Newsletters: NewsBites

Subscribe to SANS Newsletters

Join the SANS Community to receive the latest curated cyber security news, vulnerabilities and mitigations, training opportunities, and our webcast schedule.





SANS NewsBites
@Risk: Security Alert
OUCH! Security Awareness
Case Leads DFIR Digest
Industrial Control Systems
Industrials & Infrastructure


SANS NewsBites is a semiweekly high-level executive summary of the most important news articles that have been published on computer security during the last week. Each news item is very briefly summarized and includes a reference on the web for detailed information, if possible.

Spend five minutes per week to keep up with the high-level perspective of all the latest security news. New issues are delivered free every Tuesday and Friday.

Volume XIX - Issue #94

December 1, 2017


****************************************************************************

SANS NewsBites               December 1, 2017                Vol. 19, Num. 094

****************************************************************************

TOP OF THE NEWS

AWS Bucket Misconfiguration Exposes Classified NSA Data

NATO Members Develop Cyber Warfare Rules

Federal Cybersecurity Dashboard Adoption


REST OF THE WEEK'S NEWS

Seleznev Sentenced for New Charges

Fixes Available for Cisco WebEx Flaws

Google to Start Process of Blocking Third-Party Software Code Injection in Chrome

Website Using "Pop-Unders" to Launch Hidden, Persistent Cryptocurrency Miners

UK Suit Alleges Google Circumvented Privacy Protections on Users' iPhones

Apple Releases Fix for macOS Root Vulnerability

Baratov Reaches Plea Deal in Yahoo Breach Case

PowerDNS Releases Patches for Authoritative Server and Recursor

INTERNET STORM CENTER TECH CORNER


***************************  Sponsored By AlgoSec  **************************


AlgoSec, the leader in Security Policy Management recently examined the state of security across hybrid environments. The survey revealed that while many organizations are embracing public cloud platforms as part of their enterprise infrastructure, they also have serious concerns when managing security across hybrid environments, both during and after cloud migrations.  Read More: http://www.sans.org/info/200270


*****************************************************************************

TRAINING UPDATE


-- SANS Cyber Defense Initiative 2017 | Washington, DC | December 12-19 | https://www.sans.org/event/cyber-defense-initiative-2017


-- SANS Security East 2018 | New Orleans, LA | January 8-13 | https://www.sans.org/event/security-east-2018


-- SANS Amsterdam January 2018 | January 15-20 | https://www.sans.org/event/amsterdam-january-2018


-- SANS Las Vegas 2018 | January 28-February 2 | https://www.sans.org/event/las-vegas-2018


-- Cyber Threat Intelligence Summit | Bethesda, MD | January 29-February 5 | https://www.sans.org/event/cyber-threat-intelligence-summit-2018


-- SANS London February 2018 | February 5-10 | https://www.sans.org/event/london-february-2018


-- Cloud Security Summit & Training 2018 | San Diego, CA | February 19-26 | https://www.sans.org/event/cloud-security-summit-2018


-- SANS Secure Japan 2018 | February 19-March 3 | https://www.sans.org/event/sans-secure-japan-2018


-- SANS Secure Singapore 2018 | March 12-24 | https://www.sans.org/event/secure-singapore-2018


-- SANS OnDemand and vLive Training | The SANS Training you want with the flexibility you need. Get a 10.5" iPad Pro with Smart Keyboard, or an ASUS Chromebook Flip, or take $400 Off OnDemand or vLive Training when you register by December 13. https://www.sans.org/online-security-training/specials/


-- Can't travel? SANS offers online instruction for maximum flexibility


-- Live Daytime training with Simulcast - https://www.sans.org/simulcast


-- Evening training 2x per week for 6 weeks with vLive - https://www.sans.org/vlive


-- Anywhere, Anytime access for 4 months with OnDemand format -https://www.sans.org/ondemand/


