SANS NewsBites

Secure Your Routers! Healthcare ALPHV/Blackcat Ransomware Updates

March 1, 2024  |  Volume XXVI - Issue #17

Top of the News


2024-02-28

CISA Updates ALPHV Blackcat #StopRansomware Advisory

The US Cybersecurity and Infrastructure Security Agency (CISA), along with the FBI and the Department of Health and Human Services (HHS) has released an update to their joint advisory about the ALPHV/Blackcat ransomware-as-a-service (RaaS). The new information includes new indicators of compromise, as well as associated tactics, techniques, and procedures. The ALPHV/Blackcat attacks have been focusing their attention on the healthcare sector, most recently the attack against Change Healthcare.

Editor's Note

The advisory was issued in response to recent healthcare-related ransomware incidents. But keep in mind that the same techniques are also used in other industries. They are not healthcare-specific.

Johannes Ullrich
Johannes Ullrich

Starts with four items to do today. While urgent, most will take longer than a day. I would add network segmentation to the list. Ransomware attacks exploit the ability to move laterally.

William Hugh Murray
William Hugh Murray

The ransomware group Blackcat is an equal opportunity attacker, every industry sector is a target. While the advisory updates IoCs and attacker tactics, the best defense remains diligence in patch, configuration, and credential management.

Curtis Dukes
Curtis Dukes

2024-02-28

Cencora Discloses Data Exfiltration

In a filing with the US Securities and Exchange Commission (SEC), pharmaceutical distribution and consulting company Cencora disclosed that a cyberincident resulted in the exfiltration of sensitive personal data from their network. Cencora says they learned of the breach on February 21 and have “not yet determined whether the incident is reasonably likely to materially impact [their] financial condition or results of operations.”

Editor's Note

Cencora’s filing is an example of a “compliance-only” breach notification, essentially saying “something bad happened, we noticed, not sure how bad yet, but we think we contained it.” Where possible, convince your management that “lack of liability through obscurity” does not help in the long run and providing more information helps the waters all businesses swim in to get cleaner sooner.

John Pescatore
John Pescatore

With the filing, Cencora met the intent of new SEC rules around material cyber incidents. What’s interesting though, is how a Fortune 500 company with over $230B in annual revenue fell victim to what is likely a ransomware attack. Unfortunately, details are scant now.

Curtis Dukes
Curtis Dukes

Cencora, formerly AmerisourceBergen, states there is no connection between this attack and the attack at Change Heathcare. Reality is that because of the havoc that can be created by attacking/disrupting healthcare, it will remain a popular target for attackers. This points back to cyber hygiene as well as proactive monitoring and security posture assessment. If you can, hire a third party to assess your security posture, before the attackers do it for you.

Lee Neely
Lee Neely

2024-02-28

Secure Your Ubiquiti EdgeRouters

In a joint advisory, law enforcement and cybersecurity-related agencies from 11 countries warn that Russian state-sponsored hackers are likely to continue to use compromised Ubiquiti EdgeRouters to conduct malicious activity. The threat actors are known to have abused the devices “to harvest credentials, collect NTLMv2 digests, proxy network traffic, and host spear-phishing landing pages and custom tools.” In January, the agencies disrupted a botnet of the compromised routers. This advisory warns that the threat actors are likely to do the same thing again and urges owners of the routers to take steps to protect their devices from compromise. Recommended actions include performing a hardware factory reset, upgrading to the most recent version of firmware, changing default usernames and passwords, and implementing strategic firewall rules on WAN-side interfaces.

Editor's Note

Ubiquity routers are still under attack. We did not see a significant drop in scans for Ubiquity routers following the takedown. We are seeing even more scans for default credentials for other routers like, for example, Vyatta.

Johannes Ullrich
Johannes Ullrich

The hackers from APT28 were installing Moobot (a Mirai variant, leveraging SSH trojans) on vulnerable routers turning them into a botnet. Review your bash history, iptables and .ssh directories for unexpected keys. If you have a compromised, or suspected compromised device, perform a hardware factory reset, upgrade to the latest firmware, change default passwords, and make sure WAN access for administration is disabled.

