SANS NewsBites

Oracle Says Data Was Stolen From "Obsolete" Servers; US OCC Experienced Major Cybersecurity Incident; CIS Will Provide Gap Funding for MS-ISAC

April 11, 2025  |  Volume XXVII - Issue #28

Top of the News


2025-04-09

Oracle Denies Cloud Breach Because Servers Were 'Obsolete'

After denying that a reported March 20, 2025 breach of Oracle Cloud took place, Oracle has now sent emails to customers informing them that "a hacker did access and publish user names" and encrypted or hashed passwords, specifying that the credentials were on "obsolete servers that were never a part of OCI," and therefore that "the Oracle Cloud -- also known as Oracle Cloud Infrastructure or OCI -- has NOT experienced a security breach." Oracle's notification email states that in the specific context of OCI, customer environments, customer data, and cloud service have not been compromised. Multiple news sources have received confirmation of the leaked data's authenticity from Oracle customers. Kevin Beaumont characterized Oracle's response as "wordplay," and asked, "How long was the attacker in the SaaS solution (that Oracle manage)? What did they do with the access? How long were they in for? Why were 'legacy' systems containing customer info left unmanaged and insecure?" Oracle is currently facing a class-action lawsuit over a separate breach of Oracle Health servers, also not publicly acknowledged by the company.

Editor's Note

"No, it was an OLD plane that went down. It doesn't count as a crash!" The fastest way to lose trust is half-truths and evasiveness. I'm sure there are some great people doing great work there, but they're not putting their best foot forward.

Christopher Elgee
Christopher Elgee

Clarification of the scope of the breach is helpful. The identities were stolen from the Oracle Cloud Classic (OCC) Oracle Identity Manager (IDM) database which included usernames, emails and hashed passwords. It is positioned as a legacy service, so you should be moving away from it if you are using it, disabling any remaining OCC IDM accounts. If you have an OCI account, which should have a different password from OCC, make sure that you're enforcing MFA.

Lee Neely
Lee Neely

It would appear that Oracle is 'doubling-down' on their denial of a security breach of their network. If the servers were obsolete, then why not expunge all user data and take them off-line. It speaks to Oracle processes, or lack thereof. Honestly, it's not a good look for Oracle for being a responsible company.

Curtis Dukes
Curtis Dukes

There is an ongoing lawsuit about this. I'm unsure I want to weigh in because I would prefer to look at the court documents to determine what is provided to the judge. Here is what I can tell you: this level of uncertainty may not be good for Oracle overall as it is trying to attract more customers onto its platform.

Moses Frost
Moses Frost

As we noted last week, both orphan servers and data leak. Whether one calls this risk a "breach" is a matter of semantics. However, by whatever name, the risk must be identified and managed.

William Hugh Murray
William Hugh Murray

2025-04-09

US Office of the Comptroller of the Currency Says Breach is Considered a Major Cybersecurity Incident

The US Office of the Comptroller of the Currency (OCC) told Congress that a February email system breach is considered a major cybersecurity incident. The breach was initially disclosed on February 26. The updated information provided to Congress says the OCC became aware of the incident on February 11. The breach led to the theft of "highly sensitive information relating to the financial condition of federally regulated financial institutions used in its examinations and supervisory oversight processes." The intruders had access to the email system for more than a year; in all, the incident compromised more than 150,000 emails from bank regulators dating back to 2023.

Editor's Note

The attackers had access to OCC email accounts, via compromised administrator accounts, for about 20 months, and the compromise was detected because of unusual interaction between administrator accounts and their mailboxes, which hints that behavior detection capabilities were recently enabled. The takeaway is to both enable behavior detection capabilities, and validate administrator accounts, to include enforcing MFA. Don't forget to not only monitor creation, but also reactivation of accounts.

Lee Neely
Lee Neely

What's embarrassing is that the evildoer maintained persistence for over a year. It makes one wonder about the security controls in place, and oversight provided by the security staff. Let's worry less about who the threat actor is, and more on overhauling the security staff and monitoring of critical cybersecurity controls so that it 'happen again.

Curtis Dukes
Curtis Dukes

While often beneath our notice, for most organizations, e-mail is a mission critical application. It is valuable resource requiring necessary protection and an attack vector and amplifier. Let this report be a warning.

