SANS NewsBites

Cisco Lists Products Affected by RegreSSHion Vulnerability; ERP Firm Supply Chain Attack; OT/ICS Security Guidance

July 9, 2024  |  Volume XXVI - Issue #52

Top of the News


2024-07-08

Cisco Provides List of Their Products Containing RegreSSHion Vulnerability

Cisco has published a list of their products they say contain the RegreSSHion vulnerability. The list includes 42 products confirmed to be vulnerable; an additional 51 products are still being investigated for the vulnerability. The remote code execution vulnerability, which was discovered by Qualys researchers, affects the OpenSSH server (sshd) in glibc-based Linux systems.

Editor's Note

In case you missed it, RegreSSHion affects most currently in use versions of ssh. While not easy to exploit, you should look in particular at devices like routers and switches if updates are available.

Johannes Ullrich
Johannes Ullrich

The list identifies both affected and _NOT_ affected products. Read carefully. Cisco has published Snort rules to detect exploitation and recommends restricting SSH access to trusted hosts only. Other workarounds will be in the product specific bug references. Keep an eye on their Vulnerable Products list for information about when fixes are available. Due to the lack of immediate fixes, you want to get on those restrictions to the SSH service.

Lee Neely
Lee Neely

Cisco is a massive company with multiple product lines built both organically and through acquisition. One of their primary management protocols outside of HTTPS will be SSH. Unfortunately for them, this bug is going to be a hard one for all those business units to locate since it's a specific set of builds that are affected and not all builds. Expect them to take a bit to figure out what's affected and what's not, and based on their EoL/EoS cycles, you'll see several builds back.

Moses Frost
Moses Frost

Lists of vulnerable products from suppliers are useful only if one has a list of all products one is using.

William Hugh Murray
William Hugh Murray

2024-07-03

South Korean Company's ERP Software Server Targeted in Supply Chain Attack

Researchers at AhnLab Security Intelligence Center (ASEC) discovered a supply chain attack affecting an unnamed South Korean company's enterprise resource planning (ERP) solution. The company's server was compromised to infect devices with backdoor malware known as Xctdoor instead of delivering software updates.

Editor's Note

Attacks against ERP servers have not seen much public coverage. But these systems are huge targets, and are often difficult to patch and secure.

Johannes Ullrich
Johannes Ullrich

We have seen an uptick in supply chain attacks in the last 18 months. Supply chain attacks are largely carried out by nation states, and provide the opportunity to attack once, exploit many. When successful, this sort of attack is difficult to thwart. While the onus is on vendors to secure their products as part of a standard duty of care, end-users can also play a part by monitoring for signs of data exfiltration.

Curtis Dukes
Curtis Dukes

Here's one a bit harder to detect. The ERP software provider's update server was compromised, allowing the delivery of compromised packages. Load the IOC's from ASEC to make sure you're not included. Make sure that your update processes include validation of packages, ensuring the source and contents are legitimate. Train users to be wary of unsolicited updates through unexpected channels, such as email.

Lee Neely
Lee Neely

2024-07-05

UK Government Guidance for OT/ICS Security

The UK government's Research Institute in Trustworthy Inter-Connected Cyber-Physical Systems (RITICS) has published a document offering guidance in securing operational technology (OT) and industrial control system, (ICS) hardware. The guide, Considerations for Cyber Incident Response Planning within Industrial Control Systems/Operational Technology, includes a list of Indicators of Good Practice (IGPs).

Editor's Note

The NCSC lays out best practice guidelines for incident response, but don't ignore segmentation! If you have operation technology of any kind, do all you can to keep it separate from IT networks. Your preferences should be, in order: 1) true air gap, 2) data diode for telemetry out only, and 3) highly secure network segment. If you have a valid business requirement for the third option, put all the preventive and detective controls you have to work!

Christopher Elgee
Christopher Elgee

This 20-page guide is a quick read and a good reference to prepare for ICS/OT incidents. These systems continue to be targets and you may as well stack the deck in your favor. Make sure that you have an ICS/OT specific response plan and play book, remember that in these systems availability and integrity are key, versus confidentiality in traditional IT systems, which calls for a different approach.

Lee Neely
Lee Neely

While it is useful to have environment specific security guidance, most successful attacks exploit common hygiene failures. Attend to the short list of common essential and efficient measures first.

