SANS NewsBites

Lessons Learned from State Sponsored ICS Compromise; Perimeter Devices are Still a Big Risk

February 9, 2024  |  Volume XXVI - Issue #11

Top of the News


2024-02-08

Chinese State-Sponsored Cyber Espionage Group Maintained Persistent Access in US Critical Infrastructure System

In a joint advisory, the US Cybersecurity and Infrastructure Security Agency (CISA)m the National Security Agency, (NSA), the FBI, and cybersecurity agencies in Canada, the UK, Australia, and New Zealand warn that state-sponsored threat actors from the People’s Republic of China maintained presence in a US critical infrastructure systems for five years before being detected. The group, known as Volt Typhoon, is known to use living-off-the-land techniques to maintain persistent access in targeted systems. The international group of agencies has also jointly issued a publication titles “Identifying and Mitigating Living Off the Land Techniques.”

Editor's Note

The attack "only" affected critical infrastructure systems. But at the same time, the techniques used will likely be used by other actors as well. Read the reports considering how you would prevent or detect these attacks against your systems.

Johannes Ullrich
Johannes Ullrich

I would give this a good read. This group is a bit more than opportunistic. It shows how they can leverage bugs in the VPN provider kit to get in and persist. I believe this group also targeted the same residential systems we all use. The fact that these threat actor groups are working this way is not by chance; the data is valuable to them.

Moses Frost
Moses Frost

Make sure your team realizes that living-off-the-land techniques are not hypothetical or classroom exercises, that they are in fact actively used. The mitigations should be basic cyber hygiene: apply patches for Internet-facing systems and services, deploy phishing resistant MFA, ensure logging is turned on both for application and OS activities, and you're storing them in a central logging system. Make sure you're equipping your team with current tools to help automate these processes wherever possible.

Lee Neely
Lee Neely

2024-02-08

APT Threat Actors are Exploiting Known Vulnerabilities in FortiOS

Fortinet is warning that state-sponsored threat actors are exploiting known vulnerabilities in FortiOS. One of the vulnerabilities, CVE-2022-42475, is a heap-based buffer overflow for which Fortinet issued a patch in December 2022. The second vulnerability (CVE-2023-27997) is also a heap-based buffer overflow for which Fortinet issued a patch in June 2023.

Editor's Note

Keep your perimeter security devices up to date. Simultaneously, think about how you would detect a compromise of a perimeter security device. What kind of detective controls do you have in place to alert you of a misbehaving device?

Johannes Ullrich
Johannes Ullrich

The latest FortiOS can automatically update the system on a specified interval. To many FortiGate users, this may be a non-starter given the number of defects on the system at times. However, since most people are having a tough time keeping their systems even reasonably up to date, it may be a good option for those who don’t want to consider it. I know of one person who has a simple configuration on their FortiGate and has been running the automatic updates since the feature came out about six months ago. Suppose you find that people do not want to manage features and have the fewest options; this may be a reasonable choice. Another thing is that a writeup from the Dutch MOD describes how the implant works: you may want to read through it to see how FortiGate works under the hood.

Moses Frost
Moses Frost

2024-02-08

Ivanti, Again

On Thursday, February 8, Ivanti disclosed yet another vulnerability that affects certain versions of their Connect Secure and Policy Secure products. Ivanti has released updates to address the high-severity flaw, which can be exploited to ”allow an attacker to access certain restricted resources without authentication.” This is the fifth Ivanti vulnerability to be disclosed so far this calendar year.

Editor's Note

Title says it all. Have a plan to move on from Ivanti.

Johannes Ullrich
Johannes Ullrich

CVE-2024-22024 has a CVSS score of 8.3, and the fix is to apply the patch when released. If the patch hasn't been released for your version of Connect Secure and Policy Secure, Ivanti claims the mitigation from January 31 will address this. Due to the visibility of these services, and Ivanti's ongoing struggles, it'd be a good time to take a look at alternative solutions (as in having a fully fleshed out plan to switch) in the event management's risk tolerance is exhausted.

Lee Neely
Lee Neely

Your VPN devices, specifically SSL VPN devices, may have code and architecture developed 20 years ago. This is not a coincidence we see bugs.

Moses Frost
Moses Frost

Ivanti’s ‘vulnerability bell’ continues to be rung this year and we’re barely into February. If you’re using Ivanti products, be hyper vigilant in monitoring your network and be quick to respond to Ivanti vulnerability advisories.

