SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact UsThe US Federal Communications Commission (FCC) has published a notice of proposed rulemaking regarding Internet routing security reporting requirements for Internet service providers (ISPs). The FCC wants to ensure that ISPs are taking steps to protect their networks from Border Gateway Protocol (BGP) vulnerabilities. The FCC is accepting public comment on the proposed rules.
This move comes at the right time. For the most part, large ISPs are already implementing RPKI. As of earlier this year, the number of protected prefixes exceeds the number of unprotected once. This will hopefully get the stragglers on board.
First comes the plan then comes the implementation. ISPs have known that BGP is vulnerable to attack and has been for decades. This future requirement shouldn’t come as a surprise to any of them.
The FCC is working to hold ISPs feet to the fire implementing BGP security measures specifically Resource Public Key Infrastructure (RPKI). In effect, signed changes/updates to BGP information. They want to have the ISPs provide a confidential (detailed) report on their plans to improve BGP security, and the nine largest ISPs will be held to a higher bar for delivery. However, if they meet the desired security threshold, they will not need to file subsequent detailed plans.
Zyxel has released updates to address three critical vulnerabilities in firmware for two unsupported network-attached storage (NAS) devices, NAS326 and NAS542. The researcher who discovered the vulnerabilities found five in all; Zyxel decided three of the flaws were critical enough to merit patches despite the devices having reached end-of-life (EoL). Patches are available to customers with extended support. The two vulnerabilities that Zyxel declined to address are medium-severity privilege elevation flaws.
Nice to have patches available even after the product is officially EoL. Too often we end up with no longer supported devices. I just looked at some EoL policies for different vendors, and around four years appears to be standard. How many devices in your network are older?
CVE-2024-29972, backdoor account, CVE-2024-29973, Python code injection, and CVE-2024-29974, RCE/persistence flaw, all have CVSS scores of 9.8. CVE-2024-29972 the "NsaRescueAngel" backdoor/remote support root account, was supposed to be resolved in 2020 but remains. The patches are only available if you have extended support; apply the patches expeditiously. Regardless of support, take steps to replace these devices; they were EOL December 31, 2023. Make sure the old devices are retired/recycled so they don't re-appear in your radar at a time where issues won't be addressed.
Outpost24
Zyxel
The Hacker News
Help Net Security
The Register
Researchers at Akamai have observed a campaign targeting known vulnerabilities in ThinkPHP applications. The campaign began as far back as October 2023; the vulnerabilities have been known, and patches have been available, since late 2018 (CVE-2018-20062) and early 2019 (CVE-2019-9082).
ThinkPHP has been one of the most actively exploited web apps for years. Must have been a slow news days for this to get picked up. I would be very surprised to find a vulnerable ThinkPHP install in the wild that is not already exploited multiple times.
There were initially two major releases of ThinkPHP, an object-oriented lightweight PHP development framework, version 3 and 5, licensed under Apache 2 Open Source. CVE-2018-20062 affects ThinkPHP versions prior to 5.0.23, and CVE-2019-9082 impacts ThinkPHP prior to version 3.2.4. Make sure you're using the latest release and investigate moving to ThinkPHP 6.0/6.1 which use PHPO 7 strong typing (strict mode) and are compatible with PHP 8.1.
This announcement serves as good reminder that vulnerabilities that are known to work are a good first bet for evildoers to try. Evildoers are using them because they’re still working. The bigger question is why organizations fail to patch. That answer can be a bit more complicated, but the requirement is if don’t patch you regularly review the risk of not doing so.
The US Federal Communications Commission (FCC) has adopted a three-year, $200 million Schools and Libraries Cybersecurity Pilot Program. The goal of the program it to gather information to help the FCC understand what services and equipment will best serve schools and libraries in addressing cyberthreats.
The FCC should include program implementation guidance with the release of these funds. For example, a must is completion of a standardized cybersecurity assessment. This creates the sort of data that will prove valuable in identifying specific products and services to implement essential cyber hygiene.