-- Single Course Training

SANS Mentor https://www.sans.org/mentor/about

Community SANS https://www.sans.org/community/

View the full SANS course catalog https://www.sans.org/security-training/by-location/all


*****************************************************************************

TOP OF THE NEWS

 --

AWS Bucket Misconfiguration Exposes Classified NSA Data

(November 28 & 30, 2017)

Yet another misconfigured Amazon Web Services (AWS) bucket has been found to have been leaking classified and sensitive data. This bucket contains information that belongs to the US Army's Intelligence and Security Command, which is also a division of the National Security Agency (NSA). The 100 gigabytes of compromised data include details about an Army intelligence project known as Red Disk. The leak was detected in September.    


[Editor Comments]

[Pescatore] Short term: all AWS accounts come with 90-day free use (up to 250 agents) of Amazon's Inspector vulnerability assessment tool. Longer term: all enterprise-grade vulnerability assessment products support being extended out to the major cloud services. The usual problem is that the enterprise *processes* haven't been extended.


[Williams] With yet another classified data leak there needs to be some accountability for this leak. Some of our adversaries almost certainly found this unsecured classified information. The data on the drive image, if studied by adversaries is extremely damaging. Some have criticized Whittaker for writing about this, but without his reporting the government would have buried the fact of the leak. While national security is obviously a concern in any such situation, reporting in this case has started a valuable conversation about the handling of classified data, particularly by intelligence community contractors.


[Paller] Amazon does not take responsibility for security of user data except in services they provide. That's particularly true of configuration. Without substantial (skilled) effort, often using tools AWS provides, users are about as safe on AWS as they are putting their most sensitive data on a computer they bought at Best Buy and connected to the Internet.


Read more in:

FCW: Security firm reveals another NSA leak

https://fcw.com/articles/2017/11/28/nsa-leak-upguard-johnson.aspx

Cyberscoop: Top secret Army, NSA data found on public internet due to misconfigured AWS server

https://www.cyberscoop.com/nsa-army-leak-red-disk-aws-upguard-chris-vickery/?category_news=technology

Threatpost: Leaky AWS Storage Bucket Spills Military Secrets, Again

https://threatpost.com/leaky-aws-storage-bucket-spills-military-secrets-again/129021/

GovTech: Top-Secret Cache of Army Intelligence Data Left Exposed on Internet

http://www.govtech.com/data/Top-Secret-Cache-Of-Army-Intelligence-Data-Left-Exposed-On-The-Internet.html

ZDNet: NSA leak exposes Red Disk, the Army's failed intelligence system

http://www.zdnet.com/article/nsa-leak-inscom-exposes-red-disk-intelligence-system/

 

 --

NATO Members Develop Cyber Warfare Rules

(November 30, 2017)

Seven NATO member countries - the US, the UK, Germany, Norway, Denmark, the Netherlands, and Spain - are developing a slate of cyber warfare principles to help NATO military forces decide when to deploy cyber weapons. The new doctrine could mark a NATO shift away from a purely defensive cybersecurity posture.


[Editor Comments]

[Pescatore] NATO countries have been using offensive cyber weapons for a long time now. The real issue is reaching a consensus on defining what conditions justify their use. For example, in the pre-Internet days broadcast propaganda stations were used by many countries to send "fake news" across borders to enemy countries, yet that wasn't considered warfare. Similarly, intelligence agencies collecting intelligence in nefarious ways wasn't dealt with as an act of war. Those same activities using the Internet don't necessarily add up to "cyber war," and many forms of active cyber response are very likely to cause unintended consequences.


