SANS NewsBites

Microsoft Delays Recall Rollout; AWS Mandatory MFA for Privileged Accounts; Microsoft Announces Changes to Outlook

June 18, 2024  |  Volume XXVI - Issue #47

Top of the News


2024-06-14

Microsoft Delays Recall Release

Last week, Microsoft announced that they are delaying the release of Recall, a feature that takes screenshots every few seconds, which are then stored on users' devices and encrypted. Users can search these screenshots using local AI for future reference. Critics have been outspoken about Recall's privacy implications. The feature was to be launched as a preview in the Copilot+ PCs, which ship on June 18. Recall will now appear as a preview in the Windows Insider Program. Microsoft says, 'We are adjusting the release model for Recall to leverage the expertise of the Windows Insider community to ensure the experience meets our high standards for quality and security.'

Editor's Note

This feature is a great litmus test for thinking 'Security First.' You can easily understand a developer writing such a tool for personal use and someone seeing it and saying 'Cool, that would be a killer feature in Windows!!' A 'What Could Go Wrong' session would quickly lead to not only no way for a Windows feature, but delete that function right now from any developers' machines!! One key reason for killing the feature forever is the scary thought of AI engines ingesting random screen shots of users' screens - Microsoft has already suffered an enormous privacy breach after AI ingested contents of users' hard drives.

John Pescatore
John Pescatore

Copilot has multiple forms, app, Edge, Windows, Pro, and 365, and is positioned as a replacement for Cortana, initially branded as Bing Chat, which means you need to not only be conversant on which version is where, but also what they do and if they fit within your security constraints. Specific to Recall, considering the functionality, you need to understand where the snapshots are stored and what is discernable from the local AI. To evaluate Recall, you're going to need to get a Copilot+ PC and install Recall from the Microsoft Insider Program.

Lee Neely
Lee Neely

This whole sorry tale has done major damage to Microsoft's reputation regarding putting security before features. The phrase 'closing the barn doors after the horse has bolted' comes to mind.

Brian Honan
Brian Honan

I am glad Microsoft is listening to us; however, let's face it, this feature is in preview. It's available to be pulled down and installed. Is there going to be a threat actor that puts two and two together and makes it so that this preview feature is installed for them to use going forward? The problem is not that it's a delayed feature now; the problem is that it's officially part of the system and can be enabled through an update. It's also still not fully secured. They need to pull this until it is properly hardened.

Moses Frost
Moses Frost

It is difficult to reconcile this initiative with "Security First."

William Hugh Murray
William Hugh Murray

2024-06-17

AWS is Rolling Out Mandatory MFA for Privileged Accounts

Last fall, AWS announced that it would be requiring MFA for privileged users starting in 2024. In May, AWS began rolling out mandatory multi-factor authentication (MFA) for management account root users. Starting in July, root users of standalone accounts will be required to use MFA. Last week, AWS announced support for FIDO2 passkeys as an MFA method.

Editor's Note

AWS is helping lead the push to MFA adoption, which is fantastic. Not only is this one of the most critical controls to reducing account takeovers, but most likely quickly becoming one of the most critical controls if you want cyber insurance.

Lance Spitzner
Lance Spitzner

AWS has been raising the bar on enforcing MFA for privileged account, starting with organizations management root accounts back in October of 2023, now moving to root users of standalone accounts. Adding support for passkeys provides another attractive option you can leverage to incentivize users to adopt not just MFA, but phishing resistant MFA. Given the shenanigans around compromising reusable credentials, you should already be using MFA for AWS accounts, root or otherwise.

Lee Neely
Lee Neely

It is good to see AWS making MFA mandatory for privileged accounts. Sadly, I often see 'professional' IT people claim they do not to need MFA because they would never fall for a phishing attack and they use strong passwords. Sadly, making things mandatory is often the most effective way to manage this risk. However, we as an industry have a long way to go to make identify and access management something that is painless and user friendly both for those administering and running systems and platforms, and those that use them.

Brian Honan
Brian Honan

The implementation of mandatory MFA is timely given the recent Snowflake incident. Hopefully, AWS will expand mandatory use of MFA to non-privileged accounts to complete the journey away from passwords.

Curtis Dukes
Curtis Dukes

Good to see, good to do for all your internal privileged users if you can't do it for everyone.

John Pescatore
John Pescatore

Better late than never; strong authentication has been essential and efficient for at least a decade. Many implementations are even more convenient than passwords. However, one of the limitations of strong authentication schemes is that they may require user cooperation to setup. This makes mandating them on one's customers problematic. However, relying on fraudulently reusable credentials for infrastructure is reckless. It is long past time to stop treating infrastructure as "the cloud," soft, hazy, and often opaque.

