Newsletters: NewsBites

Subscribe to SANS Newsletters

Join the SANS Community to receive the latest curated cyber security news, vulnerabilities and mitigations, training opportunities, and our webcast schedule.





SANS NewsBites
@Risk: Security Alert
OUCH! Security Awareness
Case Leads DFIR Digest
Industrial Control Systems
Industrials & Infrastructure


SANS NewsBites is a semiweekly high-level executive summary of the most important news articles that have been published on computer security during the last week. Each news item is very briefly summarized and includes a reference on the web for detailed information, if possible.

Spend five minutes per week to keep up with the high-level perspective of all the latest security news. New issues are delivered free every Tuesday and Friday.

Volume XX - Issue #93

November 27, 2018

    

****************************************************************************

SANS NewsBites               November 27, 2018                Vol. 20, Num. 93

****************************************************************************


TOP OF THE NEWS


  Microsoft Describes Causes of Last Weeks Multi-Factor Authentication Problems

  German Governments Draft Router Security Guidelines

  FBI Spoofed FedEx Site to Catch Scammers


REST OF THE WEEKS NEWS


  UK Government Seizes Facebook Documents Allegedly Containing Internal Communications Related to Cambridge Analytica

  Facebook Appealing 500,000 Fine in Cambridge Analytica

  USPS Shores Up Informed Visibility API Security

  Adobe Issues Patches for Flash Flaw

  Researchers Find a Way to Evade Error-Correcting Code Rowhammer Protection

  Identity Spoofing Flaw in German Government Smart ID Card Authentication SDK is Fixed

  Amazon Short on Details About Customer Data Exposure


INTERNET STORM CENTER TECH CORNER



*****************************************************************************


-- SANS OnDemand and vLive Training


The SANS Training you want with the flexibility you need.

Get the ALL NEW 11" iPad Pro, or a Microsoft Surface Pro, or Take $350 Off with OnDemand and vLive Training. Offer ends December 5.

https://www.sans.org/online-security-training/specials/


-- Cyber Defense Initiative 2018 | Washington, DC | December 11-18 | https://www.sans.org/event/cyber-defense-initiative-2018


-- SANS Security East 2019 | New Orleans, LA | February 2-9 | https://www.sans.org/event/security-east-2019


-- SANS Amsterdam January 2019 | January 14-19 | https://www.sans.org/event/amsterdam-jan-2019


-- Cyber Threat Intelligence Summit & Training | Arlington, VA | January 21-28 | https://www.sans.org/event/cyber-threat-intelligence-summit-2019


-- SANS Las Vegas 2019 | January 28-February 2 | https://www.sans.org/event/las-vegas-2019


-- SANS London February 2019 | February 11-16 | https://www.sans.org/event/london-february-2019


-- SANS Secure Japan 2019 | Tokyo, Japan | February 18-March 2 | https://www.sans.org/event/secure-japan-2019


-- Open-Source Intelligence Summit & Training | Alexandria, VA | February 25-March 3 | https://www.sans.org/event/osint-summit-2019


-- SANS Secure Singapore 2019 | March 11-23 | https://www.sans.org/event/secure-singapore-2019


-- Can't travel? SANS offers online instruction for maximum flexibility


-- Live Daytime training with Simulcasthttps://www.sans.org/simulcast


-- Evening training 2x per week for 6 weeks with vLive | https://www.sans.org/vlive


-- Anywhere, Anytime access for 4 months with OnDemand format | https://www.sans.org/ondemand/



-- Single Course Training


SANS Mentor |  https://www.sans.org/mentor/about


Community SANS | https://www.sans.org/community/


-- View the full SANS course catalog and Cyber Security Skills Roadmap


https://www.sans.org/courses


https://www.sans.org/cyber-security-skills-roadmap

 

***************************  Sponsored By VMRay   ************************************


Get answers, not alerts. Learn how DFIR practitioners can speed up the investigation of a phishing attack from a matter of hours to as little as 15 minutes. http://www.sans.org/info/208700


*****************************************************************************


TOP OF THE NEWS

 

--Microsoft Describes Causes of Last Weeks Multi-Factor Authentication Problems


(November 26, 2018)


Microsoft has released details about the multi-factor authentication problems that affected users of Azure, Office 365, Dynamics, and other services last week. Microsoft identified three separate causes of the failure. The first two causesa latency in the systems front-end communication to cache services, and a race condition in processing responses from the back-end serverwere introduced in a code update that was rolled out to data centers between November 13 and 16. The third cause was triggered by the second and resulted in the back-end being unable to process requests from the front-end. Microsoft also acknowledged that telemetry and monitoring were not functioning properly, which delayed identification of the problems.