Lee Neely
Lee Neely

Law enforcement takedown of the botnet in January triggered a rush by evildoers to compromise other SOHO routers, using default login credentials. Of the mitigations offered in the advisory only two, hardware reset and change passwords, are ‘doable’ for the bulk of SOHO router owners. That is, if they even get word that their router is being targeted.

Curtis Dukes
Curtis Dukes

The Rest of the Week's News


2024-02-28

White House Executive Order Aims to Protect Sensitive Personal Data

On Wednesday, February 28, the White House issued an executive order (EO) banning the sale of sensitive personal data to “countries of concern.” As per the order, the Justice Department (DoJ) will initiate a rulemaking process to establish a data security policy; there will be opportunity for public comment. The US Attorney General will work with the Departments of State and Commerce to determine which countries will be affected by the policy.

Editor's Note

Seems like a no-brainer to me that we would want to protect US consumer data, regardless of country of concern. Frankly, it’s long overdue to pass a national data privacy law vice the hodge-podge of state data privacy laws. The law would bound what, if anything, data brokers can do with US consumer data.

Curtis Dukes
Curtis Dukes

2024-02-29

Malicious GitHub Repositories

Cloned versions of legitimate repositories with obfuscated malicious code have made their way onto GitHub. The malware steals passwords and cryptocurrency. While GitHub is able to detect automation and remove bad repositories, some are still missed, and the process doesn’t address those that were uploaded manually. The campaign was detected by researchers at Apiiro.

Editor's Note

Part of the issue is volume; the automation detection is missing about 1% of the bogus repos. The attack is flooding GitHub with millions of code repositories which contain the obfuscated malware. Initial small tests of this attack date back to May 2023, with things really ramping up in November of 2023 through today. The best defense is to monitor your code for infected payloads, and check for IOCs as outlined in the Apiiro blog posting.

Lee Neely
Lee Neely

2024-02-27

Judge Issues Restraining Order, Putting Brakes on DOE’s Plan to Track Cryptomining Energy Consumption

In February, the US Department of Energy (DOE) announced its intent to gather information from large cryptomining operations to assess the level of energy consumption the industry is demanding. On February 23, a judge in Texas issued a restraining order against the DOE prompted by a lawsuit filed by cryptomining companies. The DOE’s decision to collect the information was an emergency order rather than regular rulemaking, which normally takes much longer. The lawsuit maintains that completing the DOE’s survey would be costly and time consuming and that it would risk exposing confidential information.

Editor's Note

Hard to really justify an emergency here and emergency orders are definitely two-edged swords. But, assessing the environmental impact of the mostly speculative use of digital “currencies” would be good data to see.

John Pescatore
John Pescatore

The miners are contending DOE's requested survey would take as much as 40 hours to complete. The injunction was filed in the Western District of Texas as there is a lot of Bitcoin mining in the state, which benefits from cheap power due to overproduction by windfarms located in the panhandle. The emergency order was used by DOE as the rulemaking process can take upwards of a year.

Lee Neely
Lee Neely

Each Bitcoin costs more to mine than the one before it. This mimics real world mining. We have reached the point where energy is a major cost of such mining. Bitcoin miners are motivated to, and have been known to, steal the energy that they use. In any case, it is important for us to know the sources and uses of energy.

William Hugh Murray
William Hugh Murray

2024-02-29

Cisco Releases Updates to Address Five Vulnerabilities

On Wednesday, February 28, Cisco released fixes for five vulnerabilities affecting several of their products. Two denial-of-service vulnerabilities, both of which affect Cisco NX-OS software, are rated high-severity. The other three vulnerabilities are rated medium severity; they affect Cisco UCS 6400 and 6500 Series Fabric Interconnects, Cisco Nexus 3000 and 9000 Series Switches, and the Link Layer Discovery Protocol (LLDP) feature of Cisco FXOS Software and Cisco NX-OS Software.

