SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact UsIvanti has released a patch to address an API authentication bypass vulnerability affecting Ivanti Sentry Administrator Interface. The flaw affects all supported versions of Ivanti Sentry, previously known as MobileIron Sentry (9.18, 9.17, and 9.16). Older versions may also be vulnerable. The vulnerability can be exploited to modify Sentry configurations.
Ivanti's MobileIron products continue to be under scrutiny for bugs, and to their credit, Ivanti is jumping on fixing them quickly. Ivanti Sentry acts as a gateway for Active Sync and can also be a Kerberos Distribution Center Proxy (KKDCP) server, meaning it's a critical control point in allowing data and kerberos tickets to flow to your mobile device fleet. The flaw, CVE-2023-38035, authentication bypass, CVSS 9.8, lies in the configuration APIs on the MobileIron Configuration Service. Make sure that MICS, port 8443 is NOT exposed to the Internet, (restrict internal access as well), and get that patch deployed.
This is a double-edged issue where you have a critical component (MDM) with a manufacturer that at one point was the leader in the MDM space, combined with API authentication flaws which are very common in Web Applications. This is a good case study: If an attacker can get in your MDM they have access to plenty of your infrastructure to continue on. They can even deploy their own backdoors.
Bleeping Computer
Security Week
Ivanti
Ivanti
Google is testing a new Chrome feature that will alert users when extensions they have installed are removed from the Chrome Web Store, which indicates that the extension has been unpublished by the developer, taken down for violating Chrome Web Store policy, or identified as malware. The Safety Check feature is available for testing in Chrome 116 and will go live in Chrome 117, which is scheduled to be released on September 12.
This is one of those security features (like certificate revocation checking) that most of us thought were just built-in to browsers. After all, grocery stores quickly notify us that certain brands and date rangers of bagged lettuce were found to have e-coli. The first move in the browser world is almost always forcing the user to check and take action but Google has a good track record of fairly rapidly moving to automating security features to switch to only requiring user action to overcome security vs. enable it.
You have to imagine this was probably a bigger issue than we were led to believe if the Google team created this feature. Watch your extensions closely.
This feature will alert on three conditions: the item was marked as malware, the extension was taken down for violating Chrome Web Store policy or the extension was unpublished by the publisher. Suspect items will be available for review in the privacy and security section of the settings page under safety check.
As consumers, we often add extensions to our browser without a second thought. We then forget about the extension and its potential as a security risk. This safety check will give consumers pause to periodically check what extensions they have installed. Kudos to Google for continuing positive security changes to Chrome that quickly become standard features for modern browsers.
Chrome
Bleeping Computer
Infosecurity Magazine
A patch is available to fix a high-severity vulnerability in the WinRAR file archiver utility. The flaw could be exploited to attain arbitrary code execution by tricking users into opening a maliciously-crafted RAR file. The vulnerability was discovered by a Zero Day Initiative researcher who reported it on June 8; the flaw was addressed on August 2 in WinRAR 6.23.
The flaw is exploited when you decompress/open the RAR file. CVE-2023-40477 has a CVSS score of 7.8, so don't put this on the back burner, push out the updated WinRAR where installed.
Zero Day Initiative
The Hacker News
Bleeping Computer
The Register
A misconfigured Hotmail DNS Sender Policy Framework (SPF) record prevented recipient services from determining that the messages came from a trusted source. Hotmail users noticed last Thursday evening that messages were being returned with errors related to SPF.
Back in January, planes in the US couldn’t take off because a required Notice to Air Missions file that pilots needed to check before taking off had become corrupted. Microsoft quickly handled this self-inflicted wound to Hotmail, but a good reminder that File Integrity Management for a handful of files is a critical security process.
Now that we've implemented SPF, DKIM and DMARC, it's important to keep those updated and configured properly so legitimate email flows, as well as bogus messages are rejected. Consider the use case where you have a new service provider which is going to be sending messages on your behalf, from one of your email addresses, make sure your email and DNS teams are in the loop prior to having a "feature rich" announcement.
Microsoft, specifically on the “Microsoft account side” where the keys could have been compromised, and all the scrutiny around this, needs to have a few months of being out of the news for incidents. I’m hoping they can figure out what’s happening at that group to keep causing issues.
The last few weeks have been difficult for Microsoft’s image as a ‘security first’ company. We’ve had the yet to be explained loss of a critical signing key, and now a configuration change that resulted in a corrupted DNS file. Perhaps it’s time for Microsoft to revisit its configuration control processes.
The US Department of Health and Human Services (HHS) Advanced Research Projects Agency for Health (ARPA-H) has launched a program that will ultimately help protect the country’s healthcare system from ransomware attacks. The Digital Health Security (DIGIHEALS) Project is seeking proposals for technologies that will ensure the continuity of patient care when healthcare entities experience cyberattacks.
Looking at most healthcare security incidents (and really most security incidents in all verticals) flaws in processes and people skills (which are needed to develop and implement effective and efficient processes) are 99% of the time what enabled the attack to succeed. There are definitely unique challenges, especially in the US, in how healthcare is funded, staffed and delivered that could benefit from innovation in how technology can be more usable in life and safety environments.
Technology advances create efficiencies in delivery of vital services. Unfortunately, when a ransomware event occurs, technology becomes the Achilles’ heel for organizations, and they are left to reconstitute business operations using manual processes. This is certainly true in the healthcare sector. In the short term the most effective protection against ransomware is adequate funding for basic cyber hygiene using an established cybersecurity framework such as the CIS Critical Security Controls.