Understanding what services and equipment best serves schools includes deployments at schools. In other words, the pilot program will provide financial support to schools and libraries seeking to reduce the burden of maintaining/implementing cybersecurity services and equipment. This program is part of FCC Chairwoman Jessica Rosenworcel's Learn Without Limit's initiative, which includes ensuring connectivity in schools and libraries, Wi-Fi on school busses, as well as E-Rate support for libraries and tribal communities.
We don’t fund our public schools very well, and the staff’s salary is not what it should be. I’ve known some IT people at these county schools, and their staffing levels are some of the smallest. Any amount of help is appreciated.
On Monday, June 3, Microsoft announced that “all versions of NTLM ... are no longer under active feature development and are deprecated.” NTLM (NT LAN Manager) will continue to work in the next release of Windows Server and the next annual release of Windows. NTLM debuted in Windows NT 3.1 in 1993.
Welcome and long overdue news from the Microsofties. Granted admins still have some time to make the transition fully to Kerberos or another authentication protocol. That said, no time like the present to inventory NTLM usage and start planning for its eventual deprecation.
Yeah, I thought NTLM (LANMAN, NTRLMv1 and NTLMv2) were long gone, and the April 2024 security update broke it for some as a reminder it's still around. (This was resolved in the May 14 update). Calls to NTLM should be replaced with calls to Negotiate, which uses Kerberos, falling back to NTLM only when necessary. If you've not already cataloged your use of NTLM, do so, then take active steps to phase it out.
A ransomware attack targeting pathology services provider Synnovis in London, UK, is disrupting the ability of seven NHS Trust hospitals there to deliver services, including blood transfusions. The affected hospitals have cancelled non-emergent surgeries and sent patients sent home to wait for a new appointment. In some cases, patients have been redirected to other, unaffected facilities.
The hospitals have disconnected from Synnovis IT systems while the incident is resolved. Synnovis is not yet sharing an ETA for service restoration, and it's being noted that the recent Synlab Italia incident, even though not directly connected, took a month to restore services. Take a note here - where you're not sharing your targets of service restoration, connections will be made to other incidents to extract and publish a timeline by others. You've set recovery time objectives, if you're not comfortable stating these, you need to rehearse and revise your plans until you are.
The key statement from Synnovis is “…This is a harsh reminder that this sort of attack can happen to anyone at any time…” Heed Synnovis’ advice and review your credential, configuration, and patch management processes on a regular basis. Where possible enable MFA. Configure your devices to a known benchmark standard. And, ideally, patch high severity vulnerabilities within 24-hours of patch release.
Synnovis
BBC
Silicon Angle
Security Week
Ars Technica
Security Week
The Register
The US Cybersecurity and Infrastructure Security Agency (CISA) has added a seven-year-old vulnerability in Oracle’s Web Logic Server to its Known Exploited Vulnerabilities (KEV) catalog. The operating system command injection flaw (CVE-2017-3506) could be exploited to take control of vulnerable servers.
CVE-2017-3506, command injection flaw, CVSS score 7.4, along with CVE-2023-21839 have been weaponized by the China-based 8220 Gang (aka Water Sigbin) to launch a fileless, in-memory, cryptocurrency miner via a heavily obfuscated PowerShell script. This affects Oracle Fusion Middleware version 10.3.6.0, 12.1.3.0, 12.2.1.0, 12.2.1.1 and 12.2.1.2 and while difficult to exploit, an unauthenticated hacker with access via HTTP is all that is required. Workarounds include limiting network access or disabling packages, which will likely affect break application functionality, the best fix is to apply the CPU. The NIST KEV has a due date of June 24th to apply the update or workaround.
FBI Cyber Division Assistant Director Bryan Vorndran told attendees at the 2024 Boston Conference on Cyber Security earlier this week that the agency now has more than 7,000 LockBit ransomware decryption keys. The FBI is reaching out to known LockBit victims; others who suspect they are LockBit victims are urged to visit the FBI’s Internet Crime Complaint Center (ic3.gov).
