SANS NewsBites

In Wake of CSRB Report, Microsoft is Enhancing Their Secure Future Initiative; RSA: White House Looking to Shift Burden of Software Liability to Manufacturers; 78-Month Prison Sentence for Selling Counterfeit Cisco Equipment

May 7, 2024  |  Volume XXVI - Issue #36

Top of the News


2024-05-03

In Wake of CSRB Report, Microsoft is Enhancing Their Secure Future Initiative

Microsoft says they are expanding the scope oi their Secure Future Initiative (SFI) by integrating the findings of the Department of Homeland Security's Cyber Safety Review Board (CSRB) regarding last summer's breach of Microsoft Azure as well as lessons learned from the Midnight Blizzard attack that Microsoft reported earlier this year. The expanded SFI will be guided by three principles: secure by design, secure by default, and secure operations. The goals and actions will be aligned to six security pillars: protect identities and secrets; protect tenants and isolate production systems; protect networks; protect engineering systems; monitor and detect threats; and accelerate response and remediation.

Editor's Note

This is a big deal for two reasons. In 2002, Bill Gates revolutionized Microsoft's priorities with Trustworthy Computing. Over the past two decades in many ways the Windows operating system has become the standard for building security into default configurations. Satya Nadella's SFI is the same thing, but instead of building security into operating systems MS is embedding security into organizational culture. This is very exciting as I think they will actually do it. It's going to take years to truly see the change organization-wide, but sense of urgency and mission is there long term. But the second, and even more important take away is the impact CSRB can have. If they continue to publish detailed breach reports like this (hint: United Healthcare), we may begin to see the root causes (culture) and change that industry wide.

Lance Spitzner
Lance Spitzner

Microsoft has published a roadmap to show how they are meeting 20 of the CSRB recommendations, including victim notification, which is not getting as much attention as their other activities. Even so, make sure that you're following current guidance securing your Microsoft environments, managing accounts and permissions. Double check your implementation of strong authentication and that your team knows how to find and access the detailed logs of activity.

Lee Neely
Lee Neely

While a welcome move, it is deeply disappointing that it took a breach and the CSRB report for Microsoft to take these steps. The products and services we rely on should already be built with the principles outlined above. One has to wonder how many other vendors are not focusing on security and will only do so in response to a breach of their products/services.

Brian Honan
Brian Honan

Microsoft has added some very key promises to SFI and backed it with a memo from Microsoft CEO Satya Nadell to all MSFT employees that said In some cases, this will mean prioritizing security above other things we do, such as releasing new features or providing ongoing support for legacy systems. This is key to advancing both our platform quality and capability such that we can protect the digital estates of our customers and build a safer world for all. Two things to cynically point out: (1) Why only in some cases?? and (2) the annual RSA conference is to these kinds of promises as New Year's Day is to resolutions: if in some cases you still eat those deep-fried chocolate-filled croissants, you likely are not going to lose weight or avoid heart attacks.

John Pescatore
John Pescatore

2024-05-03

78-Month Prison Sentence for Selling Counterfeit Cisco Equipment

A Florida man has been sentenced to six-and-a-half years in prison for selling counterfeit Cisco equipment to the US military. Onur Aksoy purchased cheap network equipment from overseas which were altered to appear to be Cisco equipment. The products often failed or malfunctioned, causing problems for customers, who included schools, healthcare organizations, government agencies, and the US military. Askoy operated multiple companies in Florida and New Jersey. In June 2023, Askoy pleaded guilty to charges of conspiracy and mail fraud. In addition to his prison sentence, Askoy has been ordered to pay $100 million in restitution.

Editor's Note

The peddling of counterfeit network equipment has been around for decades. The easy solution is to buy directly from the equipment vendor or one of its resellers. That said, federal statutes can require that a percentage of procurement dollars be set aside for small business bidding. That's enabled individuals like Mr. Aksoy and his multiple companies to market in counterfeit equipment and cheat the system for personal gain. Kudos to law enforcement, keep up the good work.

Curtis Dukes
Curtis Dukes

This is old school supply chain security failure and this particular flavor (counterfeit Cisco products) has been going on for 15 years Ð in 2009 DoJ prosecuted two people caught selling counterfeit Cisco gear to the Federal Bureau of Prisons. The security principle violated is basic common sense: if it seems too good to be true, it probably isn't. Simple table-top exercise: see if you can get procurement to agree to buy all CXOs Roleks watches that are selling NOW for $49.95.

John Pescatore
John Pescatore

Cisco, US CBP and others have been working to shut down his shipment of counterfeit Cisco equipment. The question is could your team spot counterfeit equipment? Are you checking? This actor was hiding behind multiple personas running about 15 businesses, albeit all operating out of the same warehouse. If you're buying directly through resellers, DSB or otherwise, make sure you're vetting your suppliers and their deliveries carefully, particularly boundary control and other security devices. If you don't know how or if this is done, find out.