[Editor Comments]


[Honan] Kudos to Microsoft for being so open in their report and as with any incident you should not let it go to waste. Do read the report and see are there lessons from the report, or indeed, the incident that you can apply to your own environment.

 

Read more in:

Microsoft: Azure status history

https://azure.microsoft.com/en-us/status/history/

ZDNet: Microsoft details the causes of its recent multi-factor authentication meltdown

https://www.zdnet.com/article/microsoft-details-the-causes-of-its-recent-multi-factor-authentication-meltdown/

 

--German Governments Draft Router Security Guidelines

(November 26, 2018)

The German government has published draft guidelines for home and small business router security. The guidelines were developed with input from vendors, telecoms, and others in the industry. Manufacturers will not be required to abide by the guidelines, but those that do will be permitted to attach a sticker signifying their compliance. The list of requirements was prompted by an incident two years ago when a failed attempt by a hacker to hijack Deutsche Telekom routers crashed hundreds of thousands of routers across the country. 


[Editor Comments]


[Murray] These standards are specific to routers and should not be applied to all appliances. They do not distinguish between the very different requirements of managed enterprise routers and unmanaged SOHO wireless access points.They assume passwords as the preferred and exclusive control, instead of strong authentication or the asymmetric key solution so effectively used by Apple. They are solution oriented rather than requirements oriented. Good first try but more work is indicated.  


Read more in:


ZDNet: Germany proposes router security guidelines

https://www.zdnet.com/article/germany-proposes-router-security-guidelines/


BSI.Bund.de: BSI TR-03148: Secure Broadband Router (PDF)

https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Publikationen/TechnischeRichtlinien/TR03148/TR03148.pdf

 

--FBI Spoofed FedEx Site to Catch Scammers

(November 26, 2018)

Documents obtained by Motherboard indicate that the FBI spoofed the FedEx website in its efforts to catch scammers. According to the documents, the FBI also sent suspects Word documents that contained an image created to connect to an FBI server and reveal their IP address.


[Editor Comments]


[Henry] The use of tools to enable law enforcement to capture IP addresses of suspected criminals is not new, and their use has only increased with the widespread implementation of anonymizing technology. While the technique has had some success, it is labor intensive and sophisticated adversaries can often thwart it. The FBI would typically obtain a search warrant prior to deployment, adding to the effort and limiting the routine utility of this procedure.

 

Read more in:

Motherboard: The FBI Created a Fake FedEx Website to Unmask a Cybercriminal

https://motherboard.vice.com/en_us/article/d3b3xk/the-fbi-created-a-fake-fedex-website-to-unmask-a-cybercriminal


**************************  SPONSORED LINKS  ********************************


1)  Everyday, we find data leaks where others don't. Where's your cybersecurity blindspot? Find out... http://www.sans.org/info/208705

2) With the enSilo Endpoint Security Platform, the race against time is over. Download the November 2018 Endpoint Security Report by Cybersecurity Insiders.   http://www.sans.org/info/208710

3) Does your vulnerability management program cover your organization's cloud workloads, partner access, IoT and industrial control systems? Take the SANS Survey and enter to win a $400 Amazon gift card! http://www.sans.org/info/208715


*****************************************************************************

REST OF THE WEEKS NEWS 

 

--UK Government Seizes Facebook Documents Allegedly Containing Internal Communications Related to Cambridge Analytica

(November 22, 25, & 26, 2018)

The UK parliament has seized Facebook documents related to the Cambridge Analytica data scandal. Mark Zuckerberg ignored a request to meet with UK parliament in May. The documents include emails exchanged by Facebook executives and Zuckerberg. Facebook has demanded that the documents be returned.


