SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact UsThe US Federal Trade Commission (FTC) has published a notice of proposed rulemaking in the Federal Register. The proposed rule would amend the FTC’s Health Breach Notification Rule to add health app developers to the entities that are required to report data breaches. The FTC is accepting public comment through August 8, 2023.
This also refines the definition of a Personal Health Record (PHR) and reinforces the requirement to report breaches of health records not covered by HIPAA. Having a consolidated reference will help those impacted. Our demand to monitor and track our fitness has resulted in a plethora of applications and devices to meet that demand, often delivered with an eye on time-to-market, not data security and reporting. This rule change puts those meeting the demand on notice they have skin in the game. If you're collecting personal health information, or creating applications which do, you may want to weigh in on reporting requirements.
Requiring apps that handle/store personal health records to meet breach disclosure requirements was floated for public comment in 2020 with little to no pushback – it makes sense. Especially as we now see Apple and other health app/device vendors starting to meet increased consumer demands for privacy and making claims for higher levels of personal health data protection.
Federal Register
SC Magazine
Patches are available to address a critical remote code execution vulnerability in Fortinet’s FortiGate firewalls. The flaw is fixed in FortiOS firmware versions 6.0.17, 6.2.15, 6.4.13, 7.0.12, and 7.2.5. Fortinet says the vulnerability may have been exploited to launch attacks against government, manufacturing, and critical infrastructure organizations.
In line with past practice, Fortinet released the patch without details last week. Releasing a patch without indication as to the vulnerabilities, and the severity of these vulnerabilities, does make it difficult for organizations to accurately prioritize the patch.
Bleeping Computer
Bleeping Computer
Security Week
Gov Infosecurity
The Hacker News
Microsoft says that an Azure Portal outage last week was caused by an unanticipated spike in traffic. The incident resulted in customers seeing “service unavailable” messages for several hours on Friday, June 9.
Good reminder to have workarounds for when web dashboards might be down for any reason when the underlying service is still running, as was the case here. For Azure, CLI and REST API connections were still usable and should be documented and periodically tested (and protected) as fallback approaches.
This may be tied to claims of DDoS attacks by Anonymous Sudan, who also claims to have been impacting other Microsoft services including Outlook.com and OneDrive. Microsoft has taken steps to prevent recurrence, and their notice also includes steps you should take on your Azure instance to minimize future potential impacts, to include leveraging the application architecture guidance and ensuring notifications about service issues are both enabled and going to the right places.
There are two possible reasons for an unanticipated spike in network traffic: 1) lack of customer awareness (usage) by Microsoft; or, 2) a DDoS attack. Let’s call it what it was, a DDoS attack that was moderately successful. I fully expect that Microsoft is addressing possible network throughput chokepoints in anticipation of future DDoS attacks.
Azure Status
Bleeping Computer
The US Office of Management and Budget (OMB) has extended the deadline for agencies to obtain software security self-attestation letters from contractors. Originally, agencies had until June 12 to collect self-attestations from providers of critical software and until September 14 to collect the letters from all vendors. The deadline has now been extended to three months after OMB creates a common self-attestation form for critical products, and six months for non-critical products. According to the updated guidance from OMB, agencies will not need to collect self-attestation letters for open-source software.
This changes the impact of the Supply Chain Risk Management (SCRM) aspect of EO 14028. Yeah, this is the prevent a future SolarWinds plan. Essentially NIST SP 800-218 laid out the requirements with OMB M-22-18 setting the enforcement timeline. M-23-16 adds 3-12 months to the process and removes the attestation requirement for open-source attestation. This alleviates the process at one level but doesn't remove the need to make sure that you're still using the genuine components rather than an "improved" package with "special" features. Note that timing is still tied to the release and approval by OMB of a common form for attestation.
Extensions to OMB mandate deadlines are pretty much standard practice but Software Bills of Material are not very useful if all the software is packed with vulnerabilities because of shoddy development practices.
