SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact UsThe US Securities and Exchange Commission has fined JP Morgan Securities $4 million for deleting data related to Chase Bank. Under the Securities Exchange Act, JP Morgan is required to retain emails for three years; the 47 million messages in question, which were dated from January-April 2018, were deleted in 2019. JP Morgan detected the issue and self-reported to the SEC in 2020. JP Morgan says responsibility for deleting the data lies with a third-party vendor they hired to manage their archived data.
A lot of errors in this one. A third-party vendor service was claiming to be compliant with FINRA rules of enforcing 3 year retention requirements, but neither JP Morgan or FINRA noticed that it really wasn’t. Good idea to check your processes or services to see if too little or too much deletion is really happening.
You can outsource the task but you cannot outsource the responsibility. Always make sure that your third-party suppliers are fully aware of the compliance, regulatory, legal, and contractual obligations your organization, and therefore they, have to operate under.
In a regulated space, archives are a big deal. Know your retention requirements, and what disposition means. In the public sector, that means you’re likely obligated to turn over records, including email, to the national archives.
This appears to have been a lapse by JP Morgan Securities in validating that the third-party vendor was meeting the compliance controls required for data retention. It’s a financially painful lesson for JP Morgan Securities but one that others can learn from.
Fortinet has released updates to address a deserialization of untrusted data vulnerability in its FortiNAC zero-trust access solution. The flaw could be exploited to execute code remotely. Users are urged to upgrade to FortiNAC versions 9.4.3, 9.2.8, 9.1.10, 7.2.2 or above. Although the vulnerability also affects FortiNAC versions 8.x, there will not be an update for those versions.
All right, let's roll those updates. If you're running FortiNAC version 8.x, you really need to upgrade. The flaw addressed, CVE-2023-33299 has a CVSS score of 9.6, and moreover, is likely one of your cornerstone solutions for zero trust. As we move into new worlds like ZTA, you're going to have to pay heightened attention to access control points to ensure they remain pristine.
I am always concerned when I read about large network vendors as they usually have product lines that we are familiar with and think of and product lines that are not what we would consider putting in an enterprise at all. Fortinet is a very large company that has moved beyond just firewalls, and as such, this story does not reflect FortiGate, which has been in the news for years. This bug affects FortiNAC, which I believe was the Bradford Networks Acquisition. Don’t expose these management interfaces to the internet; internally, try reducing the attack surface area.
The US National Security Agency (NSA) has published a mitigation guide for the BlackLotus Unified Extensible Firmware Interface (UEFI) bootkit malware. The NSA says that Microsoft’s efforts to address BlackLotus are insufficient: while “Microsoft issued patches for supported versions of Windows to correct boot loader logic, … patches were not issued to revoke trust in unpatched boot loaders via the Secure Boot Deny List Database (DBX).”
Basically, the task is to raise the bar on the UEFI by scanning it for inappropriate software and ensure its integrity, using application blockers to limit which updaters can run, and remove the MS Windows Production CA 2011 cert from the SecureBoot's DB on systems only running Linux. Note that you can only effectively remove the BlackLotus EFI binary by completely reimaging, so do all the up-front work to avoid this scenario.
If you have Windows devices in your environment, and chances are you do, read this document. This will require some work from teams to resolve, not a simple patch.
Patching is still the preferred solution for a product vulnerability. That said, sometimes in the rush to push a patch to protect its product users, compromises are made. The vendor, MSFT in this case, pushed two patches, but for reasons not mentioned, didn’t revoke trust in unpatched boot loaders via the Secure Boot Deny List Database. Having clarity on how active a threat this is would help organization make the risk determination to apply the resource intensive guidance listed by NSA, while waiting for the next update from MSFT.
In a Form 8-K filing with the US Securities and Exchange Commission, SolarWinds revealed that several current and former employees, including the company’s chief financial officer (CFO) and chief information security officer (CISO) have received notices indicating they may be facing SEC civil enforcement action. In the filing, SolarWinds notes that “the Wells Notices provided to these individuals each state that the SEC staff has made a preliminary determination to recommend that the SEC file a civil enforcement action against the recipients alleging violations of certain provisions of the U.S. federal securities laws.” The company itself has also received a Wells Notice.
