SANS NewsBites

Ineffective Ivanti Mitigation; Possible BlackCat Payday; Phobos Ransomware

March 5, 2024  |  Volume XXVI - Issue #18

Top of the News


2024-02-29

CISA: Ivanti Mitigations Might Not Be Effective

In a joint cybersecurity advisory, the US Cybersecurity and Infrastructure Security Agency (CISA), along with the FBI, the Multi-State Information Sharing and Analysis Center (MS-ISAC), and cybersecurity agencies from Australia, Canada, New Zealand, and the UK, notes that threat actors are actively exploiting known vulnerabilities in Ivanti Connect Secure and Policy Secure gateways. Of particular concern, CISA has determined ”that the Ivanti Integrity Checker Tool (ICT) is not sufficient to detect compromise and that a cyber threat actor may be able to gain root-level persistence despite issuing factory resets.”

Editor's Note

At this point, incident response to Ivanti compromises is complicated by incorrectly applied mitigations, overwritten configurations and several similar vulnerabilities that are not always easy to tell apart. In addition, attackers may have found new vulnerabilities not covered by currently available mitigations and patches.

Johannes Ullrich
Johannes Ullrich

Threat actors are able to deceive Ivanti's internal and external ICT, resulting in failure to detect compromise. Imagine bypassing secure boot, such that whatever payload you've added passes muster as genuine code? So, yeah, a big deal. What this means is you need to grab the IOC's from the CISA message, and use them with other tools (in addition to the most recent ICT) to detect compromise. Assume compromise until proven otherwise. Resetting devices, all accounts. Assume that threat actors are able to get admin on LDAP connected accounts, such as your domain controllers. The CISA bulletin has a litany of mitigations, chief among them is limiting access, strengthening authentication and keeping things patched. If you do discover you've been tipped, please report it to IC3, your local FBI field office or CISA. They can help.

Lee Neely
Lee Neely

2024-03-04

ALPHV/BlackCat Ransomware Operators Were Just Paid $22 Million

The ALPHV/BlackCat ransomware operators, who are believed to be responsible for the attack that disrupted Change Healthcare’s operations have reportedly received a $22 million payment. The transaction took place on March 1. UnitedHealth Group, the parent company of Change Healthcare, has declined to answer questions about whether they paid a ransom. More than a week after a ransomware group took down Change Healthcare, healthcare providers are encountering problems filling prescriptions.

Editor's Note

The payment may have also triggered some disputes within ALPHV/Blackcat. As of this morning, law enforcement seized the ALPHV/Blackcat website (which has happened before). A simple site seizure, without obtaining access to key material and backend infrastructure, is a face-saving move by law enforcement. But we will see how far the takedown reached.

Johannes Ullrich
Johannes Ullrich

Some, not all, and a declining percentage of cyberinsurance policies do pay-off for ransomware payments. It is hard to find recent data but in recent years, cyberinsurance policy premiums paid have been something like 4x payouts. Like the extended warranty market, a good business for the seller but not a very good investment for the buyer, especially considering all that costs that still have to be paid to fix the problems that enabled the criminals to succeed.

John Pescatore
John Pescatore

Change Healthcare’s 2021 revenue was $3.49B. Each day that its business operations are shuttered, it loses upwards of ten million dollars. Add to that reputation risk, and it’s understandable that a ransom payment would be considered. Also, in many instances cyber insurance companies initiate the payment to reduce recovery costs. That said, paying the ransom is no guarantee that business operations will be returned to operation quickly.

Curtis Dukes
Curtis Dukes

Regardless of where the payment came from, this incident highlights the disruptiveness a ransomware attack, or indeed any cyberattack, can have on people's lives. It reinforces that cybersecurity is no longer an IT concern but can have major downstream impacts on businesses, individuals, society, and indeed the economy. When reviewing cybersecurity risks, we need look beyond their impact on our own organisations but also the impact they can have on partner organisations, customers, and society. It also highlights government’s need to invest more and provide additional supports to law enforcement to tackle the criminals behind these attacks.

