SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact UsOn Tuesday, August 8, Intel published 46 security advisories alerting customers to roughly 80 vulnerabilities in its software and firmware. Eighteen of the flaws are high-severity vulnerabilities that could be exploited to attain privilege elevation or cause denial-of-service (DoS) conditions. Among the vulnerabilities addressed is a side-channel attack nicknamed Downfall.
Downfall is another case of the CPU predictively using cached data (Gather) to speed processing, not unlike Spectre/Meltdown. Downfall affects as many as seven generations of Intel CPU/chipsets. The micro patch that addresses the vulnerability can cause as much as a 50% slowdown; you are going to want to regression test fully before deploying.
Intel
Intel
Wired
SC Magazine
Ars Technica
Dark Reading
Security Week
Security Week
Google is now releasing Stable channel Chrome security updates weekly in an effort to minimize the patch gap – the amount of time between a patch being released for testing and the patch being publicly released to the Stable channel. Previously, Chrome security updates were released every other week. The first update released under the new schedule is Chrome 116, which made its appearance on the stable channel on Wednesday, August 9.
With all the updates we’ve seen for Chrome, it’s not a huge surprise to see weekly updates to keep ahead of the curve. At this point you should have your browsers set to automatically update with a forced relaunch in under 48 hours, so you’re just verifying the updates are in place, rather than spending time packaging and deploying.
Kudos to Google for their efforts to steadily close the patch gap for one of their products. While not perfect (but then what is with cybersecurity?), it does force the evil-doer to work harder in developing and executing an exploit. The change to weekly security updates should have little to no impact on the user.
And almost no applications will be harmed by this progress.
The US National Institute of Standards and Technology (NIST) is seeking feedback on the newest draft of its Cybersecurity Framework, CSF 2.0. NIST would like to know “whether this draft revision addresses organizations’ current and anticipated future cybersecurity challenges, is aligned with leading practices and guidance resources, and reflects comments received so far.” The updated document also adds a Core Function to its Framework Core: Govern now joins Identify, Protect, Detect, Respond, and Recover.
This update extends the CSF from critical infrastructure to all organizations regardless of size. Now is the time to provide input for both relevance and impact to your business. Better still, leverage your local peers, professional associations, etc. to speak with a larger voice. Provide feedback by November 4th to cyberframework@nist.gov.
CSRC NIST
Nextgov
Infosecurity Magazine
This week, the UK Election Commission disclosed that its network suffered a “complex cyber-attack” in August 2021; the Commission learned of the incident in October 2022. The intruders had access to the Election Commission servers, which contain email, control systems, and electoral registers. It is possible that the intruders were able to gain access to the system by exploiting the ProxyNotShell vulnerability in Microsoft Exchange Server, which was disclosed in September 2022 and patched in November 2022.
A Time to Detect of 14 months for a critical national system is a huge failure in security operations. The Commission states they have taken needed mitigation steps (such as “We have strengthened our network login requirements…”) and improved monitoring – perhaps that explains why disclosure took 10 months.
This was an attack on election support systems, rather than devices at polling places, which included information about voters and their choices for opting/out of data sharing. The nine month delay of public notice from the Election Commission hints they don’t have good data to fully determine the extent of the breach. Make sure that your team has sufficient information, not only about what sort of data is on which systems, but also forensic data is being forwarded and available for analysis, to include both system and application logs.
Three things are bothersome about this data breach: 1) 14 months for the UK Election Commission to determine they had suffered a cyber incident; 2) nine months for the UK Election Commission to notify residents of the loss of PII; and 3) the e-mail server was exploited 12 months before the critical ProxyNotShell vulnerability was publicly announced; is this patient zero? None of these numbers inspire confidence in the Election Commission’s ability to protect UK citizen data.
