SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact UsThe authorities who took control of the website that the LockBit ransomware group used to leak stolen data are now using the site to slowly leak details about the ransomware group’s operations. Disclosed information includes LockBit-related arrests in Ukraine and Poland, decryption keys, and recovery tools.
If you have been affected by LockBit, reach out to your local FBI contact to see if they have decryption keys available for you. At the same time: LockBit, the malware, is still around and modified installers have been sighted.
It appears that authorities are giving the LockBit organizers the digital middle finger as well as disclosing the identities of the two organizers to draw them into the open. Aside from watching that theatre play out, continue to expect variations/new generations of their ransomware. The other takeaway is that law enforcement has keys for LockBit, subsequently, decryption and/or recovery tools are available for free.
The other shoe has dropped. Broadcasting the complete take-over via seized infrastructure must sting. Well-played by international law enforcement authorities. The only remaining question: will the evildoers learn their lesson or simply look to build new infrastructure and continue with the ransomware game?
Again, well done to all involved. The intelligence data gathered by law enforcement during this operation will have many who are either directly involved in LockBit, or who are affiliates, looking over their shoulders for many years to come. This operation will hopefully become the template for many future operations to disrupt and detain other cybercriminal gangs.
Ars Technica
The Register
Europol
Krebs on Security
The Record
Bleeping Computer
The Register
The Register
Two weeks after detecting a cyberattack on its systems, Germany battery manufacturer Varta says that it has not yet resumed production. The company is working with forensic IT experts and analysts to test and restart its systems. Varta is unable to say when manufacturing will resume at its five production plants.
A good reason not to let your PR folks have the final word on breach releases is this quote from Varta: “Organised group of hackers who managed to break through the high security standards of VARTA's IT systems with a high level of criminal energy.” This is basically saying “Our security standards are only high enough to thwart disorganized individual hackers with low levels of energy, even though a successful attack could halt our production systems for two weeks or more.”
While Varta is not sure when things will be on-line; they hope to have some services restored next week. They also warn customers that email exchanged between February 12 and 18th is lost and will need to be resent. Good move to notice where customer (or internal) communications are impacted by an incident and disclose that will need to be repeated. Have you considered how you'd detect gaps in either your ticketing or email system, let alone the steps to bridge them?
Varta’s annual revenue is around $1B. With downtime (3 weeks), forensic experts, system rebuilds, system purchases, this incident will easily cost them more than $100M. Hopefully, Varta will provide details of the attack, to include what cyber defenses were in place, so that we can all learn from this unfortunate incident.
Change Healthcare is experiencing network disruptions following a cyberattack. Once the organization learned of the incident, they disconnected their systems to prevent any additional damage. The outage has impeded prescription processing, leading to delays in patients receiving their medications.
Change Healthcare is part of the health tech company Optum which is operated by UnitedHealth group since 2022. Change Healthcare processes patient payments for about 1/3 of US patients across the country. As of February 23rd, the American Hospital Association has advised possibly affected healthcare organizations to disconnect their systems from Optum until it's deemed safe to reconnect. While Change is providing status updates, and hopes to resolve the issue today, it's not clear what patients needing prescriptions need to do. Don't forget to include and repeat customer workarounds/actions in your notifications. If you're impacted, the best bet is to talk to your pharmacy about options to provide at least a bridging amount of medication while the issue is resolved.
Health IT Security
Security Week
The Record
Infosecurity Magazine
The Register
Change Healthcare
Apple has announced its PQ3 post-quantum cryptographic protocol; it is currently in beta. PQ3 will be introduced in iOS 17.4, iPadOS 17.4, macOS 14.4, and watchOS 10.4; it will be enabled by default on devices that support it.
Signal and Apple are taking the lead in implementing quantum safe encryption. But be careful rushing new algorithms into production. Apple developed its own "PQ3" algorithm. NIST is currently going through the deliberate and thorough process of identifying a quantum safe encryption standard. The process already eliminated a few algorithms that were initially considered safe by many experts. This isn't easy. If you develop software: Stay flexible and allow for encryption algorithms to be swapped later if needed. For any encryption implementation, a threat model is critical to define the most appropriate solution.
For anyone whose threat model ACTUALLY includes malicious actors capturing traffic now to decrypt in the future, quantum-resistant crypto may be something to consider. As Dr. J points out, several of the proposals NIST was considering have been found very weak (crypto is hard!), so best practice is probably to layer one of these new, shiny algorithms on top of something you already trust, like TLS 1.3.
End-to-end encryption for all messaging is important but adding post-quantum encryption to an already encrypted service that only works on Apple devices shouldn’t be on anyone’s Top Ten risk list when business emails are still sent unencrypted.
