SANS NewsBites is a semiweekly high-level executive summary of the most important news articles that have been published on computer security during the last week. Each news item is very briefly summarized and includes a reference on the web for detailed information, if possible.
Spend five minutes per week to keep up with the high-level perspective of all the latest security news. New issues are delivered free every Tuesday and Friday.
Volume XVIII - Issue #56
July 15, 2016
TOP OF THE NEWS
HIPAA Guidance on Reporting RansomwareFDIC Systems Intrusions Not Reported
Fiat Chrysler Announces Bug Bounty Program
THE REST OF THE WEEK'S NEWS
US Appeals Court Sides with Microsoft in Ireland Server CaseClock-Based Intrusion Detection for Automobile Systems
Fixes Available for Drupal Remote Code Execution Flaws
Locky Ransomware Encrypts Files Even When Computers are Offline
Juniper Patches for Junos OS
Four-Year Prison Sentence for Conspiracy to Steal Defense Data
Malware Found on European Energy Company System
Patch Tuesday: Microsoft and Adobe
********************** Sponsored By MobileIron *************************
Take the Mobility Assessment to determine if your enterprise mobility management strategy is on track to succeed. Benchmark your performance, understand where you may have security risks and receive recommendations tailored to your situation. Take the assessment!
http://www.sans.org/info/187290
***************************************************************************
TRAINING UPDATE x2028 x2028
--SANS Minneapolis 2016 | Minneapolis, MN | July 18-23 | x2028 https://www.sans.org/event/minneapolis-2016
--SANS San Antonio | San Antonio, TX | July 18-23 | x2028 https://www.sans.org/event/san-antonio-2016
--Industrial Control Systems Security Training | Houston, TX | July 25-30 | x2028 https://www.sans.org/event/ics-houston-summit-training-2016
--SANS Boston 2016 | Boston, MA | August 1-6 | x2028 https://www.sans.org/event/boston-2016
--SANS Vienna | Vienna, Austria | August 1-6 | x2028 https://www.sans.org/event/vienna-2016
--Security Awareness Summit & Training | San Francisco, CA | August 1-10, 2016 | x2028 https://www.sans.org/event/security-awareness-summit-2016
--Data Breach Summit: Assessment, Compliance, Communication | Chicago, IL | August 18, 2016 | x2028 https://www.sans.org/event/data-breach-summit-2016
--SANS Alaska | Anchorage, AK | August 22-27, 2016 | https://www.sans.org/event/alaska-2016
--SANS Virginia Beach 2016 | Virginia Beach, VA | August 22-September 2 | x2028 https://www.sans.org/event/virginia-beach-2016
--SANS Brussels Autumn 2016 | Brussels, Belgium | September 5-10 | x2028 https://www.sans.org/event/brussels-autumn-2016
--SANS Network Security 2016 | Las Vegas, NV | September 10-19 | https://www.sans.org/event/network-security-2016
--Security Leadership Summit & Training | September 27 - October 4, 2016 | Dallas, TX | https://www.sans.org/event/security-leadership-summit-2016
***************************************************************************
TOP OF THE NEWS
HIPAA Guidance on Reporting Ransomware (July 14, 2016)
According to new Health Insurance Portability and Accountability Act (HIPAA) guidance, ransomware attacks must be reported to the Department of Health and Human Services (HHS). The guidance "describes ransomware attack prevention and recovery from a healthcare sector perspective, including ... how HIPAA breach notification processes should be managed in response to a ransomware attack."[Editor Comments ]
[Pesctore ]
The HHS guidance basically says that if an attacker was able to encrypt files containing PHI, then the attacker has both "acquired" the files (which requires notification) or has impacted the information owner's ability to access their own data and the business ability to maintain the integrity of the data, also requiring notification. Note that this last condition means that disclosure would be required even if you had encrypted the files before the ransomware attack encrypted them a second time! The guidance does point out that you can still perform a risk assessment justifying your belief that a disclosure would not be required.
