Defending Against COVID-19 Cyber Scams

The Cybersecurity and Infrastructure Security Agency (CISA) warns
individuals to remain vigilant for scams related to Coronavirus Disease 2019
(COVID-19). Cyber actors may send emails with malicious attachments or links to
fraudulent websites to trick victims into revealing sensitive information or
donating to fraudulent charities or causes. Exercise caution in handling any
email with a COVID-19-related subject line, attachment, or hyperlink, and be
wary of social media pleas, texts, or calls related to COVID-19.

CISA encourages individuals to remain vigilant and take the following
precautions.

Discovery of Cloud Snooper this week

    Cloud security is as important as ever as more and more services are moved to the cloud. Unfortunately misconfigured servers still exist, regardless of where they are located. A simple Google search (no Shodan required) is all it takes to find unsecured S3 buckets, which can be treasure troves of information. Let’s be real though, that type of find is low-hanging fruit that any script kiddie or automated tool can find. There’s something far more sophisticated lurking in the cloud and there’s a good chance a nation state is behind it.

    Researchers over at SophosLabs announced the discovery of Cloud Snooper this week. They were looking into infected cloud servers hosted by Amazon Web Services (AWS) when they noticed unusual traffic on a Linux server. The security groups (SGs), which are firewall rules designed to limit traffic to the server, were properly configured. But a rootkit and a backdoor were found on the system that allowed the adversary to bypass the firewall altogether.

    It all works by piggybacking malicious packets on legitimate traffic allowed by the SGs. The attacker sends these “disguised” requests to the rootkit, where they are intercepted. The malware sends the command to the backdoor. The outbound traffic is then obfuscated in the same way, giving the adversary the ability to siphon data and execute commands. The researchers noted that because
of this technique “the C2 traffic stays largely indistinguishable from the legitimate web traffic.”

    Linux servers aren’t the only ones vulnerable to Cloud Snooper – there’s also a Windows version based on the notorious Gh0st RAT. What’s worse is that it isn’t limited to cloud services either. The researchers pointed out that the technique could potentially bypass nearly any firewall. Security best practices will help to mitigate the threat, which includes keeping all security services and patches up to date, proper configuration management, and two-factor authentication.

Sources:

Wifi attack called Kr00k, which affects millions of devices

    Wireless network security has come a long way since the days of easily breakable Wired Equivalent Privacy (WEP). WiFi Protected Access (WPA) 2 has been the most commonly used standard since it was released in 2004 and has had very few vulnerabilities since the original release.

    This week however researchers from ESET released the details of a new attack called Kr00k, which affects millions of devices all over the world. This vulnerability can allow an attacker to read data between the device and access point as if there was no encryption at all.

    As detailed in a previous blog, device manufacturers rarely implement common standards like Bluetooth of WiFi into their products from scratch. They instead purchase and integrate one of
the many off the shelf solutions provided by Broadcom or others, tweaking for their specific use case.

    The two most popular chipsets for WiFi come from Broadcom and Cypress, both of which are vulnerable to the Kr00k attack. These chipsets are used in millions of devices including smartphones, laptops, IoT devices, etc. This means that the attacks spans nearly every manufacturer of electronics
that uses WiFi in their products.

    The attack itself is based on a bug in the access point disassociation logic. Disassociations happen via special control frames in a WiFi connection and happen all the time legitimately, whether from low signal or an intentional disconnect from an access point. When a disassociation request happens the vulnerable chipsets reset the transmit buffer with an encryption key of all zeros. This buffer is then finalized by being transmitted out using the all zero encryption key which makes it vulnerable to sniffing by a 3rd party. The transmit buffer is relatively small at only 32 kilobytes but using the attack sequentially via a script makes it possible to leak larger pieces of data given enough time. The same attack can also be used on the access point itself and is not limited to attacking a single client only.

    By using the attack on a vulnerable access point it would be possible to eavesdrop on any client connected to the wireless net-work, whether it has already been patched or not.