Brian Honan
Brian Honan

ALPHV/BlackCat affiliates are sabre rattling about getting cheated out of their share of the Change Healthcare ransom payment, leading many to conclude that is what this transaction was. ALPHV lists 28 companies they are extorting in addition to Change Healthcare, so it's not a given they paid. It will be interesting to see if the assumption is made that healthcare providers are inclined to pay, raising the frequency and intensity of attacks against that sector. For all of us the best bet is to double down on cyber hygiene, staying the course with our anti-ransomware protections, making sure you're connected with your local CISA, FBI, ISAC, etc. in case you need to reach out to report or verify your defenses.

Lee Neely
Lee Neely

2024-03-04

CISA, FBI, MS-ISAC: Phobos Ransomware Warning

The US Cybersecurity and Infrastructure Security Agency (CISA) , the FBI, and the Multi -State Information Sharing and Analysis Center (MS-ISAC) have published a joint cybersecurity advisory warning that Phobos ransomware is being used to attack networks at government and critical infrastructure organizations. The document includes a list of tactics, techniques, and procedures (TTPs) used by the ransomware actors, as well as indicators of compromise (IOCs) Phobos operates on a ransomware-as-a-service (RaaS) model. The advisory recommends securing RDP ports, prioritizing the remediation of known exploited vulnerabilities, and implementing EDR solutions.

Editor's Note

The attack vectors are largely the same for all ransomware gangs – phishing, RDP, and website drive by. Bottom line: if you’re ineffective in both patch and configuration management, you’re going to have a bad day when the cybercriminals find you.

Curtis Dukes
Curtis Dukes

Your periodic reminder that if criminals are using these techniques to target critical infrastructure you can be guaranteed the same techniques will be used against other organisations. So review this paper and if appropriate, follow the recommendations.

Brian Honan
Brian Honan

Make sure you're keeping an eye on all remote-access/RDP solutions in play, not just MS RDP and VNC. Provide secure mechanisms for remote access and support, listening to input on new and better services for this purpose. These guys modify firewall rules to bypass your protections, setup persistence, steal authentication tokens, so they can come and go as they please, and then they start the ransomware plays, including removing any discovered backups to make restoration painful if not impossible.

Lee Neely
Lee Neely

The Rest of the Week's News


2024-03-04

Malicious Artificial Intelligence/Machine Learning Models Found in Hugging Face Platform

Researchers from JFrog have detected more than 100 malicious artificial intelligence/ machine learning (AI/ML) models in the Hugging Face platform. When downloaded, the malicious code installs backdoors and other malware on end-user devices. Most of what JFrog detected seems to be proof-of-concept; just 10 models were discovered to actually be malicious.

Editor's Note

This is a new type of supply chain attack. We are used to attackers tricking developers into installing malicious libraries. These ML models are in many ways similar. Not only will malicious models affect the results produced, but they are often installed and used like libraries, able to execute arbitrary code on a developer’s system during install.

Johannes Ullrich
Johannes Ullrich

The AI hook got this into the headlines, but really just another warning to consider all incoming software (AI or not) like you’d consider stream water on a hike: either filter it, or don’t drink it. Governance of AI projects have to have requirements for making sure tools/platforms/models used are checked for vulnerabilities and “pathogens.”

John Pescatore
John Pescatore

The challenge is detecting the malicious capabilities of these AI/ML models. While it appears they were caught flat footed, Hugging Face has since added process to do malware, pickle and secrets scanning for every file in every repository for malicious code, unsafe deserialization or sensitive information and alert moderators/users. Additionally Hugging Face developed a new model for securely storing model data called "safetensors." As you're researching the use of AI/ML/LLMs be sure to start engaging with suppliers on security measures, not just for core components but externally provided ones as well.

Lee Neely
Lee Neely

2024-03-01

Judge Orders NSO Group to Share Source Code with WhatsApp

A US federal judge in California has ordered spyware maker NSO Group to share its source code with WhatsApp. The order came about because of a lawsuit filed by WhatsApp against NSO Group over the company’s spyware being used to snoop on 1,400 WhatsApp users. The order does not require NSO Group to reveal their client list or information about their server architecture.

