SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact UsGitHub’s push protection feature is now available to all private repositories with GitHub Advanced Security and to all public repositories at no cost. Push protection provides an added layer of security by scanning commits for secrets before accepting git push operations. GitHub introduced push protection in beta 13 months ago.
Very nice and useful feature. Once a secret makes it into a git repository, removing it can be difficult. Even better to offer this as a free feature to all (paid users get some customization).
This is free for public repositories, requires the use of GitHub Advanced Security licenses at a list price of $21 per user per month for private repositories. That $300 per GitHub user per year should be considered a mandatory cost for to claim you are doing the Sec part of DevSecOps.
This is a free service to help detect any secrets you’ve inadvertently put in your repositories. Regardless of other mitigations you’ve implemented, adding one more, particularly one without a cost which is already integrated in the platform, is a no-brainer.
Feedback on the GitHub’s beta protection feature for paying customers was very positive. GitHub is now extending that protection feature to its public repositories. This benefits the greater software development and delivery ecosystem. Kudos to GitHub for placing security over profits with this decision.
GitHub
Bleeping Computer
The Hacker News
Duo
On Tuesday, May 9, Microsoft released fixes for dozens of security issues in its products. Two of the vulnerabilities addressed in the updates are being actively exploited: a Win32k privilege elevation vulnerability and a Secure Boot security feature bypass vulnerability. The Secure Boot flaw is being actively exploited through malware known as Black Lotus, which exploits a vulnerability in a patch Microsoft released in March.
Closing the hole Black Lotus is taking advantage of is a darn good idea. That secure boot flaw (CVE-2023-24932) along with the privilege escalation flaw (CVE-2023-29336) require local access to exploit, but with a significant number of remote and mobile/remote workstations in the environment these days, local access options have increased dramatically; you need to factor that into your evaluation of risk.
For Microsoft users, whenever you see the words ‘actively exploited’ in the security bulletin, immediately elevate its priority in your patch cycle.
In its opening to Google I/O, Google demonstrated the use of AI to extend the utility and usability of its other products and applications. One such demonstration was to improve the quality of code during the development process. Such use of AI should show up in a marked reduction in the number of patches. Traditional testing is not getting the job done.
Krebs on Security
The Register
Dark Reading
Bleeping Computer
Gov Infosecurity
In a May 10 blog post, Dragos details a failed extortion attempt against the company following a data breach. Dragos writes that the threat actors “gained access by compromising the personal email address of a new sales employee prior to their start date, and subsequently used their personal information to impersonate the Dragos employee and accomplish initial steps in the employee onboarding process. The group accessed resources a new sales employee typically uses in SharePoint and the Dragos contract management system. In one instance, a report with IP addresses associated with a customer was accessed, and we’ve reached out to the customer.”
Great transparency. Leaders in cyber security do not necessarily distinguish themselves by having no incidents, but by how they deal with them. That said: This incident shines a bright light on the problem of securely on-boarding employees. In particular with more and more remote work, handing out credentials and access, "bootstrapping trust," can be difficult.
Dragos doesn’t provide a lot of detail on the compromise of the onboarding process, but their top 5 recommendations point out that when moving up to MFA, important to think through how someone would attack your onboarding process: “Harden Identity & Access Management infrastructure and processes; Implement separation of duties across the enterprise; Apply the principle of least privilege to all systems and services; Implement multi-factor authentication everywhere feasible.”
Although Dragos revealed few attack details, it does provide an opportunity for organizations to review their onboarding processes. This has become important as today’s workforce is largely remote, elevating identity and access management as a key security consideration before granting access to corporate assets. This ‘near-miss event’ should be documented and added to a company’s risk management discussion.
While I prefer in-person verification and delivery of the initial credentials, we have all implemented workflows to allow for remote validation and credential issuance. Consider the scenario from Dragos and review your processes to see if there are ways it could be bypassed. Are there race conditions - e.g., your reusable password is used to obtain your MFA token, which could be modified to prevent abuse?
Dragos
SC Magazine
Dark Reading
Bleeping Computer
Security Week
The attorneys general of three US states are seeking to overturn an Environmental Protection Agency (EPA) rule requiring states to include cybersecurity assessments in their inspections of water systems. The lawsuit puts focus on the issue of the government’s role in regulating privately-held entities that are responsible for elements of the country’s critical infrastructure.
In the filing, the state of Missouri says it does 800 water service surveys per year and the EPA requirement would add 2-6 hours per survey per year, or roughly a full-time job for at least one employee – even though Missouri states it already requires public water systems to publish cyber risk plans. If those plans were already actively being reviewed for sufficiency and actual implementation (vs. just a box being checked that the plans were created), seems like a high estimate of added cost.
The lawsuits were to be expected; no one wants to give up their rights. But when it comes to critical infrastructure that protects the nation, it has to be shared responsibility. In a perfect world you would have a common, minimum cybersecurity baseline that every critical infrastructure sector agrees to and is measured against. Let’s move cybersecurity inspections from “do you have a plan?” to “I’ve implemented and actively monitor the baseline established.”
Part of the challenge is the estimated impact of the new required regulations, particularly on staffing. When faced with new regulations which appear to have a big impact like this, make sure that you’ve made sure the impact is just from the change in regulatory requirements and not from existing requirements you were not meeting which would undermine the believability of your objection.
Former Ubiquiti employee Nickolas Sharp has been sentenced to six years in prison for stealing company data, trying to extort money from the company, and spreading false stories about the company. Sharp, who was employed as a senior developer at Ubiquiti, was on the team that was responding to the incident. An internal investigation revealed that Sharp had exfiltrated sensitive data from Ubiquiti systems. In January 2023, Sharp pleaded guilty to intentionally damaging a protected computer, wire fraud, and making false statements to FBI. He was also ordered to pay $1.6 million in restitution.
