SANS NewsBites

Prioritized Fast Patching of Windows and Kubernetes; Limit Controlled Unclassified Information Storage To Certified Cloud Services

September 15, 2023  |  Volume XXV - Issue #73

Top of the News


2023-09-12

September 2023 Patch Tuesday

variety of products. Five of the vulnerabilities are rated critical, and two are being actively exploited: a Microsoft Streaming Service Proxy Elevation of Privilege Vulnerability (CVE-2023-36802) and a Microsoft Word Information Disclosure Vulnerability (CVE-2023-36761).

Editor's Note

CVE-2023-36761 is the vulnerability to watch out for. It is not only already being exploited, but it is also not a difficult problem to exploit. Note that Windows 11 will soon have the ability to disable NTLM hashes for SMB which may help with problems like this in the future.

Johannes Ullrich
Johannes Ullrich

The Microsoft Word information disclosure vulnerability (CVE-2023-36761, CVSS score 6.2) understates what's disclosed. This flaw discloses Net-NTLMv2 (authentication) hashes, which makes it very attractive to exploit. Also take note of CVE-2023-38148, a RCE flaw in the Internet Connection Sharing (ICS) service, where an unauthenticated attacker can exploit this just by sending a properly crafted packet to the ICS service. This flaw has the highest rating of the bunch at CVSS score of 8.8.

Lee Neely
Lee Neely

Rapid patching of any Windows vulnerability at least at Microsoft’s Critical level is the minimum that is defensible based on real world exploitation of unpatched Windows systems.

John Pescatore
John Pescatore

Interestingly, the two vulnerabilities being actively exploited have relatively low CVSS scores yet, can lead to either loss of user credentials or system-level access. Follow the standard security advice by prioritizing critical vulnerabilities first, as part of your patch cycle.

Curtis Dukes
Curtis Dukes

2023-09-14

Penn State University Facing Lawsuit Over Cybersecurity Protocol Compliance

A lawsuit filed against Pennsylvania State University alleges violations of the False Claims Act. The lawsuit alleges that the university lied to or misled federal officials regarding its compliance with cybersecurity requirements while contracting with the government. As a contractor, the university handles controlled unclassified information (CUI). Adequate protection for CUI is, at a minimum, implementing the National Institute of Standards and Technology (NIST) Special Publication 800-171, Protecting Controlled Unclassified Information in Nonfederal Information Systems and Organizations.

Editor's Note

This is a complex case with many claims being made, but one thing that stood out to me: Penn State had selected a FedRAMP certified cloud storage solution for CUI data but ended up using the Microsoft 365 OneDrive consumer cloud storage service instead, which is not OK for CUI data. This is a common temptation: “We are already paying for these bundled storage services, why should we pay for these other services?” This one is a good example to use to convince management when there is a need to avoid that temptation.

John Pescatore
John Pescatore

An interesting sequence of events. The University has been claiming compliance with NIST 800-171, via self-attestation. Meanwhile, an interim Vice Provost and University CIO doesn’t get the permanent job, later finds misuse of the cybersecurity compliance self-reporting, and ‘dimes out’ the University six years later. A few points: 1) self-attestation is reasonable given that the DoD has upwards of 300,000 contractor organizations providing services; 2) in those six years, the DoD should have done a spot assessment for compliance to the cybersecurity requirements; 3) what took the whistleblower so long to file a complaint; and, 4) the government, when it finds potential fraud, should hold those contractor organizations accountable.

Curtis Dukes
Curtis Dukes

While the attorney general acknowledges that even well implemented security can have incidents, he is stating that in this case the University knowingly failed to implement and follow the required cybersecurity requirements in 800-171. The implementation of 800-171 has largely been a self-attestation, albeit an ATO was still required, new regulations will require third-party validation that controls are in pace to properly protect CUI. Stepping back, consider how your service providers are protecting your sensitive information to include how that is validated. If they are using services, do your protection requirements flow down to those third-party systems? Moreover, do you have clear, tested, reporting and response plans in place?