The extension is reasonable given that the self-attestation form is still in draft form with industry comment through 26 June. Further, even if software vendors cannot meet one or more of the reporting requirements, they can simply submit a PO&M to the government and continue to offer their products for purchase. It is a bit puzzling though that web browsers would be excluded from reporting given their importance and the fact the top browsers are all developed by well-established software vendors.
White House
Security Week
Fedscoop
Nextgov
Apple is improving privacy and security protections in a range of its products. Link tracking protection in Messages, Mail, and Safari Private browsing will remove tracking data from shared links. A new iOS feature will allow users to share specific pictures with apps while keeping other private. Lockdown Mode will get new features and will be supported on watchOS.
It is a very good thing to see Apple, Microsoft, Google and others react to increased consumer attention (and in the numerous US state laws) to privacy. The best way for security/privacy to be built into software is for buyers to demand it.
Expect these improvements to arrive with iOS/iPadOS 17, watchOS 10 and macOS 14. Sensitive content warnings as well as more information on requested permissions/data use should help guide users. Note that Apple is working to have default-deny if you click the alert without agreeing to the access. While you can access the Developer Beta of these operating systems now, you may want to test them on your backup devices rather than your daily drivers.
Apple continues to make strides in security and privacy, in many ways leading the industry for mobile devices. My one concern with all these different options is complexity. Helping people use technology safely and securely is my full-time job, and I have a hard time enabling all the security options, which can change year to year. So to make security / privacy effective, Apple has to ensure they make it simple (or default). So far Apple has done a decent job of it, and to be honest I can’t think of any company better prepared to make security simple. However, security is of little value if it’s so complex people don’t use it.
Apple
The Hacker News
PC Magazine
9to5mac
The government of the Australian Capital Territory said that it suffered a security breach as the result of a compromised Barracuda Email Security Gateway (ESG). Barracuda disclosed the critical remote command injection vulnerability on May 19 and issued a fix on May 20. More recently, Barracuda urged users whose appliances were compromised to replace them instead of applying patches. The ACT government said that although it had rebuilt its Barracuda system following the vulnerability’s disclosure, an investigation revealed that a data breach had occurred.
Threat hunting, checking for IOCs, has to be continuous. In the ESG case, there was a red flag for you to not only address the ESG but also check for compromise. The trick is you can't sit back waiting on the next alert that something you have is vulnerable or being exploited, you need to be continuously ingesting IOCs and looking for anomalous behavior.
On the surface, Barracuda’s response to the vulnerability was quick. That said, details from the internal investigation imply the evil-doers had compromised the software months before. That’s plenty of time to target and exfiltrate data from compromised devices. The ACT government now has to conduct a damage assessment as well as plan for replacement of the affected devices.
Progress Software has released a patch to address additional vulnerabilities in its MOVEit Transfer file transfer application. Last week, Progress released a patch to fix a critical SQL injection vulnerability in MOVEit. The newly-disclosed vulnerabilities are also SQL injection issues. Progress urges customers to install the June 9 patch.
If you're using MOVEit, do three things immediately. First, apply the patch, second, make sure that you're running a secure configuration, lastly, assume compromise, leveraging the resources on the Progress blog site below to discover unwelcome advances.
By now every organization that uses MOVEit Transfer is well aware of vulnerabilities in the application. Those organizations are left with two things to do: 1) assess for compromise; and, 2) download and install patches as they become available.
Authorities in South Korea have arrested and indicted a former Samsung Electronics executive for allegedly stealing technological intellectual property (IP). The individual hired 200 Samsung and SK Hynix employees and allegedly directed them to steal information from those companies. He allegedly intended to use the information to build a chip manufacturing facility in China.
This report highlights the risk to organizations from insiders who have malicious intent. An insider threat program can help but it cannot fully eliminate the risk. Bottom line: it’s virtually impossible to protect a company’s intellectual property from employees (to include contractors) who have access.
This is an excellent case study in the importance of protecting IP. Humans remain the weakest link, which is why they are targeted. Keep in mind that adversaries like China think in much longer timeframes than we do in the US, like 10-, 50- or 100-year plans, emphasizing the need to both be vigilant and update/adapt your processes to secure IP and the humans responsible for it.