Curtis Dukes
Curtis Dukes

The Rest of the Week's News


2024-02-07

JetBrains Patches Critical Vulnerability in On-Prem TeamCity

JetBrains has released an update to address an authentication bypass vulnerability in on- TeamCity On-Premises. The flaw affects TeamCity Om-Premises version 2017.1 through 2023.11.2. The vulnerability is addressed in version 2023.11.3. The vulnerability was discovered externally and reported to JetBrains on January 19.

Editor's Note

If you're using the cloud version of TeamCity, you're covered. CVE-2024-23917, authentication bypass, has a CVSS score of 9.8. The patch is specific to this vulnerability; other issues need to be addressed by applying the needed updates separately. JetBrains is advising to make any unpatched Internet accessible TeamCity servers inaccessible until mitigations can be applied.

Lee Neely
Lee Neely

TeamCity is a CI/CD. Patch your CI/CD.

Moses Frost
Moses Frost

2024-02-08

Fix Released for Linux Shim Bootloader Vulnerability

Various Linux distributions are in the process of patching a high severity out-of-bounds write vulnerability in shim, a piece of code that is used in Linux secure boot process. The flaw can be exploited to install malware that executes at the firmware level.

Editor's Note

Turns out most of our modern Linux systems are using UEFI (rather than BIOS) and secure boot is likely to be enabled. If you're using secure boot, whether workstation or server, you need to deploy the updated Shim. While RedHat is getting the press on this update, it also applies to other Linux distros, including Debian, Ubuntu and SUSE. The risk here is the Shim is executing at the lowest levels of the boot process, so any malware introduced via the weakness has a significant attack surface which can be leveraged to manipulate the kernel or OS.

Lee Neely
Lee Neely

2024-02-07

US Cryptomining Operations Must Report Energy Use

The US Energy Information Administration (EIA) now requires certain cryptocurrency mining operations to provide information about their electricity consumption. The requirement applies to “identified commercial cryptocurrency miners.” EIA estimates that cryptocurrency mining accounts for as much as 2.3 percent of US electricity consumption.

Editor's Note

At core, this is about managing the capacity of the US power grid. This targets reporting from legitimate mining operations. The volume of crypto mining in the US has been steadily increasing over the last decade, but in 2019 saw a big jump, and when China started cracking down on digital currency mining in 2021, much of this activity moved to the US. The resource intensive activity is known as “proof of work” used currencies like Bitcoin in the process for releasing new cryptocurrency, versus “proof of stake” used by currencies like Ethereum, which uses 0.005% of the power demand of "proof of work." Even so, one wonders how much other activities, such as EV's and moving away from natural gas, are impacting the U.S. grid.

Lee Neely
Lee Neely

2024-02-07

Multiple Vulnerabilities in Canon Printers

Canon has disclosed seven critical buffer overflow vulnerabilities affecting some of its small office multifunction printers and laser printers. If affected devices are directly connected to the Internet, attackers could exploit the vulnerabilities to execute arbitrary code or create denial-of-service conditions. The vulnerabilities were disclosed last summer; firmware fixes were made available on February 5.

Editor's Note

The suggested mitigations are to update the printer firmware then isolate the devices, which is going to be counter intuitive as you're likely to be used to setting them up for anyone to use. The trick is that with the capacity of modern printers, they have enough capability and connectivity to effectively be a pivot point. Consider limiting what they can connect to over the Internet as well, allowing only what is necessary for operation and updates.

Lee Neely
Lee Neely

It took Canon an inordinate amount of time to patch the seven critical vulnerabilities. That said, network printers are often overlooked when it comes to patch management. Hopefully, organizations are employing a secure network architecture that limits exposure of printers to the Internet.

Curtis Dukes
Curtis Dukes

Ensure that your printers, Canon and others, are connected only to the local network.

William Hugh Murray
William Hugh Murray

2024-02-06

Dutch Military Network Infected with Remote Access Trojan

In early 2023, state-sponsored cyberthreat actors breached an unclassified network belonging to the Dutch Ministry of Defence. The intruders exploited a known vulnerability in a Fortinet VPN to place a remote access Trojan (RAT) malware in the system. The attack’s effect was limited due to network segmentation. A patch for the flaw was made available in December 2022 and the vulnerability was disclosed in January 2023.

Editor's Note

The good news is the attackers were limited to one network segment. The bad news, they compromised their devices using old flaws that hadn't been fixed. The COATHANGER malware is persistent, surviving reboots and firmware updates, and is purpose built for FortiGate appliances. If you're having trouble getting support to keep your Fortinet VPN updated (see story about exploits to old Fortinet bugs), use this story to make your case. At this point, you're going to want to assume compromise adding factory reset to your activities.

