BlueHat IL 2018 – David Weston – Windows: Hardening with Hardware Video

The security features of modern PC hardware are enabling new trust
boundaries and attack resistance capabilities unparalleled in software
alone. These hardware capabilities help to improve resistance to a wide
range of attacks including physical attacks against DMA and disk
encryption, kernel and remote code exploits, and even application
isolation through virtualization.

In this talk, we will review the metamorphosis and fundamental
re-architecture of Windows to take advantage of emerging hardware
security capabilities. We will also examine in-depth the hardware
security features provided by vendors such as Intel, AMD, ARM and
others, and explain how Windows takes advantage of these features to
create new and powerful security boundaries and exploit mitigations.
Finally, we will discuss the new attack surface that hardware provides
and review exploit case studies, lessons learned, and mitigations for
attacks that target PC hardware and firmware.

Link to Video

Detecting Lateral Movement through Tracking Event Logs

Many recent cyberattacks have been confirmed in which malware infects a
host and in turn spreads to other hosts and internal servers, resulting
in the whole organization becoming compromised. In such cases, many
points need to be investigated. Accordingly, an approach for quickly and
thoroughly investigating such critical events, ascertaining the overall
picture of the damage as accurately as possible, and collecting facts
necessary for devising remedial measures is required.

While the configuration of the network that is targeted by an attack
varies depending on the organization, there are some common patterns in
the attack methods. First, an attacker that has infiltrated a network
collects information of the host it has infected using “ipconfig”,
“systeminfo”, and other tools installed on Windows by default. Then,
they examine information of other hosts connected to the network, domain
information, account information, and other information using “net” and
other tools. After choosing a host to infect next based on the examined
information, the attacker obtains the credential information of the
user using “mimikatz”, “pwdump”, or other password dump tools. Then, by
fully utilizing “net”, “at”, or other tools, the attacker infects other
hosts and collects confidential information.

For such conventional attack methods, limited set of tools are used in
many different incidents. The many points that need to be investigated
can be dealt with quickly and systematically by understanding typical
tools often used by such attackers, and what kind of and where evidence
is left.

For such use of tools, the Japan Computer Emergency Response Team
Coordination Center (JPCERT/CC) extracted tools used by many attackers
by investigating recently confirmed cases of targeted attacks. Then, a
research was conducted to investigate what kind of logs were left on the
server and clients by using such tools, and what settings need to be
configured to obtain logs that contain sufficient evidential
information. This report is a summary of the results of this research.
The details of traces (event logs and forensic architecture) generated
upon execution of the tools are compiled in “Tool Analysis Result Sheet”
and published on GitHub.

Tool Analysis Result Sheet
https://jpcertcc.github.io/ToolAnalysisResultSheet/

https://jpcertcc.github.io/ToolAnalysisResultSheet/

https://github.com/JPCERTCC/ToolAnalysisResultSheet

This repository summarizes the results of
examining logs recorded in Windows upon execution of the 49 tools which are
likely to be used by the attacker that has infiltrated a network.

Tool Analysis Result Sheet is created in HTML and can be checked from the
following URL.

A report that outlines and usage of this
research is published below. When using Tool Analysis Result Sheet, we
recommend you to check the report.

We hope this document is useful in incident investigation.
Article was copied from the Japan Computer Emergency Response Team Coordination Center

Cisco VPN Danger

Earlier this week Cisco revealed a major vulnerability affecting devices configured with their WebVPN clientless VPN software. This VPN software is featured in the Secure Sockets Layer (SSL) of numerous Cisco hardware devices. Companies around the world use WebVPN so that their employees can connect to the corporate intranet from the outside. The successful exploitation of this vulnerability could have potentially devastating consequences for an organization.
When WebVPN functionality is enabled, devices are vulnerable to a flaw that allows hackers to “double-free” memory on the system. To accomplish this, an attacker submits custom crafted XML messages to the WebVPN interface of the target device. The messages instruct the system to free a specific memory address multiple times, which may lead to memory leakage, giving an attacker the power to write malicious commands to memory. With this power an attacker has the ability to execute arbitrary code, monitor traffic, and corrupt memory. This flaw can even be exploited for the purposes of a DDoS attack by forcing the system to continuously reboot itself.