Electoral Commission
TechCrunch
DoublePulsar
Ars Technica
The Register
Gov Infosecurity
On Tuesday, August 8, Microsoft released security updates to address nearly 90 security issues in multiple products. Six of the flaws are rated critical; two are being actively exploited. The US Cybersecurity and Infrastructure Security Agency (CISA) has added one of those issues, the Microsoft .NET Core and Visual Studio Denial of Service Vulnerability (CVE-2023-38180), to its Known Exploited Vulnerabilities catalog; Federal Civilian Executive Branch (FCEB) agencies have until August 30 to mitigate the issue.
Mirroring my comment on last month’s Microsoft Vulnerability Tuesday patch release: If you set your “must patch ASAP” threshold very high (9.8 CVSS base/8.5 temporal), 3 of the 88 Microsoft flaws require immediate attention. If, and you should, you add “anything already being exploited” that adds 2 more for a total of 6. Obviously, all patches should be applied but triaging to get the most dangerous ones done ASAP needs to be the strategy.
The critical updates also include Office components such as Teams and Outlook. Rather than worrying about which update meets the CISA requirement, push the entire update, focused on timely deployment as there are actively exploited flaws being addressed.
Maybe it’s me, but it seems as though the monthly patch cycle has become predictable. I mean, tens of security issues announced, check; CISA adds to the growing KEV catalog; check; FCEB agencies are given 30 plus days to mitigate, until they waiver; check; and, evil-doers continue to attack; check. Until ‘secure by design’ principles become routine, follow the standard security advice by prioritizing critical vulnerabilities first, as part of your patch cycle.
ISC SANS
KrebsOnSecurity
The Register
SC Magazine
Dark Reading
Security Week
New York Governor Kathy Hochul has introduced the state’s first cybersecurity strategy. She writes that, “This strategy unifies New York State’s cybersecurity services, functions, and operations … [and] provides a framework for aligning the actions and resources of both public and private New York stakeholders.” The strategy has four parts: a description of cyber threats; NY’s approach to managing these threats by being unified, resilient, and prepared; identification of critical stakeholders; and a description of the strategy’s five strategic pillars: Operate, Collaborate, Regulate, Communicate, and Grow.
The PDF of the strategy linked below is 21 pages in length. It will serve as a model for other states. A video of the Governor's introduction of the strategy can be found at https://www.youtube.com/watch?v=fQCtwcvmuks. While the drafting of the strategy was done at the NY Department of Financial Services (DFS), in her presentation the Governor demonstrated a remarkable grasp of the issues confronting the State and the Nation, ownership of the strategy, and a commitment to it. Well worth the thirty minutes.
The list of stakeholders appears broad enough, including city, county and state organizations, as well as New York State based offices of Homeland Security and military which raise the odds of success. This could be a model for others to follow.
Congratulations to New York State for publishing their first cybersecurity strategy. The true measure will be in how well they implement the strategy.
An international law enforcement effort led by Interpol has taken down a phishing-as-a-service (PaaS) platform that is believed to have compromised more than 70,000 users in 43 countries. Authorities in Indonesia have arrested two individuals in connection with the scheme; a third individual was arrested in Japan.
The good news is these types of law enforcement takedowns are no longer really newsworthy, any more than many other non-cybercrime law enforcement actions. But, much like newspapers still print (or publish online…) listings of restaurants that get shut down for health code violations, breached businesses should always be newsworthy to support smarter decisions both by buyers, and ideally proactive action by sellers and service providers.
It is encouraging to see continued progress on shuttering attack-based PaaS operations. While replacements will likely emerge, continued success in taking them down will hopefully give operators pause before establishing them.
Never underestimate the ingenuity of criminals to monetize all facets of a cyber operation.
Earlier this month at Black Hat USA 2023, the US Defense Advanced Research Projects Agency (DARPA) announced the AI Cyber Challenge (AIxCC), “a two-year competition aimed at driving innovation at the nexus of AI and cybersecurity to create a new generation of cybersecurity tools.” The competition has both a funded track and an open track. Proposals for the funded track are due next month; open track registration begins this fall.