Editor's Note

This goes back to 2018/2019 where the NSO group created messaging accounts, setup proxy and relay servers, which sent messages to mobile devices to exploit CVE-2019-3568, a buffer overflow app in the WhatsApp, present in iOS, Android, Windows Phone and Tizen devices. NSO is also facing similar charges from Apple and the Knight First Amendment Institute and has lost bids for their cases to be dismissed due to foreign state status, or that it is only licensed for national lawful surveillance. The question is how relevant would the source code of an app which compromised your app be five years later? Consider if you could use it to determine if you still have assumptions or code which should be adjusted.

Lee Neely
Lee Neely

From what I read, the arguments made to the Judge to preclude source code from discovery were not sufficient. Instead, what appears to have happened is that the discovery claim would extend beyond the implant to the entire software stack. Because these systems may not have full functionality at the implant level, they want to see the full software stack to establish what the entirety of the solution can do. Is this some strange new precedent that is being set? I’m not a legal expert; what I can tell you is that I would be concerned that the source code to this system is now in more hands. This is not a criminal case; a civil case discovery can be much broader.

Moses Frost
Moses Frost

2024-03-04

German Law Enforcement Takes Down Cybercrime Website

Law enforcement authorities in Germany have taken down the Crimemarket website and arrested six people in connection with the “biggest illegal, German-speaking online trading platform.” Crimemarket had an estimated 180,000 registered users. The investigation has been active for several years, and culminated in the February 29, execution of more than 100 search warrants. German police also seized evidence, including technological devices, narcotics, and cash.

Editor's Note

German law enforcement is not just investigating the operators, they are also including traders and users. They have been monitoring the platform over an extended period, allowing the platform to operate after they had compromised it to support collecting incriminating information including identification, login credentials and other information.

Lee Neely
Lee Neely

These dark web cybercrime markets have been in decline for several years. Today, many criminal gangs use chat channels to trade in illegal goods. That doesn’t mean that the law enforcement raid wasn’t successful, just that more nefarious elements trade on other platforms.

Curtis Dukes
Curtis Dukes

2024-03-04

Fixes Available for Hikvision Vulnerabilities

Hikvision, a Chinese company that makes surveillance equipment, has released fixes for two vulnerabilities in their HikCentral Professional security management system, which is used to manage video, access control, and other security systems. One of the vulnerabilities (CVE-2024-25063) is a high-severity, insufficient server-side validation issue could allow unauthorized access to URLs. The second flaw (CVE-2024-25064) is also an insufficient server-side validation issue, but is rated medium severity because exploitation requires authentication. Users are urged to apply patches as soon as possible.

Editor's Note

CVE-2024-25063 and CVE-2024-25064 have CVSS scores of 7.5 and 4.3 respectively. While no evidence yet shows these are being exploited in the field, the fix is to update to the latest version of the software. Be sure to go to the Hikvision system relevant for your country/region, also review their security best practices to optimize your installation.

Lee Neely
Lee Neely

The Hikvision system is used extensively in retail. If you have them, firewall and patch.

Moses Frost
Moses Frost

2024-03-04

Phishing Campaign Targets FCC and Cryptocurrency Platforms

Researchers from Lookout have detected a phishing kit they call CryptoChameleon that is being used to target US Federal Communications Commission (FCC) employees as well as users and employees of cryptocurrency platforms. The campaign uses cloned single sign-on pages to trick targeted users into sharing their account access credentials on mobile devices.

Editor's Note

Aside from your work to train users on social engineering and phishing attacks, here is where we also need phishing resistant authentication, so that even if captured, the credentials are not fully effective. Better still, passwordless authentication. This campaign captured usernames, passwords, password reset URLs and even photo IDs. Be sure you're enabling all the strong authentication as well as detection measures you already owned, rather than waiting for a "perfect" solution to raise the bar. Use this scenario to find gaps in your existing solutions.

