SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact UsThe Australian Communications and Media Authority (ACMA) has determined that a September 2022 breach affecting telecommunications firm Optus was due to an API coding error. The issue had been present for four years before the breach. ACMA says Optus failed to protect customer data of millions of individuals.
The API had two entry points, each of which was secured in 2017. In 2021, a coding error broke one of the ACLs, but the defect was only detected in one of the entry points, despite both being impacted by the same flaw. While the obvious move was to make sure that the same fixes were applied to all entry points, the better move for your future self is to only have one entry point, one set of security controls and one instance to support, secure, document and implement.
APIs are still untested; we see such common flaws. It's web hacking like the 2000s all over again. If you haven't dug into APIs, start. If you think they are not vulnerable to the more traditional attacks, they probably are.
This is the second such determination in recent weeks by an Australian government authority that a commercial business failed in implementing reasonable cybersecurity. While CIS's guide to defining reasonable cybersecurity is specific to the United States, defining reasonable cybersecurity applies globally. Reasonable cybersecurity is becoming the bar businesses will be measured against.
Just a few weeks after critical vulnerabilities in Zyxel network-attached storage (NAS) devices were disclosed, data gathered by the Shadowserver Foundation indicates that end-of-life (EoL) Zyxel NAS devices are coming under attack. Shadowserver has reported observing instances of attempted compromise of a command injection vulnerability (CVE-2024-29973) by a Mirai-like botnet. Timothy Hjort, Student Intern in Vulnerability Research, Outpost24, detected the vulnerabilities and noted in a write-up that 'Despite the fact that the device has reached End-of-Life by the end of last year, they still released patches for the three critical vulnerabilities,' including CVE-2024-29973.
There is a non-zero chance that the EOL devices will remain unpatched for the same reason they are still operating. CVE-2024-29973 has a CVSS score of 9.8. Even with the patches, the best move is to replace these with supported devices. Scan your environment for them, then take actions to patch and decommission them, don't let them go into the rainy-day pile. Make sure you're not exposing NAS to the Internet.
It's interesting to see what types of systems are being attacked as we have such an American view into the state of things. Zyxel may not be the most 'relevant' company in the US, but overseas its used quite frequently. Interesting to see how this was targeted. You must imagine that someone sat on these bugs.
This disclosure should serve as a reminder that NAS devices should not be visible to the public networks, that any device vulnerabilities are likely to become more visible as time passes, and that all devices must be managed and maintained for as long as they are in use.
Automobile dealership software-as-a-service (SaaS) provider CDK Global has set up interactive voice-response lines for customers to obtain information about the ransomware attack that has disrupted operations at its customers organizations. A message on that system from CDK says that threat actors are contacting automobile dealerships, claiming to be from CDK and trying to gain deeper access to the dealerships systems.
Seeing blood in the water, attackers are cranking up their social engineering playbook. If you and your team haven't participated in a social engineering village, you need to, even if on video, to see just how effective these techniques are. Don't forget it's not that hard to create legitimate looking correspondence or other communication, encourage staff to verify if they have any doubts about a request for access or information. Remember to call your known-good contact, not the information in the email/document/etc.
Another area of the market no one thinks about. The automotive service industry is now at the core of your mechanics and dealerships. CDK is important in that space, but we probably don't know how far this will go because it's not widely known or understood.
According to a breach notification letter the Los Angeles (California) Department of Public Health sent to individuals whose data were compromised in a February 2024 cyberattack, the attackers gained access to the system through push notification spamming. The perpetrators inundated an employee with fraudulently-generated multi-factor authentication (MFA) approval requests from their Microsoft 365 account, one of which the recipient approved.
Push Notification Fatigue is not theoretical, it's a thing, which is why you're getting pushed towards phishing-resistant MFA. Don't throw your existing MFA under the bus: it's better than mere passwords, it's that attack techniques have evolved to circumvent many of the less robust MFA options. The good news is you probably already have staff chomping at the bit to roll out passkeys, FIDO2, Certificate Based Authentication, or other robust options. Let them loose on a POC or two, then pick one to deploy this year.
Social engineering, the acquisition of special knowledge or privileges, by means of fraud or deceit, remains the most efficient form of attack.