Lee Neely
Lee Neely

Two points to call out: 1) Timing of the attack from when a patch was generally available; and 2) Network segmentation for the assist in limiting the attack from spreading. For one, while we don’t know precisely when the attack was found (early 2023), we do know that a patch was available in December 2022. It speaks to the need to be vigilant in patching critical vulnerabilities. For two, network segmentation is a key safeguard in maintaining a secure network architecture. It’s one of CIS’ critical security controls (CSC 12.2).

Curtis Dukes
Curtis Dukes

2024-02-06

Google Threat Analysis Group Report on Commercial Surveillance Vendors

Google’s Threat Analysis Group (TAG) has published a report, Buying Spying: How the commercial surveillance industry works and what can be done about it. TAG observes that nearly half of all zero-day exploits that target Google products come from commercial surveillance vendors.

Editor's Note

Commercial surveillance is big business, the spyware vendors (NSO Group, Variston, Negg Group, Intellexa, RCS Lab, etc.) are licensing their services for millions of dollars. They are not just going after zero-days, they are going after unpatched flaws as well. Your primary mitigation is to make sure that devices are updated and patched, which means lifecycle management as well, then apply appropriately locked down configurations in risky areas. Give consideration to requiring loaners for out of the country trips, particularly to sensitive countries, to include destruction of the loaner when returned.

Lee Neely
Lee Neely

An excellent read, well done TAG. Three things to highlight: 1) the relatively large number of commercial surveillance vendors creating spyware; 2) the number of 0-days that are found and used against both Google and Apple products; and 3) the advanced skillset that exists outside of government. Bottomline, it a very lucrative business to be in if you have the right technical skills.

Curtis Dukes
Curtis Dukes

2024-02-08

Fraudulent LastPass App Removed from App Store

LastPass detected a fraudulent LastPass app in the iOS app store. A LastPass blog post notes that “the app attempts to copy our branding and user interface, though close examination of the posted screenshots reveal misspellings and other indicators the app is fraudulent.” Apple has removed the app from its store.

Editor's Note

It is not frequently that we hear of a fraudulent app being published in the Apple App store. As additional app stores become available (based on the EU ruling to allow competing sources of iOS apps), this is going to be a more common concern as they will not have the same level of rigor for publishing apps as Apple does. Be prepared to train users on selection, and where possible restrict access to only vetted app stores.

Lee Neely
Lee Neely

Perhaps a coincidence or more likely an attempt to discredit Apple given the recent European court ruling to open their app store to competition. Whatever the reason, one of the very few times that a fraudulent app got past Apple’s app vetting process.

Curtis Dukes
Curtis Dukes

If you are still using LastPass, best to check your copy.

William Hugh Murray
William Hugh Murray

Internet Storm Center Tech Corner

Computer viruses are celebrating their 40th birthday (well, 54th, really)

https://isc.sans.edu/diary/Computer+viruses+are+celebrating+their+40th+birthday+well+54th+really/30624

Anybody knows what this URL is about? Maybe Balena API request?

https://isc.sans.edu/diary/Anybody+knows+that+this+URL+is+about+Maybe+Balena+API+request/30628

A Python MP3 Player With Builtin Keylogger Capability

https://isc.sans.edu/diary/A+Python+MP3+Player+with+Builtin+Keylogger+Capability/30632

Fake LastPass App in Apple App Store

https://blog.lastpass.com/2024/02/warning-fraudulent-app-impersonating-lastpass-currently-available-in-apple-app-store/

Ivanti XXE Vulnerability

https://forums.ivanti.com/s/article/CVE-2024-22024-XXE-for-Ivanti-Connect-Secure-and-Ivanti-Policy-Secure

FortiOS sslvpnd vulnerability

https://www.fortiguard.com/psirt/FG-IR-24-015

Critical shim vulnerability and patch

https://github.com/rhboot/shim/releases/tag/15.8

Volt Typhoon Lessons Learned

https://www.cisa.gov/resources-tools/resources/identifying-and-mitigating-living-land-techniques

Critical Security Issue Affecting TeamCity On-Premises CVE-2024-23917

https://blog.jetbrains.com/teamcity/2024/02/critical-security-issue-affecting-teamcity-on-premises-cve-2024-23917/

Resume Looters

https://www.group-ib.com/blog/resumelooters/

Facebook Advertising Spreads Novel Malware Variant

https://www.trustwave.com/hubfs/Web/Library/Documents_pdf/FaceBook_Ad_Spreads_Novel_Malware.pdf