SANS NewsBites

Microsoft Patch Tuesday; CISA Frees Next-Gen Analysis System; Critical Windows Issue Affecting Rust and Others; Help Us Improve NewsBites

April 12, 2024  |  Volume XXVI - Issue #29

Top of the News


2024-04-10

Patch Tuesday: Microsoft

On Tuesday, April 9, Microsoft released its monthly security update, which addresses nearly 150 CVEs. Three of the vulnerabilities are rated critical; all three are remote code execution flaws affecting Microsoft Defender for IoT. A fourth flaw a proxy driver spoofing vulnerability was previously disclosed and has been actively exploited.

Editor's Note

This patch Tuesday was a bit odd. Many of the vulnerabilities are caused by a small number of components, and the only product affected by critical vulnerabilities is Defender for IoT. The already exploited vulnerability is a driver certificate that was abused and is being revoked with this update.

Johannes Ullrich
Johannes Ullrich

The glass half full of this record number of flaws found in Windows would be that Microsoft's recognition of lack of attention to security that was exposed last year has resulted in more investment in testing/finding/removing vulnerabilities. However, it will take several months of decreasing patch count, and faster releases of patches, to show that the glass is not still half empty. Also see the Adobe Patch item today.

John Pescatore
John Pescatore

There are around 40 RCE patches for MS OLE driver for SQL Server and seven RCE fixes for their DNS server. As much as OLE is a fact of life, you want those updates deployed. Even though MS states you effectively need a perfect storm of events to exploit the DNS flaws, that service is critical enough to warrant deploying the patches rather than skipping or postponing until something happens.

Lee Neely
Lee Neely

2024-04-10

CISA Releases its Malware Next-Gen Analysis System for Public Use

The US Cybersecurity and Infrastructure Security Agency (CISA) has released a version of its Malware4 Next-Gen malware analysis system for public use. Until now, Malware Next-Gen was available only to federal agencies. Organizations and individuals may now submit malware samples and other suspicious artifacts for analysis after registering with a login.gov account. There is a portal for unregistered users if organizations or people want to submit samples anonymously, but they will not receive the results of the analysis.

Editor's Note

This free service has been available to .gov and .mil users since November and has been very successful. Don't miss out on the analysis results by submitting anonymously, that is the payout. Registration for a Login.gov account only takes 5-10 minutes, and if you already have one you can use it.

Lee Neely
Lee Neely

2024-04-10

Update Available for Critical Flaw in Rust

A critical vulnerability in Rust versions prior to 1.77.2 could be exploited to execute arbitrary shell commands on Windows machines. The Rust Security Response WG was notified that the Rust standard library did not properly escape arguments when invoking batch files (with the bat and cmd extensions) on Windows using the Command API. Rust is urging users/developers to upgrade to Rust 1.77.2, in which the vulnerability is mitigated.

Editor's Note

This vulnerability affects several languages, not just Rust. Rust was just the first to offer a patch. The underlying problem affects languages allowing the execution of Windows commands via cmd.exe. Command line arguments are not always escaped properly, leading to OS command injection. The vulnerability has been named "BatBadBut", and details can be found here: https://flatt.tech/research/posts/batbadbut-you-cant-securely-execute-commands-on-windows/

Johannes Ullrich
Johannes Ullrich

2024-04-12

Help Us Improve NewsBites

Please take 3 minutes to give us your suggestions.

The Rest of the Week's News


2024-04-09

Patch Tuesday: Adobe

Adobe has released nine updates to address 24 CVEs. The updates include fixes for a pair of critical arbitrary code execution vulnerabilities in Adobe Commerce; a dozen vulnerabilities in Adobe Experience Manager, all rated important; a critical buffer overflow vulnerability in Adobe Media Encoder; four vulnerabilities in Adobe Illustrator, including three critical arbitrary code execution flaws; and four vulnerabilities in Adobe Animate, including two critical arbitrary code execution flaws.

Editor's Note

The Adobe Commerce vulnerabilities deserve some attention and likely expedited patching. Similar issues were widely exploited in the past.

Johannes Ullrich
Johannes Ullrich

Users with the Creative Cloud desktop app should have updates automatically downloaded. Even so, make sure they have been applied and applications restarted.