Lee Neely
Lee Neely

2024-05-06

RSA: White House Looking to Shift Burden of Software Liability to Manufacturers

At the RSA Conference in San Francisco this week, US Office of the National Cyber Director Assistant National Cyber Director for Cyber Policy and Program Nick Leiserson told an audience that the White House has been talking with software manufacturers about shifting the burden of liability from customers to manufacturers. The effort is (prompted by) the White House National Cyber Strategy, which includes incentives for software companies to develop products without serious vulnerabilities. The conversation will include critical infrastructure operators later this year. In a related story, the Cybersecurity and Infrastructure Security Agency (CISA) is expected to announce their Secure by Design pledge this week.

Editor's Note

It's easy to say we're shifting the liability burden to manufacturers and yes, they can do much, much more to strengthen secure by design principles. That said, eliminating design level vulnerabilities is a difficult task and will require knowledge and skills that aren't easily taught by software developers. Another consideration is that years of research has proven it nearly impossible to eliminate all vulnerabilities, design, and implementation level in commercial software. In its present form, the only winner with this approach is liability lawyers.

Curtis Dukes
Curtis Dukes

Making sure that suppliers have skin in the game when it comes to secure software will, I hope, help raise the bar across the board. One aspect that has to be considered is the exploitability of flaws, particularly of embedded code or libraries from third parties. Software suppliers already prioritize flaws which can be exploited to make keeping complex packages manageable.

Lee Neely
Lee Neely

This is like talking to the deep-fried chocolate croissant industry about nutrition. The federal government needs to talk via its buying power Ð the software industry and its lobbying firms have been effectively immune to talks about taking ownership of even easily avoided flaws in their products.

John Pescatore
John Pescatore

One would like to see the software industry meet the same standard of merchantability as any other industry and that the Administration would follow through on what is so far only a threat. However, the market's tolerance for shoddy and the industry culture of "ship early, add quality late" is so deeply entrenched that one cannot be very hopeful.

William Hugh Murray
William Hugh Murray

The Rest of the Week's News


2024-05-03

Fixes Available for Critical RCE Vulnerabilities in ArubaOS

HPE Aruba Networking has released updates to address a total of 10 vulnerabilities in ArubaOS. Of those 10, four are critical unauthenticated buffer overflow vulnerabilities that could be exploited to attain remote code execution. The vulnerabilities affect multiple versions of ArubaOS. Some versions of the software are End of Maintenance and do not have patches available.

Editor's Note

The fix is to update to the patched version of ArubaOS 8.10, 8.11, 10.4, 10.5 or 10.6. If you're not on one of these versions to begin with, you need to get there. While there are workarounds, they don't address all the issues in all the ArubaOS versions; the safer bet is to update rather than stopping the sand running through your fingers.

Lee Neely
Lee Neely

It's crucial that every network vendor is part of this conversation. The widespread nature of this network vulnerability demands immediate action-patching is essential. We often encounter such fundamental issues during penetration tests. However, many testers lack deep network knowledge and the necessary exploits. It's a risk not worth taking.

Moses Frost
Moses Frost

2024-05-03

Microsoft Zero-Trust DNS

Microsoft is developing Zero Trust DNS (ZTDNS), which will appear in an unspecified future version of Windows. Microsoft has also published a document to help admins determine how ZTDNS fits into their Zero Trust deployment model. ZTDNS will first be in private preview, and at an undetermined later date, will be available to insiders.

Editor's Note

Practitioner's note: for defenders who currently track name resolution by inspecting port 53/TCP/UDP traffic at the network edge, you'll need to shift focus to the endpoint or the protective DNS servers. The latter assumes you're running your own or have access to telemetry from your protective DNS provider.

Christopher Elgee
Christopher Elgee

This aligns with OMB M-22-09 and NIST SP 800-207 to support DOH/DOT as well as integration with the Windows firewall for DNS traffic routing, allowing you to filter out undesired domain or even upstream resolvers, not unlike the PDNS service CISA provides agencies. The goal is to have all DNS traffic encrypted and only use trusted servers. Once you have DOH/DOT servers in place, you're going to want to focus on client mods to use DOH/DOT, including routing that traffic to your trusted servers.

Lee Neely
Lee Neely

2024-05-06

Wichita, Kansas City Government Suffers Ransomware Attack

The City of Wichita in Kansas has taken its network offline following a ransomware attack. The attack occurred on Sunday, May 5, and resulted in encrypted data on some of the city's IT systems. Wichita officials do not yet know if the attackers stole information before encrypting.

Editor's Note

The city turned off their network and a number of supporting systems. The primary impact is most city services are only accepting cash and the airport Wi-Fi and departure screens are not operating. Wichita is finding ways to deliver services to residents, and their web site explains how to interact with each city service both as a citizen and a supplier, one more nice communication style to add to your playbook.

