SANS NewsBites

Fortinet Announces Another Bug Disclosure; Telecoms Have Seven Days to Disclose Breaches

February 13, 2024  |  Volume XXVI - Issue #12

Top of the News


2024-02-12

Cyber Readiness Institute’s 2024 State of SMB Cyber Readiness Survey

Coverage of cyberattacks leans toward larger organizations because of their wider public impact, creating a perception that larger companies are more targeted, while the reality is that SMBs are frequent victims due to their vulnerabilities and easy access to larger organizations. A global survey on cyber readiness among SMBs can provide valuable insights, raise awareness, and inform actions that benefit all businesses, policymakers, and society as a whole. Take the survey here.

Learn more about the Cyber Readiness Institute: https://cyberreadinessinstitute.org/


2024-02-09

Fortinet Ends Rough Week with Another Bug Disclosure

On Friday, February 9, Fortinet disclosed a critical out-of-bounds write vulnerability affecting its FortiOS SSL VPN. The flaw can lead to remote code execution and may already have been exploited. Users are urged to upgrade to fixed versions of affected products. If users need to use a workaround until upgrading is possible, Fortinet recommends disabling SSL VPN, as disabling webmode will not be sufficient. Last week, Fortinet disclosed two critical vulnerabilities in FortiSIEM and backtracked on a story about Internet-connected toothbrushes being used to launch a distributed denial-of-service (DDoS) attack.

Editor's Note

Where there is smoke, there is fire. Fortinet has been in the news for so many exploits. I’m sure many people started looking at what has been compromised and used it as a roadmap to find bugs. Expect this to happen to other manufacturers in the news, such as SonicWall, Ivanti, F5, and more. Other manufacturers that haven’t been in the news aren’t immune; it’s just about how many eyes look at what.

Lee Neely
Lee Neely

CVE-2024-21762, out-of-bounds write, has a CVSS score of 9.8, and is listed in the NIST KEV catalog with a fix or discontinue date of 2/16/24. The workaround, disabling the SSL VPN isn't going to win you any points, you need to plan your update. Note FortiOS 7.6 is not affected, and if you're on FortiOS 6.0 you need to migrate to a fixed version. While the Internet-connected toothbrushes story was fake, it's a good conversation starter about what you do and don't want Internet connected, and how to approach security in that type of environment.

Lee Neely
Lee Neely

2024-02-12

FCC: Telecoms Have Seven Days to Disclose Breaches

The US Federal Communication Commission (FCC) has adopted a new rule requiring telecommunications companies and VoIP providers to notify authorities within seven days of detecting a breach. The organizations that will need to be notified include the FCC, the FBI, and the Secret Service. The new rule also states that covered organizations must notify affected customers “without unreasonable delay … and in no case more than 30 days following reasonable determination of a breach.” If organizations “determine that no harm to customers is reasonably likely to occur,” they do not need to notify customers.

Editor's Note

I’m sure there will be much lobbying to delay the requirement or weaken the language (which has plenty of wiggle room) but this one is long overdue.

John Pescatore
John Pescatore

The rule change expands breach notification rules to not just cover Customer Proprietary Network Information (CNPI) but all forms of PII and goes into effect on March 13th. It also eliminates the requirements for carriers to notify customers of a breach in cases where they can reasonably determine that no harm to customers is reasonably likely to occur as a result of the breach. Talk to your telecommunication/VoIP providers about modifications/impacts to their reporting process and that they have accurate reporting information for you.

Lee Neely
Lee Neely

We are long past the stage where companies can proclaim after a breach that they "take security seriously" but are then left to self-regulate how they manage security. The time for self-regulation is over and this new disclosure rule is one of many new regulations in the US, the EU, the UK, and indeed in other jurisdictions that will require companies to prove they take "security seriously" and take accountability for their actions.

Brian Honan
Brian Honan

Telecoms are such core infrastructure; seven days may be appropriate. However, we have seen legislation in the past in countries like India that failed to implement this. I suspect we will see exceptions like usual.

Moses Frost
Moses Frost

Seven days, 96, 72, 48-hours… the federal government seems to be all over the place in establishing data breach notification rules. Wouldn’t it be more efficient and clearer to private companies if the government were to settle on a single data breach reporting rule across every industry vertical? Sounds like the perfect job for the Office of the National Cyber Director.

