SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact UsGoogle’s Threat Analysis Group (TAG) has “observed multiple government-backed hacking groups exploiting the known vulnerability, CVE-2023-38831, in WinRAR” a Windows file archiving utility. The high-severity bug has been exploited since early 2023; RARLabs released WinRAR 6.23 in August to address the vulnerability.
You may be noticing a recurring theme of exploiting unpatched vulnerabilities recently. The take-away is to make sure that you’re applying patches, particularly critical ones, in a timely fashion. Where you have long intervals between updates, e.g., in business or mission critical systems, maximize the defenses around those to reduce the risk. Updates to end-user, commodity, and perimeter systems should be standardized changes so you can apply patches rapidly.
This is an example of cybercriminals ‘banking’ on organizations’ slowness in downloading and installing software updates. The zero-day was first seen in the wild in early April, but you really couldn’t do much but monitor for signs of attack. Fast-forward, update released in August that fixes the underlying vulnerability. Fast-forward again to October and organizations still being exploited. Unfortunately, still a lot of work to be done in automating the software update process to get out in front of the exploit cycle.
Dark Reading
Bleeping Computer
Gov Infosecurity
RARLAB
NVD
A survey of risk and compliance professionals found that two of the top four ranked internal threats to businesses included ransomware and security breaches, and state-sponsored attacks. While generative AI did not make the top of the list, “a majority of risk and compliance pros say employee use of generative AI opens the door to business risk, adding that less than 10% of companies are prepared to mitigate internal threats associated with the emerging tech.”
I’m going to skew old here, but you didn’t see risk surveys back when Visicalc, the first spreadsheet for a personal computer came out, or later when Lotus 123 and then Microsoft Excel turned spreadsheets into ubiquitous business software that has been responsible for a huge volume of data leakage and exposure (as well creation of intentional and unintentional disinformation) in the name of increased productivity. Governance around data management was largely ignored and the mistakes repeated as relational databases followed – don’t make the same mistakes with AI!
Consider GenAI as emerging technology. It is incredibly powerful and has the promise of returning many employee hours of productivity. You need to learn how it differs from prior technology, to include how your GenAI engine is trained and what information it stores, and if possible, how it’s used. Decide how you want information created by GenAI to be handled/credited versus wholly original works as well as how you’re going to verify the information given as genuine.
Generative AI as a technology hold great promise in automating business workloads in virtually every industry vertical. That said, it will also force risk managers to reframe existing business risks in new, unforeseen ways. For example, data privacy: businesses have always had that as a risk from a confidentiality and availability perspective, but now they have to consider the integrity of the data used for business purposes. As companies start to implement AI into business operations, the Chief Risk Officer has to be a part of the discussion.
Insider error and malice are the internal risk. Generative AI and LLMs in particular represent a major advance in user interfaces to the computer. They permit us to express the results that we want in natural language. They make the computer an easier to use tool. However, it remains a tool. Tools vary in quality, utility, use, and usability. The user remains responsible for the selection of the tool, the purpose to which it is put, and all the properties of the result.
On Monday, October 16, Cisco disclosed that a critical zero0day security flaw in its IOS XE software was being actively exploited. On Tuesday, researchers from VulnCheck said that the number of infected IOS XE Internet-facing devices was estimated to be 10,000. By Thursday, that number had increased to 40,000.
Do a scan and make sure you’re not a member of that community. Cross check with asset discovery tools. If you’ve got IOS XE devices, not only make sure that access to their management interface is not Internet accessible, or disabled, but also take steps to protect or disable any Internet exposed management interfaces.
Let me start by saying that I am very comfortable with the Cisco CLI because I remember using CatOS. The only reason I have thought of enabling the HTTP server on these devices would be to support some captive web portals. With that out of the way, I will be clear here on my comments. Using the Web Interface for a Cisco router or switch outside of something like the Viptela acquisition or Meraki is a terrible idea that should never be considered. The CLI is possibly the best way to manage it; outside of some network management system requiring it, this should never be consideredThe second statement is, why would any of your control plane items be on the internet, SSH, or HTTP? It doesn’t matter; you're asking for trouble.
With the announcement, the exploit clock started ticking as every criminal gang and nation state went ‘full tilt’ on the offensive. Best advice for organizations continues to be, follow Cisco’s mitigation guidance until an update is available.