[Northcutt ]
Page 2 of the HHS Fact Sheet has the magic word, "backup". Frequent backups, tested backups, offsite backups. And we move on to face the next threat.
Read more in:
SC Magazine: HHS: Healthcare groups must report all ransomware attacks
-http://www.scmagazine.com/hhs-healthcare-groups-must-report-all-ransomware-attac
ks/article/509630/
Health Leaders Media: CMS Offers HIPAA Guidance on Ransomware
-http://www.healthleadersmedia.com/leadership/cms-offers-hipaa-guidance-ransomwar
e#
HHS (Health and Human Services): FACT SHEET: Ransomware and HIPAA
-http://www.hhs.gov/sites/default/files/RansomwareFactSheet.pdf
FDIC Systems Intrusions Not Reported (July 13 and 14, 2016)
According to a report from The US House Committee on Science, Space, and Technology, the Chinese government is suspected of breaking into Federal Deposit Insurance Corp. (FDIC) computers several times between 2010 and 2013. Backdoors were found on 12 workstations and 10 servers. The incidents were never reported to authorities.[Editor Comments ]
[Paller ]
The shoemaker's children: federal agencies responsible for overseeing cybersecurity in commercial organization have shown a disturbing pattern, first seen at DHS, of weak internal security controls and skills combined with a failure to disclose important breaches and the lessons learned from those breaches.
Read more in:
NBC News: Chinese Government Suspected of Hacking into FDIC Computers
-http://www.nbcnews.com/tech/security/chinese-government-suspected-hacking-fdic-c
omputers-n609206
The Hill: Chinese government likely hacked FDIC: report
-http://thehill.com/policy/cybersecurity/287561-chinese-government-likely-hacked-
fdic-report
Computerworld: Chinese hackers blamed for multiple breaches at U.S. banking agency
-http://www.computerworld.com/article/3095295/security/chinese-hackers-blamed-for
-multiple-breaches-at-us-banking-agency.html
Ars Technica: FDIC was hacked by China, and CIO covered it up
-http://arstechnica.com/security/2016/07/fdic-was-hacked-by-china-and-cio-covered
-it-up/
Fiat Chrysler Announces Bug Bounty Program (July 13, 2016)
Automobile manufacturer Fiat Chrysler says it will pay up to US $1,500 for reported vulnerabilities in their automobiles' software. Fiat Chrysler is not the first automobile company to pay for information about vulnerabilities; Tesla established a bounty program last year. GM has a vulnerability disclosure program, but offers no payment.[Editor Comments ]
[Pescatore ]
Increasing numbers of successes show the efficiency and effectiveness of well-managed bug bounty programs, with emphasis on the "well-managed" part. It will be good to see the application security testing services industry respond and up their game against this form of competition.
[Assante ]
Vulnerability discovery efforts combined with system-of-system attack surface and path reviews are important tools in the cyber-to-physical design and testing process. The goal is to deliberately consider, reduce, and understand as many exposures as possible prior to release and ongoing version management of software-centric platforms.