Lee Neely
Lee Neely

2024-04-11

CISA Publishes Alert About Sisense Supply Chain Attack

The US Cybersecurity and Infrastructure Security Agency (CISA) has published a cybersecurity alert regarding a supply chain attack affecting data analytics company Sisense. The incident compromised Sisense customer information. CISA is urging Sisense customers to reset Sisense account-related secrets and credentials, and to investigate and report to CISA any related suspicious activity.

Editor's Note

Not a bad idea to add resetting/updating credentials associated with third party service providers after they suffer a breach. Note that you want to do that after they give the all clear, and likely disconnect or discontinue using their services between the notification of an incident and that point. This is another example of a joint tabletop exercise you could leverage.

Lee Neely
Lee Neely

Not a lot of details (ok, any) on the compromise, but given the technology space where Sisense sits, could put lots of sensitive customer data into play. Rotating logon credentials is an easy first step that can help identify compromised accounts.

Curtis Dukes
Curtis Dukes

2024-04-11

Wisconsin Healthcare Provider Discloses Ransomware Attack

The Group Health Cooperative of South Central Wisconsin (GHC-SCW) says that it suffered a ransomware attack in January. While the IT department managed to prevent GHC-SCWs data from becoming encrypted, the threat actors stole personal information belonging to more than 533,000 individuals. The incident has been reported to the US Department of Health and Human Services Office for Civil Rights.

Editor's Note

A good reminder that while using the term ransomware attack increases click rates, the confidentiality and integrity of data gets breached, not just the availability it is the failure to protect the data that is important. But we never took bronchitis that seriously until it got the scary and hard to pronounce name Respiratory Syncytial Virus (RSV) a few years ago use the scary terms to get management attention but address the cause of the problem not the hype.

John Pescatore
John Pescatore

Even though no evidence is shown of the data being posted or used, GHC-SCW is advising users to monitor all communications from healthcare providers, including electronic messages, billing statements and other communications and report any suspicious activity to them immediately. Health data stolen during the January ransomware attack includes affected individuals' names, addresses, telephone numbers, e-mail addresses, dates of birth and/or deaths, social security numbers, member numbers, and Medicare and/or Medicaid numbers.

Lee Neely
Lee Neely

2024-04-10

Risky Business: Google Workplace and Multi-Party Approvals

Google is implementing multi-party approvals for some sensitive actions initiated by admins in Workspace. The requirement will apply to changes made to certain settings, including 2-step verification, account recovery, advanced protection, Google session control, login challenges, and passkeys, which is currently in beta. The change will help ensure no sensitive action happens in a silo, and prevent unauthorized or accidental changes.

Editor's Note

Ah, the tried and still true two-person rule for anything related to authentication and authorization! Given the use of AI to create fake audio and video, also throw in an out of band safe word so Party 1 and Party 2 can make sure Party 3 hasn't crashed the party.

John Pescatore
John Pescatore

Multi-party controls are a powerful tool for mitigating the risk of privilege. They have all but been abandoned in the move from paper.

William Hugh Murray
William Hugh Murray

2024-04-11

CISA Emergency Directive: Protect Microsoft Accounts From Compromise

The US Cybersecurity and Infrastructure Security Agency (CISA) has published an Emergency Directive regarding Microsoft account security. In the document, CISA directs federal agencies to take steps to remediate tokens, passwords, and other authentication credentials that have been or are suspected to be compromised. Agencies have until April 30 to reset application credentials and identify affected email correspondence.

Editor's Note

These measures are urgent. Do not interpret the fact that the directive is not addressed to you as excluding you. Do not interpret the deadline as license to delay until it.

William Hugh Murray
William Hugh Murray

The guidance here is simple and worth considering for any outsourced email or cloud services. In short, update any suspect credentials (user, API, or otherwise), deactivate/delete unused, look for unexpected account creation. We should all be keeping an eye on those things. Check your issued access tokens for really old ones and get those updated. If you have services to check for compromised passwords, make sure they are enabled/working. Now get strong MFA deployed. Note that a bad password, coupled with MFA, still needs resolution.

Lee Neely
Lee Neely

It's been a horrible few months for Microsoft and the bad news continues. Unfortunately, this comes with the territory of being the largest provider of IT products to government, both federal and state. The directive does highlight the importance of actively managing authentication credentials for signs of compromise.