SC Magazine
Ars Technica
Security Week
VulnCheck
Censys
NVD
The US Cybersecurity and Infrastructure Security Agency (CISA), along with 17 global partners, has updates secure-by-design guidance for software manufacturers. “The authoring organizations strongly encourage every technology manufacturer to build their products based on reducing the burden of cybersecurity on customers, including preventing them from having to constantly perform monitoring, routine updates, and damage control on their systems to mitigate cyber intrusions. We also urge the software manufacturers to build their products in a way that facilitates automation of configuration, monitoring, and routine updates.”
Unfortunately, the key phrase is “strongly encouraged” – in ancient programming languages, this is what was known as a No-Op or NOP instruction which told the processor “read and do nothing.” The guidance is fine but it has been available for many years from many sources. Since legislation is not happening in the US at least, procurement pressure is what is needed.
Expect CISA and its global partners to continue refining their secure-by-design guidance with Industry review. For it to be ultimately successful, however, requires buy-in from regulators. Regulators can compel companies to make the necessary process and technology changes. We also have the added difficulty in how Industry shows compliance with secure-by-design requirements. Unfortunately, given politics in the US, Industry will mostly demur in implementing until at least 2025.
Since the first version, this guidance input from hundreds of software publishers was incorporated into the document. While it will take time to evolve existing SDLCs and supporting processes to secure by design, the message is clear: software must be designed to be secure by default. Read through the guide and see where you can change the bar. If you’re adopting secure by design principles, publicize them. Don’t wait for regulatory requirements to start down this path.
Ohhhh, we are supposed to make it so that people write SECURE software? I had this all wrong this whole time! I get the idea it should not be the onus of the customer to ensure that these things are safe. It’s a great consumer protection idea. The problem is that it’s just a piece of paper without regulation or teeth.
CISA
Nextgov
MeriTalk
Axios
Following recent announcements that Google and Microsoft have implemented passkey support, Amazon has added support for passkeys on its website. WhatsApp has also announced that it will roll out passkey support for Android users.
Adding support is like putting a lock on the door but never actually setting the lock – a good first step but no increase in security. Google’s approach of making the passkeys the default but allowing users to switch to passwords is a much stronger approach and really what is badly needed today.
This is effectively for the web versions of the Amazon Shopping and other apps. The mobile versions still rely on a password. If you setup a passkey, and you’ve enabled 2FA, you are going to need to confirm that with a code from your 2FA to get setup, even though passkeys are intended to replace that. You may want to watch for support in the mobile apps before changing your account.
Welcome Amazon, to the potential of a passwordless future. It appears you still have some kinks to work out (one-time verification code) and some applications to add passkey support for; but all the tech giants are now aligning in the use of passkeys.
Use Passkeys! If you can use a physical hardware token, but in the event you can’t use passkeys.
Mazda has served a software developer with a Digital Millennium Copyright Act (DMCA) cease-and-desist letter regarding library that was used by Home Assistant integration Mazda Connected Services, which was also maintained by the developer. GitHub received a DMCA takedown order as well.
The software dependence of modern cars will soon become a major issue as these cars age. If car makers do not open their API and other interfaces, a car may become obsolete just like a smartphone. This may be even more of a problem if current EV startups end up failing and support will cease for their cars.
Unlike recent publications from Tesla, this researcher seems to have reverse engineered the Mazda API for a home-assistant integration, which users were using for clever automation/monitoring of their vehicles. The lesson here is to make sure you have proper permission before reverse engineering an API and sharing the resultant application, particularly if you’re using hidden features, even if you’re not charging or otherwise making money from those efforts.
The FBI, Europol, and other European law enforcement agencies have taken down the website that was used by the Ragnar Locker ransomware operators to post allegedly stolen information. According to the FBI, Ragnar Locker ransomware was used to launch attacks against 52 organizations between April 2020 and March 2022; targets included companies across the spectrum of critical infrastructure sectors.
This is the latest move this year by the FBI to take down ransomware gangs, the most recent being the Hive gang, limiting their ability to do “double extortion” of their victims. This doesn’t mean you can let down your guard when it comes to ransomware. It does mean law enforcement, the FBI and others, working together and separately, are working to reduce or eliminate the effectiveness of these threat actors.