William Hugh Murray
William Hugh Murray

2024-06-15

Microsoft Announces Security-Inspired Changes for Outlook

As part of their Secure Future Initiative, Microsoft will make several security-related changes to Outlook over the next few months. Microsoft plans to deprecate basic authentication (username and password) for all personal Outlook accounts in mid-September. Microsoft will also deprecate Outlook Light and end support for Mail and Calendar apps on Windows. At the end of this month, users will no longer be able to access Gmail through Outlook.com; Outlook for Windows will still allow Gmail access.

Editor's Note

Similar to the AWS initiative of pushing people to stronger authentication options, but two differences here: First, Microsoft is not requiring the use of MFA; instead, they are requiring the use of mail apps that support Modern Authentication methods. Second, they are actively EOLing support of anything that does not support that. This is a fantastic first step to ensuring people can use and support strong authentication methods. The challenge for Microsoft (and any vendor) is making strong authentication as simple as possible. Requiring MFA for IT Admins and Developers is one thing, requiring it for the Ordinary Computer User is a whole different challenge.

Lance Spitzner
Lance Spitzner

This moves the free Outlook/Hotmail/Live.com users from password-based authentication to token based authentication. This will manifest itself in two ways. First, users will see an authentication prompt asking you to trust the Microsoft authentication service. Second, users who are not on supported clients will no longer be able to authenticate. This includes the old Mail and Calendar apps on Windows. Microsoft is replacing these with free Outlook for Windows. You will still be able to use the Outlook Web App, but use a current browser (Current Edge, Chromium, Safari and Firefox browsers work) as the old lightweight version, for older/less capable browsers is also retiring.

Lee Neely
Lee Neely

Similar to AWS item above, all movement away from reusable passwords is good movement. Since Microsoft is investing billions of dollars in AI, I'd like to see announcements of email processing able to detect AI generated content.

John Pescatore
John Pescatore

Appears to be a two-fold strategy by MSFT: First, some housecleaning for outdated applications to include the mandatory use of MFA Ð a good thing. Second, perhaps some positive press for their Secure Future Initiative, given the pummeling they've received over multiple security lapses.

Curtis Dukes
Curtis Dukes

The Rest of the Week's News


2024-06-17

Synnovis Breach Impact Continues

A June 3 ransomware attack on UK pathology services provider Synnovis continues to affect healthcare services in London. The incident has significantly reduced the number of tests that Synnovis can process. The two most affected Trusts - Kings' College Hospital NHS Foundation Trust and Guy's and St Thomas' NHS Foundation Trust - have had to reschedule more than 800 surgeries and 700 outpatient visits.

Editor's Note

This recovery is going to take a bit: Synnovis is talking about restoring services over the next few weeks. The impacted Trusts have been working to reschedule and adopt to meet patient needs. No ill will towards Synnovis, this is hard and uncomfortable, I wish them well. Even so, this begs the question of how you would survive an outage of a critical service provider. How long are your workarounds viable? Have you investigated a secondary or fail-over option?

Lee Neely
Lee Neely

2024-06-14

Ascension Says Personal Data Stolen, EHR Access Restored

Last week, the Ascension healthcare system made two announcements regarding a May ransomware attack. On Wednesday, June 12, Ascension disclosed that the attackers had exfiltrated data, including patient personal health information (PHI) and personally identifiable information (PII). On Friday, June 14, Ascension announced that they have restored access to Electronic Health Records (EHRs). The ransomware appears to have gained purchase in the Ascension system after an employee accidentally downloaded a malicious file.

Editor's Note

The good news is services are on-line, some data is still being restored, bad news, information was exfiltrated. Patients are being offered free credit monitoring and identity theft services. Ascension is being transparent in stating the root cause was social engineering, that an employee downloaded a malicious file they thought was legitimate. We've all been there, definitely a good example to incorporate into your training. While you're at it, look at their cybersecurity event site for some ideas on how to share the information about the event and what is impacted.

Lee Neely
Lee Neely

Those users and applications (e.g., email, browsing, file transfer) must be isolated from mission critical applications (e.g., EHR).

William Hugh Murray
William Hugh Murray

2024-06-17

Key Tronic Says Data Stolen in Cyber Incident

In an amended Form 8-K filing with the US Securities and Exchange Commission, printed circuit board assembly firm Key Tronic say they have determined that the threat actor accessed and exfiltrated limited data from the Company's environment during a cyberattack. The data include some personally identifiable information. Key Tronic also noted that they have so far incurred $600,000 in expenses related to the attack.

