SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact UsA memory corruption vulnerability in the Fluent Bit logging utility could be exploited to create denial-of-service conditions, allow information disclosure, and possibly allow remote code execution according to a report from Tenable. Fluent Bity has been downloaded billions of times. The vulnerability affects versions 2.0.7 through 3.0.3, and has been fixed in Fluent Bit version 3.0.4.
Ask any cloud service providers in use if they use Fluent Bit and are they on the latest version and if they can assure you that use of an older version did not lead to compromise.
If you're using Fluent Bit, make sure you've updated to 3.0.4. The harder question will be asking your cloud providers if they are and which version is in place. If you're referencing a provided SBOM, make sure that it is both current and that you're checking the Vulnerability-Exploitability eXchange (VEX) data for applicability of vulnerabilities.
This goes back to things like SBOM and Cloud Providers. If your cloud provider is using this and patches it, you will never technically know about it unless you have these libraries exposed to you. Then again, how do you know they fully patched it?
Tenable
Tenable
GitHub
NVD
Dark Reading
Security Week
Bleeping Computer
On May 15, 2024, the US Securities and Exchange Commission (SEC) has adopted changes to their Regulation S-P, which requires financial organizations to adopt written policies and procedures that address administrative, technical, and physical safeguards for the protection of customer records and information. The amendments require certain financial institutions to report breaches within 30 days of detection.
Expeditious reporting may not be on your radar when you're focused on detection and reducing dwell times. Make sure that you're partnering with folks like your CFO who are tracking SEC requirements so you can work together to meet them.
The US Cybersecurity and Infrastructure Security Agency (CISA) has added a pair of vulnerabilities affecting end-of-life D-Link routers to their Known Exploited Vulnerabilities (KEV) catalog. One of the flaws (CVE-2014-100005) is a cross-site request forgery issue affecting D-Link DIR-600 routers; the other (CVE-2021-40655) in an information disclosure issue affecting D-Link DIR-605 routers. The vulnerabilities have been exploited in the wild. CISA advises that the vulnerable equipment be retired or replaced.
There is no patch for these vulnerabilities. Yet another reminder to track the "End of Life" of devices. Some recent approaches to "device safety" labeling to consider adding an expiration date to indicate how long a particular device will be supported. Most consumers will likely be surprised how short this time is, and maybe some expired devices are still rotting on store shelves waiting to be sold to unsuspecting consumers.
At the user level, the solution to this problem is simply to replace the device. The improvement in performance and function will more than likely cover the cost of the upgrade; risk reduction will come as lagniappe. At the community level, many, not to say most, of these devices will never be replaced and may be co-opted into bot-nets. We should consider legislation that would allow ISPs to coerce their customers to upgrade.
Researchers at Check Point have detected a design flaw in the Foxit PDF Reader that can be exploited to deliver malware. The flaw is being actively exploited by multiple threat actors to deliver a range of malware including Agent Tesla, AsyncRAT, DCRat, and XWorm. The issue does not affect Adobe Acrobat Reader.
A lot of attention has been paid to flaws in Adobe's PDF products like Acrobat. However, Foxit's solutions had very similar flaws, and they are exploited just like the bigger competitor's flaws.
Foxit positions themselves as more affordable drop-in replacement for Acrobat. This attack relies on social engineering, prompting the user to enable/allow behavior which may seem innocuous, but in totality allows for the malware to be installed and executed. The root cause is in how Foxit is designed rather than a coding error. Even so, educating users on how to handle the unexpected prompts for privilege or command execution, similar to your existing social engineering preventative training, are your current best mitigations.
The 2024 Verizon Data Breach Investigations Report highlighted that over two-thirds of breaches analyzed included a non-malicious human element. This vulnerability does just that: it takes advantage of human nature to routinely accept the default option for pop-up windows. Take a moment to think before clicking.
A US Environmental Protection Agency (EPA) Enforcement Alert provides information for community water systems (CWSs) to help them comply with Safe Drinking Water Act (SDWA) Section 1433, which requires most CWSs to conduct Risk and Resilience Assessments (RRAs), develop Emergency Response Plans (ERPs) and certify their completion to EPA. According to the Enforcement Alert, 70 percent of CWSs EPA has inspected since September 2023 did not meet all of the SDWA Section 1433 requirements.
In my experience, community water systems are often small, running on systems which are enough to get the job done, and don't have the resources for in-depth security assessments. While the 1433 section only applies to systems with over 3300 users, it's still a good idea to have your arms around where your risks are and what you can do to keep from being a victim. Regardless of size, leverage the Water ISAC resources below. Membership is based on customer base, starting at $105/year, and even has a 60-day trial so you can see if it is a fit. Given that critical infrastructure like this is a constant target, opting out or ignoring your security posture really isn't an option.
The alert highlights two things that make it difficult for communities to comply: 1) lack of technical skills to conduct the cyber portion of the RRA; and 2) resources to implement the findings from the cybersecurity assessment. Both are solvable but require funds at the federal level and likely technical support at the state or local level.
While many of these systems use the some of the same software and share any vulnerability, unlike the power grid, one cannot be used as an attack vector against others. While any compromise will be serious, consequences will remain local.
Australian digital prescription services company MediSecure has disclosed a ransomware attack that compromised patient data through November 2023. Once MediSecure became aware of the incident, they took their website offline. The incident appears to have originated through a third-party vendor. MediSecure was one of two companies that provided digital prescription services through Australia's public digital health network until last November.
Of note here is that MediSecure's contract with Australia's health network was awarded to another provider last May, and the transition completed in November. It appears customer data was still available in their systems. The call to action is to review how your data is protected when services are transitioned to a new provider, what is their disposition process, to include any third party services they leverage. All that should be in writing and validated on a regular basis.
