SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact UsMicrosoft says they are expanding the scope oi their Secure Future Initiative (SFI) by integrating the findings of the Department of Homeland Security's Cyber Safety Review Board (CSRB) regarding last summer's breach of Microsoft Azure as well as lessons learned from the Midnight Blizzard attack that Microsoft reported earlier this year. The expanded SFI will be guided by three principles: secure by design, secure by default, and secure operations. The goals and actions will be aligned to six security pillars: protect identities and secrets; protect tenants and isolate production systems; protect networks; protect engineering systems; monitor and detect threats; and accelerate response and remediation.
This is a big deal for two reasons. In 2002, Bill Gates revolutionized Microsoft's priorities with Trustworthy Computing. Over the past two decades in many ways the Windows operating system has become the standard for building security into default configurations. Satya Nadella's SFI is the same thing, but instead of building security into operating systems MS is embedding security into organizational culture. This is very exciting as I think they will actually do it. It's going to take years to truly see the change organization-wide, but sense of urgency and mission is there long term. But the second, and even more important take away is the impact CSRB can have. If they continue to publish detailed breach reports like this (hint: United Healthcare), we may begin to see the root causes (culture) and change that industry wide.
Microsoft has published a roadmap to show how they are meeting 20 of the CSRB recommendations, including victim notification, which is not getting as much attention as their other activities. Even so, make sure that you're following current guidance securing your Microsoft environments, managing accounts and permissions. Double check your implementation of strong authentication and that your team knows how to find and access the detailed logs of activity.
While a welcome move, it is deeply disappointing that it took a breach and the CSRB report for Microsoft to take these steps. The products and services we rely on should already be built with the principles outlined above. One has to wonder how many other vendors are not focusing on security and will only do so in response to a breach of their products/services.
Microsoft has added some very key promises to SFI and backed it with a memo from Microsoft CEO Satya Nadell to all MSFT employees that said In some cases, this will mean prioritizing security above other things we do, such as releasing new features or providing ongoing support for legacy systems. This is key to advancing both our platform quality and capability such that we can protect the digital estates of our customers and build a safer world for all. Two things to cynically point out: (1) Why only in some cases?? and (2) the annual RSA conference is to these kinds of promises as New Year's Day is to resolutions: if in some cases you still eat those deep-fried chocolate-filled croissants, you likely are not going to lose weight or avoid heart attacks.
A Florida man has been sentenced to six-and-a-half years in prison for selling counterfeit Cisco equipment to the US military. Onur Aksoy purchased cheap network equipment from overseas which were altered to appear to be Cisco equipment. The products often failed or malfunctioned, causing problems for customers, who included schools, healthcare organizations, government agencies, and the US military. Askoy operated multiple companies in Florida and New Jersey. In June 2023, Askoy pleaded guilty to charges of conspiracy and mail fraud. In addition to his prison sentence, Askoy has been ordered to pay $100 million in restitution.
The peddling of counterfeit network equipment has been around for decades. The easy solution is to buy directly from the equipment vendor or one of its resellers. That said, federal statutes can require that a percentage of procurement dollars be set aside for small business bidding. That's enabled individuals like Mr. Aksoy and his multiple companies to market in counterfeit equipment and cheat the system for personal gain. Kudos to law enforcement, keep up the good work.
This is old school supply chain security failure and this particular flavor (counterfeit Cisco products) has been going on for 15 years Ð in 2009 DoJ prosecuted two people caught selling counterfeit Cisco gear to the Federal Bureau of Prisons. The security principle violated is basic common sense: if it seems too good to be true, it probably isn't. Simple table-top exercise: see if you can get procurement to agree to buy all CXOs Roleks watches that are selling NOW for $49.95.
Cisco, US CBP and others have been working to shut down his shipment of counterfeit Cisco equipment. The question is could your team spot counterfeit equipment? Are you checking? This actor was hiding behind multiple personas running about 15 businesses, albeit all operating out of the same warehouse. If you're buying directly through resellers, DSB or otherwise, make sure you're vetting your suppliers and their deliveries carefully, particularly boundary control and other security devices. If you don't know how or if this is done, find out.
Justice
Justice
Ars Technica
The Register
Bleeping Computer
At the RSA Conference in San Francisco this week, US Office of the National Cyber Director Assistant National Cyber Director for Cyber Policy and Program Nick Leiserson told an audience that the White House has been talking with software manufacturers about shifting the burden of liability from customers to manufacturers. The effort is (prompted by) the White House National Cyber Strategy, which includes incentives for software companies to develop products without serious vulnerabilities. The conversation will include critical infrastructure operators later this year. In a related story, the Cybersecurity and Infrastructure Security Agency (CISA) is expected to announce their Secure by Design pledge this week.