Lee Neely
Lee Neely

2024-05-05

Finnish Transport and Communications Agency Warns of Mobile Banking Android Malware

The Finnish Transport and Communications Agency (Traficom) has published a warning about Android malware targeting online bank accounts. The campaign involves SMS messages sent in Finnish, instructing recipients to call a certain number; the person who answers the call tells them to download an app for protection, which is how the malware gains access to their devices.

Editor's Note

Beware of SMS bearing gifts. There are SMS filtering systems for mobile devices, the risk being you need to send the message to the system for analysis. An alternative is to use device controls to block/isolate unknown senders, introducing an added step before interacting with those messages. Even with iOS allowing third-party app stores in the EU, guiding your users to use caution when installing apps, particularly under the guise of helpdesk support, remains prudent. The old trick of spotting language and grammar errors in phishing attempts is becoming far less effective; take it for a given that the fake help desk person will speak your language like a native.

Lee Neely
Lee Neely

2024-05-03

US Government Agencies Say North Korean Threat Actors are Exploiting Weak DMARC to

The US National Security Agency (NSA), the Department of State, and the FBI have published a joint cybersecurity advisory warning that threat actors with ties to North Korea's government have been exploiting weak DMARC implementations to conduct spearphishing attacks against policy analysts and other experts. DMARC, or Domain-based Message Authentication Reporting and Conformance (DMARC) policies, when properly configured, help prevent spoofed email messages.

Editor's Note

Practitioner's note: this is an easy one to check. Perform a web search for "dmarc checker," enter your domain, and see what it says. Getting it right can be tricky, but the first step is knowing whether you're vulnerable.

Christopher Elgee
Christopher Elgee

If you don't have a DMARC setting, or your policy is set to none (p=none) it's time to change it to reject or quarantine, with a 100% applicability. Yeah, rolling out DMARC with a p=none was safe, it accepts all messages, and as such, isn't effective. Make sure to communicate as you change this setting. The bulletin also gives guidance on how to read the email headers to see how your SPF, DKIM and DMARC settings are being applied.

Lee Neely
Lee Neely

One often implements new controls with a permissive policy to avoid disruption, with the full intentions of moving to a more restrictive policy that one fails to get around to. My mentor, Charlie Middleton, taught me to over-control new applications; one can always relax the controls later if warranted. However, once the application gets out of control, tightening may be too late to be effective.

William Hugh Murray
William Hugh Murray

2024-05-06

Tinyproxy HTTP Connection Header Vulnerability

A critical use-after-free vulnerability in the HTTP Connection Headers parsing in Tinyproxy versions 1.11.1 and 1.10.0 can be exploited to achieve memory corruption and remote code execution. The vulnerability is triggered through an unauthenticated HTTP request. According to data from Censys gathered on May 4, of the 90,310 hosts exposing a Tinyproxy service to the public Internet, approximately 57,000 are running vulnerable versions of Tinyproxy.

Editor's Note

Some finger-pointing going on between Talos and the Tinyproxy open-source software maintainers on preferred vulnerability notification method. Regardless, a fix is now available for download. For the roughly 60% of users that are operating vulnerable versions, snag the patch and install to protect against attack.

Curtis Dukes
Curtis Dukes

2024-05-06

FCC Asks Congress to Fully Fund Telecom Tech Replacement Reimbursement Program

US Federal Communications Commission (FCC) Chair Jessica Rosenworcel has written to Congress, asking them for additional funding to reimburse telecommunications companies who are replacing Huawei and ZTE equipment. In 2019, the FCC banned telecoms from using Huawei and ZTE equipment in projects that are paid for through the Universal Service Fund. In early 2020, Congress approved the Secure and Trusted Communications Networks Act, which created a program to rip out and replace Chinese telecom gear. The FCC approved nearly $5 billion in reimbursements, but Congress has so far allocated only $1.9 billion.

Editor's Note

It's a simple math problem for the telco providers. Stay in the program and get stuck with 60% of the bill or withdraw and not realize a one-time 30-ish% increase in revenue. I suspect many will exit the program unless Congress comes through with the full funding amount. The question then becomes whether government will move to shut down those networks in violation of the law and deny connectivity to rural users.

Curtis Dukes
Curtis Dukes

Small carriers, with 2 million customers or fewer, were given priority for this funding, and it is estimated that the awarded funds still only covered about 40% of the replacement equipment cost and that an additional 3.9 billion is needed to correct the problem. In MondayÕs RSA keynote from Secretary of State Blinken, he stated a commitment to not let US suppliers lag in technology to prevent a repeat occurrence of this scenario.

Lee Neely
Lee Neely

Internet Storm Center Tech Corner