William Hugh Murray
William Hugh Murray

2025-04-08

CIS Will Provide Gap Funding for MS-ISAC

In the wake of funding cuts affecting the Multi-State Information Sharing and Analysis Center (MS-ISAC), the Center for Internet Security (CIS) has said they will provide temporary gap funding so MS-ISAC can continue providing services to state and local governments. MS-ISAC has more than 18,000 members, who receive services that include "network intrusion detection, a malicious domain blocking and reporting service, endpoint detection and response, a cybersecurity self-assessment program and a 24/7 security operations center."

Editor's Note

The MS-ISAC does wonderful work helping defend SLTTs who simply don't have the bench to do it all themselves. I sincerely hope they're able to continue their important work indefinitely!

Christopher Elgee
Christopher Elgee

Along with the FS-ISAC, the MS-ISAC has been a leader, effective and useful. A new funding model should be found. My understanding is that the FS-ISAC is funded by subscription by its members.

William Hugh Murray
William Hugh Murray

The core argument was the MS-ISAC functions were overlapping other CISA provided services, and CISA is facing cuts of their own. CIS's funding should last through the end of the fiscal year, allowing time to determine the long-term solution.

Lee Neely
Lee Neely

The Rest of the Week's News


2025-04-08

Update WhatsApp for Windows to Fix Attachment RCE Flaw

Meta has published a security advisory disclosing a "spoofing issue" in WhatsApp Desktop for Windows, fixed as of version 2.2450.6. CVE-2025-30401, CVSS score not yet provided, would allow an attacker to use a maliciously crafted "mismatch" attachment to cause the recipient to "inadvertently execute arbitrary code rather than view the attachment when manually opening the attachment inside WhatsApp," because the software would display the attachment according to its MIME type, but would select the file opening handler based on the filename extension. The flaw was reported through Meta Bug Bounty Submission by an external researcher. BleepingComputer notes that a similar flaw resulting in unwanted execution of Python and PHP attachments was patched by WhatsApp in July 2024.

Editor's Note

CVE-2025-30401 is still getting updates, and currently has a CVSS score of 6.7. Regardless, if you're using the Windows Desktop WhatsApp, update it. While there are not reports of active exploits, WhatsApp has been actively, successfully targeted in the past, as such, you want to review having it on desktops.

Lee Neely
Lee Neely

Bug bounty programs have been available for well over a decade. They continue to prove their worth in finding critical vulnerabilities in both vendor and government programs. Product owners should not only focus on the immediate vulnerability but take the time to understand the root-cause for the vulnerability and fix it correctly.

Curtis Dukes
Curtis Dukes

2025-04-09

CISA Adds Five CVEs to KEV, Including Vulnerabilities in CentreStack, Windows CLFS, and CrushFTP

The US Cybersecurity and Infrastructure Security Agency (CISA) has added five CVEs to their Known Exploited Vulnerabilities (KEV) catalog this week. The vulnerabilities include a use of hard-coded cryptographic key vulnerability in Gladinet CentreStack (CVE-2025-30406); a use-after-free vulnerability in Microsoft Windows Common Log File System (CLFS) Driver (CVE-2025-29824); an authentication bypass vulnerability in CrushFTP (CVE-2025-31161); and two vulnerabilities in Linux kernel: an out-of-bounds read issue (CVE-2024-53150) and an out-of-bounds access issue (CVE-2024-53197). The vulnerabilities have mitigation due dates between April 28 and April 30.

Editor's Note

The CentreStack flaw, CVE-2025-30406, CVSS score 9.0, hinges on a hardcoded cryptographic key (machineKey) and is fixed in version 16.4.10315.56368, released April 3 - which generates a new unique mackineKey during installation. CentreStack has also published additional server-side fixes and enhancements you'll want to make sure are in place.

Lee Neely
Lee Neely

As government agencies go, CISA continues to be efficient and its services essential. Its funding is under pressure as much political as economic. It deserves our support.

William Hugh Murray
William Hugh Murray

2025-04-10

Fortinet Releases Updates to Fix Critical Unverified Password Change Vulnerability in FortiSwitch

Fortinet has released FortiSwitch updates to address "an unverified password change vulnerability [CWE-620] in FortiSwitch GUI [that] may allow a remote unauthenticated attacker to modify admin passwords via a specially crafted request." The issue was discovered internally. The flaw affects multiple versions of FortiSwitch; users are urged to update to versions 6.4.15, 7.0.11, 7.2.9, 7.4.5, or 7.6.1. For users unable to update immediately, Fortinet suggests a workaround that involves "disable[ing] HTTP/HTTPS access from administrative interfaces [and] configure[ing] trusted hosts to limit the hosts that can connect to the system."