Read more in:

Reuters: NATO mulls 'offensive defense' with cyber warfare rules

https://www.reuters.com/article/us-nato-cyber/nato-mulls-offensive-defense-with-cyber-warfare-rules-idUSKBN1DU1G4

Silicon UK: NATO Plots Cyber Warfare Rules

http://www.silicon.co.uk/security/cyberwar/nato-cyber-warfare-rules-225475?inf_by=5a013858681db87f488b46c2

 

 --

Federal Cybersecurity Dashboard Adoption

(November 28, 2017)

A US Department of Homeland Security official says that the major government agencies are expected to be connected to the federal cybersecurity dashboard by the end of February 2018. The dashboard will allow DHS officials to keep tabs on which software is running on networks across the government. Just two agencies are currently connected. Once the 24 major agencies are connected, DHS will begin connecting smaller agencies. The federal cybersecurity dashboard is part of DHS's Continuous Diagnostics and Mitigation program.


[Editor Comments]

[Northcutt] Ignore the pundits who criticize saying they should measure this or that. The dashboard means certain metrics will be monitored and compared against peer agencies. When you are the only one with a failing score, there is no place to hide.


Read more in:

Nextgov: All Major Agencies Will Be on Federal Cybersecurity Dashboard by February

http://www.nextgov.com/cybersecurity/2017/11/all-major-agencies-will-be-federal-cybersecurity-dashboard-february/142838/

Read more in:

Nextgov: All Major Agencies Will Be on Federal Cybersecurity Dashboard by February

http://www.nextgov.com/cybersecurity/2017/11/all-major-agencies-will-be-federal-cybersecurity-dashboard-february/142838/


**************************  SPONSORED LINKS  ********************************


1) Join this webinar with Splunk to learn how to avoid the legacy SIEM death trap and keep your organization alive. http://www.sans.org/info/200275


2) Don't Miss: "Next-Generation Antivirus (NGAV) Buyer's Guide: Successful Strategies for Choosing and Implementing NGAV." Register: http://www.sans.org/info/200280


3) "2017 Trends and Strategies for Protecting Endpoints in Healthcare" Register: http://www.sans.org/info/200285


*****************************************************************************

THE REST OF THE WEEK'S NEWS   

 --

Seleznev Sentenced for New Charges

(November 30 & December 1, 2017)

Roman Valeryevich Seleznev has been sentenced to 14 years in prison for racketeering and conspiracy to commit bank fraud. Seleznev, who masterminded an organized online crime ring, was sentenced to 27 years in prison in April for other fraud charges. He will serve his sentences concurrently.   


Read more in:

The Register: Stop us if you've heard this one: Russian hacker thrown in US slammer for $59m bank fraud

http://www.theregister.co.uk/2017/12/01/roman_seleznev_track2_jailed/

DoJ: Russian Cyber-Criminal Sentenced to 14 Years in Prison for Role in Organized Cybercrime Ring Responsible for $50 Million in Online Identity Theft and $9 Million Bank Fraud Conspiracy

https://www.justice.gov/opa/pr/russian-cyber-criminal-sentenced-14-years-prison-role-organized-cybercrime-ring-responsible

 

 --

Fixes Available for Cisco WebEx Flaws

(November 30, 2017)

Cisco has released patches to address six vulnerabilities in Cisco WebEx Network Recording Player for Advanced Recording Format and WebEx Recording Format files. Users are encouraged to update the affected products; there are no workarounds available.


Read more in:

Cisco: Multiple Vulnerabilities in Cisco WebEx Recording Format and Advanced Recording Format Players

https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171129-webex-players

Threatpost: Cisco Patches Critical Playback Bugs in WebEx Players

https://threatpost.com/cisco-patches-critical-playback-bugs-in-webex-players/129057/

SC Magazine: Cisco patches multiple vulnerabilities in WebEx platforms

https://www.scmagazine.com/cisco-patches-critical-webex-platform-vulnerabilities/article/710747/

 

 --

Google to Start Process of Blocking Third-Party Software Code Injection in Chrome

(November 30, 2017)

In spring 2018, Google will take the first step in the process of blocking third-party software from injecting code into the browser. Chrome 66, scheduled for release in April 2018, will notify users after a browser crash that third-party code is being injected and will offer suggestions for updating or removing the offending software. In Chrome 68, scheduled for release in July 2018, third-party code injection will be blocked unless the blocking prevents Chrome from starting. In Chrome 72, scheduled for release in January 2019, Chrome will always block third-party code injection.


