SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact UsCrowdStrike has published a technical root cause analysis of the July 19 incident that disrupted travel and commerce around the world was due to an out-of-bounds read issue 'beyond the end of the input data array and resulted in a system crash.' In a separate story, CrowdStrike has also responded to claims that the Falcon sensor issue could be exploited to achieve privilege elevation or remote code execution.
One of the critical claims, that the issue is not exploitable, has been disputed. In the end, I think this comes down to a public proof showing how the outlines exploit technique works (or doesn't work) against an unpatched CrowdStrike instance.
The root cause analysis shows a long list of mitigations CrowdStrike has put in place. The issues are mostly the usual causes of software errors - new features were tested more to make sure they worked than to make sure they couldn't cause bad things to happen. The two major mitigations (runtime bounds checking and increased test coverage) illustrate this and are what we expect security companies to routinely include in their highly privileged host-based software - especially for software that (as CrowdStrike puts at the top of the Root Cause Analysis) uses powerful on-sensor AI and machine learning models to protect customer systems by identifying and remediating the latest advanced threats. These models are kept up-to-date and strengthened with learnings from the latest threat telemetry from the sensor and human intelligence from Falcon Adversary OverWatch, Falcon Complete and CrowdStrike threat detection engineers. Complex security software requiring frequent update requires high levels of runtime protection and extensive pre-release testing of updates.
The root cause analysis reads like an audit report providing insight as to why the functionality introduced in Channel File 291 back in March wasn't a problem until July. The short version is IPC for detecting malicious actions and had 21 parameters and the file only contained 20, until the interpreter tried to use the missing 21st Ð which was missed in early testing and validation. As with an audit, the issues have been addressed. If you're worried about the risks of a kernel-level plugin, CrowdStrike also published analysis of the Falcon sensor and its limitations/mitigations as a service with that level of access. This would be a good time for OS providers to evaluate the viability of reducing or eliminating kernel level access for third party services.
CrowdStrike has been extremely forthcoming in acknowledging and subsequently releasing technical details of the flaw in their application development and update process. Generally, this type of software bug (memory safety) would be caught during QA testing but was somehow missed. Publishing root cause analysis and hiring not one but two outside security review teams are each calculated steps by CrowdStrike at damage control. It appears to be working.
For most of us, automatic updates are the low risk option. For large enterprises running mission critical applications, not so much. Changes to mission critical applications should be more measured, cautious, and reversible.
CrowdStrike
CrowdStrike
The Register
SC Magazine
Security Online
Security Week
The UK Information Commissioner's Office (ICO) will fine the Advanced Software Group, which provides IT and software services to NHS, £6.09 million ($7.76 million) in connection with the exfiltration of NHS patient data. In August 2022, the NHS experienced a ransomware attack that disrupted their non-emergency call system and resulted in the theft of personal information belonging to nearly 83,000 patients. An investigation has determined that the attackers accessed Advanced Software Groups systems through an account that was not protected with multi-factor authentication.
In this case the deficiency was in the IT service provider, which is being fined, rather than the NHS. The takeaway is to assess the security practices of your IT solution providers as they are likely using the same practices across customers. Deep dive on how they separate their clients' services and information as well as their own security practices, you're looking for where the weakest links are. Note: if you're the weakest link, you need to address that.
MFA has become the de facto standard for Identity and Access Management (IAM). This is the third such finding in recent months that specifically calls out lack of MFA in holding organizations accountable. While the terminology used by country is different, 'adequate' vice 'reasonable' the legal effect is the same - did not meet a standard duty of care in protection of personal information.
Strong authentication (at least two kinds of evidence, at least one of which is resistant to replay) is an essential and efficient measure. Failure to employ it is reckless, increases risk, and may be subject to penalty. Be certain that universal application is required in all third party agreements.
ICO
Security Week
Security Online
The Record
Consumer Reports investigated services that claim they will remove people's information from people-search data broker sites. The investigation looked at the efficacy of 13 services over a four-month period, checking to see whether the data had been removed at one week, one month, and four months. In every case, at least some data remained on the sites.
Good report that points out often the least expensive services are higher quality than the most expensive and that minimizing the personal data you expose is always going to be the most cost-effective tactic.