    After ESET researchers found the bug they responsibly disclosed it to the chipset makers and began a 120-day countdown for public disclosure. This gave manufacturers plenty of time to create a patch and start rolling it out to vulnerable devices. To make sure that your network is not vulnerable each device utilizing WiFi should be checked to make sure it is patched and up to date. It would also be wise to utilize VPN software when on untrusted networks as it may not be possible to verify that the access point is not vulnerable.

Sources:

https://threatpost.com/billions-of-devices-wifi-encryption-hack/153267/

https://www.zdnet.com/article/new-kr00k-vulnerability-lets-attackers-decrypt-wifi-packets/

Revoking Over 3 Million Digital Certificates Due To Bug

    The popular free Certificate Authority (CA), Let’s Encrypt, will be revoking mil-lions of certificates that enable Transport Layer Security (TLS), the subsequent protection of data between machines, and the positive identification of services for their customers. Digital certificates bind a public cryptographic key to a name. It binds it to a domain name in the case of web traffic utilizing the HTTPS protocol. This binding happens when a CA, also known as an issuer, certifies that the entity claiming ownership over the domain has control over the do-main in question.

    The CA announced this revocation just 24 hours prior and sent notifications out to the users affected informing them that on Wednesday 03/04/20 the digital certificates would be revoked. Let’s Encrypt explained in its announcement that the revocation was due to an error in its domain validation checking software.

    Let’s Encrypt is a free certificate issuance organization that has become wildly popular and accepted for issuing certificates. It can do this because it auto-mates and simplifies the issuance and renewal process for certificates. The automation code used by Let’s Encrypt to validate a domain is essential to the integrity of certificates that it issues. Unfortunately, a bug in this code was dis-covered, casting doubt on the legitimacy of millions of TLS certificates. Let’s Encrypt claims to secure 190 million websites. This bug affects 3 million certificates which, according to Let’s Encrypt, equates to around 12 million server names.

    The bug was found in Certificate Authority Authorization (CAA) code which checks for CAA records at the same time it validates a subscriber’s control of a domain name. A problem in the CAA domain validation code allowed subscribers to submit N domains for validation and the CAA software, instead of validating each domain, would pick one domain and validate it N times. The bug could have potentially been exploited and looks like it has been exploited numerous times as Let’s Encrypt began analyzing the highest priority certificates and immediately revoked 445 certificates that had forbidden CAA records.

    The issue for those using a revoked certificate, particularly businesses, is that users will see security warnings claiming that the site is not valid which could lead to lost sales and a damaged reputation. You can check for affected sites by downloading the list Let’s Encrypt provides on their website showing the affected domains.

Sources:

https://threatpost.com/lets-encrypt-revoke-millions-tls-certs/153413/

https://community.letsencrypt.org/t/2020-02-29-caa-rechecking-bug/114591/3

• https://nakedsecurity.sophos.com/2020/03/04/why-3-million-lets-encrypt-certificates-are-being-killed-off-today/

Vulnerability Affects Tomcat Versions for Over a Decade

     Apache Tomcat has been a popular Java servlet hosting application for over 20 years. It is used to host hundreds of thousands of websites and web applications. However, a highrisk vulnerability has recently been discovered that has remained unnoticed for 13 years.


    Researchers at Chaitin Tech, a Chinese cybersecurity firm, discovered the vulnerability and dubbed it GhostCat. The vulnerability lies in a flaw with the Tomcat Apache JServ Protocol (AJP). This protocol is similar to HTTP but runs on port 8009 and is used to communicate with Apache HTTPD web servers or oth-er Tomcat instances. Until recently, the AJP connector was enabled by default on all Tomcat servers and bound to IP address 0.0.0.0.


    This AJP flaw can be used to read and write files to a Tomcat server that the user shouldnt be able to do. This could lead to an attacker stealing configuration files, passwords, or putting scripts on the server for backdoor access. If the web server allows file uploads, it could also be abused to allow remote code execution. There are already multiple proofofconcept code examples on GitHub that have popped up since the vulnerability was made public, so it is likely that attacks are already happening in the wild.


