SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact UsIn a joint advisory, the US Cybersecurity and Infrastructure Security Agency (CISA)m the National Security Agency, (NSA), the FBI, and cybersecurity agencies in Canada, the UK, Australia, and New Zealand warn that state-sponsored threat actors from the People’s Republic of China maintained presence in a US critical infrastructure systems for five years before being detected. The group, known as Volt Typhoon, is known to use living-off-the-land techniques to maintain persistent access in targeted systems. The international group of agencies has also jointly issued a publication titles “Identifying and Mitigating Living Off the Land Techniques.”
The attack "only" affected critical infrastructure systems. But at the same time, the techniques used will likely be used by other actors as well. Read the reports considering how you would prevent or detect these attacks against your systems.
I would give this a good read. This group is a bit more than opportunistic. It shows how they can leverage bugs in the VPN provider kit to get in and persist. I believe this group also targeted the same residential systems we all use. The fact that these threat actor groups are working this way is not by chance; the data is valuable to them.
Make sure your team realizes that living-off-the-land techniques are not hypothetical or classroom exercises, that they are in fact actively used. The mitigations should be basic cyber hygiene: apply patches for Internet-facing systems and services, deploy phishing resistant MFA, ensure logging is turned on both for application and OS activities, and you're storing them in a central logging system. Make sure you're equipping your team with current tools to help automate these processes wherever possible.
CISA
CISA
Cyberscoop
Bleeping Computer
Fortinet is warning that state-sponsored threat actors are exploiting known vulnerabilities in FortiOS. One of the vulnerabilities, CVE-2022-42475, is a heap-based buffer overflow for which Fortinet issued a patch in December 2022. The second vulnerability (CVE-2023-27997) is also a heap-based buffer overflow for which Fortinet issued a patch in June 2023.
Keep your perimeter security devices up to date. Simultaneously, think about how you would detect a compromise of a perimeter security device. What kind of detective controls do you have in place to alert you of a misbehaving device?
The latest FortiOS can automatically update the system on a specified interval. To many FortiGate users, this may be a non-starter given the number of defects on the system at times. However, since most people are having a tough time keeping their systems even reasonably up to date, it may be a good option for those who don’t want to consider it. I know of one person who has a simple configuration on their FortiGate and has been running the automatic updates since the feature came out about six months ago. Suppose you find that people do not want to manage features and have the fewest options; this may be a reasonable choice. Another thing is that a writeup from the Dutch MOD describes how the implant works: you may want to read through it to see how FortiGate works under the hood.
Fortinet
Security Week
Bleeping Computer
NVD
NVD
On Thursday, February 8, Ivanti disclosed yet another vulnerability that affects certain versions of their Connect Secure and Policy Secure products. Ivanti has released updates to address the high-severity flaw, which can be exploited to ”allow an attacker to access certain restricted resources without authentication.” This is the fifth Ivanti vulnerability to be disclosed so far this calendar year.
Title says it all. Have a plan to move on from Ivanti.
CVE-2024-22024 has a CVSS score of 8.3, and the fix is to apply the patch when released. If the patch hasn't been released for your version of Connect Secure and Policy Secure, Ivanti claims the mitigation from January 31 will address this. Due to the visibility of these services, and Ivanti's ongoing struggles, it'd be a good time to take a look at alternative solutions (as in having a fully fleshed out plan to switch) in the event management's risk tolerance is exhausted.
Your VPN devices, specifically SSL VPN devices, may have code and architecture developed 20 years ago. This is not a coincidence we see bugs.
Ivanti’s ‘vulnerability bell’ continues to be rung this year and we’re barely into February. If you’re using Ivanti products, be hyper vigilant in monitoring your network and be quick to respond to Ivanti vulnerability advisories.
JetBrains has released an update to address an authentication bypass vulnerability in on- TeamCity On-Premises. The flaw affects TeamCity Om-Premises version 2017.1 through 2023.11.2. The vulnerability is addressed in version 2023.11.3. The vulnerability was discovered externally and reported to JetBrains on January 19.