It's easy to say we're shifting the liability burden to manufacturers and yes, they can do much, much more to strengthen secure by design principles. That said, eliminating design level vulnerabilities is a difficult task and will require knowledge and skills that aren't easily taught by software developers. Another consideration is that years of research has proven it nearly impossible to eliminate all vulnerabilities, design, and implementation level in commercial software. In its present form, the only winner with this approach is liability lawyers.
Making sure that suppliers have skin in the game when it comes to secure software will, I hope, help raise the bar across the board. One aspect that has to be considered is the exploitability of flaws, particularly of embedded code or libraries from third parties. Software suppliers already prioritize flaws which can be exploited to make keeping complex packages manageable.
This is like talking to the deep-fried chocolate croissant industry about nutrition. The federal government needs to talk via its buying power Ð the software industry and its lobbying firms have been effectively immune to talks about taking ownership of even easily avoided flaws in their products.
One would like to see the software industry meet the same standard of merchantability as any other industry and that the Administration would follow through on what is so far only a threat. However, the market's tolerance for shoddy and the industry culture of "ship early, add quality late" is so deeply entrenched that one cannot be very hopeful.
HPE Aruba Networking has released updates to address a total of 10 vulnerabilities in ArubaOS. Of those 10, four are critical unauthenticated buffer overflow vulnerabilities that could be exploited to attain remote code execution. The vulnerabilities affect multiple versions of ArubaOS. Some versions of the software are End of Maintenance and do not have patches available.
The fix is to update to the patched version of ArubaOS 8.10, 8.11, 10.4, 10.5 or 10.6. If you're not on one of these versions to begin with, you need to get there. While there are workarounds, they don't address all the issues in all the ArubaOS versions; the safer bet is to update rather than stopping the sand running through your fingers.
It's crucial that every network vendor is part of this conversation. The widespread nature of this network vulnerability demands immediate action-patching is essential. We often encounter such fundamental issues during penetration tests. However, many testers lack deep network knowledge and the necessary exploits. It's a risk not worth taking.
Microsoft is developing Zero Trust DNS (ZTDNS), which will appear in an unspecified future version of Windows. Microsoft has also published a document to help admins determine how ZTDNS fits into their Zero Trust deployment model. ZTDNS will first be in private preview, and at an undetermined later date, will be available to insiders.
Practitioner's note: for defenders who currently track name resolution by inspecting port 53/TCP/UDP traffic at the network edge, you'll need to shift focus to the endpoint or the protective DNS servers. The latter assumes you're running your own or have access to telemetry from your protective DNS provider.
This aligns with OMB M-22-09 and NIST SP 800-207 to support DOH/DOT as well as integration with the Windows firewall for DNS traffic routing, allowing you to filter out undesired domain or even upstream resolvers, not unlike the PDNS service CISA provides agencies. The goal is to have all DNS traffic encrypted and only use trusted servers. Once you have DOH/DOT servers in place, you're going to want to focus on client mods to use DOH/DOT, including routing that traffic to your trusted servers.
The City of Wichita in Kansas has taken its network offline following a ransomware attack. The attack occurred on Sunday, May 5, and resulted in encrypted data on some of the city's IT systems. Wichita officials do not yet know if the attackers stole information before encrypting.
The city turned off their network and a number of supporting systems. The primary impact is most city services are only accepting cash and the airport Wi-Fi and departure screens are not operating. Wichita is finding ways to deliver services to residents, and their web site explains how to interact with each city service both as a citizen and a supplier, one more nice communication style to add to your playbook.
The Finnish Transport and Communications Agency (Traficom) has published a warning about Android malware targeting online bank accounts. The campaign involves SMS messages sent in Finnish, instructing recipients to call a certain number; the person who answers the call tells them to download an app for protection, which is how the malware gains access to their devices.
Beware of SMS bearing gifts. There are SMS filtering systems for mobile devices, the risk being you need to send the message to the system for analysis. An alternative is to use device controls to block/isolate unknown senders, introducing an added step before interacting with those messages. Even with iOS allowing third-party app stores in the EU, guiding your users to use caution when installing apps, particularly under the guise of helpdesk support, remains prudent. The old trick of spotting language and grammar errors in phishing attempts is becoming far less effective; take it for a given that the fake help desk person will speak your language like a native.
The US National Security Agency (NSA), the Department of State, and the FBI have published a joint cybersecurity advisory warning that threat actors with ties to North Korea's government have been exploiting weak DMARC implementations to conduct spearphishing attacks against policy analysts and other experts. DMARC, or Domain-based Message Authentication Reporting and Conformance (DMARC) policies, when properly configured, help prevent spoofed email messages.