    The GhostCat vulnerability was found in versions all the way back to Tomcat version 6.x, which was released in February of 2007. All version since then, in-cluding 7.x, 8.x, and 9.x are also affected. Chaitin researchers found the bug in early January of this year and properly informed Apache to develop patches before releasing the vulnerability information to the public. Apache has re-leased patches for supported branches (7.0.100, 8.5.51, and 9.0.31) but Tomcat 6.x was endoflife back in 2016 and has not been updated. Chaitin also updated their XRAY network scanning tool to help identify vulnerable Tomcat servers.


    There is also a mitigation for GhostCat if updating the server is not possible for some reason. The AJP connector can be disabled in the server configuration if it is not needed at all, or the listening address and/or port can be modified as well. It is highly encouraged that all server owners upgrade to the latest version as soon as possible.

 Sources

 
https://thehackernews.com/2020/02/ghostcatnewhighriskvulnerability.html#commentbox



https://lists.apache.org/thread.html/ r7c6f492fbd39af34a68681dbbba0468490ff1a97a1bd79c6a53610ef%40% 3Cannounce.tomcat.apache.org%3E




https://www.zdnet.com/article/ghostcatbugimpactsallapachetomcatversionsreleasedinthelast13years/

NSA-Developed Open Source Software

For you security professions this is a great site to get guidance and software.

 The
software listed here developed within the National Security Agency
and is available to the public for use. I encourage you to check it
out!

I would also tell you to check out  this site as well code.gov

National Security Agency released the source code of Ghidra, its reverse engineering tool

    The National Security Agency released the source code of Ghidra, its reverse engineering tool.

    This source code repository includes instructions to build on all
supported platforms (macOS, Linux, and Windows). With this release,
developers will be able to collaborate by creating patches, and
extending the tool to fit their cybersecurity needs.

    The source code is available for download at ghidra-sre.org along with the 9.1.1 patch.
Ghidra is a software reverse engineering (SRE) framework developed by NSA’s Research Directorate for NSA’s cybersecurity mission.
It helps analyze malicious code and malware like viruses, and can give
cybersecurity professionals a better understanding of potential
vulnerabilities in their networks and systems.

  • Includes a suite of software analysis tools for analyzing compiled
    code on a variety of platforms including Windows, Mac OS, and Linux
  • capabilities include disassembly, assembly, decompilation, graphing and scripting, and hundreds of other features
  • supports a wide variety of processor instruction sets and
    executable formats and can be run in both user-interactive and automated
    modes.
  • users may develop their own Ghidra plug-in components and/or scripts using the exposed API
  •    For more NSA releases, check out CODE.NSA.GOV for open source, and NSA’s Technology Transfer Program for other technology.

    Hacks of the week


    SmokeLoader Malware Found Spreading via Fake
    Meltdown/Spectre Patches



    New KillDisk Variant Hits Financial Organizations in
    Latin America



    GhostTeam Adware Can Steal Facebook Credentials


    ‘Hacking Incident’ Impacts Nearly 280,000 Medicaid
    Patients



    Hackers Hijack DNS Server of BlackWallet to Steal
    $400,000



    U.S. Cyber Command Operation Disrupted Internet
    Access of Russian Troll Factory on Day of 2018 

    Midterms



    UPnP-enabled Connected Devices in the Home and
    Unpatched Known Vulnerabilities

    Denial of Service attack on the victim’s source of ad revenue, Google AdSense

        We expect services to protect themselves from fraudulent activity. Automated
    services
    tend to be particularly tempting to unscrupulous individuals that seem to think that they can pull one over
    on an unmanned operation. So it
    makes plenty of sense
    for Google AdSense to be constantly vigilant for any bot activity trying to
    extract artificial ad views to collect on the bounty of ad revenue. But what if
    our fences become cages?