Lee Neely
Lee Neely

This is a civil suit brought, qui tam, by a private citizen, a former official of the defendant, on behalf of the government and himself, in his role as plaintiff-relator (whistle blower), a role defined in the False Claims Act. It seeks to recover financial damages which it asserts were suffered by the government as a result of false statements made by the defendant. It does not seek any other remedy. The suit does not specify the amount of the damages. It seeks a jury trial. This suit is about the money, not the false claims, not about security. It is punitive, not remedial. That said, the lesson for the rest of us is do not lie to the government.

William Hugh Murray
William Hugh Murray

2023-09-14

Update Kubernetes Clusters to Fix Vulnerabilities

A researcher from Akamai has found three vulnerabilities in Kubernetes; all three are due to insecure function call and lack of user input sanitization. The most serious of the bunch is a high-severity flaw that can be exploited to achieve remote code execution with SYSTEM privileges on Windows nodes within the machine. Kubernetes was notified of the vulnerabilities in July; they released fixes in August.

Editor's Note

This specifically apply to Windows endpoints in the cluster. In addition to applying the update, make sure you're limiting the number of users who can perform actions on a cluster. Another workaround is to disable the use of Volume.Subpath, which was being passed to a PowerShell script to evaluate and execute, without proper sanitization, test for impacts as you may be using it.

Lee Neely
Lee Neely

Good reminder to check that patch management processes actually extend to software like Kubernetes and the ability to update API objects on running configurations.

John Pescatore
John Pescatore

The Rest of the Week's News


2023-09-14

Malicious Linux Download Manager

Researchers from Kaspersky Lab say that a malicious version of Free Download Manager software backdoored devices that downloaded the malicious version of the software between 2020 and 2022. The malware also stole data, including “system information, browsing history, saved passwords, cryptocurrency wallet files, [and] credentials for cloud services.” Starting in 2020, visitors to the freedownloadmanager[.]org, which offers a legitimate version of Free Download Manager, were sometimes redirected to a site that offered the malicious version of the software. The redirected ceased in 2022.

Editor's Note

This malware has been available for about three years, and it appears a link on the legitimate website was used at times to direct users to the malicious version. A victim had no real indication that they are downloading malware.

Johannes Ullrich
Johannes Ullrich

Grab those IOCs and check for compromised systems. While the attack is inactive, you may still have cleanup. Probably want to bag any remnants of the Free Download Manager as well as it is unknown how systems were delivered the legitimate versus malicious version.

Lee Neely
Lee Neely

This attack seems to bear the hallmarks of being nation-state driven. Some addresses received a benign copy, others the buggered version. Once the spotlight was cast, poof it disappeared. It serves as a reminder to trust only your OS distributor.

Curtis Dukes
Curtis Dukes

2023-09-13

Europol Publishes Internet Organised Crime Assessment Report

Europol has published the Internet Organised Crime Assessment (IOCTA) 2023 report as well as a spotlight report, Cyber-attacks: the apex of crime-as-a-service. “IOCTA is Europol’s assessment of the cybercrime landscape and how it has changed over the last 24 months.” The cyber-attacks report is the first of three planned spotlight reports; the other two are online fraud and child sexual exploitation.

Editor's Note

The 22-page report notes the common attack vectors are exploits of vulnerabilities and misconfigurations, particularly VPN and RDP, particularly brute-force attacks of accounts not protected by MFA, inadequate or lacking firewalls. They also leverage vulnerable services, like ProxyShell on Exchange for launching phishing campaigns. Validation of your perimeter security, keeping services updated and using MFA are all well-known solutions here. Don't forget about outbound traffic protections. Only allowing access to approved services/ports/protocols is challenging, but worth in in the end. If the attacker's code can't connect to their services, it's a lot harder for them to operate.

Lee Neely
Lee Neely

This report is one of the best cybersecurity reports available as it reflects what police forces are seeing. While the scope of the report is by its nature focused on incidents police are involved in, it is still a good indicator of the key threats.