Read more in:

Bleeping Computer: Google Will Block Third-Party Software From Injecting Code Into Chrome

https://www.bleepingcomputer.com/news/google/google-will-block-third-party-software-from-injecting-code-into-chrome/

The Register: Google Chrome vows to carpet bomb meddling Windows antivirus tools

http://www.theregister.co.uk/2017/11/30/google_chrome_antivirus_shutout/

 

 --

Website Using "Pop-Unders" to Launch Hidden, Persistent Cryptocurrency Miners

(November 29 & 30, 2017)

At least one website has been detected using pop-unders, in this case windows that pop up behind the Windows taskbar, to harness computer resources to mine for cryptocurrency. The windows function even when the main browser window is closed. So far, the technique has been spotted on just one website and appears to work only on Chrome browsers.


[Editor Comments]

[Ullrich] As the value of crypto currencies increases, we are seeing more and more fraud related to them. For a quick summary of current attacks, see https://isc.sans.edu/forums/diary/9+Fast+and+Easy+Ways+To+Lose+Your+Crypto+Coins/23071/


Read more in:

Malwarebytes: Persistent drive-by cryptomining coming to a browser near you

https://blog.malwarebytes.com/cybercrime/2017/11/persistent-drive-by-cryptomining-coming-to-a-browser-near-you/

Bleeping Computer: Cryptojacking Script Continues to Operate After Users Close Their Browser

https://www.bleepingcomputer.com/news/security/cryptojacking-script-continues-to-operate-after-users-close-their-browser/

SC Magazine: Cryptominer uses hidden browser windows to keep on mining

https://www.scmagazine.com/persistent-cryptominer-hides-to-mine-after-closing-browser/article/710738/

 

 --

UK Suit Alleges Google Circumvented Privacy Protections on Users' iPhones

(November 29, 2017)

Google is being taken to court in the UK over allegations that it placed cookies on iPhone owners' devices even when the devices were set to block cookies. Google then allegedly used the cookies to deliver targeted advertisements.


Read more in:

BBC: Google faces mass legal action in UK over data snooping

http://www.bbc.com/news/technology-42166089

 

 --

Apple Releases Fix for macOS Root Vulnerability

(November 28 & 29, 2017)

Apple has released an emergency security update for macOS to address a flaw that allowed anyone to log in as a system administrator on machines running the High Sierra version of macOS. The patch was scheduled to be automatically applied to machines running High Sierra 10.13.1 on Wednesday, November 29. Apple has said that it plans to audit its development processes to prevent a recurrence.  


[Editor Comments]

[Ullrich] The patch will disable the root account again, which is a good thing, but if you need the root account enabled, then make sure to re-enable it after applying the patch. There may also be an issue when trying to connect to file shares after applying the fix. Apple has instructions on fixing any file share related issues. The problem here wasn't really so much that the disabled root account had no password, but a bug in some parts of the operating system that did not verify that the account was disabled.


Read more in:

Wired: Anyone Can Hack macOS High Sierra Just By Typing "Root"

https://www.wired.com/story/macos-high-sierra-hack-root/

The Register: As Apple fixes macOS root password hole, here's what went wrong

http://www.theregister.co.uk/2017/11/29/apple_macos_high_sierra_root_bug_patch/

ZDNet: Apple fixes macOS password flaw

http://www.zdnet.com/article/apple-fixes-macos-password-flaw/

Ars Technica: New security update fixes macOS root bug

https://arstechnica.com/gadgets/2017/11/new-security-update-fixes-macos-root-bug/

KrebsOnSecurity: MacOS High Sierra Users: Change Root Password Now

https://krebsonsecurity.com/2017/11/macos-high-sierra-users-change-root-password-now/

 

 --

Baratov Reaches Plea Deal in Yahoo Breach Case

(November 28 & 29, 2017)

Karim Baratov has reached a plea deal with US prosecutors regarding his involvement in breaking into webmail accounts as part of a larger breach of Yahoo accounts. He was extradited to the US earlier this year. On Tuesday, November 28, Baratov pleaded guilty to one count of conspiracy to commit computer fraud and eight counts of aggravated identity theft.