Editor's Note

CVE-2024-48887, unauthorized password change, CVSS score 9.8, doesn't need authentication and the exploit has a low degree of complexity, meaning expedite the fix. Beyond applying the update, make sure you're limiting access to the administrative web interface to trusted systems.

Lee Neely
Lee Neely

2025-04-08

Patch Tuesday Includes Updates for More than 120 Vulnerabilities

On Tuesday, April 8, Microsoft released fixes for more than 120 security issues across their product line. Eleven of the vulnerabilities included in the April release are rated critical. Among the issues addressed this month is a zero-day vulnerability: a high-severity use-after-free issue in Windows Common Log File System (CLFS) Driver that can lead to local privilege elevation (CVE-2025-29824).

Editor's Note

A reminder that vulnerabilities classified as critical means malware or threat actors can exploit them with little to no interaction from Windows users. The fixes include not only another CLFS fix but also fixes three RDP (CVE-2025-26671, CVE-2025-28480 and CVE-2025-27482) flaws, last two are critical, marked as exploitation likely.

Lee Neely
Lee Neely

This number of flaws patched in one month suggests that there is a huge reservoir of both known and unknown flaws in the code base on which we rely. In the time that it takes the vendors to find and fix these flaws at least some of them may well be found and exploited by those that have come to be known as "Advanced Persistent Threat (sources)." It also demonstrates the huge cost of late quality. For some organizations the cost of late repair may exceed the price paid for the software in the first place. Tolerance of this strategy is costing us a lot of money.

William Hugh Murray
William Hugh Murray

2025-04-08

Other Patch Tuesday Updates for April

Tuesday, April 8 also saw security updates from many other vendors, including Adobe, which patched 30 vulnerabilities in ColdFusion, 11 critical, as well as multiple vulnerabilities in a variety of products; Ivanti, which addressed six vulnerabilities in Endpoint Manager; VMware, which addressed vulnerabilities in Tanzu Greenplum and Tanzu Greenplum Backup; Zoom; Google Chrome; Siemens; Schneider Electric; Rockwell Automation, and ABB.

Editor's Note

In case you were distracted by the Microsoft patch set, don't overlook all your browsers (Edge, Chrome, Firefox, etc.) and Adobe products, which addresses 54 flaws. Don't forget to review Apple's updates March 31 and April 1st. With spring break, make sure things didn't (or don't) get missed or postponed.

Lee Neely
Lee Neely

This Patch Tuesday may well be a stress test for your organization. Use it to re-allocate resources.

William Hugh Murray
William Hugh Murray

2025-04-09

ChatGPT Used in Business Spam Campaign

Researchers at SentinelOne's SentinelLABS have observed a spam campaign targeting small and medium-size business websites' contact forms and chat widgets, using the chat API for OpenAI's gpt-4o-mini model to generate customized text, then automating sending large quantities of messages using the AkiraBot framework. The researchers note that "the use of LLM-generated content likely helps these messages bypass spam filters, as the spam content is different each time a message is generated. The framework also rotates which attacker-controlled domain is supplied in the messages, further complicating spam filtering efforts." OpenAI has disabled the API key involved and is continuing to investigate; SentinelLABS recommends using the set of rotating attacker-controlled domains as indicators of compromise and blocking them, as the content of the messages is not consistent.

Editor's Note

his bot uses several CAPTCHA bypass services, particularly targeting hCAPTCHA and reCAPTCHA using a fingerprint service to mimic legitimate user behavior as well as an inject.js script to alter the document object model, to manipulate the session with a headless chrome browser. In short, this can bypass existing non-human attack protections. Give the IOC's from the SentinelOne site to your threat hunters to see if you've been targeted. If you're using services (WAF, etc.) or plugins designed to stop bad bots/crawlers/etc. make sure they are enabled and prepared for this new form of attack. Consider blocking the IOC domains.

Lee Neely
Lee Neely

I don't think a marketing campaign exists without ChatGPT involvement. Legit or not.

Johannes Ullrich
Johannes Ullrich

Evildoers will always use the tools available to them to carry out their crime. GenAI simply automates the process and expertly gets around the capabilities of spam filters. Those evildoers innovate just like defenders; some would say, even more quickly. The best defense remains implementation of a cybersecurity framework, like IG1 of the CIS Critical Security Controls.