Read more in:

BBC: Facebook documents seized by MPs investigating privacy breach

https://www.bbc.com/news/business-46334810

ZDNet: UK gov't seizes documents Facebook wanted to keep private in Cambridge Analytica battle

https://www.zdnet.com/article/uk-gov-seizes-documents-facebook-wanted-to-keep-private-in-data-breach-row/

 

--Facebook Appealing 500,000 Fine in Cambridge Analytica

(November 22, 2018)

In a separate but related story, Facebook is appealing a ruling from the UKs Information Commissioners office (ICO) fining the company 500,000 (US $640,600) for allowing application developers access to [user] information without sufficiently clear and informed consent, and fail[ing] to make suitable checks on apps and developers using its platform. Facebook says the penalty is not justified.


Read more in:

ZDNet: Facebook appeals 500,000 penalty over Cambridge Analytica scandal

https://www.zdnet.com/article/facebook-appeals-500000-penalty-over-cambridge-analytica-scandal/

ICO: ICO issues maximum 500,000 fine to Facebook for failing to protect users personal information (October 25, 2018)

https://ico.org.uk/about-the-ico/news-and-events/news-and-blogs/2018/10/facebook-issued-with-maximum-500-000-fine/

 
 

--USPS Shores Up Informed Visibility API Security

(November 21, 22, & 26, 2018)

The US Postal Service (USPS) has fixed an authentication vulnerability in its Informed Visibility API that could have been exploited to access the personal information of 60 million people who have usps.com accounts. The Informed Visibility service is designed for bulk mail senders to make better business decisions by providing them with access to near real-time tracking data. Because the API lacked permission validation, anyone logged into usps.com could have queried the system for information about and requested changes to other users accounts. In a separate but related issue, the USPSs Informed Delivery service was the subject of an internal memo issued by the US Secret Service, which warned that thieves were exploiting weaknesses in the system to commit fraud. 


[Editor Comments]


[Pescatore] Since APIs dont have very visible front ends, standard web app security test tools and even many pen testing engagements dont effectively test them. Good to include specific requirements for demonstrating API vulnerability testing when looking at application security tools and services.


[Neely] Security evaluation of APIs and services has to be explicitly scheduled and performed as part of the SDLC because web/application scanners will not always discover and assess them.

 

Read more in:

KrebsOnSecurity: USPS Site Exposed Data on 60 Million Users

https://krebsonsecurity.com/2018/11/usps-site-exposed-data-on-60-million-users/

Nextgov: USPS Fixed Vulnerability That Exposed The Data of 60 Million People

https://www.nextgov.com/cybersecurity/2018/11/usps-fixes-vulnerability-exposed-data-60-million-people/153029/

ZDNet: USPS finally fixes website flaw that exposed 60 million users' data

https://www.zdnet.com/article/usps-finally-fixes-website-flaw-that-exposed-60-million-users-data/

 
 

--Adobe Issues Patches for Flash Flaw

(November 20 & 21, 2018)

Adobe has released fixes for a flaw in its Flash Player that could be exploited to execute code arbitrarily. Adobe has called the issue a type confusion vulnerability, meaning that Flash could potentially execute code without verifying its type. Updates are available for Windows, macOS, Linux, and Chrome OS.


[Editor Comments]


[Murray] It is now eight years since Steve Jobs wrote his criticism of Flash.  This product is historically and persistently broken and the evidence is sufficient to conclude that this product cannot be successfully secured. There is no solution to the problem that it represents other than to stop using it.  (Apple has never used Flash in iOS.  Whatever the penalty for that, Apple has paid it and is still here. While this writer has long since sold his Adobe stock, the stock market continues to love it, warts and all.)  We will never secure our infrastructure as long as dancing pigs trump a secure desktop.  Responsible people will not continue to use this porous product.  

