SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact UsThe 5th annual Women in Cybersecurity (WiCyS) Security Training Scholarship will address the critical shortage of cyber professionals, in alignment with the Office of the National Cyber Director's National Cyber Workforce & Education Strategy. This multi-stage scholarship program, with support from key stakeholders such as Craig Newmark Philanthropies, Center for Internet Security, and Bloomberg, is noteworthy for its role in enhancing diversity, equity, and inclusion within the cybersecurity industry, providing a reliable pathway for underrepresented groups to enter the workforce. The program's success over the past four years, with more than 3,000 participants skilled and a high employment rate for final stage graduates, underscores its impact on both individual careers and the broader cyber civil defense landscape.
WiCyS Release: https://www.prweb.com/releases/women-in-cybersecurity-wicys-announces-5th-annual-security-training-scholarship-302215488.html
Center for Internet Security Grant: https://www.securityinfowatch.com/cybersecurity/press-release/55055239/center-for-internet-security-awards-250000-grant-to-support-women-in-cybersecurity-wicys
BrightTalk webcast: https://www.brighttalk.com/webcast/17216/620572
Alumna Interview: https://www.youtube.com/watch?v=Irn89o8Mr90
Applications are open through August 30: https://www.wicys.org/benefits/security-training-scholarship/
The US Defense Advanced Research Projects Agency (DARPA) has announced the TRACTOR (TRanslating All C TO Rust) project to automate converting code written in C to Rust. Dr. Dan Wallach, DARPA program manager for TRACTOR, anticipates proposals that include novel combinations of software analysis, such as static and dynamic analysis, and large language models. The program will host public competitions throughout the effort to test the capabilities of the LLM-powered solutions. DARPA will host a Proposers Day on Monday, August 26, 2024, with both in-person and virtual attendance options.
Interesting tool, and something that should work quite well. I just hope it doesn't add new vulnerabilities. Remember that memory safety is important, but not the only source of vulnerabilities.
It's exciting to see an initiative to accelerate code migration tools, in this case C to Rust, but memory safe code doesn't alleviate the need to use secure coding practices. Additionally, careful consideration has to be considered to making a language conversion, not only for compatibility and stability but also growing the needed expertise and tooling to support the new language, to support both new projects and updating of the converted code. Even with improved translation tools, the code produced by these tools will need to be analyzed and modern security practices will likely need to be added.
DARPA is in the business of taking on high risk projects that advance science. While their success rate is low, when they succeed, they really succeed - just look at today's modern Internet. That said, there is a lot, and I mean a lot of C/C++ code out there, much of which is in embedded systems. I suspect that C/C++ is not going away in my lifetime Ð see COBOL.
Researchers at Volexity say that a group of state-sponsored cyberthreat actors with ties to China compromised an Internet service provider (ISP) to poison DNS responses for certain organizations. The researchers determined that StormBamboo was altering DNS query responses for specific domains tied to automatic software update mechanisms.
There are not a lot of examples of this type of MitM DNS poisoning being exploited. The best defense is DNSSEC. We always say that you should never trust the network, but how many of us are following through and enable DNSSEC? Maybe DNSSEC will get an overdue boost due to attacks like this and its increased usability in e-mail safety. Check with your registrar. Many made enabling DNSSEC dead simple.
StormBamboo, aka Evasive Panda or StormCloud, were taking advantage of automated software updates that still used HTTP vs HTTPS and didn't validate the update packages, resulting in an unattended install of the malicious packages such as the macOS threat MacMa (CDDS) or Reloadext Chrome extension. Mitigate the risks by ingesting the IOCs and implementing the detection rules provided by Volexity.
Volexity
Security Online
Security Week
Ars Technica
Infosecurity Magazine
Help Net Security
AWS says it is using a neural network called Mithra, 'a massive internal neural network graph model É that uses algorithms for threat intelligence' to identify malicious domains. Mithra has been detected more than 180,000 on a daily basis; it is also capable of predicting malicious domains days, weeks, and sometimes even months before they show up on threat intel feeds from third parties.