Curtis Dukes
Curtis Dukes

Tools are neutral; most are subject to abuse and misuse. My Dad had a high speed grinder mounted on his work bench. When I was six or seven, I used it to sharpen one of his screw drivers to a sharp edge. Now ninety, I still remember his craftsman's respect for his tools.

William Hugh Murray
William Hugh Murray

2025-04-07

Europol Report on Biometric Vulnerability Preparedness for Law Enforcement

Europol has published a report that "identifies potential ways of exploiting vulnerabilities, thus enabling law enforcement agencies to update their systems and detect such incidents during investigations." In addition to describing attack scenarios for a variety of biometric protections, the report offers mitigation suggestions, including raising awareness within law enforcement, adopting advanced evasion detection techniques, ensuring that biometric systems have security baked in from the beginning, collaborating with experts, establishing standardized reporting and data aggregation, and ensuring that data are processed securely. The report was created as a collaborative effort by Europol's Operational and Analysis Centre and the Europol Innovation Lab.

Editor's Note

When was the last time you reviewed the risks around biometric authentication, particularly factoring in masks, deep fakes, voice replay, and artificial fingerprints? This report goes into great depth on how the biometrics are faked, and while directed towards law enforcement, includes risks and mitigations you may not have considered. Consider leveraging ISO/IEC 30107-3 when evaluating biometric systems with presentation attack detection capabilities.

Lee Neely
Lee Neely

These are not so much vulnerabilities as they are fundamental limitations of the technologies. Biometrics are much more about convenience than security but may be useful as evidence in systems of strong authentication. Even here they must be implemented in such a way as to compensate for these fundamental limitations such as counterfeiting or capture and replay.

William Hugh Murray
William Hugh Murray

2025-04-10

Sensata Technologies Reports Ransomware Attack

Major industrial sensor manufacturer Sensata Technologies has filed an 8-K form with the US Securities and Exchange Commission (SEC) disclosing a "ransomware incident" involving encryption of company devices and theft of files, that took place on April 6, 2025, impacting "operations, including shipping, receiving, manufacturing production," and support functions, with no timeline given for full restoration of services. Interim measures are in place to maintain certain functions, and on learning of the attack Sensata proactively took its network offline, implementing response protocols and containment measures; third-party cybersecurity professionals are assisting with ongoing investigation. The company will notify individuals and regulatory authorities after reviewing the files that were accessed and stolen. The company does not currently expect the incident to have a material financial and operational impact between now and June 30, 2025.

Editor's Note

Sensata is based in Massachusetts, has operations in about a dozen countries, producing sensors, electrical protection and other tools for vehicle, offroad and aerospace markets, and is known for their work on components for the Apollo 11 Moon mission and Hubble space telescope upgrade. They haven't determined what data has been lost, and is already restoring services. If you are a current or past Sensata employee, you want to make sure you already have ID restoration/credit monitoring rather than wait for bad news.

Lee Neely
Lee Neely

Even large, well-resourced companies fall victim to ransomware attacks. In this case, a classic double-extortion ransom play. Once the investigation is complete it would be helpful to understand what security controls were in place and what was the root-cause of the successful attack. However, given the legalese in their 8-K filing, it's doubtful the company will be as forthcoming on those type of details. I do give them some props, however, for at least mentioning 'ransomware' in the filing.

Curtis Dukes
Curtis Dukes

Internet Storm Center Tech Corner

SANS Internet Storm Center StormCast Friday, April 11, 2025

Network Infraxploit; Windows Hello Broken; Dell Update; Langflow Exploit

https://isc.sans.edu/podcastdetail/9404

Network Infraxploit

Our undergraduate intern, Matthew Gorman, wrote up a walk-through of

CVE-2018-0171, an older Cisco vulnerability, that is still actively being

exploited. For example, VOLT TYPHOON recently exploited this problem.

https://isc.sans.edu/diary/Network+Infraxploit+Guest+Diary/31844

Windows Update Issues / Windows 10 Update

Microsoft updated its "Release Health" notes with details regarding issues

users experiences with Windows Hello, Citrix, and Roblox. Microsoft also released an emergency update for Office 2016 which has stability problems after applying the most recent update.