We still are about 5-10 years away from Q-Day and if you're in a sector where regulators are expecting you to implement PQC, this is a good place to see the process used to both certify and deploy a solution as well as see the impact. Otherwise, this may not be something you're focused on. Apple built their solution on both Signal's PQHDX and WhatsApp's auditable key directory leveraging both ECC and post-quantum Kyber and includes key rotation in their plans. Remember that all devices will need to be running an OS that supports PQ3 (and iMessage) or it will fall back to the older iMessage ECC or even SMS (none) encryption.
While this is a great step on Apple’s part, remember most cyber attackers are far more likely to simply text their victim and trick them into doing something they should not do than try to break an encryption algorithm.
Apple
Wired
The Register
SC Magazine
Ars Technica
Security Week
The Hacker News
On Thursday, February 22, AT&T experienced an outage that disrupted connectivity for tens of thousands of mobile customers. On its update page, AT&T writes, “Based on our initial review, we believe that today’s outage was caused by the application and execution of an incorrect process used as we were expanding our network, not a cyber attack.” The issue has been resolved.
One interesting "feature" of the outage was the reliance of media on "downdetector.com". This website does a great job in identifying widespread outages. But many reporting on the outage did not understand downdetector's methodology which led to reporting of outages in Verizon's and T-Mobile's network as well, which if they happened at all, were minor. Always consider the data collection methodology before drawing conclusions from data.
Yesterday morning, as I was changing flights in Denver, it was odd to see my AT&T device, in strong coverage area, with SOS service, and I had friends speculating that the root cause was a configuration or other process error. While we've all set up change processes, many of which include rollback plans, how many have of you tested the roll-back, let alone provided for an adequate time period to roll back? With nested interdependencies, it may not be the "5 minutes" your staff thinks it is. The challenge is to ask them to find an effective way to benchmark that process.
Another data point on the need for system administration hygiene. But the real question is: Did the Gross Domestic Product of the US go down or up when all those mobile devices stopped beeping, ringing and vibrating??
Well certainly a bad day for AT&T and its brand but it will survive. For organizations, this offers the perfect risk management tabletop exercise. Should you introduce an alternative communication pathway for business operation or can the company live with a little downtime? For users, it provides the opportunity to negotiate a discount on their plan when renewal time comes. And for government, perhaps a little red-teaming [tabletop] of the network-to-network peering is in order just to be safe.
Let this outage serve as a good reminder as to how you manage business resilience as a result of an outage in your supply chain. I wonder how many businesses had staff who could not work or their productivity impacted by not having access to calls or to mobile data?
VMware has issued an advisory alerting users to two vulnerabilities in the deprecated VMware Enhanced Authentication Plug-in (EAP). The advisory urges users to remove the plugin, which is no longer supported. The flaws are a critical arbitrary authentication relay vulnerability and a high-severity session hijack vulnerability.
CVE-2024-22245, authentication relay flaw, has a CVSS score of 9.6, and can be used to relay requests for Kerberos tickets from a malicious site through your authorized vCenter clients. CVE-2024-22250, session hijack flaw, CVSS score of 7.8, allows vCenter sessions to be hijacked. Removal of both the EAP browser plugin and windows service, on the client, are required to mitigate the flaw. There is no patch. This service is only used in vSphere 7 for SSO, moving to vSphere 8 allows for additional authentication options including ADFRS, Okta, and MS Authenticator.
SC Magazine
Dark Reading
Bleeping Computer
VMware
The White House has released an executive order aimed at strengthening cybersecurity of US ports. The Executive Order on Amending Regulations Relating to the Safeguarding of Vessels, Harbors, Ports, and Waterfront Facilities of the United States grants the Department of Homeland Security (DHS) the “authority to directly address maritime cyber threats, including through cybersecurity standards to ensure that American ports’ networks and systems are secure.” In a related story, the US Department of Transportation Maritime Administration issued an advisory on Foreign Adversarial Technological, Physical, and Cyber Influence.
I've worked with a number of the USCG's cyber warriors, and they're great at what they do. I applaud any executive or legislative action that expands their ability to help defend the nation. Here's hoping they're also given the resourcing and latitude to continue growing their cyber force structure. Semper paratus, my friends!
The message to the ports is to increase the security of their OT systems from PRC backed services and devices. The action calls for segmentation, monitoring, MFA, updating, backups, and reporting of incidents/suspected incidents, as we've seen in other critical infrastructure sectors. The Coast Guard, CISA and FBI are providing support for reporting and CISA can provide implementation guidance.
A crucial part of our infrastructure to which we hardly give any thought unless it breaks.