Minnesota-based Consulting Radiologists is notifying more than 500,000 patients that their personal information was compromised in a breach earlier this year. The firm detected anomalous activity in February and brought an outside cybersecurity experts. Their investigation concluded in mid-April that the breach compromised sensitive personal data, including patients' names, addresses, dates of birth, Social Security numbers, and health insurance information and medical records, all belonging to 511,947 people.
Another ransomware event targeting the healthcare sector - check, the sector has been a frequent target for years. Here's the dilemma: when to inform patients that their PII and/or PHI data was compromised. HHS rules say within 60-days following the discovery of the breach. That puts notification at mid-April. Or is it 60-days after the investigation concludes, that's mid-June. The rules are loose enough that the only thing at risk is the patient's private data.
Both LockBit and Qilin are taking credit for the attack. Russia-based Qilin claims to have made off with more than 70GB of Consulting Radiologist's data. This is the same group behind the politically motivated Synnovis healthcare attack in London, which was intended to cause a crisis, which is consistent with the Russian gang Modus Operandi of causing disruption. Consulting Radiologists is focused on raise-the-bar activities to prevent recurrence and is also offering a year of credit monitoring, credit report and credit score services to affected individuals.
The original purpose of Social Security Numbers was to remedy inevitable name collisions among all the workers in America across time. When used to resolve name collisions in small populations, the last four digits are sufficient. Collection and retention, much less disclosure, of the whole number is reckless. Do not put your organization at risk.
Having worked in IT, I've seen some strange setups. What makes these health issues worse is that they ask for your social security number, which exposes your identity, and then whether you pay up, they may go after your patients. Many are susceptible to thinking they owe money for their medical bills.
Change Healthcare has begun notifying organizations that their patients' data were compromised in the February cyberattack. The notifications include more specifics about what type of data were compromised. They include information about health insurance policies, medical records, diagnoses, prescriptions, test results, billing and claims information, financial account information, and ID info, including passport numbers, driver's license numbers, and Social Security numbers.
Change Healthcare is still sifting through data to determine who was or was not affected by the breach, telling us this is going to take a bit. I don't fault them for caution to accurately identify affected individuals: in today's environment, of both highly connected information sharing and concentrated attacks, especially on healthcare providers, you really need to be proactive about having credit monitoring and restoration services. Don't wait for the breach notification. When was the last time you checked that your credit was locked/frozen? Trust but verify here, your peace of mind is worth it.
Note that much of the PII data disclosed, while useful for resolving identity collisions at application or enrollment time, should never have been retained. The lesson for the rest of us is that retaining data longer than necessary creates a liability and a risk.
UK-based medical device company LivaNova is notifying nearly 130,000 individuals that their personally identifiable information was compromised in a cyberattack in late October 2023. LivaNova became aware of the incident in mid-November 2023, and a subsequent investigation determined that the intruders stole names, addresses, Social Security numbers, medical information, and health insurance information, and other data. LivaNova disclosed the incident in late April, shortly after the extent of the breach was determined.
Medical device manufacturer LivaNova was still refining the extent of the breach, during which 2.2 terabytes of data was exfiltrated. LockBit claimed responsibility for the attack in December. LivaNova was notifying US based individuals in April, and started notifying non-US based individuals in May; they are not offering credit monitoring, but rather pointing folks to free credit monitoring services. While the timeline is tricky to follow, they fixed the vulnerable systems and services right away, but the identification of affected individuals took a lot longer than expected. Make sure you are aware of where your sensitive data is, so you can rapidly identify what is affected in an incident.
Another example of the gap in victim notification. While these two incidents are specific to the healthcare sector, victim notification also lags in most sectors. There are legitimate arguments for the time it takes to investigate, but that's time the criminal can use to their advantage. More often than not, the investigation concludes that data was stolen as it has for LivaNova.
Indonesia's National Data Center hit with ransomware attack. The incident has disrupted multiple services, including immigration document management as well as school and university enrollment services. Indonesia's Communications Ministry says the data center's systems were infected with a variant of LockBit and that the attackers have demanded a ransom payment of USD 8 million.
Indonesia is emphatic they are not paying the ransom. This attack is the Brain Cipher, which is a new variant of the LockBit ransomware; it's not certain they are behind it as many other threat actors are running with the leaked LockBit 3.0 builder, also this attack is not listed on the resurrected LockBit leak site. Entry to systems was due to disabling the Windows Defender security which allowed malware to be installed. While more information is still forthcoming, it'd be a good idea to verify an alert would trigger, and be responded to, when security services were disabled.
