SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact UsOn Tuesday, April 9, Microsoft released its monthly security update, which addresses nearly 150 CVEs. Three of the vulnerabilities are rated critical; all three are remote code execution flaws affecting Microsoft Defender for IoT. A fourth flaw a proxy driver spoofing vulnerability was previously disclosed and has been actively exploited.
This patch Tuesday was a bit odd. Many of the vulnerabilities are caused by a small number of components, and the only product affected by critical vulnerabilities is Defender for IoT. The already exploited vulnerability is a driver certificate that was abused and is being revoked with this update.
The glass half full of this record number of flaws found in Windows would be that Microsoft's recognition of lack of attention to security that was exposed last year has resulted in more investment in testing/finding/removing vulnerabilities. However, it will take several months of decreasing patch count, and faster releases of patches, to show that the glass is not still half empty. Also see the Adobe Patch item today.
There are around 40 RCE patches for MS OLE driver for SQL Server and seven RCE fixes for their DNS server. As much as OLE is a fact of life, you want those updates deployed. Even though MS states you effectively need a perfect storm of events to exploit the DNS flaws, that service is critical enough to warrant deploying the patches rather than skipping or postponing until something happens.
SANS ISC
Krebs on Security
The Register
SC Magazine
Bleeping Computer
Dark Reading
Microsoft
The US Cybersecurity and Infrastructure Security Agency (CISA) has released a version of its Malware4 Next-Gen malware analysis system for public use. Until now, Malware Next-Gen was available only to federal agencies. Organizations and individuals may now submit malware samples and other suspicious artifacts for analysis after registering with a login.gov account. There is a portal for unregistered users if organizations or people want to submit samples anonymously, but they will not receive the results of the analysis.
This free service has been available to .gov and .mil users since November and has been very successful. Don't miss out on the analysis results by submitting anonymously, that is the payout. Registration for a Login.gov account only takes 5-10 minutes, and if you already have one you can use it.
A critical vulnerability in Rust versions prior to 1.77.2 could be exploited to execute arbitrary shell commands on Windows machines. The Rust Security Response WG was notified that the Rust standard library did not properly escape arguments when invoking batch files (with the bat and cmd extensions) on Windows using the Command API. Rust is urging users/developers to upgrade to Rust 1.77.2, in which the vulnerability is mitigated.
This vulnerability affects several languages, not just Rust. Rust was just the first to offer a patch. The underlying problem affects languages allowing the execution of Windows commands via cmd.exe. Command line arguments are not always escaped properly, leading to OS command injection. The vulnerability has been named "BatBadBut", and details can be found here: https://flatt.tech/research/posts/batbadbut-you-cant-securely-execute-commands-on-windows/
Please take 3 minutes to give us your suggestions.
Adobe has released nine updates to address 24 CVEs. The updates include fixes for a pair of critical arbitrary code execution vulnerabilities in Adobe Commerce; a dozen vulnerabilities in Adobe Experience Manager, all rated important; a critical buffer overflow vulnerability in Adobe Media Encoder; four vulnerabilities in Adobe Illustrator, including three critical arbitrary code execution flaws; and four vulnerabilities in Adobe Animate, including two critical arbitrary code execution flaws.
The Adobe Commerce vulnerabilities deserve some attention and likely expedited patching. Similar issues were widely exploited in the past.
Users with the Creative Cloud desktop app should have updates automatically downloaded. Even so, make sure they have been applied and applications restarted.
The US Cybersecurity and Infrastructure Security Agency (CISA) has published a cybersecurity alert regarding a supply chain attack affecting data analytics company Sisense. The incident compromised Sisense customer information. CISA is urging Sisense customers to reset Sisense account-related secrets and credentials, and to investigate and report to CISA any related suspicious activity.
Not a bad idea to add resetting/updating credentials associated with third party service providers after they suffer a breach. Note that you want to do that after they give the all clear, and likely disconnect or discontinue using their services between the notification of an incident and that point. This is another example of a joint tabletop exercise you could leverage.