If you're using the cloud version of TeamCity, you're covered. CVE-2024-23917, authentication bypass, has a CVSS score of 9.8. The patch is specific to this vulnerability; other issues need to be addressed by applying the needed updates separately. JetBrains is advising to make any unpatched Internet accessible TeamCity servers inaccessible until mitigations can be applied.
TeamCity is a CI/CD. Patch your CI/CD.
Security Week
The Register
Dark Reading
JetBrains
NVD
Various Linux distributions are in the process of patching a high severity out-of-bounds write vulnerability in shim, a piece of code that is used in Linux secure boot process. The flaw can be exploited to install malware that executes at the firmware level.
Turns out most of our modern Linux systems are using UEFI (rather than BIOS) and secure boot is likely to be enabled. If you're using secure boot, whether workstation or server, you need to deploy the updated Shim. While RedHat is getting the press on this update, it also applies to other Linux distros, including Debian, Ubuntu and SUSE. The risk here is the Shim is executing at the lowest levels of the boot process, so any malware introduced via the weakness has a significant attack surface which can be leveraged to manipulate the kernel or OS.
SC Magazine
Ars Technica
Dark Reading
Infosecurity Magazine
GitHub
NVD
The US Energy Information Administration (EIA) now requires certain cryptocurrency mining operations to provide information about their electricity consumption. The requirement applies to “identified commercial cryptocurrency miners.” EIA estimates that cryptocurrency mining accounts for as much as 2.3 percent of US electricity consumption.
At core, this is about managing the capacity of the US power grid. This targets reporting from legitimate mining operations. The volume of crypto mining in the US has been steadily increasing over the last decade, but in 2019 saw a big jump, and when China started cracking down on digital currency mining in 2021, much of this activity moved to the US. The resource intensive activity is known as “proof of work” used currencies like Bitcoin in the process for releasing new cryptocurrency, versus “proof of stake” used by currencies like Ethereum, which uses 0.005% of the power demand of "proof of work." Even so, one wonders how much other activities, such as EV's and moving away from natural gas, are impacting the U.S. grid.
Canon has disclosed seven critical buffer overflow vulnerabilities affecting some of its small office multifunction printers and laser printers. If affected devices are directly connected to the Internet, attackers could exploit the vulnerabilities to execute arbitrary code or create denial-of-service conditions. The vulnerabilities were disclosed last summer; firmware fixes were made available on February 5.
The suggested mitigations are to update the printer firmware then isolate the devices, which is going to be counter intuitive as you're likely to be used to setting them up for anyone to use. The trick is that with the capacity of modern printers, they have enough capability and connectivity to effectively be a pivot point. Consider limiting what they can connect to over the Internet as well, allowing only what is necessary for operation and updates.
It took Canon an inordinate amount of time to patch the seven critical vulnerabilities. That said, network printers are often overlooked when it comes to patch management. Hopefully, organizations are employing a secure network architecture that limits exposure of printers to the Internet.
Ensure that your printers, Canon and others, are connected only to the local network.
Dark Reading
Canon
Canon Europe
In early 2023, state-sponsored cyberthreat actors breached an unclassified network belonging to the Dutch Ministry of Defence. The intruders exploited a known vulnerability in a Fortinet VPN to place a remote access Trojan (RAT) malware in the system. The attack’s effect was limited due to network segmentation. A patch for the flaw was made available in December 2022 and the vulnerability was disclosed in January 2023.
The good news is the attackers were limited to one network segment. The bad news, they compromised their devices using old flaws that hadn't been fixed. The COATHANGER malware is persistent, surviving reboots and firmware updates, and is purpose built for FortiGate appliances. If you're having trouble getting support to keep your Fortinet VPN updated (see story about exploits to old Fortinet bugs), use this story to make your case. At this point, you're going to want to assume compromise adding factory reset to your activities.
Two points to call out: 1) Timing of the attack from when a patch was generally available; and 2) Network segmentation for the assist in limiting the attack from spreading. For one, while we don’t know precisely when the attack was found (early 2023), we do know that a patch was available in December 2022. It speaks to the need to be vigilant in patching critical vulnerabilities. For two, network segmentation is a key safeguard in maintaining a secure network architecture. It’s one of CIS’ critical security controls (CSC 12.2).