        Security
    researcher Brian Krebs details a new extortion scheme that recently targeted
    one of his readers involving a Denial of Service attack on the victim’s source
    of ad revenue, Google AdSense. The attacker threatens the victim with the loss of
    revenue by flooding the victim’s website with traffic that is indicative of
    fraudulent activity. It seems obvious how a criminal mind would use fraudu-

    lent activity
    to create false views to draw upon the stone of advertising wealth, but the effort
    of keeping up with defensive algorithms might just not be worth the trouble if
    shaking down the customer is easier. Why break into the ATM when you can
    threaten the card holder?
        The extortion
    note sent to the victim details how there will be an increase in fraudulent
    traffic that will trigger an investigation by Google. This might increase ad revenue
    for a short while, but they’ll maintain the attack if they don’t pay up. The
    attacker then claims that Google will award a permanent ban if the attack persists.
    All this will go away if the victim simply pays up a five thousand dollar fee
    in the form of Bitcoin. Or at least, that’s what they claim. The attacks are
    situated best against victims who have significant traffic on their site already meaning
    that they most likely rely on that ad revenue for income and would be more
    inconvenienced by paying than they would be bankrupted otherwise the
    attacker’s efforts would all be wasted.

        Google claims that the best course of action when subject such forms of
    sabotage is to contact the AdSense help center immediately and to discontinue
    any contact with any persons who would
    threaten such fraudulent actions.
    Contacting their Ad
    Traffic Quality team will lead to an investigation into the traffic and will
    allow Google to monitor and evaluate the traffic. Hopefully this will enhance
    the ability for AdSense to employ their extensive safeguards which filter out
    any fraudulent page views to then protect both the advertisers and the
    customers of AdSense.

    Sources:

    ·       
    https://krebsonsecurity.com/2020/02/pay-up-or-well-make-google-ban-
    your-ads/
    ·       
    https://network-times.com/general/new-blackmail-mail-demands-bitcoin-
    payment-from-google-adsense-users/
    ·       
    https://threatpost.com/hacker-scheme-threatens-adsense-customers-with
    -account-suspension/152943/

    Two-Day Shutdown of U.S. Gas Pipeline complements of ransomware

        Many people believe that cybersecurity training and
    awareness isn’t important in their jobs, especially if their role isn’t
    technical. However, social engineering has led to the human element being the
    weakest link in the cybersecurity chain and attackers can be very resourceful
    and clever in their attempts. A recent attack on a U.S. natural gas compression
    facility shows just how important this awareness can be.

        The Cybersecurity and Infrastructure Security Agency
    (CISA) issued an alert this week stating that attackers had compromised the IT
    and Operation Technology (OT) networks of a natural gas compression facility.
    They deployed ransomware that encrypted data on both networks, causing a Loss
    of View event affecting Human Machine Interfaces (HMIs), data historians, and
    polling servers. Human operators could no longer monitor the status of
    operations, which lead the 
    company to enact an operational shutdown of the entire
    pipeline for 2 days while parts were replaced and backups were restored. 

        The
    attack did not result in any operational loss of control, however. 
    he attackers didn’t get into the network through some
    zero-day vulnerability or magical hacking skills: they used a spear-phishing
    campaign to get an employee to click a malicious link. The link allowed them
    access to the IT network where they were able to pivot into ICS machines due to
    a lack of segregation 
    between the corporate business network and the operations
    network. The ransomware only affected Windows-based systems and not
    Programmable Logic Controllers (PLCs).

        The CISA recommends asset owners to ensure IT and OT
    networks are segregated and provide logical zones within to help stop lateral
    movement. They also 
    recommend multi-factor authentication for remote access
    to operations net- works and a robust backup system. Another failing point in
    this attack was the lack of preparedness in the emergency response plan for
    cyberattacks: it only addressed physical safety threats.

        User training and cybersecurity awareness can go a long
    way in helping to prevent attacks like these. Humans may always be the weak
    link in cybersecurity, and it requires effort on the part of everyone in an
    organization to help protect it, no matter what their role may be.

    Sources