Read more in:

The Register: Canadian! fella! admits! hacking! Gmail! inboxes! amid! Yahoo! megahack!

http://www.theregister.co.uk/2017/11/29/canadian_hacker_webmail_yahoo/

Ars Technica: Hacker pleads guilty to huge Yahoo hack, admits helping Russia's FSB

https://arstechnica.com/tech-policy/2017/11/canadian-man-pleads-guilty-admits-role-in-massive-2014-yahoo-hack/

Cyberscoop: Guilty plea for Canadian charged in 2014 Yahoo hacking case

https://www.cyberscoop.com/karim-baratov-yahoo-hacking-fsb-guilty-plea/

Fifth Domain: 'Hacker-for-hire' pleads guilty to Yahoo breach

https://www.fifthdomain.com/civilian/fbi-doj/2017/11/29/hacker-for-hire-pleads-guilty-to-yahoo-breach/

 

 --

PowerDNS Releases Patches for Authoritative Server and Recursor

(November 28, 2017)

PowerDNS has released patches to address five vulnerabilities in its Authoritative Server and Recursor products. The issues include a missing check on API operations, insufficient validation of DNSSEC signatures, cross-site scripting in the web interface, configuration file injection in the API, and a memory leak in DNSSEC parsing.


Read more in:

PowerDNS: PowerDNS Authoritative Server 4.0.5 and Recursor 4.0.7 Released

https://blog.powerdns.com/2017/11/27/powerdns-authoritative-server-4-0-5-and-recursor-4-0-7-released/

HelpNet Security: PowerDNS patches five security holes in widely used nameserver software

https://www.helpnetsecurity.com/2017/11/28/powerdns-patches-five-security-holes/

The Register: Open source nameserver used by millions needs patching

http://www.theregister.co.uk/2017/11/28/powerdns_dnssec_bugs/

 

INTERNET STORM CENTER TECH CORNER

Passwordless Root Account Allows for Trivial Privilege Escalation on MacOS High Sierra

https://twitter.com/lemiorhan/status/935578694541770752

https://support.apple.com/en-us/HT204012


Apple Releases Security Update 2017-001 to Fix Passwordless Root Bug

https://support.apple.com/en-us/HT208315


Coinhive Miner Now As Pop-Under

https://blog.malwarebytes.com/cybercrime/2017/11/persistent-drive-by-cryptomining-coming-to-a-browser-near-you/


Fileless Malicious PowerShell Sample

https://isc.sans.edu/forums/diary/Fileless+Malicious+PowerShell+Sample/23081/


Defeating Facial Recognition

https://arxiv.org/abs/1711.09001


Bitcoin Gold Wallet App Compromise

https://bitcoingold.org/critical-warning-nov-26/


Project Exodus Identified Trackers in Android Apps

https://reports.exodus-privacy.eu.org/reports/apps/

        

Insecure Android Crypto Currency Wallets

https://www.htbridge.com/news/security-cryptocurrency-mobile-apps.html


.dev TLD Now Requires HTTPS in Chrome

http://www.theregister.co.uk/2017/11/29/google_dev_network/

        

More Malspam Pushing Emotet Malware

https://isc.sans.edu/forums/diary/More+Malspam+pushing+Emotet+malware/23083/


Google Chrome To Block Some Third Party Software Mid-2018

https://blog.chromium.org/2017/11/reducing-chrome-crashes-caused-by-third.html


European Union Funds VLC Bug Bounty

https://joinup.ec.europa.eu/news/hackerone-vlc


STI Student Scott Perry: Virtual System Forensics

http://www.sans.org/reading-room/whitepapers/bestprac/exploring-effectiveness-approaches-discovering-acquiring-virtualized-servers-esxi-38155

        

******************************************************************************

The Editorial Board of SANS NewsBites

 

John Pescatore was Vice President at Gartner Inc. for fourteen years. He became a director of the SANS Institute in 2013. He has worked in computer and network security since 1978 including time at the NSA and the U.S. Secret Service.