Editor's Note

This is another Black Basta attack, resulting in Key Tronic having to shutdown US and Mexican operations for two weeks while the attack was responded to. Interesting that PII was taken in the attack; I would have assumed the target was the IP related to their PCBA activities. Lesson learned: all data is a target. It's the consequence of loss that changes.

Lee Neely
Lee Neely

In its latest year, Key Tronic reported revenue of $588M. One leaves it to its management to judge whether a $600K expense is material. However, the SEC rule seems to be inviting defensive reporting. More experience will be necessary to see the long-term effect of the rule.

William Hugh Murray
William Hugh Murray

2024-06-17

Globe Life Cyber Incident

In a Form 8-K filing with the US Securities and Exchange Commission (SEC), Texas-based insurance company Globe Life has disclosed that they are investigating a data breach that may have compromised consumer and policy-holder information. Globe Life became aware of the incident following an inquiry from a state insurance regulator. The incident appears to involve a web portal, to which Globe Life has since removed external access.

Editor's Note

Discovering a breach after your regulator initiates an inquiry is not ideal. The question is why didn't they already know about the incident? Do you have sufficient visibility into systems to detect anomalous activities? Have you moved to incorporating application logs into your SIEM? Are you deploying EDR tools on your servers? EDR tools now have functionality which can both alert to and block certain types of malicious activity. Make sure you're leveraging the tricks of the tools you're already deploying to your advantage.

Lee Neely
Lee Neely

2024-06-17

LA County Public Health Data Breach Compromised Data of 200,000+ Individuals

The Los Angeles (California) Department of Public Health has disclosed that a phishing incident in February has compromised personal information of more than 200,000 people. The attacker managed to obtain log-in credentials of more than 50 Public Health employees. The compromised email accounts have been disabled, reset and re-imaged affected devices, blocked websites that were used in the phishing campaign, and are quarantining suspicious incoming email. The Department is notifying affected individuals by mail.

Editor's Note

The compromised credentials were used to access PII such as names, birth dates, social security numbers, diagnosis, prescriptions, health insurance information, patient IDs, medical record numbers, Medicare/Medi-Cal numbers and financial information. One hopes part of the after-action is to implement comprehensive MFA as well as breach monitoring for compromised credentials. The stakes are too high, particularly in any medical related field, to not raise the bar, particularly with offset against the cost of a recovery, or credit monitoring/restoration for affected users.

Lee Neely
Lee Neely

Credential theft is one of the key paths for evildoers to access a target's IT infrastructure. It essentially unlocks all the doors without alerting any security mechanisms that may be in place. For the employee, MFA and security awareness training are two relatively low-cost tools that can be used to limit credential theft.

Curtis Dukes
Curtis Dukes

2024-06-14

California AG: $6.75 Million Settlement from Blackbaud

South Carolina software company Blackbaud has agreed to pay $6.75 million to settle charges arising from a 2020 data breach. Blackbaud sells data management software to non-profits. Following the July 2020 breach, Blackbaud misrepresented the scope of the incident. The settlement also required Blackbaud to improve their cybersecurity posture and breach notification practices. The complaint was brought by the brought by the California Attorney General (AG). Blackbaud has previously reached settlements with AGs in the other 49 US states and the District of Columbia.

Editor's Note

Blackbaud misrepresented both the scope of the breach and the level of their security practices. Since this incident, we've seen the value of being as transparent as possible about breach details; it can make the difference between recovery and a going out-of-business sale. When it comes to security claims, assume that trust-but-verify is in play, conduct assessments, internal or external and address issues, rather than assuming nobody will discover issues.

Lee Neely
Lee Neely

The key phrase is, 'failure to implement reasonable data security' The Center for Internet Security (CIS) recently published ÔA Guide to Defining Reasonable Cybersecurity where they provide guidance to organizations seeking to develop a cybersecurity program that satisfies the general standard of reasonable cybersecurity. Give it a look. CISecurity: Reasonable Cybersecurity Guide https://www.cisecurity.org/insights/white-papers/reasonable-cybersecurity-guide

Curtis Dukes
Curtis Dukes

While the charges were related to the breach, they resulted from the "coverup." Err on the side of candor.

William Hugh Murray
William Hugh Murray

2024-06-17

ASUS Releases Firmware Updates to Address Router Flaws

On Friday, June 14, ASUS released security updates to address two vulnerabilities in their routers. One of the vulnerabilities (CVE-2024-3030) is a critical improper authentication issue that can be exploited to bypass authentication safeguards. The second vulnerability (CVE-2024-3079) is a high-severity stack-based buffer overflow issue that could be exploited to execute arbitrary commands. The vulnerabilities could hypothetically be chained. Users are urged to update to the latest firmware versions.