Not a lot of details (ok, any) on the compromise, but given the technology space where Sisense sits, could put lots of sensitive customer data into play. Rotating logon credentials is an easy first step that can help identify compromised accounts.
CISA
Cyberscoop
Nextgov
Security Week
The Record
Bleeping Computer
The Group Health Cooperative of South Central Wisconsin (GHC-SCW) says that it suffered a ransomware attack in January. While the IT department managed to prevent GHC-SCWs data from becoming encrypted, the threat actors stole personal information belonging to more than 533,000 individuals. The incident has been reported to the US Department of Health and Human Services Office for Civil Rights.
A good reminder that while using the term ransomware attack increases click rates, the confidentiality and integrity of data gets breached, not just the availability it is the failure to protect the data that is important. But we never took bronchitis that seriously until it got the scary and hard to pronounce name Respiratory Syncytial Virus (RSV) a few years ago use the scary terms to get management attention but address the cause of the problem not the hype.
Even though no evidence is shown of the data being posted or used, GHC-SCW is advising users to monitor all communications from healthcare providers, including electronic messages, billing statements and other communications and report any suspicious activity to them immediately. Health data stolen during the January ransomware attack includes affected individuals' names, addresses, telephone numbers, e-mail addresses, dates of birth and/or deaths, social security numbers, member numbers, and Medicare and/or Medicaid numbers.
Google is implementing multi-party approvals for some sensitive actions initiated by admins in Workspace. The requirement will apply to changes made to certain settings, including 2-step verification, account recovery, advanced protection, Google session control, login challenges, and passkeys, which is currently in beta. The change will help ensure no sensitive action happens in a silo, and prevent unauthorized or accidental changes.
Ah, the tried and still true two-person rule for anything related to authentication and authorization! Given the use of AI to create fake audio and video, also throw in an out of band safe word so Party 1 and Party 2 can make sure Party 3 hasn't crashed the party.
Multi-party controls are a powerful tool for mitigating the risk of privilege. They have all but been abandoned in the move from paper.
The US Cybersecurity and Infrastructure Security Agency (CISA) has published an Emergency Directive regarding Microsoft account security. In the document, CISA directs federal agencies to take steps to remediate tokens, passwords, and other authentication credentials that have been or are suspected to be compromised. Agencies have until April 30 to reset application credentials and identify affected email correspondence.
These measures are urgent. Do not interpret the fact that the directive is not addressed to you as excluding you. Do not interpret the deadline as license to delay until it.
The guidance here is simple and worth considering for any outsourced email or cloud services. In short, update any suspect credentials (user, API, or otherwise), deactivate/delete unused, look for unexpected account creation. We should all be keeping an eye on those things. Check your issued access tokens for really old ones and get those updated. If you have services to check for compromised passwords, make sure they are enabled/working. Now get strong MFA deployed. Note that a bad password, coupled with MFA, still needs resolution.
It's been a horrible few months for Microsoft and the bad news continues. Unfortunately, this comes with the territory of being the largest provider of IT products to government, both federal and state. The directive does highlight the importance of actively managing authentication credentials for signs of compromise.
The US Cybersecurity and Infrastructure Security Agency (CISA) and the FBI are urging US state, local, tribal, and territorial government election offices to move their websites to .gov domains. Adoption of the .gov domain can help mitigate impersonation and other cybersecurity risks. CISA administrated the .gov top-level domain (TLD) and has waived registration fees for qualifying government organizations.
There is a lot more rigor to getting a .gov domain approved to ensure they are legitimate, making impersonation and squatting far more difficult, which helps your users. Resist the temptation for an outsourced service to create a non-gov domain for your services for the same reasons.
This capability has been available for a few years and frankly is a no-brainer for SLTTs to adopt. Yes, there will be some one-time transition costs, but the security protections are well worth the small investment and there are federal grants available.