Editor's Note

Cisco is addressing five CVEs, CVE-2024-20321, BGP denial of service, CVE-2024-20267, IPv6 denial of service, CVE-2024-20344, Fabric Interconnects managed mode DOS, CVE-2024-20291, Port Chanel ACL programming flaw and CVE-2024-20294, Software Link Layer Discovery Protocol DOS flaw. Irrespective of the CVSS scores, these devices should already be at the top of your list to keep updated. All the flaws have patches for the affected devices, and while there is a workaround for the Port Channel ACL Programming flaw, applying the update appears much easier than the workaround.

Lee Neely
Lee Neely

2024-02-27

DOE Chooses Projects for Cyber Research, Development, and Demonstration Funding

The US Department of Energy is devoting $45 million in funding for 16 projects focused on “develop[ing] tools and technologies to reduce cyber risks to energy infrastructure.” Projects chosen by the DOE’s Office of Cybersecurity, Energy Security, and Emergency Response (CESER) cover six topic areas: Automated Cyberattack Prevention and Mitigation, Security and Resiliency by Design, Authentication Mechanisms for Energy Delivery Systems, Automated Methods to Discover and Mitigate Vulnerabilities, Cybersecurity through Advanced Software Solutions, and Integration of New Concepts and Technologies with Existing Infrastructure. They include both academic research institutions and private sector organizations.

Editor's Note

Reading the proposals, which range from small form factor secure compute platforms to regulate natural gas flows, increased security for 4G and 5G communications, to leveraging AI to detect and mitigate vulnerabilities in DER devices, this is some exciting research which should aid advances outside the energy sector.

Lee Neely
Lee Neely

Energy is our most critical and fragile infrastructure. It is vulnerable to cyberattacks. It is not an exaggeration to say that it represents an existential risk. This is a much needed initiative with significant potential.

William Hugh Murray
William Hugh Murray

2024-02-29

Lazarus and Windows Kernel Zero-day

North Korean state-sponsored threat actors have exploited a known privilege elevation vulnerability in the Windows AppLocker driver to disable security software in compromised machines. The flaw was detected by researchers from Avast, who reported the issue to Microsoft. The vulnerability was fixed in Microsoft’s February security release.

Editor's Note

CVE-2024-21339, CVSS score 7.8, allows an attacker to gain SYSTEM privileges. The fix is simple in principle, roll out the February updates from Microsoft and you're good to go. Note that on Wednesday, Microsoft changed their assessment from Exploitability assessment to Exploitation Detected. Make sure that update gets applied in a timely fashion, and you'll be good.

Lee Neely
Lee Neely

2024-02-28

German University Suffers Cyberattack

Hochschule Kempten in Kempten, Germany says its network has suffered a cyberattack on its IT infrastructure. The school “has shut down large parts of the IT infrastructure” as a precaution, and is currently unreachable by eMail, although the telephone system is operational. Hochschule Kempten is a university of applied sciences.

Editor's Note

There was a rash of attacks targeting German-speaking applied universities last year, including the University of Zurich and HS Kaiserslautern, this appears to continue that trend. The challenge in an educational setting is to enable collaboration while protection core IT. Consider completely separate networks, possibly even separate ISP connections, to ensure they remain isolated.

Lee Neely
Lee Neely

2024-02-29

ICYMI: February Security Updates

The Wired staff offers a rundown of security updates released during the month of February 2024, including Microsoft’s Patch Tuesday, Google’s Android Security Bulletin, as well as fixes for vulnerabilities in Ivanti products, Fortinet products, and the Firefox and Chrome browsers.

Editor's Note

In retrospect, February was a busy month for patching and remediation of vulnerabilities; if you're wondering why you're feeling bushed read this list. Then go back and make sure you're got as many of these updates automated as possible. Make sure you’re not still lovingly applying updates manually - think cattle not pets.