Detecting malicious domains is a classic application for machine learning. Note that there are roughly 500k new domains a day. 180k represents a significant portion of all new domains.
The data from Mithra can be used by AWS security services such as GuardDuty to proactively protect your AWS services. Make sure you're taking advantage of AWS security tools to give yourself every advantage.
Rockwell Automation has released fixes to address a high severity chassis restrictions bypass vulnerability in certain Logix programmable logic controllers (PLCs). Updates are available for most affected PLCs; users of those for which a fix is not available are urged to upgrade to supported versions. The US Cybersecurity and Infrastructure Security Agency (CISA) has published an ICS advisory. The flaw was detected by researchers at Claroty's Team 82.
Rockwell Automation has released fixes to address a high severity chassis restrictions bypass vulnerability in certain Logix programmable logic controllers (PLCs). Updates are available for most affected PLCs; users of those for which a fix is not available are urged to upgrade to supported versions. The US Cybersecurity and Infrastructure Security Agency (CISA) has published an ICS advisory. The flaw was detected by researchers at Claroty's Team 82.
The attack requires network access, which in today's environment is the new normal. Organizations should look to first limit remote access (e.g., a simple firewall can be highly effective); and second, only use secure remote access (i.e., VPN) to the OT network. While you're at it you should review your physical and personnel security processes to minimize potential insider threat attacks.
Rockwell Automation
CISA
Claroty
Security Week
The Hacker News
NVD
The blood donation organization that suffered a ransomware attack in late July says they are starting to bring critical systems back online; they are 'operating in a reduced capacity.' OneBlood serves hospitals in several southeastern US states. On August 1, the American Hospital Association (AHA) and the Health Information Sharing and Analysis Center (ISAC) updated their joint threat bulletin to include the OneBlood attack. The bulletin states, 'Now that three critical third-party supply chain attacks have significantly impacted healthcare delivery in the past three months, it should serve as a wake-up call across the industry to address supply chain security and resilience.'
OneBlood expects to have systems back online in the next few days and with the impending arrival of tropical storm Debby in Florida, is calling for volunteers to sign up to donate platelets soon to meet anticipated demands. Healthcare remains squarely in the cross-hairs of threat actors, meaning anyone in the business needs to not only go through their business resumption plans, but also make implementing, and verifying cyber security protections a priority.
While the attack was specific to the healthcare sector, every critical sector should revisit their supply chains and run tabletop exercises looking for weaknesses. It should be a regular part of board discussions to add supplier diversity into the business. Lacking that, guardrails should be put in place to limit the effects of a supply chain disruption.
Authorities have seized over $41 million that was stolen from a commodities firm in Singapore in a business email compromise (BEC) attack. The thieves, impersonating a supplier, requested that a $42.3 million payment be made to an account in Timor Leste. When it became apparent that the funds had been misdirected, Singapore police contacted authorities in Timor Leste who helped recover the stolen money.
There is not a lot of time for this type of recovery. If you find yourself in a similar situation, report to law enforcement immediately. In this case, the authorities in Timor Leste were able to arrest a total of seven suspects and recover an additional $2M, beyond the initial $39M recovered. Make sure your users, particularly those involved in authorizing payments, have heightened awareness of BEC scams. One successful scam can outweigh the cost of technical countermeasures, and associated training designed to reduce the likelihood of a successful scam.
Given that the funds transfer didn't happen until four days later, speaks to some process being in place to verify the transaction. Executive teams can use this near-miss as an example to review their own financial transaction process and make changes as needed.
An incorrect authorization vulnerability (CVE-2024-38856) in Apache OFBiz affects versions up through 18.12.14. The flaw could be exploited to allow execution of screen rendering code. Users are urged to upgrade to OFBiz version 18.12.15 or later. Another OFBiz vulnerability (CVE-2024-32113), which was disclosed in May, has been exploited.