https://support.microsoft.com/en-us/topic/april-8-2025-kb5055523-os-build-26100-3775-277a9d11-6ebf-410c-99f7-8c61957461eb

https://learn.microsoft.com/en-us/windows/release-health/windows-message-center#3521

https://support.microsoft.com/en-us/topic/april-10-2025-update-for-office-2016-kb5002623-d60c1f31-bb7c-4426-b8f4-69186d7fc1e5

Dell Updates

Dell releases critical updates for its Powerscale One FS product. In particular, it fixes a default password problem.

https://www.dell.com/support/kbdoc/en-us/000300860/dsa-2025-119-security-update-for-dell-powerscale-onefs-for-multiple-security-vulnerabilities

Langflow Vulnerability (possible exploit scans sighted) CVE-2025-3248

Langflow addressed a critical vulnerability end of March. This writeup by Horizon3 demonstrates how the issue is possibly exploited. We have so far seen one "hit" in our honeypot logs for the vulnerable API endpoint URL.

https://www.horizon3.ai/attack-research/disclosures/unsafe-at-any-speed-abusing-python-exec-for-unauth-rce-in-langflow-ai/

SANS Internet Storm Center StormCast Thursday, April 10, 2025

Getting Past PyArmor; CenterStack RCE; Android 0-Day Patch; VMware Tanzu Patches; Odd Win11 Directory; WhatsApp File Confusion; SANS AI Guide

https://isc.sans.edu/podcastdetail/9402

Getting Past PyArmor

PyArmor is a python obfuscation tool used for malicious and non-malicious software. Xavier is taking a look at a sample to show what can be learned from these obfuscated samples with not too much work.

https://isc.sans.edu/diary/Obfuscated+Malicious+Python+Scripts+with+PyArmor/31840

CentreStack RCE CVE-2025-30406

GladinetÕs CentreStack secure file-sharing software suffers from an inadequately protected machine key vulnerability that can be used to modify ViewState data. This vulnerability may lead to remote code execution, which is already exploited.

https://gladinetsupport.s3.us-east-1.amazonaws.com/gladinet/securityadvisory-cve-2005.pdf

Google Patches two zero-day vulnerabilities CVE-2024-53150 CVE-2024-53197

Google released its monthly patches for Android. Two of the patched vulnerabilities are already exploited. One of them was used by Serbian law enforcement.

https://www.malwarebytes.com/blog/news/2025/04/google-fixes-two-actively-exploited-zero-day-vulnerabilities-in-android

Broadcom VMWare Tenzu Updates

Broadcom released updates for VMWare Tenzu. Many vulnerabilities affect the backup component and allow for arbitrary command execution.

https://support.broadcom.com/web/ecx/security-advisory?

Windows 11 April Update ads inetpub directory

The April Windows 11 update appears to create a new /inetpub directory. It is unclear why, and removing it appears to have no bad effects.

https://www.bleepingcomputer.com/news/microsoft/windows-11-april-update-unexpectedly-creates-new-inetpub-folder/

WhatsApp File Type Confusion/Spoofing

WhatsApp patched a file type confusion vulnerability. A victim may be tricked into downloading an executable disguised as an image

https://www.whatsapp.com/security/advisories/2025/

SANS Critical AI Security Guidelines

https://www.sans.org/mlp/critical-ai-security-guidelines

SANS Internet Storm Center StormCast Wednesday, April 9, 2025

Microsoft Patch Tuesday; Adobe Patches; OpenSSL 3.5 with PQC; Fortinet FortiSwitch

https://isc.sans.edu/podcastdetail/9400

Microsoft Patch Tuesday

Microsoft patched over 120 vulnerabilities this month. 11 of these were rated critical, and one vulnerability is already being exploited.

https://isc.sans.edu/diary/Microsoft+April+2025+Patch+Tuesday/31838

Adobe Updates

Adobe released patches for 12 different products. In particular important are patches for ColdFusion addressing several remote code execution vulnerabilities. Adobe Commerce got patches as well, but none of the vulnerabilities are rated critical.

https://helpx.adobe.com/security/security-bulletin.html

OpenSSL 3.5 Released

OpenSSL 3.5 was released with support to post quantum ciphers. This is a long term support release.

https://groups.google.com/a/openssl.org/g/openssl-project/c/9ZYdIaExmIA

FortiSwitch Update

Fortinet released an update for FortiSwitch addressing a vulnerability that may be used to reset a password without verification.

https://fortiguard.fortinet.com/psirt/FG-IR-24-435