William Hugh Murray
William Hugh Murray

The Rest of the Week's News


2024-07-04

International Effort Takes Action Against Cobalt Strike Abuse

An international effort led by the UK's National Crime Agency, with support from law enforcement agencies from Australia, Canada, Germany, the Netherlands, Poland, and the US, as well as private sector partners, has acted against abuse of Cobalt Strike. Operation Morpheus, as the effort was named, took down hundreds of IP addresses that were being used to host illegal Cobalt Strike instances.

Editor's Note

The aim here is to discover and interrupt unlicensed versions of Cobalt Strike. Fortra, current owners of Cobalt Strike, have been working with law enforcement to help identify and remove these instances. That said, gangs are still leveraging older unlicensed/cracked copies which are still able to compromise systems. If you are using Cobalt Strike, make sure that you're using a licensed copy, irrespective of the use.

Lee Neely
Lee Neely

Kudos to all those involved in this operation. Cobalt Strike is a legitimate tool which is regularly abused by criminals to enable them launch ransomware attacks. However, by its nature it is difficult to detect it within your environment. This is a very good guide from The DFIR Report on how you can defend against unauthorised use of Cobalt Strike in your environment. (https://thedfirreport.com/2022/01/24/cobalt-strike-a-defenders-guide-part-2/) Remember criminals also abuse other legitimate remote access control software so you should regularly scan for installations of those remote tools and investigate any unauthorised installations.

Brian Honan
Brian Honan

This is a success for law enforcement. That said, the success is only possible with the support of private sector entities. Individually, they have telemetry and analytic capabilities that can be combined to give law enforcement the upper hand. That's the real gem in this story.

Curtis Dukes
Curtis Dukes

2024-07-08

Avast Releases DoNex Ransomware Decryptor

Researchers at Avast discovered a cryptographic weakness in the DoNex ransomware's code, which allowed them to create a decryptor. They have been providing the decryptor to the ransomware's victims since March. The decryptor has now been made public.

Editor's Note

Remember the NoMoreRansom Project (www.nomoreransom.org) sponsored by Europol contains all known ransomware decryptors.

Brian Honan
Brian Honan

Make sure that you're looking for public decryptors when faced with ransomware. CISA, the FBI and others like Avast and the No More Ransom Project have made them, as well as supporting tools, available when needed.

Lee Neely
Lee Neely

2024-07-08

South Africa's National Health Laboratory Service Suffers Ransomware Attack

South Africa's National Health Laboratory Service (NHLS) IT systems have been offline following a ransomware attack in late June. As of July 4, NHLS says their laboratories were operational but their ability to provide clinicians with test results digitally has been disrupted.

Editor's Note

NHLS provides diagnostic tests for about 80% of South Africans and has an estimated 6.3 million unprocessed blood tests. South Africa is in the midst of several concurrent health crises - mpox, HIV and TB, as such they are working to prioritize tests and develop alternate result delivery mechanisms as their self-service (WebView) portal remains offline. Take a read of the pivots NHLS is using to deliver services and consider if these are scenarios you need to incorporate into your BC/DR plans.

Lee Neely
Lee Neely

We have known for decades that it is impossible for the rogues to know enough about their targets to anticipate all the consequences of their attacks. However, it seems easy to anticipate that attacks against healthcare may put patients at risk of life and limb. Given this, one wonders at the continued special targeting of the healthcare sector.

William Hugh Murray
William Hugh Murray

2024-07-08

German University Suffers Cyberattack

The Frankfurt University of Applied Sciences shut down some IT systems over the weekend in the wake of a cyberattack. The university's IT systems are not currently externally available, and certain services are unavailable. Similar attacks have occurred at six other German Hochschules, or universities of applied sciences.

Editor's Note

Fortunately the university may have caught a bit of a break being on summer break, so the student impact is minimized. Online courses are still operational, but you cannot enroll online, nor can external calls be completed; even the elevators are offline as their control systems have not been confirmed to be safe. The hard part here will be lessons learned as the university had already taken measures to significantly strengthen their defenses. It's important to note there is no such thing as perfect security, and significant protection can be gained with the fundamentals. Start with authentication, monitoring, patching, segmentation and secure configurations.

Lee Neely
Lee Neely

2024-07-07

Patelco Credit Union Recovering from June 29 Ransomware Attack

California-based Patelco Credit Union is in the process of recovering from a ransomware attack. Patelco confirmed the June 29 attack on Monday, July 1. Customers reported not being able to access their accounts online. According to a July 7 update, Patelco writes that they 'have stabilized our network and begun processing transactions,' but are unable to pinpoint 'an exact date when [they] will be back to business as usual.'