This one is a good reminder to have information removal/deletion/transfer clauses in all subcontractor/service provider contacts so that sensitive information is not stored at losing incumbent vendors any longer than necessary to support full turnover to new service providers.
Although specifics on the attack are not available, it does reinforce the need for regular risk reviews of third-party vendors. Often there is reliance on a vendorÕs cybersecurity process and that must be taken into consideration as part of your information security program. Use this attack as an opportunity to revisit and update your third-party risk management program.
Security Week
SC Magazine
The Register
MediSecure
Texas-based WebTPA Employer Services says that a cybersecurity incident has compromised personal information of more than 2.4 million individuals. WebTPA is a third-party administrator for health insurance and benefits plans. WebTPA discovered the incident in late December. The compromised data include contact information, dates of birth, insurance information and Social Security numbers.
The investigation showed the data was exfiltrated in April 2023, but the attack was not discovered until December, and customer notifications just started this April. While healthcare breaches continue to be a challenge, indications are that there will be numerous lawsuits designed to force the industry to raise the bar on protecting healthcare data. Don't wait for the lawsuit to make sure your house is in order, leverage your ISAC or CISA resources to make sure that you're on top of things, don't wait for that demand to report to the board or comment to the media on your incident.
The American Radio Relay League (ARRL) has disclosed a cybersecurity incident that affected some of their services, including the Logbook of The World¨ and the ARRL Learning Center. (ARRL is the National Association for Amateur Radio.) The organization does not store payment card information and does not collect Social Security numbers. Their membership database contains publicly available information, including names, addresses, call signs, and email preferences.
As a ham radio operator (K3TN) this one hit home! The ARRL hasn't put out much information, but many systems remain unavailable a full week after the incident. This will be a good case study for the IT and IT security problems small/medium-sized non-profit organizations face with small IT staffs. Pressures to meet demands for new services often consume staff and budget that are needed to assure reliability and security (today's buzzword is 'resiliency') of existing crown jewel services. Another common problem: CEOs and Boards need to have it driven home that security through obscurity ('Who would attack us??') doesn't exist on the internet any more than it exists in Tornado Alley.
ARRL is saying they don't believe the member database is affected. And while the information is public, much is available from the FCC, that database represents an authoritative connection of that information to the member. If you're an ARRL member, be on the watch for phishing emails leveraging your information.
The ARRL is the communication system of last resort in the event of a "Black Sky" event and may be required to coordinate a cold start of the grid. However, it is highly resilient, and this application is not a single point of failure.
According to a report from the Pew Research Center, 25 percent of web pages that existed between 2013 and 2023 were not accessible as of October 2023. Most of the instances of what Pew researchers are calling digital decay, are due to pages being removed from websites that are still functioning. The study looked at government and news websites and social media posts. Local government websites had the highest incidence of broken links.
This is an interesting observation. If you own a site, you control the lifecycle and have the say on what is left vs archived/deleted. The question is what is the obligation to sites referencing that content? How far should sites go to maintain continuity/pointers to the most current versions? This is something you should discuss and document at your shop. Having a consistent approach which is written down is more important than the decision you make. Give consideration to publishing that on your site.
Do we need to archive the internet? If so, who is doing it, and how is that being funded? For those that have never investigated this, there are groups out there backing up and archiving pages on the internet and large data sources and some of them have funding, but many don't. Is it digital decay or totally lost knowledge pools? I would argue that this type of Internet historian, librarian, archivist, or even archeologist may be a job title over our lifetime. Probably dedicated to preserving pages although that webpage that was created using GeoCities with the big warning sign may be the target. Or maybe it is.
Another PDF Streams Example: Extracting JPEGs
https://isc.sans.edu/diary/Another+PDF+Streams+Example+Extracting+JPEGs/30924
Analyzing MSG Files
https://isc.sans.edu/diary/Analyzing+MSG+Files/30940
Linguistic Lumberjack: Fluent Bit Vulnerability CVE-2024-4323
Fortinet FortiSIEM Command Injection Deep-Dive CVE-2023-23992
Git Vulnerability CVE-2024-32002 PoC
https://amalmurali.me/posts/git-rce/
Google Chrome CVE-2024-4947 PoC
QNAP QTS QNAPping At the Wheel
https://labs.watchtowr.com/qnap-qts-qnapping-at-the-wheel-cve-2024-27130-and-friends/
May 2024 Security Update Problems with Windows 2019
D-Link Vulnerabilities Exploited
Ivanti PoC Exploit CVE 2024-22026
Catch up on recent editions of NewsBites or browse our full archive of expert-curated cybersecurity news.
Browse ArchiveCrashPlan and SANS team up to bring you the results of the 2024 Endpoint Data Survey.
Take the SANS 2024 Multicloud Survey: Securing Multiple Clouds Amid Constant Changes | This survey will explore the underlying forces behind why multicloud customers make the cloud adoption decisions that have been identified in past surveys.
SANS 2024 CTI Survey: Managing the Evolving Threat Landscape | May 22 | Join us to learn How the CTI discipline has evolved in the past year-how CTI analysts kept up with the ever-changing threat landscape, how they view emerging threats (adversary use of AI), and how technology enablement improves efficiency.
Resilient by Design: Rethinking Cybersecurity in Manufacturing | May 23, 1:00 pm ET | Tune in to this discussion with Dragos and Rockwell Automation as they discuss current cybersecurity threats in manufacturing, proactive responses to cybersecurity risks, and navigating the OT/ICS cybersecurity journey.