Figure 1: Affected Cisco Devices

Link: http://securityaffairs.co/wordpress/68424/security/cisco-asa-critical-flaw.html

The vulnerability has been labeled CVE-2018-0101 and has been given a 10/10, or critical rating, on the Common Vulnerability Scoring System (CVSS) scale. WebVPN is often enabled on edge firewalls, meaning that is possible for an attacker to exploit this from the outside over the Internet. Although this vulnerability seems simple to exploit, successfully crafting the necessary XML messages would require a deep understanding of the system memory layout of an affected device. Patches for the vulnerability have been released; however it is the responsibility of the company to make sure they are applied. We have yet to observe any exploits built to take advantage of this flaw, but this warning should not be taken lightly as successful exploitation would likely lead to massive consequences.

Sources:
• https://arstechnica.com/information-technology/2018/01/cisco-drops-a-mega– vulnerability-alert-for-vpn-devices/
• http://searchsecurity.techtarget.com/news/252434117/Critical-Cisco-ASA– vulnerability-patched-against-remote-attacks

Source CIP report

Changes to Office and Windows servicing and support

This is a summary of a blog post on Microsoft site the full article can be found here.

Servicing extensions for Windows 10

Windows 10 is being adopted rapidly
by organizations of all sizes, and as customers deploy the product they
are implementing a modern servicing methodology we refer to as Windows as a service.
Many customers – including MARS, Independence Blue Cross, and Accenture
– have made significant progress in moving to Windows as a Service, but
some have requested an extension to the standard 18 months of support
for Windows 10 releases.  To help these customers, we are announcing an
additional six months of servicing for the Enterprise and Education
editions of Windows 10, versions 1607, 1703, and 1709. (Additional
servicing for Windows 10, version 1511 was announced
in November.)  This extension will be offered via normal channels.  The
chart below outlines the impact of these extensions for each of the
last four Windows 10 releases.
Release
Release date
End of support
End of additional servicing for Enterprise, Education
Windows 10, version 1511
November 10, 2015
October 10, 2017
April 10, 2018
Windows 10, version 1607
August 2, 2016
April 10, 2018
October 9, 2018
Windows 10, version 1703
April 5, 2017
October 9, 2018
April 9, 2019
Windows 10, version 1709
October 17, 2017
April 9, 2019
October 8, 2019
We will also offer additional paid servicing
options for Windows 10 Enterprise and Education releases starting with
Windows 10 version 1607. For more information, contact your Microsoft
account team.
Office 2019
Last year at Ignite, we announced Office
2019 – the next perpetual version of Office that includes apps
(including Word, Excel, PowerPoint, and Outlook, and Skype for Business)
and servers (including Exchange, SharePoint, and Skype for Business).
Today we’re pleased to share the following updates:
  • Office 2019 will ship in H2 of 2018. Previews of the new apps and servers will start shipping in the second quarter of 2018.
  • Office 2019 apps will be supported on:
    • Any supported Windows 10 SAC release
    • Windows 10 Enterprise LTSC 2018
    • The next LTSC release of Windows Server
  • The Office 2019 client apps will be
    released with Click-to-Run installation technology only. We will not
    provide MSI as a deployment methodology for Office 2019 clients. We will
    continue to provide MSI for Office Server products.
Office 2019 will provide 5 years of mainstream support and approximately
2 years of extended support. This is an exception to our Fixed
Lifecycle Policy to align with the support period for Office 2016.
Extended support will end 10/14/2025

Data Privacy Day 2018 – Live From LinkedIn Event Highlights

In honor of Data Privacy Day – an international effort held annually on Jan. 28 to generate awareness about the importance of respecting privacy, safeguarding data and enabling trust – the National Cyber Security Alliance (NCSA) hosted a daylong event streamed live from LinkedIn’s offices in San Francisco, CA, on Thursday, Jan. 25. The event showcased fast-paced, cutting-edge discussions and TED-style talks with leading experts focusing on what businesses and consumers must know about privacy.