There is as much as $20 million in funding from DARPA to create next generation cybersecurity tools in response to emerging AI capabilities. There will be follow up events at BlackHat and DEFCON for participants in the challenge. While there was a message of caution in the preceding BlackHat keynote on AI, this research is designed to tease out not only where we can go with AI, both mitigation of risks and leveraging capabilities to aid our cyber responders.
One hopes that this program will produce a new generation of tools rather than simply admiration of the problem that so often passes as research. IBM has been applying AI to the security of some its customers for several years. Their work demonstrates practical and efficient tools.
Researchers from the Department of Information Technology and Electrical Engineering (D-ITET) at ETH Zürich (Switzerland), a public research university, have disclosed details of a CPU side-channel attack that affects AMD processors. Dubbed Inception, the attack could lead to information disclosure. The attack involves a combination of “two phenomena that enable an unprivileged attacker to leak arbitrary information on all modern AMD CPUs: Phantom speculation and Training in Transient Execution.
Another case where the CPU’s attempt to predict execution paths can be abused to disclose information, in this case the return address. AMD is releasing updates, and they advise to use security best practices, as this flaw needs to be exploited by locally running code, such as only allowing trusted code to execute.
On Tuesday, August 8, SAP released 16 security notes to address vulnerabilities in multiple products. One of the most pressing issues SAP addressed is a critical (CVSS score 9.8) improper access control vulnerability affecting SAP Power Designer version 16.7. The security note that addresses this vulnerability also addresses an information disclosure vulnerability (CVSS score 5.3) in the same product.
Odds are your CFO is not going to want to give you the downtime to patch. Even so, work to regression test the updates through non-production environments to make a case to deploy these fixes sooner than later, particularly if you’re exposing your SAP environment to the Internet.
Microsoft Patch Tuesday
https://isc.sans.edu/diary/Microsoft+August+2023+Patch+Tuesday/30106
Some things never change, such as SQL Authentication "Encryption"
https://isc.sans.edu/diary/Some+things+never+change+such+as+SQL+Authentication+encryption/30112
Defender Pretender: When Windows Defender Updates Become a Security Risk
Dell Compellent Hardcoded Key
Vulnerabilities in Sogou Keyboard
https://citizenlab.ca/2023/08/vulnerabilities-in-sogou-keyboard-encryption/
Adobe Updates
https://helpx.adobe.com/security/security-bulletin.html
Tunnelcrack VPN Vulnerability
https://papers.mathyvanhoef.com/usenix2023-tunnelcrack.pdf
Mozilla VPN Vulnerability
https://www.openwall.com/lists/oss-security/2023/08/03/1
Non English Exchange Server Patch Issues
VSCode Token Security
https://cycode.com/blog/exposing-vscode-secrets/
Weekly Updates for Google Chrome
https://security.googleblog.com/2023/08/an-update-on-chrome-security-updates.html
Catch up on recent editions of NewsBites or browse our full archive of expert-curated cybersecurity news.
Browse ArchiveFree technical content sponsored by SANSCloud Security Exchange 2023 on Friday, August 18 | Join us for our biggest cloud security event of the year where we bring together experts from the world's largest CSP's: AWS, Google Cloud & Microsoft Azure on ONE virtual stage.
Upcoming webcast on Tue, August 22 at 1:00pm ET | The Future of Log Centralization for SIEMs and DFIR – Is the End Nigh?
Upcoming webcast on Thu, August 24 at 10:30am ET | The Importance of NDR Detection-in-Depth with Matt Bromiley and Corelight's Sr.
SANS Review: Google reCAPTCHA Enterprise | In this exclusive webcast, SANS Expert Instructor Dave Shackleford and Google Product Manager Badr Salmi dove into how reCAPTCHA Enterprise can provide organizations an entire ecosystem of tools for both detecting and responding to fraud.