Gov Infosecurity
Bleeping Computer
NIST
Google’s Threat Analysis Group (TAG) has published a report, Buying Spying: How the commercial surveillance industry works and what can be done about it. TAG observes that nearly half of all zero-day exploits that target Google products come from commercial surveillance vendors.
Commercial surveillance is big business, the spyware vendors (NSO Group, Variston, Negg Group, Intellexa, RCS Lab, etc.) are licensing their services for millions of dollars. They are not just going after zero-days, they are going after unpatched flaws as well. Your primary mitigation is to make sure that devices are updated and patched, which means lifecycle management as well, then apply appropriately locked down configurations in risky areas. Give consideration to requiring loaners for out of the country trips, particularly to sensitive countries, to include destruction of the loaner when returned.
An excellent read, well done TAG. Three things to highlight: 1) the relatively large number of commercial surveillance vendors creating spyware; 2) the number of 0-days that are found and used against both Google and Apple products; and 3) the advanced skillset that exists outside of government. Bottomline, it a very lucrative business to be in if you have the right technical skills.
Google APIs
SC Magazine
Bleeping Computer
LastPass detected a fraudulent LastPass app in the iOS app store. A LastPass blog post notes that “the app attempts to copy our branding and user interface, though close examination of the posted screenshots reveal misspellings and other indicators the app is fraudulent.” Apple has removed the app from its store.
It is not frequently that we hear of a fraudulent app being published in the Apple App store. As additional app stores become available (based on the EU ruling to allow competing sources of iOS apps), this is going to be a more common concern as they will not have the same level of rigor for publishing apps as Apple does. Be prepared to train users on selection, and where possible restrict access to only vetted app stores.
Perhaps a coincidence or more likely an attempt to discredit Apple given the recent European court ruling to open their app store to competition. Whatever the reason, one of the very few times that a fraudulent app got past Apple’s app vetting process.
If you are still using LastPass, best to check your copy.
Computer viruses are celebrating their 40th birthday (well, 54th, really)
Anybody knows what this URL is about? Maybe Balena API request?
https://isc.sans.edu/diary/Anybody+knows+that+this+URL+is+about+Maybe+Balena+API+request/30628
A Python MP3 Player With Builtin Keylogger Capability
https://isc.sans.edu/diary/A+Python+MP3+Player+with+Builtin+Keylogger+Capability/30632
Fake LastPass App in Apple App Store
Ivanti XXE Vulnerability
FortiOS sslvpnd vulnerability
https://www.fortiguard.com/psirt/FG-IR-24-015
Critical shim vulnerability and patch
https://github.com/rhboot/shim/releases/tag/15.8
Volt Typhoon Lessons Learned
https://www.cisa.gov/resources-tools/resources/identifying-and-mitigating-living-land-techniques
Critical Security Issue Affecting TeamCity On-Premises CVE-2024-23917
Resume Looters
https://www.group-ib.com/blog/resumelooters/
Facebook Advertising Spreads Novel Malware Variant
https://www.trustwave.com/hubfs/Web/Library/Documents_pdf/FaceBook_Ad_Spreads_Novel_Malware.pdf
Catch up on recent editions of NewsBites or browse our full archive of expert-curated cybersecurity news.
Browse ArchiveFree technical content sponsored by SysdigUpcoming Free Virtual Event on Thu, February 29 | SOAR Into 2024: Harness the Power of the 5/5/5 Benchmark for Cloud Detection and Response - Tune in as Dave Shackleford and industry experts show you how to keep your cloud-speed business innovation secure from cloud-speed exploitation.
Upcoming Webcast: Modernizing AppSec with Application Security Posture Management | Join Matt Bromiley and Idan Elor from Apiiro on March 6 at 1PM ET as they discuss how to secure applications, a complex and cumbersome issue many organizations have yet to solve.
Buyers Guide: How to Secure Egress Traffic from Workloads in the Public Cloud | Tune in on March 12!
Shining a Light in the Dark: Observability and Security on March 21 | Join Matt Bromiley and Elastic’s Security and Observability experts Gagan Singh and Jennifer Ellard to discover how a convergence between security and observability empowers your teams.