Lee Neely
Lee Neely

2024-02-29

Japan’s CERT/CC Warns Lazarus Threat Actors Released Malicious PyPI Packages

Japan’s Computer Emergency Response Team Coordination Center (JPCERT/CC) has published an alert warning that the Lazarus threat actor group has released malicious packages to the Python Package Index (PyPI). The four identified malicious PyPI packages have more than 3,200 downloads, collectively.

Editor's Note

They are taking advantage of users making typos in package names. For example, pycryptoenv and pycryptoconf are similar to pycrypto in name. The blog includes not only an analysis of the malicious packages but also a set of IOCs for you to leverage. As they say, check the name twice and download once, always make sure you're getting the genuine package you requested.

Lee Neely
Lee Neely

2024-02-29

Law Firm Discloses Data Breach

California-based law firm Houser LLP has disclosed that it suffered a cybersecurity incident resulting in the compromise of sensitive information belonging to more than 325,000 individuals. On May 9, 2023, Houser learned that certain files on their systems had been encrypted. An investigation revealed that some of the files has been copied and exfiltrated. Houser is a national litigation law firm with offices in 11 US states.

Editor's Note

This is a good case study for any law firm, but especially those chasing class action lawsuits and collecting lots of personal information from potential customers. The incident was not detected until the criminals contacted them, a third-party investigation took over 6 months to complete, and notification didn’t happen until a month after that. A breach of this size will have hard costs in the tens of millions of dollars - likely 10 times as much as the cost to avoid would have been.

John Pescatore
John Pescatore

The write-up clearly indicates that Houser LLP were the victim of a successful ransomware extortion. What’s interesting is that per the filing, the breach was discovered in January 2024, yet the law firm had contact with the attacker(s) in June 2023. From that contact, agreement was reached that the attacker(s) would delete the pilfered data. So, bottom line, it took from May 2023 to February 2024 to notify victims that their PII had been stolen.

Curtis Dukes
Curtis Dukes

Sensitive information includes credit card, social security, tax ID and driver's license numbers, financial account and medical information. Reports are that after the attackers were contacted by Houser, they agreed to delete the pilfered data, nor would it be distributed. Hauser has implemented improved security measures including ransomware detection, phishing simulation and MFA for Office 365. Affected parties are being offered credit monitoring services.

Lee Neely
Lee Neely

Internet Storm Center Tech Corner

Take Downs and the Rest of Us: Do they matter?

https://isc.sans.edu/diary/Take+Downs+and+the+Rest+of+Us+Do+they+matter/30694

Exploit Attempts for Unknown Password Reset Vulnerability

https://isc.sans.edu/diary/Exploit+Attempts+for+Unknown+Password+Reset+Vulnerability/30698

Dissecting DarkGate: Module Malware Delivery and Persistence as a Service

https://isc.sans.edu/diary/Guest+Diary+Dissecting+DarkGate+Modular+Malware+Delivery+and+Persistence+as+a+Service/30700

Ivanti Incident Response Update

https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-060b

Github Flooded with Infected Repos

https://apiiro.com/blog/malicious-code-campaign-github-repo-confusion-attack

Security Flaws in NoName Doorbell Cameras

https://www.consumerreports.org/home-garden/home-security-cameras/video-doorbells-sold-by-major-retailers-have-security-flaws-a2579288796/

StopRansomware: Updated ALPHV Blackcat Advisory

https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-353a

GlobalBlock Service To Prevent Trademark abuse

https://www.bleepingcomputer.com/news/technology/registrars-can-now-block-all-domains-that-resemble-brand-names/

Joint Cybersecurity Advisory

https://www.ic3.gov/Media/News/2024/240227.pdf

SVR Cyber Actors Adapt Tactics for Initial Cloud Access

https://www.ncsc.gov.uk/news/svr-cyber-actors-adapt-tactics-for-initial-cloud-access

Data Scientists Targeted by Malicious Hugging Face ML Models with Silent Backdoor

https://jfrog.com/blog/data-scientists-targeted-by-malicious-hugging-face-ml-models-with-silent-backdoor/