If you were hit by LockBit and don't have the key, reach out to the FBI to see if you can get a decryption key; it's not going to cost you anything. Note that LockBit is still active, albeit operating on new servers due to the recent takedown. The U.S. State Department is now offering $10 million for information that leads to LockBit leadership arrest or conviction, and an extra $5 million for tips leading to arrest of LockBit affiliates.
Cisco has published a security advisory regarding vulnerabilities in their Webex Meetings software. An insecure direct object reference (IDOR) vulnerability could give attackers access to internal Webex meetings by simply changing numbers in a link. The flaws appear to have been exploited to snoop on German government Webex meetings to expose meeting information and metadata, including meeting topics and participants. Cisco has addressed the issues “and a fix has been implemented worldwide as of May 28, 2024.”
This was a server-side fix. As a customer, you have no action to take. Cisco is notifying customers who had observable attempts to access meeting information and metadata, and reports no further (successful) attempts to access this data via the bugs.
Cloud storage provider Snowflake now says that customer accounts protected by single-factor authentication were targeted in attacks bent on stealing sensitive data. Ticketmaster and Santander recently disclosed breaches; both are Snowflake customers. Data that are purported to have been stolen from Advance Auto Parts and Lending Tree, both of which are Snowflake customers, have appeared for sale on the dark web.
Single factor authentication has to become a thing of the past. With an ever-increasing number of services and applications available over the Internet, coupled with the human factor of password choices, it's not a risk you can ignore. Where you're using passwords, ensure that you've using password services which include data breach notification to alert users they need to change passwords, and put time limits in. Here is a hard one - where a user has multi-factor authentication enabled, but is using a weak or compromised password, they still need to change that password.
WatchGuard VPN Bruteforcing
https://isc.sans.edu/diary/Brute+Force+Attacks+Against+Watchguard+VPN+Endpoints/30984
No Defender Yes Defender
https://isc.sans.edu/diary/NoDefender+YesDefender/30980
Malicious Python Script with a "Best Before" Date
https://isc.sans.edu/diary/Malicious+Python+Script+with+a+Best+Before+Date/30988
FBI Obtained 7,000 LockBit Ransomware Keys
TotalRecall Tool To Extract Data from Microsoft Recall
https://github.com/xaitax/TotalRecall
Apple Guarantees 5 Years of Security Updates
https://www.androidauthority.com/iphone-software-support-commitment-3449135/
FCC Proposes New Rule for Security Routing
https://www.fcc.gov/document/fcc-proposes-internet-routing-security-reporting-requirements
WebEx Flaw
https://www.helpnetsecurity.com/2024/06/05/cisco-webex-cloud-vulnerability/
Fake Job Ads Lead to Stolen Crypto Currency
https://www.ic3.gov/Media/Y2024/PSA240604
Zyxel NAS Vulnerabilities
https://outpost24.com/blog/zyxel-nas-critical-vulnerabilities/
Catch up on recent editions of NewsBites or browse our full archive of expert-curated cybersecurity news.
Browse ArchiveTake the SANS 2024 ICS/OT Survey: The State of ICS/OT Cybersecurity Survey | The purpose of this survey is to determine the safety and security challenges and the state of defensive postures involved with control system cyber assets, their communication protocols and supporting operations.
Webcast: 2024 State of Security Automation Survey | June 25, 1:00 pm ET | Tune in to this discussion with Mark Orlando and Palo Alto's Jane Goh as they discuss the results of this survey - how SOC teams identify, prioritize and assess the efficiency of the SOAR use cases; and explore the ways AI might fill the gaps left by SOAR and remaining potential barriers.
Webcast: Secure your multi-cloud environment from code to cloud with Microsoft Defender CSPM | June 26, 10:30 am ET | Join Matt Bromiley and Tal Rosler of Microsoft as they unveil the latest security posture innovations in Microsoft Defender for Cloud.
Webcast: Is Access to Corporate Resources from any Device, Anywhere Truly Possible?