Brian Honan
Brian Honan

Kudos to Europol for publishing the report. If you routinely follow media reporting on cybersecurity events you will find nothing new in the report. If not, the report provides a good summary of cyber-attack trends over the past year.

Curtis Dukes
Curtis Dukes

2023-09-13

CISA Roadmap for Open Source Software Security

The US Cybersecurity and Infrastructure Security Agency (CISA) has an open source software security roadmap. The roadmap is built around four central goals: establishing CISA’s role in supporting the security of OSS; understanding the prevalence of key open source dependencies; reducing risks to the federal government; and hardening the broader OSS ecosystem.

Editor's Note

Goal 4, “Harden the OSS Ecosystem”, and in particular Objective 4.3 “Publish Guidance on OSS Security Usage Best Practices” are the most important parts of the CISA roadmap. Missing is an objective to drive adoption of those Best Practices by all consumers of federal funding.

John Pescatore
John Pescatore

Having a framework for getting your arms around the security of open-source software is a helpful thing. Best practices, vulnerability disclosure, education and help generating a SBOM are all in this roadmap. Also look to projects like Google's AOSS where they are signing packages as being the legitimate versions as well as scanned for vulnerabilities. Don't lose sight of the fact that even if your open-source components are genuine and free of malicious code, that doesn't mean they are free of flaws or may not work in combination with the other application components.

Lee Neely
Lee Neely

Establishment of a roadmap is but a small first step to ‘securing’ the open-source software ecosystem. I will be interested in the annual scorecard that CISA produces to demonstrate success against its roadmap and four central goals. That is, if CISA produces a scorecard.

Curtis Dukes
Curtis Dukes

2023-09-14

Caesars Entertainment Confirms Cyberattack

Caesars Entertainment has disclosed that it experienced a cyberattack that compromised a significant amount of data, including driver’s license and Social Security numbers from its loyalty database. In a Form 8-K filing with the US Securities and Exchange Commission (SEC), Caesars says, “We have taken steps to ensure that the stolen data is deleted by the unauthorized actor, although we cannot guarantee this result.”

Editor's Note

The statement by Caesars implies they paid a ransomware demand, and the Wall Street Journal is reporting they paid $15 million of the the initial $30 million demand. Caesars also states also are monitoring for use of the exfiltrated information and working with the affected IT service provider to prevent recurrence. Unlike the MGM incident, this didn't impact customer facing services: this appears to be an attack on a third-party service provider. Caesars made no mention of providing identity theft/recovery services for impacted club members, so if you're a Caesar's loyalty club member, make sure that you're covered.

Lee Neely
Lee Neely

Caesars is finally confirming what has largely been reported over the past week. In Caesar’s case, a compromise in outsourced business process operations is the culprit. Business process outsourcing was recently highlighted in the Cyber Safety Review Board (CSRB) report on LAPSUS$. Interestingly, it also appears that Caesars paid the ransom to prevent member data from being released publicly. We can argue the merits of that decision but ultimately it is the companies to make.

Curtis Dukes
Curtis Dukes

I love how the phrase “We have taken steps to ensure that the stolen data is deleted by the unauthorized actor, although we cannot guarantee this result” highlights the problem with paying ransom demands to criminals, who by their very nature are not very trustworthy.

Brian Honan
Brian Honan

2023-09-12

DOE Will Fund National Labs’ Grid Cybersecurity Projects

The US Department of Energy (DOE) will disburse $39 million among nine National Laboratory projects focused on strengthening the cybersecurity of the country’s distributed energy resources (DER). “DER systems include utility-scale solar, wind, storage and other clean technologies; behind-the-meter renewables and storage systems; electric vehicle chargers; and other customer-owned devices. These research, development, and demonstration projects will develop innovative cybersecurity tools and technologies for DER Systems, such as Distribution Management Systems, Distributed Energy Resource Management Systems, and DER aggregators.”