Curtis Dukes
Curtis Dukes

The Rest of the Week's News


2024-02-12

International Law Enforcement Operation Takes Aim at Warzone RAT

A coordinated international law enforcement effort has led to the arrest of two individuals in connection with Warzone remote access trojan (RAT). The effort also took down the RAT’s associated website and domains used to sell the malware. One of the suspects was arrested in Malta; the other was arrested in Nigeria.

Editor's Note

The Warzone RAT, aka Ave Maria RAT, was being licensed for between $16 and $38/month. The two gentleman have been both marketing and providing support for the RAT from June 2019 to March 2023. The two gentlemen face extradition and, if convicted, up to 10 years in prison and pay a hefty fine. Somewhat ironic considering one is a Nigerian prince. If you were a victim of the Warzone RAT, head over to the FBI's Warzone Rat Victim Reporting form: https://wzvictims.ic3.gov. RAT mitigations include keeping software, including EDR, updated, having a good firewall, strong passwords (better still MFA), and not opening suspicious attachments or links. If your email provider has attachment security/link filtering, enable it.

Lee Neely
Lee Neely

These days cyber-crime is international, and the law enforcement response must be as well. What’s interesting is that one of the suspects worked as a trusted insider to obtain needed information to attack. Insider threat is the most difficult to defend against. Revisit your physical and personnel security processes and how they support a well-established cybersecurity program.

Curtis Dukes
Curtis Dukes

2024-02-12

Planet Home Discloses More Details About Ransomware Attack

Mortgage lending company Planet Home has disclosed that its network became infected with ransomware last year. The attack targeted Planet Home’s Citrix systems in mid-November. The company sent notification letters to affected customers in late January. Planet Home experienced a separate MoveIT-related breach earlier in 2023.

Editor's Note

The takeaway quote: “While Planet had implemented multiple layers of security tools designed to prevent this type of unauthorized access…” “Security in Depth” is just “Spending in Depth” when you put layers of security without first putting down the foundation “Essentially Security Hygiene” which includes patching critical vulnerabilities in core infrastructure quickly.

John Pescatore
John Pescatore

Planet Home was the recipient of LockBit ransomware courtesy of the Citrix Bleed flaw. While affected customers are being notified, if you're a Planet Home customer, don't wait for the notice to get credit monitoring/restoration service. Not a bad time to verify that your shop patched Citrix Bleed, in all environments.

Lee Neely
Lee Neely

2024-02-12

Ransomware Attack Disrupts Online Services at Romanian Hospitals

A ransomware targeted the Hipocrate Information System (HIS), which some Romanian hospitals use to manage patient data and other information. HIS is offline and its data encrypted. The incident has caused system outages at 21 Romanian hospitals; numerous other hospitals removed their connectivity out of caution. The affected hospitals are using paper records during the downtime. Most of the affected hospitals have backups that are no more than three days old.

Editor's Note

The attackers used Backmydata ransomware, which is a variant from the Phobos ransomware family. Interestingly the individual hospitals have backups of their data in the HIS systems, all but one is 3 days old, the one is 12 days old. Here is an interesting topic to dive deep on - have you got backups from your outsourced providers, and could you use those backups for service restoration? If not, could you change that answer?

Lee Neely
Lee Neely

A supply chain attack against a widely used software application. What’s unfortunate is that for many of the hospitals, the backups appear to have been stored locally and are themselves affected. Given this attack it seems a prudent reminder for organizations to maintain an instance of recovery data off-line as described by CIS Control 11.4.

Curtis Dukes
Curtis Dukes

Another example of how those behind cyberattacks are criminals motivated purely by greed and who have no remorse for those impacted by their attacks.

Brian Honan
Brian Honan

Patient data and other information should always be isolated from each other.

William Hugh Murray
William Hugh Murray

2024-02-12

ExpressVPN Disables Split-Tunneling to Fix Unprotected DNS Request Issue

ExpressVPN has temporarily removed the split-tunneling feature from the most recent version of their Windows app (v. 12.73.0) to fix “an issue that may have left some users’ DNS requests unprotected.” The problem was introduced in a version of the app that was released in May 2022 (12.23.1).

Editor's Note

Split tunneling, or running multiple VPNs at a time, is always dangerous and it often isn't clear how packets, in particular DNS requests, are routed. One should also always test VPNs occasionally by inspecting traffic leaving the system to verify any assumptions about how packets are being routed (do not overlook IPv6!)