As healthcare providers are often on a tight budget, this is a chance to get needed funding to implement security measures. Anything we can do to raise the bar for the healthcare industry will help; there is no indication that there will be a reduction of attacks focused on this sector.
Well-intended if somewhat speculative. In the meantime, encourage strong authentication and isolation of mission critical patient facing (clinical) applications from high risk Internet facing (e-mail, browsing) applications.
Juniper has released updates for the Junos OS J-Web interface to fix four vulnerabilities that can be combined to attain unauthenticated remote code execution. While each of the vulnerabilities separately have severity ratings of medium, when they are chained together, the severity rating increases to critical.
While you're waiting for the outage window to apply the update, you can either disable the J-Web interface, or limit access to trusted hosts only. These devices should already be in your prioritized updates category. Don't get sidetracked with the individual CVSS scores of the weaknesses, CVE-2023-36844 through CVE-2023-36847, _COMBINED_ they are rated as critical.
Security Week
The Hacker News
Juniper
Jenkins has published a security advisory alerting users to 19 vulnerabilities in a variety of its products. Among the flaws addressed are four high severity issues: stored cross-site scripting vulnerabilities in Shortcut Job Plugin, and Docker Swarm Plugin, and Flaky Test Handler Plugin and a cross-site request forgery (CSRF) vulnerabilities in Folders Plugin.
Exploiting CVE-2023-40336 could result in approval of unsandboxed scripts resulting in unsafe execution. Two of the flaws, CVE-2023-40342 and CVE-2023-40346 are due to improperly escaped content. Long story short install the updated components: Blue Ocean version 1.27.5.1, Config File Provider version 953.v0432a_802e4d2, Delphix version 3.0.3, Flaky Test Handler version 1.2.3, Folders version 6.848.ve3b_fd7839a_81, Fortify version 22.2.39, NodeJS version 1.6.0.1, and Shortcut Job version 0.5.
Products like Jenkins that are sold to implement Continuous Integration/Continuous Delivery pipelines have features like SafeReStart and Quiet Start that enable pipelines to be seamlessly and safely resumed – great candidates for fast patching!
Given Jenkins use in automating software development and delivery pipelines… you know the drill, patch now.
The US National Credit Union Administration (NCUA) has announced that as of September 1, 2023, all federally insured credit unions must notify them of “reportable” cybersecurity events within 72 hours after becoming aware of the incident. NCUA defines a reportable incident as one that results in “a substantial loss of confidentiality, integrity, or availability of a network or member information system, … a disruption of business operations, or unauthorized access to sensitive data.”
The recent SEC rule changes mandate notification within 96 hours for public financial institutions that suffer a material breach. The NCUA is requiring notification with 72 hours for ‘reportable’ cybersecurity breaches. Let’s not argue the efficacy of 72- vs 96-hour notification, but rather, harmonize on a single reporting standard for the financial sector, and perhaps every industry sector.
If you're on a CU board, ask your CEO for details on what they consider the thresholds are for reportable events and if they are clear on who is responsible to report and how. Then determine what notification you, as a board, expect. Remember you're governing, not operating.
Fairly obvious requirement, good definition of what triggers the requirement, reasonable time.
Australian software company Energy One has disclosed that its network was the victim of a cyberattack last week. The company says that the incident affected systems in the UK as well as in Australia. They have not yet determined if the attack affected customer-facing systems and what data were compromised.
Nothing definitive yet. Keep an eye on their web site for updates on what was breached and current state.
Think supply chain.
SystemBC Scans and ProxyNation
https://isc.sans.edu/diary/SystemBC+Malware+Activity/30138
From a Zalando Phish to a RAT
https://isc.sans.edu/diary/From+a+Zalando+Phishing+to+a+RAT/30136
Exchange Server Security Update Re-Release
Ivanti Sentry Vulnerability Exploited
Hotmail SPF Record Error Leads to spam false positives
DUO Security Outage
https://status.duo.com/incidents/rw7g0q7ztj8f
mTLS Vulnerabilities
https://github.blog/2023-08-17-mtls-when-certificate-authentication-is-done-wrong/
RARLAB WinRAR Recovery Volume Vulnerability
https://www.zerodayinitiative.com/advisories/ZDI-23-1152/
Chinese Entanglement | DLL Hijacking in the Asian Gambling Sector
https://www.sentinelone.com/labs/chinese-entanglement-dll-hijacking-in-the-asian-gambling-sector/
Google Chrome to Warn Users of Malicious Extensions
https://betanews.com/2023/08/17/google-chrome-to-warn-users-about-problematic-extensions/
Catch up on recent editions of NewsBites or browse our full archive of expert-curated cybersecurity news.
Browse ArchiveFree technical content sponsored by SANS Security AwarenessUpcoming Webcast tomorrow, August 23 at 10:30am ET | WhatWorks in Building Security Culture and Maturity Across a Global Enterprise - Join us to find out how the deployment of the SANS Security Awareness platform can increase overall awareness of how to recognize and avoid security attacks.
Upcoming webcast on Thu, August 24 at 10:30am ET | The Importance of NDR Detection-in-Depth with Matt Bromiley and Corelight's Sr.
Tune in for our upcoming webcast, Navigating the App Sec Alert Overload: Strategies for Effective Application Security Monitoring on Tuesday, August 29 at 10:30am ET - Our speakers will share insights, strategies, and best practices for taming the alert overload while ensuring a strong security posture.
In our upcoming webcast, Forensic Assessment & Variant Discovery In Minutes on Tue, August 29 at 1:00pm ET - Attendees will learn how to complete a current environmental assessment in minutes and determine if they have or have ever been impacted by a threat.