Swiss government agencies have been affected by a ransomware attack against a third-party technology provider and by distributed denial-of-service (DDoS) attacks. The Swiss government released a statement saying that some operational data may have been stolen as a result of the ransomware attack against Xplain, which provides software to some government agencies.
This DDoS attack and the ‘unanticipated spike in traffic’ affecting Microsoft Azure highlight the importance of frequent communication with your Internet Service Provider. Don’t wait until you’re the victim of a DDoS attack to have a discussion about service responsibilities and recovery. Additionally, the ransomware attack announced by Xplain highlights the importance of encryption, to include proper key management, when data is being hosted by a third-party cloud provider.
Indications are this is the "NoName" pro-Russian hacking group which targets NATO-aligned countries and entities in North America, Ukraine and Europe because Switzerland changed its neutrality stance to send aid to Ukraine. The Swiss are electing not to pay any ransom, instead working their response plan, which means the attacks continue while the impacted agencies are working to discover what was exfiltrated and prevent recurrence. Consider what your plan looks like in this scenario, and watch their progress for any tricks you can leverage.
Bleeping Computer
Security Week
Infosecurity Magazine
A recently declassified report released by the US Office of the Director of National Intelligence (ODNI) reveals that the US government is buying large quantities of data abouts its citizens. While obtaining phone location data would normally require a warrant, the government has circumvented that requirement by purchasing the information from private companies. The report also notes that deanonymization of data deemed to have been sanitized of personally identifiable information is “trivial.
This isn't the first time we've talked about location data being purchased through third parties to avoid having to follow the subpoena process to obtain it from wireless carriers directly. And the data comes not just from your mobile devices, but also your car, IoT, web site trackers, and other modern technologies. While government agencies may be on notice to toe the line on obtaining the information through law enforcement channels, our adversaries are under no such restraint. The real fix is strengthening laws protecting that data, it's use and proper anonymization, but with the value to private industry, it's best to make sure you take action to limit tracking and other information where you can instead of waiting for changes.
Geoserver Attack Details: More Cryptominers Against Unconfigured WebApps
Undetected PowerShell Backdoor Disguised as a Profiled File
https://isc.sans.edu/diary/Undetected+PowerShell+Backdoor+Disguised+as+a+Profile+File/29930
DShield Honeypot Activity for May 2023
https://isc.sans.edu/diary/DShield+Honeypot+Activity+for+May+2023/29932
Fortinet Update CVE-2023-27997
https://www.fortiguard.com/psirt/FG-IR-23-097
Fortinet Patches CVE-2023-27997
https://twitter.com/cfreal_/status/1667852157536616451
Bitwarden Key Accessible By Low Privileged User
https://hackerone.com/reports/1874155
Western Digital SMART Flag Abuse
Second MOVEit Vulnerability
https://www.progress.com/security/moveit-transfer-and-moveit-cloud-vulnerability
Catch up on recent editions of NewsBites or browse our full archive of expert-curated cybersecurity news.
Browse ArchiveFree technical content sponsored by SANSFree Upcoming Solutions Forum | Join Dave Shackleford on Friday, June 23 as he chairs the Architecting a Cloud Security Guardrails Model Solutions Forum - we’ll break down the most common guardrails to consider within a cloud security architecture design and discuss best practices to enable and automate these over time + registrants will receive first access to the accompanying report written by Dave!
Upcoming Webcast on Thursday, June 15 at 3:30pm ET | Enhancing OT Security: A Dual Perspective on Threat Detection with Emerson and Dragos - Join us as Emerson & Dragos dive deeper into threat monitoring techniques, OT visibility, and incident response to better protect your industrial applications from cyber threats.
Upcoming webcast with Dave Shackleford on Thursday, June 15 at 1:00pm ET | Achieve Cloud Security at Scale - Join this session to gain a clear understanding of key cloud security challenges facing organizations and recommendations for staying secure at scale, while gaining the benefits of cloud agility.
Tune in on Tuesday, June 20 at 3:30pm ET for our upcoming webcast: The Future of Risk-Based Detection | Register now: https://www.sans.org/info/226315