Curtis Dukes
Curtis Dukes

2024-04-09

CISA, FBI Urge Election Offices to Adopt .gov Domains

The US Cybersecurity and Infrastructure Security Agency (CISA) and the FBI are urging US state, local, tribal, and territorial government election offices to move their websites to .gov domains. Adoption of the .gov domain can help mitigate impersonation and other cybersecurity risks. CISA administrated the .gov top-level domain (TLD) and has waived registration fees for qualifying government organizations.

Editor's Note

There is a lot more rigor to getting a .gov domain approved to ensure they are legitimate, making impersonation and squatting far more difficult, which helps your users. Resist the temptation for an outsourced service to create a non-gov domain for your services for the same reasons.

Lee Neely
Lee Neely

This capability has been available for a few years and frankly is a no-brainer for SLTTs to adopt. Yes, there will be some one-time transition costs, but the security protections are well worth the small investment and there are federal grants available.

Curtis Dukes
Curtis Dukes

2024-04-11

Public Comment Period Open on NIST Cybersecurity Risk Management Doc

The US National Institute of Standards and Technology (NIST) is accepting public comment on a draft document, Incident Response Recommendations and Considerations for Cybersecurity Risk Management: A CSF 2.0 Community Profile. The publication seeks to assist organizations with incorporating cybersecurity incident response recommendations and considerations throughout their cybersecurity risk management activities, as described by the NIST Cybersecurity Framework (CSF) 2.0. The comment period ends on May 20, 2024.

Editor's Note

Having a guide like this is huge help if you're trying to implement or evaluate your incident response plans. Most importantly, NIST is striving to get companies to get common response scenarios documented, as they are needed in emergency response situations.

Lee Neely
Lee Neely

2024-04-11

French Towns Suffer Cyberattack on Shared Servers

Governments of five municipalities in western France have been hit by a cyberattack. The local governments of the five towns Saint-Nazaire, Montoir-de-Bretagne, Donges, La Chapelle-des-marais, and Pornichet share servers. Officials say it may be months before service is restored. The attack began on Tuesday, April 9.

Editor's Note

On Wednesday, employees were told not to turn on their computers or access email via their phones. Email and phone services are down, and officials do not have access to their workspaces, files or business software. This is an all hands on deck situation, with twice daily updates/meetings on progress, where everyone is pulling together to restore services. This will be a good study in cross-jurisdictional incident response worth studying for applicability.

Lee Neely
Lee Neely

Small towns simply lack cybersecurity resources, human and financial, to build and maintain an effective cybersecurity program. They become easy pickings for cyber criminals to attack, most often for ransom.

Curtis Dukes
Curtis Dukes

Internet Storm Center Tech Corner

Microsoft Patches

https://isc.sans.edu/diary/April+2024+Microsoft+Patch+Tuesday+Summary/30822

Rust Command API code execution vulnerability CVE-2024-24576

https://blog.rust-lang.org/2024/04/09/cve-2024-24576.html

Adobe Updates: Magento Adobe Commerce CVE-2024-20759 CVE-2024-20758

https://helpx.adobe.com/security/products/magento/apsb24-18.html

https://helpx.adobe.com/security.html

Fortinet FortiOS And FortiProxy Vulnerability CVE-2023-41677

https://www.fortiguard.com/psirt/FG-IR-23-493

FortiClient Linux Remote Code Execution

https://www.fortiguard.com/psirt/FG-IR-23-087

BatBadBut: You can't securely execute commands on Windows

https://flatt.tech/research/posts/batbadbut-you-cant-securely-execute-commands-on-windows/

Apple Threat Notifications and Protecting Against Mercenary Spyware

https://support.apple.com/en-us/102174

New Technique to Trick Developers Detected in an Open Source Supply Chain Attack

https://checkmarx.com/blog/new-technique-to-trick-developers-detected-in-an-open-source-supply-chain-attack/

Smoke and Screen Mirrors Signed Backdoor CVE-2024-26234

https://news.sophos.com/en-us/2024/04/09/smoke-and-screen-mirrors-a-strange-signed-backdoor/

D-Link NAS Backdoor

https://github.com/netsecfish/dlink

LG SmartTV Vulnerabilities

https://www.bitdefender.com/blog/labs/vulnerabilities-identified-in-lg-webos/

Wait Just an Infosec: The Amazingly Scary XZ SSHD Backdoor (April 4, 2024)

with Johannes Ullrich and Bohan Zdrnja

https://www.youtube.com/watch?v=HTNKS3tw3xk