The challenge is making users aware of just how much information is available online about them, many have accepted that some is there, but are unaware of the full scope of what's available. The people-search sites are data brokers; they are in the business of gathering data about people and selling it to whoever will pay for it. If you've searched for someone on-line and found a link which asks you to pay for the "rest" of the information about someone, that's what we're talking about. Consumer Reports did find that the opt-out function on the people-search sites was more effective (70% gone within one week) than the services who get paid for take-down notices and acknowledges it's a lot more work for users to go to each site and opt-out. They also found that some take-down services were affiliated with a data-broker, and therefore only took down the data for that broker.
The study validates what many of us assumed: 1) some level of collusion between data brokers and data removal services; and 2) lack of effectiveness in 'opt-out' requests. The best defense remains, limit what data you make available on-line and, review data retention policies of institutions you do business with.
Researchers at Oligo Security have identified a zero-day vulnerability affecting all major browsers that could be exploited to bypass browser security and possibly access local networks. According to the researchers, the issue stems from the inconsistent implementation of security mechanisms across different browsers, along with a lack of standardization in the browser industry. As a result, the seemingly innocuous IP address, 0.0.0.0, can become a powerful tool for attackers to exploit local services, including those used for development, operating systems, and even internal networks.
Web services listening on loopback have been proliferating and they often have the ability to execute code (intentionally or not). Some under-appreciated attacks like DNS rebinding can be used to attack them despite these browser protections.
We're probably all scratching our heads saying 0.0.0.0 isn't a valid IP address; what's up here? This flaw only affects Mac and Linux systems. Links to 0.0.0.0 were being used instead of 127.0.0.1 to access local services, which should not have worked. The problem is there wasn't consistent guidance in the relevant RFC's on what browsers should do with those IP addresses. This flaw is being addressed by the major browser vendors. It will be blocked with the Chrome/Chromium 128 rollout, Apple is making changes to Webkit and Firefox is working to fix this "at a future date." Mitigations include implementing PNA headers, verifying HOST headers, using HTTPS, and implementing CSRF tokens in applications.
Oligo
Cyberscoop
SC Magazine
The Hacker News
Bleeping Computer
Singapore's Ministry of Education (MOE) says it will remove the Mobile Guardian Device Management security application from personal learning devices after a cybersecurity incident led to 13,000 students' devices being remotely wiped. An investigation conducted by Mobile Guardian revealed unauthorized access to their platform on August 4.
The reality is on-premises deployment of your MDM is less common, with many enterprises now depending on a service provider's hosted offering. The MOE has stated they are removing Mobile Guardian but have been silent about how they are planning to regain that device management capability. Consider the risks of a hosted service, such as devices being wiped, if that service gets compromised and how you'd respond. Understand the migration process from one MDM to another, this often requires a device wipe with a modified restore process, so you don't restore the prior device management configuration.
Mobile Guardian
MOE
The Record
The Register
Ars Technica
Michigan-based McLaren Health Care instituted downtime procedures following a cyberattack that disrupted the organization's IT systems on August 6. McLaren says they are 'largely operational.' The organization operates 13 hospitals as well as ambulatory surgery centers, imaging centers, and other healthcare facilities. This is the second disruptive cybersecurity incident McLaren has experienced in the past year.
The INC ransomware gang is taking credit for this attack. McLaren was compromised last September by the Alphv/BlackCat ransomware gang resulting in the loss of over 2 million patient records. While this prior experience is likely aiding their recovery, they still have the hard conversations ahead about why this second attack succeeded. Something to factor into your ransomware playbook is that about 80% of organizations who paid the ransom for an initial attack are hit again, often by the same gang.
Two security incidents within a year; it's probably time for a change-up in leadership at the non-profit. Separately, the board should look to add cybersecurity subject matter expertise and make it a core part of its risk management program.
This week I asked a colleague, who practices in the healthcare industry, why this industry continues to be a target of opportunity years into ransomware attacks. His instant response was "because the decisions are being made by doctors." I confess I had not thought of that.
Bitdefender researchers say they have discovered vulnerabilities in photovoltaic system management platforms that could potentially be exploited 'to control inverter settings that could take parts of the grid down, potentially causing blackouts.' Bitdefender has notified affected vendors, and the vulnerabilities have been fixed.
Check the research for affected companies beyond Deye and Solarman. Vulnerabilities included hard coded credentials, account takeover flaws, information leakage and JWT tokens which can be used across platforms. The good news is the discovered vulnerabilities are fixed. It's not clear if the providers will discover and address future flaws themselves or additional discovery like this is needed. The researchers are presenting their research the afternoon of August 9th at Defcon in the IoT Village talks.