Pretty gutsy move here. Sharp posed as an anonymous whistleblower when the company refused to pay his demands. Fortunately, Ubiquiti partnered with the FBI who were able to unravel the ruse and reveal the perpetrator. Good reason to include law enforcement, such as the FBI, in your investigation/response process.
This article reminds one of the saying “crime doesn’t pay”. It also highlights the importance for organizations to review their in-place controls to protect intellectual property. This is especially important when working with remote staff.
Bleeping Computer
Security Week
Gov Infosecurity
The US National Institute of Standards and Technology (NIST) has published an updated draft of its guidance for protecting sensitive unclassified information. NIST will hold a webinar on June 6, 2023, that will “provide an overview of the significant changes” to the guidance. Public comments on the document will be accepted through July 14.
This is update 3 to SP 800-171, which applies to contractors processing government data. Most often in the DoD space. If you’re in this category or wish to be, review the guide and provide comments by July 14. The goal is to provide reasonable guidance to ensure that data is properly protected, not replace your existing framework or standards.
Of course "Controlled Unclassified" is a class. We need to be consistent in capitalizing the words "Classified" and "Unclassified" when they are being used as a term of art in a national security context.
NIST
CSRC
Fedscoop
Nextgov
A ransomware attack last month against hardware maker Micro-Star International (MSI) resulted in leaked private Unified Extensible Firmware Interface (UEFI) keys. MSI refused to pay the ransom demand, and the attackers began leaking stolen data, including source code for MSI motherboard firmware. The trove of leaked information includes firmware image signing keys for 57 products and Intel Boot Guard private keys for 166 products.
MSI doesn’t seem to have a process for revoking these compromised keys, nor are they publishing information relating to the compromise, which means you’re going to have to double/triple check any MSI firmware updates to ensure they are truly from MSI. One hopes MSI will publish guidance soon.
Siemens and Schneider Electric have released advisories alerting customers to vulnerabilities in their industrial control systems (ICS) products. Siemens published six advisories that address 26 security issues, including critical flaws affecting Siveillance Video and the Scalance local processing engine. Schneider’s four advisories address six vulnerabilities, including a high-severity flaw affecting PowerLogic power meters.
These patches also address issues in their IoT gateway. Prioritize patches relating to access control devices or any components which are directly accessible.
Texas-based food distributor Sysco has disclosed a data breach that exposed sensitive information about customers, employees, and business operations. In the “Other Information” section of a US Securities and Exchange Commission (SEC) Form 10-Q filing, Sysco writes that they became aware of the breach in early March 2023 and believe the incident began in mid-January. They “initiated an investigation, with the assistance of cybersecurity and forensics professionals. The investigation determined that the threat actor extracted certain company data, including data relating to operation of the business, customers, employees and personal data.”
Yay, the breach didn’t impact business operations, but wait, customer and employee personal data was exfiltrated. Make sure you are not only disclosing breach information in a regulatory report like this: be proactive in reaching out to customers and employees regarding breach of any of their data, especially if you want to keep those customers and employees.
La Policía Nacional (the National Police of Spain) have arrested 40 people in connection with a cybercrime campaign involving phishing, identity theft, bank fraud, and money laundering. The operation is believed to have netted more than €700,000 ($764,000) from its victims.
The attack used SMS messages with urgent requests to login to their financial institution, leading to credential capture, funds transfers, etc. This is a great case study in social engineering you should look at incorporating into your user awareness training. We need to help our users so these methods stop working.
Policia
The Hacker News
Infosecurity Magazine
Bleeping Computer
Microsoft Patch Tuesday
https://isc.sans.edu/diary/Microsoft+May+2023+Patch+Tuesday/29826
Exploratory Data Analysis with CISSM Cyber Attacks Database Part 2
https://isc.sans.edu/diary/Exploratory+Data+Analysis+with+CISSM+Cyber+Attacks+Database+Part+2/29828
Geolocating IPs is Harder Than You Think
https://isc.sans.edu/diary/Geolocating+IPs+is+harder+than+you+think/29834
AndoryuBot Targets Ruckus Admin RCE Vulnerability
Pre-Infected Mobile Phones
https://www.theregister.com/2023/05/11/bh_asia_mobile_phones/
Dragos Breach
https://www.dragos.com/blog/deconstructing-a-cybersecurity-event/
Microsoft Patched Outlook (actually Windows) vulnerability again
https://www.akamai.com/blog/security-research/important-outlook-vulnerability-bypass-windows-api
Law Enforcement and Intelligence Agencies Disable "Snake" Malware
Fake System Update Drops Malware
GitHub "Push Protection" now out of Beta
Catch up on recent editions of NewsBites or browse our full archive of expert-curated cybersecurity news.
Browse ArchiveFree technical content sponsored by SynSaberFree PCAP Analysis tool | The OT PCAP Analyzer (OPA) is a free tool developed by SynSaber for the Industrial Security Community.
The 2023 SANS ICS/OT Survey, written by our very own Dean Parsons is live!
Tune in on Thursday, May 18th at 1:00pm ET | Bridging the Gap: Securing Your Digital Transformation Journey | Register now: https://www.sans.org/info/226040
Upcoming webcast with Matt Bromiley on Thursday, May 25th at 1:00pm ET | I have Trust Issues and So Does My CISO--How NDR can help identify issues in your ZTA | Register now: https://www.sans.org/info/226045