Lee Neely
Lee Neely

2024-03-03

Fulton County, Georgia Still Recovering from January Cyberattack

The government of Fulton County, George, has not fully recovered from a late-January cyberattack against their IT systems. The incident took down the office phone system and prevented clerks from issuing vehicle registrations, marriage licenses, and other permits. The attackers have also threatened to leak sensitive data they claim to have taken from Fulton County systems. Fulton County is still working to restore phone systems and online services, although county offices are open. The LockBit ransomware group has claimed responsibility for the attack.

Editor's Note

As a means of comparison, it took the city of Baltimore three months to return affected city services to full operation at a cost of around $18M. This attack spotlights the need for organizations both public and private to test data recovery plans at a minimum, quarterly.

Curtis Dukes
Curtis Dukes

Something that is often lost in the debate about paying extortion demands from cybercriminals is that regardless of whether you pay those demands or not, the recovery from an attack like that suffered by Fulton County can take a long time and many systems could remain offline for weeks and months. Always, regularly review your recovery plans and test them to see how quickly you can actually recover.

Brian Honan
Brian Honan

Fulton County was a LockBit victim and was one of the sites targeted after the LockBit takedown/re-emergence, saying the attackers still had their data and demanded payment. Interestingly, even though the deadline passed without payment, no data were released. Meanwhile, the county is using paper forms to process jail detainees, residents cannot pay utility bills or access property records online, and clerks are unable to issue marriage licenses or firearm permits. If you can get your hands on the details of the restoration, it'll be a good use case to consider for service resumption of services which are both widespread and interdependent. Take time to consider how you'd practice such a recovery.

Lee Neely
Lee Neely

2024-03-04

North Korean Threat Actors Steal Info From South Korean Chip Makers

South Korea’s National Intelligence Service (NIS) has warned that North Korean cyber threat actors have been targeting South Korean semiconductor manufacturers and stealing sensitive corporate information. NIS says the attacks targeted Internet-exposed servers through known vulnerabilities to gain initial access to corporate networks. NIS says the cyber espionage groups used “living-off-the-land” techniques to hide from tools that might have detected their presence in the networks.

Editor's Note

Have you had a strategy discussion on detecting, and thwarting, a living-off-the-land attack? Could you detect abnormal use of normal tools, irregular lateral movement and data exfiltration? While old techniques, such as dropping in Cobalt Strike, are still in use, these attacks are becoming commonplace.

Lee Neely
Lee Neely

The operative phrase here is “through known vulnerabilities.” Cybercriminals are opportunistic and will use known vulnerabilities to attack you. Some professionals estimate that working exploits are generally available 24-36 hours after patch release. That’s a small window for the defender to work with in updating systems, so prioritizing all Internet-facing servers first for patching is key.

Curtis Dukes
Curtis Dukes

Internet Storm Center Tech Corner

Scanning for Confluence CVE-2022-26134

https://isc.sans.edu/diary/Scanning+for+Confluence+CVE202226134/30704

Capturing DShield Packets with a LAN Tap

https://isc.sans.edu/diary/Capturing+DShield+Packets+with+a+LAN+Tap+Guest+Diary/30708

Additional Critical Security Issues Affecting TeamCity

https://blog.jetbrains.com/teamcity/2024/03/additional-critical-security-issues-affecting-teamcity-on-premises-cve-2024-27198-and-cve-2024-27199-update-to-2023-11-4-now/

GitHub Push Protection Now On By Default

https://github.blog/2024-02-29-keeping-secrets-out-of-public-repositories/

Android Updates

https://source.android.com/docs/security/bulletin/2024-03-01

Linksys E-2000 Vulnerability

https://warp-desk-89d.notion.site/Linksys-E-2000-efcd532d8dcf4710a4af13fca131a5b8

Exploiting CSP Wildcards for Google Domains

https://attackshipsonfi.re/p/exploiting-csp-wildcards-for-google

Silver SAML: Golden SAML in the Cloud

https://www.semperis.com/blog/meet-silver-saml/