Kudos to international law enforcement on the website take down. Unfortunately, the advantage is still with cybercriminals taking advantage of poor cyber hygiene. The best defense continues to be configure, patch, back-up, and monitor.
Kaspersky researchers have detected threat actors using the MATA backdoor framework to attack Eastern European organizations in the oil, gas, and defense industry sectors. The espionage campaign was ongoing between August 2022 and May 2023. Kaspersky first described the MATA framework in 2020; the threat actors have been using an updated version of MATA in the Eastern European attacks.
The MATA backdoor had been previously used by the Lazarus gang, but there is no ready connection to them for this campaign. The attack uses spear-phishing email to deliver Word documents, with a malware payload that leverages a flaw in Internet Explorer. Targeted or not, this is a good time to double down on your spear-phishing defenses.
The US Department of Justice (DoJ) has announced that “the United States seized 17 website domains used by North Korean information technology (IT) workers in a scheme to defraud U.S. and foreign businesses, evade sanctions and fund the development of the Democratic People’s Republic of Korea (DPRK) government’s weapons program.” The announcement also revealed that court-authorized seizure in October 2022 and January 2023 recovered approximately $1.5 million in ill-gotten gains.
The seized domains were leveraged to ensure the legitimacy of the workers seeking jobs in the US. The mitigation is to make sure you’re doing strong background checks of workers, particularly remote and foreign workers, as well as limiting access to only the IP they are hired to work on. Beyond aiding the home country, you may also wind up with a deemed export, which will get you in hot water, including fines, with the Department of Commerce.
(October 19, 2023)
Researchers from Symantec’s Threat Intelligence have detailed an espionage campaign against a Middle Eastern government. The threat actors are believed to be part of an Iranian cyberespionage group known as Crambus. The campaign maintained an eight-month dwell time in the government’s system between February and September 2023.
Read the Symantec blog for IOCs to add to your library. Review your protections and monitoring, in this case the attack concentrates on Exchange, to ensure you’re able to detect a compromise sooner than later. An eight-month dwell time has to become a thing of the past.
Hiding in Hex
https://isc.sans.edu/diary/Hiding+in+Hex/30322
Changes to SMS Delivery and How it Effects MFA and Phishing
https://isc.sans.edu/diary/Changes+to+SMS+Delivery+and+How+it+Effects+MFA+and+Phishing/30320
Honeypot Update
https://github.com/DShield-ISC/dshield/blob/main/README.md
Malicious Keepass Ads
Malicious JavaScript in Smart Contracts
https://labs.guard.io/etherhiding-hiding-web2-malicious-code-in-web3-smart-contracts-65ea78efad16
Oracle Quarterly Critical Patch Update
https://www.oracle.com/security-alerts/cpuoct2023.html
Citrix Vulnerability Exploited CVE-2023-4966
https://www.mandiant.com/resources/blog/remediation-netscaler-adc-gateway-cve-2023-4966
Exposed Jupyter Notebooks Exploited
https://www.cadosecurity.com/qubitstrike-an-emerging-malware-campaign-targeting-jupyter-notebooks/
Fake Traffic Tickets with QR Code
https://twitter.com/polizeiberlin/status/1713867011837567411
Synology NAS DSM Account Takeover: Not Random Random Numbers
https://claroty.com/team82/research/synology-nas-dsm-account-takeover-when-random-is-not-secure
Milesight Routers CVE-2023-43261
Catch up on recent editions of NewsBites or browse our full archive of expert-curated cybersecurity news.
Browse ArchiveFree technical content sponsored by SANSCyber Solutions Fest 2023 kicks off next week!
Upcoming Webcast on Tue, October 24 at 1:00pm ET | Identify, Evaluate, and Prioritize Industrial Cyber Risk - Join this webcast with Dean Parsons as he evaluates PAS Cyber Integrity, a new offering from PAS Hexagon designed to harden OT assets against cyber-threats, identify critical endpoint vulnerabilities and risks, enable rapid recovery, and more.
The bottom line: Risk centered IGA powered by ML is transforming enterprise security.
Top Tips for Safeguarding your Business with Mobile App Vetting | Join Domenica Crognale on November 1 at 1:00pm ET to learn best practices for mobile app vetting to protect your organization.