 

Read more in:

Cyberscoop: Adobe issues fix for Flash bug allowing remote code execution

https://www.cyberscoop.com/adobe-flash-patch-bug-remote-code-execution/

Adobe: Security updates available for Flash Player | APSB18-44

https://helpx.adobe.com/security/products/flash-player/apsb18-44.html

 
 

--Researchers Find a Way to Evade Error-Correcting Code Rowhammer Protection

(November 21 & 22, 2018)

Research published last week shows that the error-correcting code (ECC) enhancement built into memory chips as a precaution against Rowhammer attacks could be bypassed to manipulate a chips memory. ECC memory can repair bitflips. Rowhammer attacks, first documented in 2014, involve performing repeated reads or writes on specific memory locations so that they create an electrical field that flips some adjacent bits, altering the data in the memory chips. The researchers have devised a method they say can precisely flip bits in server RAM chips without triggering the ECC The issue lies in the way ECC checks for errors. One change prompts ECC to repair the flip; two flips causes ECC to crash the program. But three bits flipped would evade detection.


Read more in:

VUSec: ECCploit: ECC Memory Vulnerable to Rowhammer Attacks After All

https://www.vusec.net/projects/eccploit/

Wired: An Ingenious Data Hack is More Dangerous Than Anyone Feared

https://www.wired.com/story/rowhammer-ecc-memory-data-hack/

The Register: 3 is the magic number (of bits): Flip 'em at once and your ECC protection can be Rowhammer'd

https://www.theregister.co.uk/2018/11/21/rowhammer_ecc_server_protection/

ZDNet: Rowhammer attacks can now bypass ECC memory protections

https://www.zdnet.com/article/rowhammer-attacks-can-now-bypass-ecc-memory-protections/

Ars Technica: Potentially disastrous Rowhammer bitflips can bypass ECC protections

https://arstechnica.com/information-technology/2018/11/potentially-disastrous-rowhammer-bitflips-can-bypass-ecc-protections/

 
 

--Identity Spoofing Flaw in German Government Smart ID Card Authentication SDK is Fixed

(November 21 & 22, 2018)

A vulnerability in the software that supports Germanys electronic ID card system that could have been exploited to spoof others identities has been fixed. The issue lies in the Governikus Autent software development kit (SDK) that websites use if they choose to support or exploit this federal electronic ID authentication. The firm that detected the issue notified Bund-CERT (Germanys Computer Emergency Response Team) in August 2018; the issue was fixed in October.


Read more in:

The Register: German e-government SDK patched against ID spoofing vulnerability

https://www.theregister.co.uk/2018/11/22/german_egovernment_sdk_patched_against_id_spoofing_vulnerability/

ZDNet: German eID card system vulnerable to online identity spoofing

https://www.zdnet.com/article/german-eid-card-system-vulnerable-to-online-identity-spoofing/

SecLists: SEC Consult SA-20181121-0 :: Signature Bypass / Authentication Bypass in Governikus Autent SDK

https://seclists.org/fulldisclosure/2018/Nov/56

 
 

--Amazon Short on Details About Customer Data Exposure

(November 21, 2018)

On Wednesday, November 21, some Amazon customers received email messages notifying them that the company inadvertently disclosed [their] name and email address due to a technical error. Few details have been provided, apart from a vague reassurance that the problem has been mitigated and that customers do not need to reset their passwords.


Read more in:

ZDNet: Amazon leaks users' email addresses due to 'technical error'

https://www.zdnet.com/article/amazon-leaks-users-email-addresses-due-to-technical-error/

Ars Technica: Amazon customers names and email addresses disclosed by website error

https://arstechnica.com/information-technology/2018/11/amazon-customers-names-and-email-addresses-disclosed-by-website-error/

Cyberscoop: Amazon keeps tight-lipped about pre-Black Friday security incident

https://www.cyberscoop.com/amazon-keeps-tight-lipped-pre-black-friday-security-incident/

 

INTERNET STORM CENTER TECH CORNER

Attacks Against Docker API

https://isc.sans.edu/forums/diary/Moby+the+Shark/24340/


Mirai Like Attack Hitting Hadoop

https://asert.arbornetworks.com/mirai-not-just-for-iot-anymore/


New Rowhammer Variant Effects ECC Memory

https://www.vusec.net/projects/eccploit/


ViperMonkey: VBA Maldoc Deobfuscation

https://isc.sans.edu/forums/diary/ViperMonkey+VBA+maldoc+deobfuscation/24346/


Malicious NPM Libraries

https://medium.com/@cnorthwood/todays-javascript-trash-fire-and-pile-on-f3efcf8ac8c7