The recently released national cybersecurity strategy emphasized the shifting of liability to product and service companies. This action appears to be another signal to the market that companies will be held responsible. What’s interesting though, is that the SEC recommended an enforcement action against SolarWinds over its public statements on cybersecurity and procedures governing such disclosures. Is this a case where the issue is about statements made, or not, in the context of financial regulations rather than a lack of appropriate application of cybersecurity?
This really just indicates the beginning of the investigation to see if failures that allowed this compromise to happen were known and not acted on, or just not known. From a customer perspective, both are equally bad – a supplier of software that is installed at the heart of IT operations with full access needs to be held to higher standards that require at least essential security hygiene be maintained to assure software product integrity.
The SolarWinds SEC issues will be interesting to follow as the MOVEit vulnerabilities surface. Is there going to be a correlation between the situations?
This is currently a case of he-says, she-says. The SEC states that SolarWinds didn't properly disclose their breach in 2020, while SolarWinds contends they performed as required. This is an argument to make careful records of not only your breach disclosures, but the basis or regulations you feel you were following.
Hopefully this is a step toward holding suppliers accountable for shipping malicious code.
A flaw in Microsoft Teams External Tenants feature allows attackers to bypass phishing safeguards and deliver malware to employees. The vulnerability affects Microsoft Teams with default configuration. The issue lies in an insecure direct object reference (IDOR) access control vulnerability. Microsoft has acknowledged that the flaw exists but does not plan to address it right away.
With so many companies using Teams, this could be an interesting bug. It’s more interesting that Microsoft will not address it right away. Typically, the reason is either that it’s a complicated thing to fix and will require some time to solve, or that it’s very difficult to exploit, and widespread exploitation has not happened. The silver lining here is that it’s a hosted service, so Microsoft will patch it for you.
Teams is one of those annoying Microsoft apps that seems to constantly turn itself on after being shut down, so many instances of it running with the default configuration even where it is not being used.
We’ve seen an increase in the use of collaboration platforms by enterprises, Teams being one example. These platforms allow seamless integration with other organizations. It stands to reason researchers [to include evil-doers] would start to probe this new means of access for malware delivery. It does reinforce the need for security vendors to ensure their products account for this access method. Bottomline though: effective configuration and patch management is still the best defense to limit the attacker’s foothold.
A cyberattack affecting systems at Canada’s Suncor Energy has caused problems for customers at Petro-Canada filling stations. The issues are preventing customers from logging in to accounts, earning rewards points, or paying with payment cards. Suncor has not yet provided details about the cyber security incident.
Looks like Suncor didn’t live up to the World Economic Forum “Cyber Resiliency Pledge” it signed just last year. That pledge was triggered by the Colonial Gas Pipeline incident, which highlighted that resiliency meant more than protecting OT and systems directly related to production/distribution – business is interrupted if billing/payment and other systems are brought down.
If you're going to a Suncor or Petro-Canada station, be prepared to pay cash, and that carwash season pass, not so much either. They still appear to be working on recovery, and their forensics don't yet indicate any customer data has been exfiltrated. We need to see what we can learn from this attack to see what's familiar and can be mitigated.
The Globe and Mail
Bleeping Computer
The Record
On Thursday and Friday of last week (June 22& 23) the US Cybersecurity and Infrastructure Security Agency (CISA) added 11 security issues to its Known exploited Vulnerabilities (KEV) catalog. These include three vulnerabilities affecting multiple Apple products; vulnerabilities in VMware Tools and VMware Aria Operations for Networks; vulnerability in Zyxel Network-Attached Storage (NAS) devices; three vulnerabilities affecting Roundcube Webmail; a vulnerability affecting Mozilla Firefox, Firefox ESR, and Thunderbird; and a vulnerability affecting Microsoft Win32k.
Remember when you eye-rolled all those Apple updates - yeah, top of the list, due 7/14. Go through the list and make sure that you're addressing these issues; there should be no surprises here. And some, like the Apple and Mozilla updates, are pretty standard so you can get those behind you right away.