Read more in:
NBC News: Fiat Chrysler Offers Hackers Bounty to Report Cyber Threats
-http://www.nbcnews.com/tech/tech-news/fiat-chrysler-offers-hackers-bounty-report
-cyber-threats-n608416
Computerworld: Generous Fiat Chrysler offers $1,500 for car security bugs - or two minutes of annual profit
-http://www.theregister.co.uk/2016/07/13/fiat_chrysler_bug_bounty/
Wired: Chrysler Launches Detroit's First 'Bug Bounty' for Hackers
-https://www.wired.com/2016/07/chrysler-launches-detroits-first-bug-bounty-hacker
s/
Ars Technica: Bug bounties and automotive firewalls: Dealing with the car hacker threat
-http://arstechnica.com/cars/2016/07/bug-bounties-and-automotive-firewalls-dealin
g-with-the-car-hacker-threat/
*************************** SPONSORED LINKS *****************************
1) Why Layered Security Strategies Dont Work and What You Can Do About It. Tuesday, July 19th, 2016 at 11:00 AM (11:00:00 EDT/US Eastern) with Navneet Singh. http://www.sans.org/info/187285
2) SANS 2016 Financial Security Survey- Help SANS determine strengths and weaknesses in financial info systems http://www.sans.org/info/187295
3) Take the SANS 2016 Cloud Security Survey & enter to win a $400 Amazon Gift Card! http://www.sans.org/info/187300
***************************************************************************
THE REST OF THE WEEK'S NEWS
US Appeals Court Sides with Microsoft in Ireland Server Case (July 14, 2016)
The US Court of Appeals for the Second Circuit in New York has reversed a lower court's decision, unanimous in their decision that Microsoft does not have to surrender customer data stored on an overseas server to the Justice Department. According to the decision, The US Stored Communications Act "does not authorize courts to issue warrants for the seizure of customer email content that is stored exclusively on foreign servers." The Justice Department had sought the contents of email messages stored on a server in Ireland as part of a drug trafficking case.[Editor Comments ]
[Murray ]
While this is an important case, it is a narrow ruling. The ruling is based, not upon Constitutional grounds, but upon the Court's reading of the law. Expect the government both to appeal and to seek changes to the law. Like the Apple "All Writs" action, this is about whether there are to be any limits on the power of the government to compel the cooperation of those who are not parties to, but mere custodians of, data belonging to others. It has major implications for how we will use the Internet.
Read more in:
Computerworld: Microsoft wins appeal over U.S. government access to emails held overseas
-http://www.computerworld.com/article/3095795/cloud-computing/microsoft-wins-appe
al-over-us-government-access-to-emails-held-overseas.html
V3: Microsoft wins court appeal over handing email stored in Ireland to US authorities
-http://www.v3.co.uk/v3-uk/news/2464974/microsoft-wins-its-court-appeal-over-hand
ing-irish-email-to-us-authorities
ZDNet: In privacy victory, Microsoft wins appeal over foreign data warrant
-http://www.zdnet.com/article/microsoft-wins-appeal-over-warrant-for-overseas-ema
ils/
The Hill: Microsoft wins landmark data storage case
-http://thehill.com/policy/cybersecurity/287763-microsoft-wins-landmark-data-stor
age-case
eWeek: Microsoft Wins Appeal in Ireland Email Case
-http://www.eweek.com/security/microsoft-wins-appeal-in-ireland-email-case.html
SC Magazine: Second Circuit rules in favor of Microsoft, gov't can't force access to email on Irish server
-http://www.scmagazine.com/second-circuit-rules-in-favor-of-microsoft-govt-cant-f
orce-access-to-email-on-irish-server/article/509647/
Clock-Based Intrusion Detection for Automobile Systems (July 14, 2016)
Researchers from the University of Michigan have developed a proof-of-concept intrusion detection tool for cars' computer systems. The Clock-based Intrusion Detection System (CIDS) creates digital fingerprints for a car's digital components using "clock skew," the fact that computers' internal clocks drift over time because of manufacturing defects and temperature. The digital fingerprints would allow the researchers to determine whether or not messages are legitimate. The researchers plan to present a paper on their findings at Usenix.[Editor Comments ]
[Pescatore ]
Back in the late 1990s, the automotive industry was considering PKI to support encryption of communications in future smart vehicles. Vehicles usually have some form of Vehicle Identification Number that is "hard coded" into the physical frame of the car, and that makes a good starting point for a trustable public key value. Future movement towards vehicle-to-vehicle communications, let alone autonomous vehicles, will require some form of secure communications.
[Murray ]
This is the second report (
-http://news.ufl.edu/articles/2016/07/extortion-extinction-researchers-develop-a-
way-to-stop-ransomware.php$
) in a week of "security research," rather than legitimized hacking. According to Walt Mossberg, in journalism, "two points make a trend." May these two cases be the start of a trend.