The US National Institute of Standards and Technology (NIST) is accepting public comment on a draft document, Incident Response Recommendations and Considerations for Cybersecurity Risk Management: A CSF 2.0 Community Profile. The publication seeks to assist organizations with incorporating cybersecurity incident response recommendations and considerations throughout their cybersecurity risk management activities, as described by the NIST Cybersecurity Framework (CSF) 2.0. The comment period ends on May 20, 2024.
Having a guide like this is huge help if you're trying to implement or evaluate your incident response plans. Most importantly, NIST is striving to get companies to get common response scenarios documented, as they are needed in emergency response situations.
Governments of five municipalities in western France have been hit by a cyberattack. The local governments of the five towns Saint-Nazaire, Montoir-de-Bretagne, Donges, La Chapelle-des-marais, and Pornichet share servers. Officials say it may be months before service is restored. The attack began on Tuesday, April 9.
On Wednesday, employees were told not to turn on their computers or access email via their phones. Email and phone services are down, and officials do not have access to their workspaces, files or business software. This is an all hands on deck situation, with twice daily updates/meetings on progress, where everyone is pulling together to restore services. This will be a good study in cross-jurisdictional incident response worth studying for applicability.
Small towns simply lack cybersecurity resources, human and financial, to build and maintain an effective cybersecurity program. They become easy pickings for cyber criminals to attack, most often for ransom.
Saint Nazaire Agglo
The Record
Microsoft Patches
https://isc.sans.edu/diary/April+2024+Microsoft+Patch+Tuesday+Summary/30822
Rust Command API code execution vulnerability CVE-2024-24576
https://blog.rust-lang.org/2024/04/09/cve-2024-24576.html
Adobe Updates: Magento Adobe Commerce CVE-2024-20759 CVE-2024-20758
https://helpx.adobe.com/security/products/magento/apsb24-18.html
https://helpx.adobe.com/security.html
Fortinet FortiOS And FortiProxy Vulnerability CVE-2023-41677
https://www.fortiguard.com/psirt/FG-IR-23-493
FortiClient Linux Remote Code Execution
https://www.fortiguard.com/psirt/FG-IR-23-087
BatBadBut: You can't securely execute commands on Windows
https://flatt.tech/research/posts/batbadbut-you-cant-securely-execute-commands-on-windows/
Apple Threat Notifications and Protecting Against Mercenary Spyware
https://support.apple.com/en-us/102174
New Technique to Trick Developers Detected in an Open Source Supply Chain Attack
Smoke and Screen Mirrors Signed Backdoor CVE-2024-26234
https://news.sophos.com/en-us/2024/04/09/smoke-and-screen-mirrors-a-strange-signed-backdoor/
D-Link NAS Backdoor
https://github.com/netsecfish/dlink
LG SmartTV Vulnerabilities
https://www.bitdefender.com/blog/labs/vulnerabilities-identified-in-lg-webos/
Wait Just an Infosec: The Amazingly Scary XZ SSHD Backdoor (April 4, 2024)
with Johannes Ullrich and Bohan Zdrnja
Catch up on recent editions of NewsBites or browse our full archive of expert-curated cybersecurity news.
Browse ArchiveFree virtual event on 5/2 learn from speakers experiences as Field CISO at Databricks, CISO at Reddit, CISO at Tools for Humanity, CISO at Atlassian register here: https://www.sans.org/info/228905This will be a great opportunity to learn about how the CISO role is changing, especially for companies and platforms where customer trust plays a big role.
SANS 2024 CTI Survey: Managing the Evolving Threat Landscape | May 22 | Join us to learn How the CTI discipline has evolved in the past year-how CTI analysts kept up with the ever-changing threat landscape, how they view emerging threats (adversary use of AI), and how technology enablement improves efficiency.
Do You Know Where Your Data Is?
Unleashing Secure Access with an Identity-Centric Zero Trust Network Access Solution: Microsoft Entra Private Access | May 1 at 3:30 pm ET | Join us to explore how you can enable secure access to any app or resource, from anywhere using Microsoft’s identity-centric Security Service Edge solution.