White House
White House
DOT
The Register
SC Magazine
Dark Reading
Security Week
Gov Infosecurity
Joomla has released updates to address five vulnerabilities in its content management system. The flaws could be exploited to achieve arbitrary code execution on unpatched websites. Joomla has fixed the vulnerabilities in versions 5.0.3 and 4.4.3. The updates also incorporate several bug fixes and improvements.
While it appears an administrator has to click a link to enable the exploit, it's still time to apply the updates. While Joomla provides updates for both 4.4 and 5.0, Joomla 4.4 sites can be upgraded, rather than migrated, to Joomla 5, so it's recommended to update to Joomla 5.0.3.
The US Cybersecurity and Infrastructure Security Agency (CISA), the Environmental Protection Agency (EPA), and the FBI have released a fact sheet listing top actions for security water systems. The document includes free tools, resources, and services to support recommended actions, which include conducting regular cybersecurity assessments, conducting an inventory of OT/IT assets, and developing and exercising cybersecurity incident response and recovery plans.
The actions are prioritized to help get your arms around raising the bar, and some actions, such as changing default passwords, are effectively free. While removing direct (Internet) access to OT systems may sound like it'll be expensive requiring staff to use other mechanisms to reach them, the prevalence of targeted OT attacks, particularly successful ones, will quickly outweigh those costs. Leverage the resources in the report to keep things manageable.
Just two pages. A two minute read. Actions to be taken. If taken across the industry, will raise cost of attack by a factor of ten. Great start.
While it’s good to have security guidance specific to water systems, the guidance for every critical sector has been around for decades. Regular cybersecurity assessments, check. Inventory of assets (HW, SW, Data), check. Creating and exercising incident response and recovery plan, check. These and other critical security controls should become the minimum baseline required of every critical infrastructure provider.
Threat actors have been using a recently-released network mapping tool for malicious purposes. “SSH-Snake is a self-modifying worm that leverages SSH credentials discovered on a compromised system to start spreading itself throughout the network.” Researchers from Sysdig have observed threat actors using SSH-Snake to steal SSH credentials. The attackers exploited known vulnerabilities to gain initial access to the systems.
The worm is fileless and uses compromised credentials to access systems. You can raise the bar by disallowing password based authentication to Internet-facing SSH. Better still, don't allow SSH from the Internet, require certificate authentication for privileged users and review access, eliminating unused/unneeded accounts.
Python InfoStealer With Dynamic Sandbox Detection
https://isc.sans.edu/diary/Python+InfoStealer+With+Dynamic+Sandbox+Detection/30668
Phishing Pages Hosted on Archive.org
https://isc.sans.edu/diary/Phishing+pages+hosted+on+archiveorg/30676
Friend, Foe or Something In Between
Large AT&T Wireless Network Outage
https://isc.sans.edu/diary/Large+ATT+Wireless+Network+Outage+att+outage/30680
SSH Snake Abused in the Wild
https://github.com/MegaManSec/SSH-Snake
iMessage with PQ3
https://security.apple.com/blog/imessage-pq3/
Connect Wise ScreenConnect Used by LockBit
ConnectWise ScreenConnect Vulnerabilities
https://www.connectwise.com/company/trust/security-bulletins/connectwise-screenconnect-23.9.8
ScreenConnect Authentication Bypass Exploit CVE-2024-1709 CVE-2024-1708)
Remove VMWare Enhanced Authentication Plugin (EAP) СVE-2024-22245 CVE-2024-22250
https://kb.vmware.com/s/article/96442
Voltage Noise to Manipulate Wireless Chargers
Catch up on recent editions of NewsBites or browse our full archive of expert-curated cybersecurity news.
Browse ArchiveFree technical content sponsored by Dragos, Inc.Now Available | Dragos 2023 OT Cybersecurity Year In ReviewAs we confront the relentless tide of cyber incidents, the OT Cybersecurity Year in Review stands as an anchor, offering clarity and direction for executives and practitioners at the helm of operational technology cyber defense.
Upcoming Free Virtual Event on Thu, February 29 | SOAR Into 2024: Harness the Power of the 5/5/5 Benchmark for Cloud Detection and Response - Tune in as Dave Shackleford and industry experts show you how to keep your cloud-speed business innovation secure from cloud-speed exploitation.
Buyers Guide: How to Secure Egress Traffic from Workloads in the Public Cloud | Tune in on March 12!
Upcoming Webcast: Modernizing AppSec with Application Security Posture Management | Join Matt Bromiley and Idan Elor from Apiiro on March 6 at 1PM ET as they discuss how to secure applications, a complex and cumbersome issue many organizations have yet to solve.