Read more in:
Wired: Clever Tool Shields Your Car From Hacks by Watching Its Internal Clocks
-https://www.wired.com/2016/07/clever-tool-shields-car-hacks-watching-internal-cl
ocks/
Fixes Available for Drupal Remote Code Execution Flaws (July 14, 2016)
Drupal is urging users to patch critical vulnerabilities in the content management system that could be exploited to allow remote code execution. The vulnerability is believed to affect approximately 14,000 websites. The Drupal advisory lists new releases for several affected modules.[Editor Comments ]
[Williams ]
These vulnerabilities are easily exploitable and result in unauthenticated remote code execution. The highest scoring vulnerability was rated 22/25 on Drupal's security rating scale. Admins were given a 24-hour notice that critical patches were coming. If this isn't already being exploited in the wild, it's only a short time before it will be.
Read more in:
The Register: Critical remote code execution holes reported in Drupal modules
-http://www.theregister.co.uk/2016/07/14/critical_remote_code_execution_holes_rep
orted_in_drupal_modules/
V3: Drupal issues major security fixes for flaw probably used in Panama Papers breach
-http://www.v3.co.uk/v3-uk/news/2464863/drupal-issues-major-security-fixes-for-fl
aw-probably-used-in-panama-papers-breach
ZDNet: Drupal calls on users to patch critical remote code execution vulnerabilities
-http://www.zdnet.com/article/drupal-calls-on-users-to-patch-critical-remote-code
-execution-vulnerabilities/
Drupal Advisory: Drupal contrib - Highly Critical - Remote code execution PSA-2016-001
-https://www.drupal.org/psa-2016-001
Locky Ransomware Encrypts Files Even When Computers are Offline (July 14, 2016)
A new variant of the Locky ransomware is capable of operating encrypting files on infected computers even when the malware is unable to communicate with command-and-control servers. Instead of using a unique encryption key, this version of Locky will use a predefined public key, which will be the same for all infected machines that are offline or otherwise prevent Locky from communication with the command-and-control servers.[Editor Comments ]
[Murray ]
The FBI issued guidance (
-https://www.fbi.gov/news/podcasts/thisweek/
) in the context of Locky. Little of the guidance is specific to Locky; most are things that qualify as "essential" practices (Can be done by anyone, using available resources, each only about 80%, but work together to achieve an arbitrary level of security. (Paraphrased from Peter Tippett)
-http://www.washingtonpost.com/wp-srv/liveonline/advertisers/viewpoint_tru120402.
htm
). Many of these essential measure are dismissed by security professionals because of their (80%) limitations while others are resisted in the name of convenience. However, if implemented as Dr. Tippett suggests, they will resist, not only ransom ware, but the success and cost of most other attacks.
Read more in:
Computerworld: New Locky ransomware version can operate in offline mode
-http://www.computerworld.com/article/3094720/security/new-locky-ransomware-versi
on-can-operate-in-offline-mode.html
Juniper Patches for Junos OS (July 14, 2016)
Juniper has released fixes for eight vulnerabilities in its Junos operating system. The Junos OS is used on Juniper networking and security appliances. The flaws could be exploited to gain elevated privileges, cause denial of service conditions and kernel crashes, and impersonate trusted users.[Editor Comments ]
[Williams ]
This flaw allows anyone with a self-signed certificate, claiming to be from a trusted certificate authority, to bypass validation. Organizations using Juniper devices at the boundary should consider employing hunt teams to determine whether this vulnerability was exploited previously.
Read more in:
The Register: Juniper's bug hunters fire out eight patches
-http://www.theregister.co.uk/2016/07/14/junipers_bug_hunters_fire_out_eight_patc
hes/
Computerworld: Juniper patches high-risk flaws in Junos OS
-