OFBiz is an open-source java-based framework for creating ERP systems. CVE-2024-38856 doesn't have a CVSS score yet, but is a weakness in unauthenticated processes, and can be used to execute arbitrary code, it's a good idea to start the update process, particularly as your ERP system owner is going to want you to do full regression testing before they'll let you update production.
ISC
Seclists
Security Week
Security Online
Infosecurity Magazine
Help Net Security
NVD
Researchers from Graz University of Technology in Austria have published a paper that describes 'a novel kernel exploitation technique elevating a limited heap vulnerability to an arbitrary memory read-and-write primitive.' The researchers successfully demonstrated the exploit against Linux kernel versions 5.19 and 6.2, both of which have reached end-of-life (EoL) in October 2022 and May 2023, respectively.
If you have systems running the 5.19 or 6.2 Linux kernel, you'll need to update. For better or for worse, your Enterprise or long-term-support Linux distributions are running older kernel versions. Check with your users running leading edge projects/versions who typically don't run these "older" versions, to verify they've already updated.
Microsoft has addressed an Azure outage that affected services in North and Latin America on Monday, August 5. The incident lasted roughly two hours. The entry on the Azure status page reads, 'a subset of customers experienced intermittent connection errors, timeouts, or latency while connecting to Microsoft services that leverage Azure Front Door (AFD), as a result of an issue that impacted multiple geographies. The issue was limited to internal Microsoft services hosted on AFD, and did not impact external commercial customers using AFD.' Last week, an outrage affecting Azure and Microsoft 365 services caused problems worldwide.
It appears a configuration change impacted Microsoft's CDN service, which was rolled back about 90 minutes after the impact was discovered. Make sure that you're using all the HA tricks offered by your cloud service providers to mitigate risks of any service failures. Do a deep dive on what you can fail away from, don't assume you can just "turn off" services and that you understand what the potential blast radius of services are. For example, having east/west separation doesn't help for a common service across the country.
Current Secure Boot Certificate Authority Expires in 2026
https://isc.sans.edu/diary/Even+Linux+users+should+take+a+look+at+this+Microsoft+KB+article/31140
OOXML Spreadsheets Protected by Verifier Hashes
https://isc.sans.edu/diary/OOXML+Spreadsheets+Protected+By+Verifier+Hashes/31072
Script Obfuscation Using Multiple Instances of the Same Function
https://isc.sans.edu/diary/Script+obfuscation+using+multiple+instances+of+the+same+function/31144
Disclosure of key technical details of CrowdStrike's large-scale blue screen
https://mp.weixin.qq.com/s/uD7mhzyRSX1dTW-TMg4UhQ
New OFBiz Vulnerability
https://issues.apache.org/jira/browse/OFBIZ-13128
https://www.youtube.com/watch?v=J_IxCBjd4Pw
Roundcube XSS Vulnerabilities
StormBamboo Compromises ISP to Abuse Insecure Software Update Mechanisms
DARPA TRACTOR Program for Translating C to Rust
Catch up on recent editions of NewsBites or browse our full archive of expert-curated cybersecurity news.
Browse ArchiveWebcast: SANS 2024 Multicloud Survey: Securing Multiple Clouds Amid Constant Changes | August 28, 11:00AM ET | Kenneth G.
Webcast: A zero-trust user access model can expedite compliance with new looming NERC CIP regulations | Tuesday, July 30, 1:00 pm ET | This presentation will explore challenges and elements for key NERC CIP-003-9 requirements, and an example of successful implementation.
Free Virtual Event: SANS 2024 AI Survey: AI and Its Growing Role in Cybersecurity: Lessons Learned and Path Forward | September 11, 10:30 AM ET | Join Matt Edmondson as and other experts as they explore the intersection of AI and cybersecurity and provide actionable insights for practitioners, decision-makers, and enthusiasts eager to navigate the future of digital defense.
Virtual Event: DFIR Summit 2024 | Join us for two full days of free digital forensics, incident response, and threat hunting content on August 22-23 by registering for one or both of our upcoming Solutions Tracks.