The day’s discussions focused on the following privacy hot topics:

  • Looking Into a Crystal Ball: What Your Data Says About You
  • Five Things You Can Do to Manage Your Privacy Now
  • What You Should Know About the Internet of Me and Your Privacy
  • Tracking My Location – Business Uses and Consumer Choices
  • Staying Competitive – Why Privacy Is Good for Your Business
  • The Problem With Your Online Privacy
  • Balancing Act: Privacy and Innovation
  • What’s an Algorithm Got to Do With It?


Missed the event? Check out the full video here – and the full event recap, including photos, here

Tax Identity Theft Awareness Week

Tax Identity Theft Awareness Week is January 29 to February 2, and many
federal agencies are offering information and resources to help consumers learn
to protect themselves from tax-related identity theft and Internal Revenue
Service (IRS) imposter scams.

NCCIC/US-CERT
encourages consumers to review IRS publication Taxes.Security.Together.
and NCCIC/US-CERT Tip Preventing
and Responding to Identity Theft
. Users can also participate in a series of
free
webinars and chats
on avoiding tax identity theft, hosted by the Federal
Trade Commission, IRS, Department of Veterans Affairs, and others

Apple Releases Multiple Security Updates

Original
release date: January 23, 2018

Apple has released security updates to address vulnerabilities in multiple
products. An attacker could exploit some of these vulnerabilities to take
control of an affected system.

NCCIC/US-CERT encourages users and administrators to review Apple security pages
for the following products and apply the necessary updates:

Save up to 60% on SQL Server 2017 learning resources

SQL Server 2017 gives you the power
to build modern applications using the language of your choice,
on-premises and in the cloud, on Windows, Linux, and Docker containers.
In two new titles from Microsoft Press, explore the concepts and
methodologies of managing SQL Server databases with hands-on practice to
become a more experienced—and more efficient—database administrator.

SPECIAL OFFER: For a limited time, save 50% when you buy either SQL Server 2017 Administration Inside Out or SQL Server 2017 Administration Inside Out (Video). Even better? Add both products to cart and save 60% on your purchase*! Use discount code SQL2017 during checkout to apply discount.
 

PowerShell Core 6.0: Generally Available (GA) and Supported!

PowerShell
Core 6.0
is a new edition of PowerShell that is cross-platform
(Windows, macOS, and Linux), open-source, and built for heterogeneous
environments and the hybrid cloud.
 From the Microsoft Blog
 
First and foremost, thank you to all
of our amazing community, especially our open-source contributors (the most
recent of which you can find on our community dashboard at https://aka.ms/PSGitHubBI) for donating your time
and energy to PowerShell Core. Whether you contributed code, tests,
documentation, issues, or even just your feedback and opinions, we are
extremely grateful for the sweat and tears that you’ve invested in PowerShell.
(For those interested in contributing, hop and over to our Contribution Guide on GitHub. You don’t have to be
a guru to help out!)

How to disrupt attacks caused by social engineering ( copied from Microsoft Secure Blog)

 5: Stages of a phishing attack

  • Phase 1: Threat actor targets employee(s) via phishing campaign
  • Phase 2: An employee opens the attack email which allows the threat
    actor access to load the malicious payload or compromise the user
    identity
  • Phase 3: The workstation is compromised, threat actor persists malware, threat actor gathers credentials
  • Phase 4: Threat actors use stolen credentials to move laterally and
    gain unsolicited access and compromise key infrastructure elements
  • Phase 5: Threat actors exfiltrate PII and other sensitive business data

There is a great article on this topic here