Practitioner's note: this is an easy one to check. Perform a web search for "dmarc checker," enter your domain, and see what it says. Getting it right can be tricky, but the first step is knowing whether you're vulnerable.
If you don't have a DMARC setting, or your policy is set to none (p=none) it's time to change it to reject or quarantine, with a 100% applicability. Yeah, rolling out DMARC with a p=none was safe, it accepts all messages, and as such, isn't effective. Make sure to communicate as you change this setting. The bulletin also gives guidance on how to read the email headers to see how your SPF, DKIM and DMARC settings are being applied.
One often implements new controls with a permissive policy to avoid disruption, with the full intentions of moving to a more restrictive policy that one fails to get around to. My mentor, Charlie Middleton, taught me to over-control new applications; one can always relax the controls later if warranted. However, once the application gets out of control, tightening may be too late to be effective.
Defense
Infosecurity Magazine
The Record
Bleeping Computer
Security Week
Dark Reading
A critical use-after-free vulnerability in the HTTP Connection Headers parsing in Tinyproxy versions 1.11.1 and 1.10.0 can be exploited to achieve memory corruption and remote code execution. The vulnerability is triggered through an unauthenticated HTTP request. According to data from Censys gathered on May 4, of the 90,310 hosts exposing a Tinyproxy service to the public Internet, approximately 57,000 are running vulnerable versions of Tinyproxy.
Some finger-pointing going on between Talos and the Tinyproxy open-source software maintainers on preferred vulnerability notification method. Regardless, a fix is now available for download. For the roughly 60% of users that are operating vulnerable versions, snag the patch and install to protect against attack.
Talos Intelligence
The Hacker News
NVD
Censys
GitHub
US Federal Communications Commission (FCC) Chair Jessica Rosenworcel has written to Congress, asking them for additional funding to reimburse telecommunications companies who are replacing Huawei and ZTE equipment. In 2019, the FCC banned telecoms from using Huawei and ZTE equipment in projects that are paid for through the Universal Service Fund. In early 2020, Congress approved the Secure and Trusted Communications Networks Act, which created a program to rip out and replace Chinese telecom gear. The FCC approved nearly $5 billion in reimbursements, but Congress has so far allocated only $1.9 billion.
It's a simple math problem for the telco providers. Stay in the program and get stuck with 60% of the bill or withdraw and not realize a one-time 30-ish% increase in revenue. I suspect many will exit the program unless Congress comes through with the full funding amount. The question then becomes whether government will move to shut down those networks in violation of the law and deny connectivity to rural users.
Small carriers, with 2 million customers or fewer, were given priority for this funding, and it is estimated that the awarded funds still only covered about 40% of the replacement equipment cost and that an additional 3.9 billion is needed to correct the problem. In MondayÕs RSA keynote from Secretary of State Blinken, he stated a commitment to not let US suppliers lag in technology to prevent a repeat occurrence of this scenario.
DNS Debugging with nslookup
https://isc.sans.edu/diary/nslookups+Debug+Options/30894/
DHCP Based VPN Routing Leaks
https://www.leviathansecurity.com/blog/tunnelvision
Mullvad VPN DNS Traffic Leak
https://mullvad.net/en/blog/dns-traffic-can-leak-outside-the-vpn-tunnel-on-android
Tiny Proxy Vulnerability
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1889
Microsoft Plans DNS Lockdown
Microsoft Graph API Abuse
https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/graph-api-threats
SANSFIRE SEC522 Defending Web Applications
https://www.sans.org/cyber-security-training-events/sansfire-2024/
Catch up on recent editions of NewsBites or browse our full archive of expert-curated cybersecurity news.
Browse ArchiveTake the SANS 2024 Multicloud Survey: Securing Multiple Clouds Amid Constant Changes | This survey will explore the underlying forces behind why multicloud customers make the cloud adoption decisions that have been identified in past surveys.
SANS 2024 CTI Survey: Managing the Evolving Threat Landscape | May 22 | Join us to learn How the CTI discipline has evolved in the past year-how CTI analysts kept up with the ever-changing threat landscape, how they view emerging threats (adversary use of AI), and how technology enablement improves efficiency.
Take the SANS 2024 AI Survey: AI and Its Growing Role in Cybersecurity: Lessons Learned and Path Forward | The goal of this survey is to look at AI's role in cybersecurity and understand the opportunities and workforce dynamics as well as emerging threats, shortcomings and challenges.
Resilient by Design: Rethinking Cybersecurity in Manufacturing | May 23, 1:00 pm ET | Tune in to this discussion with Dragos and Rockwell Automation as they discuss current cybersecurity threats in manufacturing, proactive responses to cybersecurity risks, and navigating the OT/ICS cybersecurity journey.