is being overseen by Nate Fick, who is the first US ambassador at large for Cyberspace and Digital Policy.
To incentivize participation, Fick is working to make sure that proper service credit is given to employees who chose to focus on technology and cybersecurity, versus traditional embassy job assignments, with the ultimate goal of every credible candidate for chief of mission or U.S. ambassadors having a demonstrated understanding and support for technology and cybersecurity. Fick is working to hire up, leveraging an expedited hiring process to hire another 25-30 civil service workers.
One hopes that ambassadorial level really means they are serious. That said, while training is important, it is at best a substitute for experience.
The US Cybersecurity and Infrastructure Security Agency (CISA) has recently added four new vulnerabilities to its Known Exploited Vulnerability (KEV) catalog. The vulnerabilities are a privilege elevation issue in Android Framework; an insecure deserialization vulnerability in Novi Survey; a type confusion vulnerability in the Google Chromium V8 Engine; and a use-after-free vulnerability in macOS. Federal Civilian Executive Branch (FCEB) agencies have mitigation deadlines for these vulnerabilities in early May.
The Android flaw effects Android 11,12, 12L and 13, and the CISA advises patching by May 4. Realistically, you should have Android 13 as your minimum platform: it's been out since last August. This flaw, CVE-2023-20963, with a raw CVSS score of 7.8, is being actively exploited. Exploitation allows malicious apps to install or remove apps, grant permissions, and make some apps non-removable without user interaction. Note the macOS update added to the KEV is for 10.14.4, released in March 2019; you should be on macOS 12 & 13 at this point, not updating macOS 10.14.
With these vulnerabilities, the KEV catalog is now up to 918 entries, over 18 months. I have to ask again about the effectiveness of the catalog given no linkage to FCEB Agency compliance, other than periodic GAO or IG cybersecurity audits.
SC Magazine
Bleeping Computer
The Hacker News
CISA
NCR says that a ransomware attack against one of its data centers has created problems for some customers of its Aloha point-of-sale (PoS) software platform. Aloha PoS is used in restaurants. Aloha PoS service disruptions began earlier this month; on April 13, NCR determined that the cause was a ransomware attack. The “data center outage … is impacting a limited number of ancillary Aloha applications for a subset of … hospitality customers.”
We've all seen PoS systems with the Aloha screen saver and/or NCR logo on them; they are widely used. While the impacts to the NCR data center appear to be limited in scope and impact, they are feeling widespread and highly impactful to customers. That's an important disconnect to capture and modify your measurement of impacts and corresponding communication. My gut says some added impacts are due to interdependencies between systems, which are really tough to tease out and minimize. Don't ignore the person saying, in effect, "I told you so;" you're going to want to debrief them after the incident. On a positive note, NCR has been keeping their DFW05 datacenter outage site (https://status.aloha.ncr.com/incidents/cnl38krr6n6b) updated. NCR is rebuilding their applications in a new secure environment, actively contacting customers with workarounds, and has engaged external forensic and law enforcement expertise.
Rheinmetall, an automotive and arms manufacturer based in Dusseldorf, Germany, has disclosed that it experienced a cyberattack that affects its industrial customer division. A company spokesperson said that their defense division was not affected. The incident occurred on Friday, April 14.
Rheinmetall is a target as they are a key arms supplier to the Ukraine, and the attack was co-timed with their talks of constructing a new tank factory in the Ukraine. Think of how your plans to expand into new markets or supply key customers could motivate such an attack, and how you would prepare. Not sure how many of us have this scenario in our risk register. Management is going to want you to be able to give the equivalent response to "didn't hurt" so they can move forward unimpaired. Don't get distracted by the politics of the changes in business, rather focus on how to remain secure and incorporate added risks.
The strange case of the Great Honeypot of China
https://isc.sans.edu/diary/The+strange+case+of+Great+honeypot+of+China/29750
The LockBit ransomware (kinda) comes for macOS
https://objective-see.org/blog/blog_0x75.html
Google Cloud Used as C&C
https://thehackernews.com/2023/04/google-uncovers-apt41s-use-of-open.html
Attack Campaign That Uses Fake Google Chrome Errors
Chromium Publishes Emergency Update
https://chromereleases.googleblog.com/2023/04/stable-channel-update-for-desktop_14.html
LAPS Update Errors
https://learn.microsoft.com/en-us/windows-server/identity/laps/laps-overview
Manage Engine Vulnerability
https://hnd3884.github.io/posts/CVE-2023-29084-Command-injection-in-ManageEngine-ADManager-plus/
Catch up on recent editions of NewsBites or browse our full archive of expert-curated cybersecurity news.
Browse ArchiveFree technical content sponsored by DrataSave Time On Compliance | With automated evidence collection and 24/7 risk monitoring for 14+ frameworks, including SOC 2, ISO 27001, GDPR, and HIPAA, you can stay compliant without the messy, manual work.
T-2 weeks until we kick off the first-ever two-day ICS Security Summit Solutions Track | Join Dean Parsons and invited industry experts on Mon, May 1 - Tue, May 2 | Register now: https://www.sans.org/info/225805
Upcoming webcast on Thursday, April 20th at 1:00pm ET | Managing Apps on BYO and Managed Devices: How to Enforce Policies to Protect Your Data | Register now: https://www.sans.org/info/225810
Join us on Thursday, May 4th at 1:00pm ET for our upcoming webcast: 5 Automation Trends to Scale and Modernize Your InfoSec Compliance Program | Register now: https://www.sans.org/info/225815