Editor's Note

For ANY router like this, never expose the web based admin interface to the internet. Note that D-Link also released patches this week for a similar severe vulnerability. Add a calendar event to check for router firmware updates once a month.

Johannes Ullrich
Johannes Ullrich

The vulnerabilities could be weaponized to own these devices. The primary fix is to update the firmware on affected devices. Workarounds include both ensuring long complex passwords are used and disabling internet reachable services, such as remote access, port forwarding, DDNS, VPN server, DMZ, port triggers. Given the impact of disabling these services, applying the firmware update will be faster and easier. Even so, ensure WAN based administration is disabled and strong passwords are used.

Lee Neely
Lee Neely

2024-06-17

Scattered Spider Suspected Ringleader Arrested

Police in Spain have arrested an individual believed to be the leader of a hacking group known as Scattered Spider. The group has launched attacks against numerous organizations, including MGM Resorts. They are also known for launching social, engineering attacks against help desks and overwhelming users with fraudulent MFA requests.

Editor's Note

One imagines some casino operators want a piece of this guy. In addition to Tyler Buchanan's arrest, another alleged Scattered Spider gang member, Floridian Noah Michael Urban, was arrested in January. This was a joint operation between the Spanish Police and the FBI and was a complex challenge due to the structure of the gang. Law enforcement is learning how to work with the non-traditional structure of current gangs to facilitate future takedowns, putting them on notice that their days of being untouchable are numbered.

Lee Neely
Lee Neely

Amidst all the news stories about the damage and harms criminals inflict on people, for example the Synnovis Breach story, it is good to see law enforcement are able to identify suspects and arrest them.

Brian Honan
Brian Honan

2024-06-14

Fired Employee Pleads Guilty to Deleting Virtual Servers, Gets 32 Months in Prison

A former employee of National Computer Systems (NCS) in Singapore has been sentenced to more than two-and-a-half years in prison for deleting virtual servers after being fired. Nagaraju Kandula pleaded guilty to deleting 180 virtual servers, causing SGD 918,000 (USD 679,000) in damages. Kandula was let go from NCS in November 2022; the firm neglected to rescind his credentials, which he used to access company systems in February and March 2023.

Editor's Note

The fired employee accessed the system multiple times in 2022 and 2023, from India and Singapore. Two factors to ponder: First, how well does your account termination/lockout process work? Consider voluntary and involuntary separations. Include employees transitioning status, e.g. from employee to consultant. Second, have you enabled unexpected access scenario detection - particularly for privileged accounts? Should that account be logging in form another country? Not every function needs to be allowed from anyplace on the Internet.

Lee Neely
Lee Neely

An example of the importance for all parts of a company, Legal, HR, IT, and Information Security, to create and actively manage the process for departing employees. An employee's accounts should be suspended within minutes of their termination.

Curtis Dukes
Curtis Dukes

Does your insider incident response plan include someone deleting all your machines and backups?

Moses Frost
Moses Frost

Internet Storm Center Tech Corner

New NetSupport Campaign Delivered Through MSIX Packages

https://isc.sans.edu/diary/New+NetSupport+Campaign+Delivered+Through+MSIX+Packages/31018

Overview of My Tools That Handle JSON Data

https://isc.sans.edu/diary/Overview+of+My+Tools+That+Handle+JSON+Data/31012

iTerm2 Vulnerability

https://vin01.github.io/piptagole/escape-sequences/iterm2/rce/2024/06/16/iterm2-rce-window-title-tmux-integration.html

NextCloud Vulnerability

https://github.com/nextcloud/security-advisories/security/advisories/GHSA-9v72-9xv5-3p7c

Python Serialization and "Sleepy Pickle"

https://x.com/MarkBaggett/status/1801732554740969561

D-Link Router Backdoor

https://www.twcert.org.tw/en/cp-139-7880-629f5-2.html

https://supportannouncement.us.dlink.com/security/publication.aspx?name=SAP10398

Detecting Headless Chrome

https://deviceandbrowserinfo.com/learning_zone/articles/detecting-headless-chrome-puppeteer-2024

Detecting Malicious VS Code Extensions

https://medium.com/@amitassaraf/4-6-introducing-extensiontotal-how-to-assess-risk-in-vs-code-extensions-3ac5bfd83fb1

ASUS Router Critical Vulnerability

https://www.asus.com/content/asus-product-security-advisory/