Ransomware gangs pretty much target every sector to include national government. While it is doubtful they will get a payout, the information has value as part of the criminal supply chain.
The Japan Aerospace Exploration Agency (JAXA) has experienced several cyberattacks over the past year. Officials say that the incidents have not compromised sensitive rocket and satellite data. Japan's Chief Cabinet Secretary, Yoshimasa Hayashi, says security officials are taking steps to protect JAXA systems from future attacks.
Space exploration and research is known for extensive collaboration between the public and private sectors. As such, having reachable servers and services is common. The hard part for all of us supporting wide collaboration is to not only ensure the components involved are patched and secured, but to also move to more secure practices. Beyond moving to modern technology, I know that FTP server still works but..., but also embracing modern security practices, such as MFA, endpoint signaling before allowing connections, and comprehensive logging/monitoring with automated responses. Look for untapped capabilities in existing services which could be good candidates to raise the bar in a non-disruptive fashion.
Following the US Department of Commerce's announcement of an upcoming ban on Kaspersky products and services due to national security concerns, the Treasury Department imposed sanctions on a dozen people who hold leadership positions at Kaspersky. The company's CEO and founder, Eugene Kasperksy, has not been sanctioned. The sanctions prohibit US individuals and entities from conducting business with those named. The sanction does not include Eugene Kaspersky. Important Kaspersky ban dates: as of July 20, 2024, Kaspersky may not sell its products or services in the US; as of September 29, 2024, Kaspersky Security Network must cease operating in the US, which means no more Kaspersky software updates and antivirus signatures will be provided as of that date.
This reminds me of a question my buddy John and I were discussing of which is better: a silent or USG-only ban, which leaves the private sector unprotected, or a public one like this which can be contested/debated. The research and threat profile for both are the same. The sanctions are based on Executive Order 14024, from April 2021, which allows sanctioning against individuals and entities furthering specified harmful foreign activities of the Russian Federation.
Treasury
The Record
The Register
Security Week
Help Net Security
Sysinternals Process Monitor Version 4 Released
https://isc.sans.edu/diary/Sysinternals+Process+Monitor+Version+4+Released/31026
Configuration Scans Expand
https://isc.sans.edu/diary/Configuration+Scanners+Adding+Java+Specific+Configuration+Files/31032
SQL Server Emergency Fix
Juniper Security Analytics Update
Kaspersky Sanctions
https://home.treasury.gov/news/press-releases/jy2420
MacOS/iOS XNU Buffer Overflow Exploit CVE-2024-27815
https://jprx.io/cve-2024-27815/
Phoenix UEFI Buffer Overflow Affects Wide Range of Systems
Ghostscript Update
https://ghostscript.readthedocs.io/en/gs10.03.1/News.html
js2py vulnerability
https://github.com/Marven11/CVE-2024-28397-js2py-Sandbox-Escape
Catch up on recent editions of NewsBites or browse our full archive of expert-curated cybersecurity news.
Browse ArchiveSANS 2024 SOC Survey Webcast: Facing Top Challenges in Security Operations | July 12, 10:30 am ET | Join Chris Crowley and guest speakers as they examine this year's survey results to understand how SOCs are architectured, favorite and frustrating technologies, staffing, funding, threat intel, and automation.
Webcast: 2024 State of Security Automation | June 25, 1:00 pm ET | Tune in to this discussion with Mark Orlando and Palo Alto's Jane Goh as they discuss the results of this survey - how SOC teams identify, prioritize and assess the efficiency of the SOAR use cases; and explore the ways AI might fill the gaps left by SOAR and remaining potential barriers.
Webcast: Secure your multi-cloud environment from code to cloud with Microsoft Defender CSPM | June 26, 10:30 am ET | Join Matt Bromiley and Tal Rosler of Microsoft as they unveil the latest security posture innovations in Microsoft Defender for Cloud.
Continuous Attack Surface Discovery and Penetration Testing with BreachLock | Tune in on Wed., July 10 as Dave Shackleford takes a solutions deep dive with BreachLock's attack surface management and penetration testing as a service offering.