Editor's Note

As security of the grid and our critical systems remains forefront, these nine projects are designed to leverage modern technologies, AI, ML, IPv6, etc. to secure existing utility systems without disrupting them, as well as provide a model for future services which can be built with security in mind. These projects are collaborations between the national laboratories, universities, utilities and private sector companies.

Lee Neely
Lee Neely

2023-09-14

New Zealand Transportation Authority Suffers Cyberattack

The Auckland Transport (AT) transportation authority in New Zealand is dealing with a cyber incident that is causing problems with its integrated ticketing and fares system. AT is the authority for the region’s public transportation, which includes buses, ferries, and trains, and for building roadways and other transportation infrastructure.

Editor's Note

The primary impact is that users cannot easily top up (recharge) their Hop card. The guidance is to still use the cards, rather than try to bypass paying for travel (busses, trains, and ferries.) Ticketing machines are only taking cash, and users are unable to go to retailers to purchase concessions to make purchases with the Hop card or top them off. Ironically, the attack comes before the planned system upgrade to allow the use of Apple/Google pay, as well as credit/debit cards. There's another scenario to walkthrough - do you restore the old system, expedite the deployment of the new, or devise a hybrid?

Lee Neely
Lee Neely

2023-09-14

Update Azure HDInsight Instances to Fix XSS Vulnerabilities

Researchers from Orca security found eight cross-site scripting (XSS) vulnerabilities in various Apache services on Microsoft Azure HDInsight, an open-source data analytics service. The vulnerabilities were addressed in Microsoft’s August 2023 patch release. Organizations running Azure HDInsight need to update their instances to ensure the fixes are applied.

Editor's Note

This was a case of 6 stored and 2 reflected XSS vulnerabilities being discovered in the Apache services incorporated in Azure HDInsight (Hadoop, Spark, Kafka). Resulting in eight CVE identifiers (CVE-2023-36881, CVE-2023-35394, CVE-2023-38188, CVE-2023-35393, and CVE-2023-36877.) The flaws, which permitted input and variable manipulation, come back to input sanitization and output encoding. Beyond making sure your developers are sanitizing input and output, make sure that you're keeping your frameworks and related tools updated. Take a close look at what a WAF can do to help protect you, particularly from flaws in vendor provided applications or components.

Lee Neely
Lee Neely

Internet Storm Center Tech Corner

Microsoft Patch Tuesday

https://isc.sans.edu/diary/Microsoft+September+2023+Patch+Tuesday/30214

DShield and eqmu Sitting in a Tree: L-O-G-G-I-N-G

https://isc.sans.edu/diary/DShield+and+qemu+Sitting+in+a+Tree+LOGGING/30216

Uncursing the ncurses memory corruption vulnerabilities

https://www.microsoft.com/en-us/security/blog/2023/09/14/uncursing-the-ncurses-memory-corruption-vulnerabilities-found-in-library/

3AM Ransomware used if LockBit Fails

https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/3am-ransomware-lockbit

Backdoored Free DownloadManager

https://securelist.com/backdoored-free-download-manager-linux-malware/110465/

Foxit PDF Reader Updates

https://www.foxit.com/support/security-bulletins.html

macOS MetaStealer: New Family of Obfuscated Go Infostealers

https://www.sentinelone.com/blog/macos-metastealer-new-family-of-obfuscated-go-infostealers-spread-in-targeted-attacks/

Windows 11 to Support Blocking SMB NTLM Hashes

https://techcommunity.microsoft.com/t5/storage-at-microsoft/smb-ntlm-blocking-now-supported-in-windows-insider/ba-p/3916206

Arbitrary code execution via Windows Themes (CVE-2023-38146)

https://exploits.forsale/themebleed/

OpenSSL 1.1.1 End of Life

https://www.openssl.org/blog/blog/2023/09/11/eol-111/

Adobe Updates

https://helpx.adobe.com/security/security-bulletin.html