Shawn Henry is president of CrowdStrike Services. He retired as FBI Executive Assistant Director responsible for all criminal and cyber programs and investigations worldwide, as well as international operations and the FBI's critical incident response.


Suzanne Vautrinot was Commander of the 24th Air Force (AF Cyber) and now sits on the board of directors of Wells Fargo and several other major organizations.


Ed Skoudis is co-founder of CounterHack, the nation's top producer of cyber ranges, simulations, and competitive challenges, now used from high schools to the Air Force. He is also author and lead instructor of the SANS Hacker Exploits and Incident Handling course, and Penetration Testing course.


Michael Assante was Vice President and Chief Security Officer at NERC, led a key control systems group at Idaho National Labs, and was American Electric Power's CSO. He now leads the global cyber skills development program at SANS for power, oil & gas and other critical infrastructure industries.


Mark Weatherford is Chief Cybersecurity Strategist at vArmour and the former Deputy Under Secretary of Cybersecurity at the US Department of Homeland Security.


Stephen Northcutt teaches advanced courses in cyber security management; he founded the GIAC certification and was the founding President of STI, the premier skills-based cyber security graduate school, www.sans.edu.


Dr. Johannes Ullrich is Chief Technology Officer of the Internet Storm Center and Dean of the Faculty of the graduate school at the SANS Technology Institute.


William Hugh Murray is an executive consultant and trainer in Information Assurance and Associate Professor at the Naval Postgraduate School.


Lee Neely is a Senior Cyber Analyst at Lawrence Livermore National Laboratory, SANS Analyst and Mentor. He has worked in computer security since 1989.


Sean McBride is Director of Analysis and co-founder of Critical Intelligence, and, while at Idaho National Laboratory, he initiated the situational awareness effort that became the ICS-CERT.


Rob Lee is the SANS Institute's top forensics instructor and director of the digital forensics and incident response research and education program at SANS (computer-forensics.sans.org).


Tom Liston is member of the Cyber Network Defense team at UAE-based Dark Matter. He is a Handler for the SANS Institute's Internet Storm Center and co-author of the book Counter Hack Reloaded.


Jake Williams is a SANS course author and the founder of Rendition Infosec, with experience securing DoD, healthcare, and ICS environments.


Dr. Eric Cole is an instructor, author and fellow with The SANS Institute. He has written five books, including Insider Threat and he is a founder with Secure Anchor Consulting.


Mason Brown is one of a very small number of people in the information security field who have held a top management position in a Fortune 50 company (Alcoa). He leads SANS' efforts to raise the bar in cybersecurity education around the world.


David Hoelzer is the director of research & principal examiner for Enclave Forensics and a senior fellow with the SANS Technology Institute.


Gal Shpantzer is a trusted advisor to CSOs of large corporations, technology startups, Ivy League universities and non-profits specializing in critical infrastructure protection. Gal created the Security Outliers project in 2009, focusing on the role of culture in risk management outcomes and contributes to the Infosec Burnout project.


Eric Cornelius is Director of Critical Infrastructure and ICS at Cylance, and earlier served as deputy director and chief technical analyst for the Control Systems Security Program at the US Department of Homeland Security.


Alan Paller is director of research at the SANS Institute.


Brian Honan is an independent security consultant based in Dublin, Ireland.


David Turley is SANS operations manager and serves as production manager and final editor on SANS NewsBites.


Please feel free to share this with interested parties via email, but no posting is allowed on web sites. For a free subscription visit https://www.sans.org/account/create