Turning Your BMC Into A Revolving Door

https://www.synacktiv.com/ressources/zeronights_2018_turning_your_bmc_into_a_revolving_door.pdf


Critical Flash Update

https://helpx.adobe.com/security/products/flash-player/apsb18-44.html


Thanksgiving Lure for Emotet

https://www.forcepoint.com/blog/security-labs/thanks-giving-emotet

 

******************************************************************************


The Editorial Board of SANS NewsBites

 

John Pescatore was Vice President at Gartner Inc. for fourteen years. He became a director of the SANS Institute in 2013. He has worked in computer and network security since 1978 including time at the NSA and the U.S. Secret Service.


Shawn Henry is president of CrowdStrike Services. He retired as FBI Executive Assistant Director responsible for all criminal and cyber programs and investigations worldwide, as well as international operations and the FBI's critical incident response.


Suzanne Vautrinot was Commander of the 24th Air Force (AF Cyber) and now sits on the board of directors of Wells Fargo and several other major organizations.


Ed Skoudis is co-founder of CounterHack, the nation's top producer of cyber ranges, simulations, and competitive challenges, now used from high schools to the Air Force. He is also author and lead instructor of the SANS Hacker Exploits and Incident Handling course, and Penetration Testing course.


Michael Assante was Vice President and Chief Security Officer at NERC, led a key control systems group at Idaho National Labs, and was American Electric Power's CSO. He now leads the global cyber skills development program at SANS for power, oil & gas and other critical infrastructure industries.


Mark Weatherford is Chief Cybersecurity Strategist at vArmour and the former Deputy Under Secretary of Cybersecurity at the US Department of Homeland Security.


Stephen Northcutt teaches advanced courses in cyber security management; he founded the GIAC certification and was the founding President of STI, the premier skills-based cyber security graduate school, www.sans.edu.


Dr. Johannes Ullrich is Chief Technology Officer of the Internet Storm Center and Dean of the Faculty of the graduate school at the SANS Technology Institute.


William Hugh Murray is an executive consultant and trainer in Information Assurance and Associate Professor at the Naval Postgraduate School.


Lee Neely is a Senior Cyber Analyst at Lawrence Livermore National Laboratory, SANS Analyst and Mentor. He has worked in computer security since 1989.


Rob Lee is the SANS Institute's top forensics instructor and director of the digital forensics and incident response research and education program at SANS (computer-forensics.sans.org).


Tom Liston is member of the Cyber Network Defense team at UAE-based Dark Matter. He is a Handler for the SANS Institute's Internet Storm Center and co-author of the book Counter Hack Reloaded.


Jake Williams is a SANS course author and the founder of Rendition Infosec, with experience securing DoD, healthcare, and ICS environments.


Dr. Eric Cole is an instructor, author and fellow with The SANS Institute. He has written five books, including Insider Threat and he is a founder with Secure Anchor Consulting.


Mason Brown is one of a very small number of people in the information security field who have held a top management position in a Fortune 50 company (Alcoa). He leads SANS' efforts to raise the bar in cybersecurity education around the world.


David Hoelzer is the director of research & principal examiner for Enclave Forensics and a senior fellow with the SANS Technology Institute.


Gal Shpantzer is a trusted advisor to CSOs of large corporations, technology startups, Ivy League universities and non-profits specializing in critical infrastructure protection. Gal created the Security Outliers project in 2009, focusing on the role of culture in risk management outcomes and contributes to the Infosec Burnout project.


Eric Cornelius is Director of Critical Infrastructure and ICS at Cylance, and earlier served as deputy director and chief technical analyst for the Control Systems Security Program at the US Department of Homeland Security.


Alan Paller is director of research at the SANS Institute.


Brian Honan is an independent security consultant based in Dublin, Ireland.


David Turley is SANS operations manager and serves as production manager and final editor on SANS NewsBites.


Please feel free to share this with interested parties via email, but no posting is allowed on web sites. For a free subscription visit https://www.sans.org/account/create