Editor's Note

Everyone uses online banking these days. Autopay is one of the most popular services. For the member, it's time to consider splitting accounts with different banking institutions to build resiliency. For the credit union, use this as a learning opportunity, build table-top exercises to test the recovery for all banking services offered. And finally, when the time is right share details on the security incident so that we can all learn. Everyone uses online banking these days. Autopay is one of the most popular services. For the member, it's time to consider splitting accounts with different banking institutions to build resiliency. For the credit union, use this as a learning opportunity, build table-top exercises to test the recovery for all banking services offered. And finally, when the time is right share details on the security incident so that we can all learn.

Curtis Dukes
Curtis Dukes

Patelco has about $9 billion in assets and around 500,000 members. They are working hard to communicate service impacts, both on their web page and in emails to members, promising to process backlogged deposits before withdrawals, and to advocate for members who have credit scores impacted as a result of the incident. Nobody has yet claimed responsibility for this attack. Initial advice amounted to using another FI while things got sorted out, which has been modified to helping members use the reduced services and weather the storm.

Lee Neely
Lee Neely

2024-07-05

Alabama Department of Education Says Cyber Intruders Accessed Data

The Alabama State Department of Education (ALSDE) has acknowledged that it thwarted an attempted ransomware attack against their IT systems in mid-June. While the intruders did not manage to encrypt the department's data, they did compromise data and temporarily disrupt some ALSDE services.

Editor's Note

While deemed a success, and it is, there is much that can be learned. For example: What types of defenses were in place? What sort of training did the information system staff have in incident response and ability to restore systems? It's understandable organizations don't want to share this type of information, but the reality is, many organizations can benefit from knowing what works.

Curtis Dukes
Curtis Dukes

ALSDE has decided not to negotiate with the hackers, nor to pay the ransomware. Impacted systems have been restored and additional security measures deployed, which speaks highly to their preparedness.

Lee Neely
Lee Neely

2024-07-05

OpenAI Breach

OpenAI, the company behind ChatGPT, experienced a security breach of their internal messaging systems in early 2023. The intruder stole information about the design of OpenAI's products, but not their AI code. The company disclosed the incident internally in April 2023; they decided not to make the incident public because no personal data were stolen, nor did they consider the breach a threat to national security. They did not inform law enforcement. The incident is now becoming public based on information from two people who provided details on the condition of anonymity.

Editor's Note

Required disclosure meet whistleblowing. While possibly philosophical, it's a good idea to have a plan for how you'd handle this scenario. Disclosure requirements include a measure amounting to having a material impact, but that doesn't mean all involved will agree with that determination. Having a plan ahead, including NDA, event protection requirements and responsible parties will smooth this path if needed.

Lee Neely
Lee Neely

Internet Storm Center Tech Corner

OpenSSH RegreSSHion Vulnerability

https://www.qualys.com/2024/07/01/cve-2024-6387/regresshion.txt

https://isc.sans.edu/diary/SSH+regreSSHion+Remote+Code+Execution+Vulnerability+in+OpenSSH/31046

Overlooked Domain Name Resiliency Issues: Registrar Communications

https://isc.sans.edu/diary/Overlooked+Domain+Name+Resiliency+Issues+Registrar+Communications/31048

Kunai: Keep an Eye on your Linux Hosts Activity

https://isc.sans.edu/diary/Kunai+Keep+an+Eye+on+your+Linux+Hosts+Activity/31054

Decryptor for DoNex Ransomware

https://decoded.avast.io/threatresearch/decrypted-donex-ransomware-and-its-predecessors/

Shelltorch Explained: Multiple Vulnerabilities in Pytorch Model Server (Torchserve)

https://www.oligo.security/blog/shelltorch-explained-multiple-vulnerabilities-in-pytorch-model-server

Exim Bypass Attachment Inspection

https://bugs.exim.org/show_bug.cgi?id=3099#c4

Toshiba/Sharp Printer vulnerabilities

https://pierrekim.github.io/blog/2024-06-27-toshiba-mfp-40-vulnerabilities.html

https://pierrekim.github.io/blog/2024-06-27-sharp-mfp-17-vulnerabilities.html

Cloudflare 1.1.1.1 incident on June 27th 2024

https://blog.cloudflare.com/cloudflare-1111-incident-on-june-27-2024