Anything that has software and internet access can be a target, hence the need for the Dev team to follow secure software design principles. At least in this case both the researchers and vendor acted responsibly. The researchers, by responsibly reporting the vulnerabilities to the vendor, and the vendor for taking immediate action to fix the vulnerabilities.
HPE Aruba Networking has released updates for multiple vulnerabilities in Aruba Access Points running InstantOS and ArubaOS 10. The flaws could be exploited to achieve remote code execution and create denial-of-service conditions. The advisory addresses 10 CVEs, three of which are rated critical, affecting ArubaOS 10.6.x.x: 10.6.0.0 and below; ArubaOS 10.4.x.x: 10.4.1.3 and below; InstantOS 8.12.x.x: 8.12.0.1 and below; InstantOS 8.10.x.x: 8.10.0.12 and below. The advisory also lists other affected software versions that are End of Maintenance and 'strongly recommends all customers running End-of-Maintenance software to migrate to a supported branch as soon as possible.'
The RCE vulnerabilities are in both their SSH and certificate management services, so you want to apply the updates as well as make sure that those services are only exposed to authorized devices, which comes back to not exposing management interfaces to the Internet. If you're running ArubaOS or InstantOS, make sure you're on a supported version, you want to keep these updated.
Speaking at the BlackHat USA conference earlier this week, security researcher Patrick Wardle said that computer crash reports offer 'a myriad of information that will allow us to extract malware, bugs, and much more.' Wardle provided examples of vulnerabilities he discovered by analyzing crash reports on his own computers.
This is a bit of a double-edged sword. Vendors need information to understand why their product crashed, and as such need as much information about the system state as possible. A threat actor can leverage that same information to discover weaknesses in your systems. It's no longer practical for a security officer to review a crash report before sending it, so instead, alert users to use caution sending crash reports, to share them only with verified sources when required, and to treat them as sensitive documents. When in doubt, don't share them.
A Survey of Scans For GeoServer Vulnerabilities
https://isc.sans.edu/diary/A+Survey+of+Scans+for+GeoServer+Vulnerabilities/31148
Exploring Anti-Phishing Measures in Microsoft 365
https://certitude.consulting/blog/en/o365-anti-phishing-measures/
SSHamble Security Testing Tool
https://www.runzero.com/blog/sshamble-unexpected-exposures-in-the-secure-shell/
macOS Sequoia Weekly Permission Prompts
https://9to5mac.com/2024/08/06/macos-sequoia-screen-recording-privacy-prompt/
.internal domain
0.0.0.0 Day Exploiting Localhost APIs from the Browser
https://www.oligo.security/blog/0-0-0-0-day-exploiting-localhost-apis-from-the-browser
Apple Hardens Gatekeeper
https://developer.apple.com/news/?id=saqachfa
Downgrade Attacks Using Windows Updates
https://www.safebreach.com/blog/downgrade-attacks-using-windows-updates/
CrowdStrike Root Cause Analysis
https://www.crowdstrike.com/falcon-content-update-remediation-and-guidance-hub/
Kibana Vulnerability
https://discuss.elastic.co/t/kibana-8-14-2-7-17-23-security-update-esa-2024-22/364424
Android August 2024 Bulletin
https://source.android.com/docs/security/bulletin/2024-08-01
Ubiquity Amplification Attack Vulnerability Update
Catch up on recent editions of NewsBites or browse our full archive of expert-curated cybersecurity news.
Browse ArchiveWebcast: SANS 2024 Multicloud Survey: Securing Multiple Clouds Amid Constant Changes | August 28, 11:00AM ET | Kenneth G.
Webcast: A zero-trust user access model can expedite compliance with new looming NERC CIP regulations | Tuesday, July 30, 1:00 pm ET | This presentation will explore challenges and elements for key NERC CIP-003-9 requirements, and an example of successful implementation.
Free Virtual Event: SANS 2024 AI Survey: AI and Its Growing Role in Cybersecurity: Lessons Learned and Path Forward | September 11, 10:30 AM ET | Join Matt Edmondson as and other experts as they explore the intersection of AI and cybersecurity and provide actionable insights for practitioners, decision-makers, and enthusiasts eager to navigate the future of digital defense.
Virtual Event: DFIR Summit 2024 | Join us for two full days of free digital forensics, incident response, and threat hunting content on August 22-23 by registering for one or both of our upcoming Solutions Tracks.