Johannes Ullrich
Johannes Ullrich

Typically, enabling the VPN changes your DNS configuration to use the VPN's so that you can resolve services provided "behind" the VPN. That also means those DNS requests are routed over the encrypted VPN tunnel, and therefore secure. By forcing full tunnel, these requests are forwarded to the DNS traffic to ExpressVPN's DNS responders rather than your local/ISP responder. The downside is local network resources (printers, NAS, servers) will not be reachable.

Lee Neely
Lee Neely

2024-02-12

Package Repository Security Principles from CISA and OpenSSF

The US Cybersecurity and Infrastructure Security Agency (CISA) has teamed up with the Open Source Security Foundation (OpenSSF) to publish a framework for package repository security. The document, titled Principles for Package Repository Security, “defines four levels of security maturity of package repositories across four categories of capabilities: authentication, authorization, general capabilities, and command-line interface (CLI) tooling.”

Editor's Note

This has been a long time coming. Read up on WordPress plugins in which maintainers had fatigue, so attack groups offered to “help maintain the package.” Only once the ownership was transferred was it converted into a mechanism to spread backdoors.

Moses Frost
Moses Frost

2024-02-09

French Health Insurance Data Compromised

Health insurance-related data of millions of French citizens were exposed via breaches of two payment processors, Viamedis and Almerys, which are used by multiple insurers. The breaches occurred in late January, five days apart. France’s data protection agency, the Commission Nationale Informatique et Libertés (CNIL), is investigating. The breaches reportedly did not affect banking or medical information.

Editor's Note

A very targeted attack with the likely aim of retrieving credit card or banking institution numbers. While they failed in that objective, the cybercriminals did retrieve valuable information to support identity theft. Unfortunately, it has become all too common practice for commercial companies to retain every shard of information about customers.

Curtis Dukes
Curtis Dukes

The breached data includes marital status, date of birth, social security number, name of the health insurer. The insurers are directly responsible for notifying affected users. The big concern is that the pilfered data could be combined with other breached data for identity theft.

Lee Neely
Lee Neely

2024-02-12

Third-Party Breaches Affect GAO, Bank of America

The US Government Accountability Office (GAO) has disclosed that a breach at third-party contractor CGI Federal exposed data belonging to 6,600 current and former employees. In a separate story, a breach of third-party service provider Infosys McCamish Systems (IMS) compromised Bank of America customer data.

Editor's Note

The LockBit ransomware gang is taking credit for the IMS breach. BofA is declining to comment on this incident, and while they will notify affected customers, my advice is to be proactive on credit monitoring/identity restoration services. I am proactive here because my information has been breached previously.

Lee Neely
Lee Neely

Third parties rarely require peer access to your network. Consider running third party connections, apps, services, and servers, in “padded cells,” (to include end-to-end application layer encryption) designed to prevent harm to themselves or others.

William Hugh Murray
William Hugh Murray

Internet Storm Center Tech Corner

Exploit Against Unnamed BYTEVALUE Router Vulnerability Included in Mirai

https://isc.sans.edu/diary/Exploit+against+Unnamed+Bytevalue+router+vulnerability+included+in+Mirai+Bot/30642

MSIX With Heavily Obfuscated PowerShell Script

https://isc.sans.edu/diary/MSIX+With+Heavily+Obfuscated+PowerShell+Script/30636

Senior Executives Targeted in Ongoing Azure Account Takeover

https://www.darkreading.com/cloud-security/senior-executives-targeted-ongoing-azure-account-takeover

CISA Partners With OpenSSF To Secure Software Repositories

https://www.cisa.gov/news-events/alerts/2024/02/08/cisa-partners-openssf-securing-software-repositories-working-group-release-principles-package

PostgreSQL Vulnerability

https://www.postgresql.org/support/security/CVE-2024-0985/

Microsoft Defender Bypass via Comma

https://hyp3rlinx.altervista.org/advisories/MICROSOFT_WINDOWS_DEFENDER_TROJAN.WIN32.POWESSERE.G_MITIGATION_BYPASS_PART2.txt

Too Many Honeypots

https://vulncheck.com/blog/too-many-honeypots

ClamAV Command Injection Vulnerability CVE-2024-20328

https://amitschendel.github.io/vulnerabilites/CVE-2024-20328/

ExpressVPN DNS Leaks

https://www.expressvpn.com/blog/windows-app-dns-requests/