A third-party vendor breach has prompted American Airlines and Southwest Airlines to begin notifying pilots that their personal data have been compromised. The third-party vendor, Pilot Credentials, manages pilot recruitment and applications for multiple airlines. The compromised data include government-issued identification numbers, including those for Social Security, driver’s licenses, Airman Certificates, and passports. The breach occurred in late April; Pilot Credentials notified American and Southwest about the incident on May 3. American and Southwest have both moved pilot applications to internal systems.
The Internet Systems Consortium (ISC) has released updated versions of BIND to address three vulnerabilities in the domain name system (DNS) software. All three issues are remotely exploitable and could be used to create denial-of-service (DoS) conditions. The vulnerabilities are fixed in BIND versions 9.16.42, 9.18.16, and 9.19.14 and BIND Supported Preview Edition versions 9.16.42-S1 and 9.18.16-S1.
Healthcare sector data security breaches reported to the US Department of Health and Human Services Office for Civil Rights (HHS OCR) so far this year affect more than 39 million people. Among the largest reported breaches: Managed Care of North America, which affected 8.86 million people; Pharmerica Corp., which affected 5.8 million people; and egal medical group, which affected 3.38 million people. (Note: Some of the breaches occurred in 2022 but were not reported to HHS OCR until 2023.)
This report highlights the fact that the healthcare sector has been and continues to be a target of cybercriminals. While not all have been attributed to ransomware gangs, a majority have. Victims should use the free credit monitoring services offered to monitor for identity theft.
Health IT Security
OCR Portal
The US Health Sector Cybersecurity Coordination Center (HC3) has published an analyst note warning that search engine optimization (SEO) poisoning attacks are increasingly being used against organizations in the US Health Care and Public Health sector. The note’s suggestions for detecting and preventing SEO poisoning attacks include implementing typosquatting detection and using indicators of compromise (IoC) lists.
In the SANS 2023 Threat Report, Katie Nickels pointed out the growth in SEO poisoning attacks across the board. See the webcast tomorrow, Wednesday, June 28: https://www.sans.org/webcasts/sans-2023-top-new-attacks-and-threat-report/
Entities reporting breaches enabled by MOVEit include the New York City Department of Education and third-party service provider PBI Research Services. The PBI breach has affected Genworth Financial, Wilton Reassurance, and the California Public Employees’ Retirement System (CalPERS).
Gov Infosecurity
Bleeping Computer
Bleeping Computer
Email Spam With Modiloader Attached
https://isc.sans.edu/diary/Email+Spam+with+Attachment+Modiloader/29978
Word Document with an Online Attached Template
https://isc.sans.edu/diary/Word+Document+with+an+Online+Attached+Template/29976
Quakbot Activity Obama271 Distrubution Tag
https://isc.sans.edu/diary/Qakbot+Qbot+activity+obama271+distribution+tag/29968
Camaro Dragon Infects USB Drives as well as Network Drives
BlackLotus Mitigation Guide
https://media.defense.gov/2023/Jun/22/2003245723/-1/-1/0/CSI_BlackLotus_Mitigation_Guide.PDF
Grafana Security Release
https://grafana.com/blog/2023/06/22/grafana-security-release-for-cve-2023-3128/
Microsoft Teams External Tenant Confusion
Free Smart Watches
https://www.darkreading.com/threat-intelligence/suspicious-smartwatches-mailed-us-army-personnel
Catch up on recent editions of NewsBites or browse our full archive of expert-curated cybersecurity news.
Browse ArchiveFree technical content sponsored by SANSHave you registered for the Government Security Solutions Forum 2023?
Tune in on Thursday, June 29 at 1:00pm ET as Dave Shackleford hosts our upcoming webcast: Is Retail a Security Fail?
SANSFIRE 2023 Bonus Session: Dodge the Sliver Bullet and Find the Smoking Gun | Tune in on Tuesday, July 11 at 12:30pm ET to learn about insightful community developed detections, and an open NDR that puts the power in your hands.
Dave Shackleford reviewed Google's reCAPTCHA Enterprise platform.