- Vulnerable U
- Posts
- đď¸ Vulnerable U | #029
đď¸ Vulnerable U | #029
Vegas Casinos Hacked, Zero-Days for days! Apple x 2, Adobe Reader, Cisco, Chrome, Microsoft x 2, and more!
Read Time: 8 minutes
Howdy friends!
Second edition coming to you from Hawaii - fortunate enough to still be out here, but headed home soon. Two lucky things this week: the volcano near Hilo erupted big time, largest since 2018, so we ran over there and go to see lava spewing out of the ground. Second, 2 monk seals showed up right outside our hotel room and all the employees stopped what they were doing and were videoing them, asked why it was so cool - apparently only 8 of them left on the island and they rarely come to the hotel.
Gonna be hard to leave | Lava erupting behind me! |
Going to be hard to write these from my desk after writing them from a balcony overlooking the ocean for a few days!
Buckle in - it was a CRAZY news week in infosec.
Letâs get vulnerable.
Sneak Peak at the Blog of the Week:
I recently stumbled upon a thought-provoking video featuring psychologist Dr. Russell Barkley, in which he discusses the roles of a parent in a childâs life.
In the video, Barkley suggests that parents have little to do with WHO their children are. We are born with 400+ psychological traits and short of abuse, neglect, and malnutrition, there is little that parents can do to CHANGE who their kids are. Not to say they donât impact them, but that guiding, nurturing, and creating safe environments for their children to develop and grow is all they really have control over. The personalities, abilities, and traits of children are predetermined by a unique set of genes. He goes on to say that you can not design your child. Nothing you do in your home will make them something they are not.
He describes this as a shepherd view and an engineer view. Shepherds, he says, are very powerful people. They choose the pasture to graze on, determine whether they are properly nourished, determine whether the sheep are protected from harm. âThe environment is important, but it doesnât design the sheep.â
The engineering view, however, leaves parents feeling responsible for everything. They believe they can change, mold, and design a child into the person they think they should be. And itâs simply not possible no matter how hard they try.
This concept got me thinking about leadership in technology organizations, particularly infosec. Because at our jobs leaders arenât parents and staff arenât children (not usually anyway!), I had to get a little creative, but the basic principles are the same.
We donât get to create an individual contributor, but we do get to create our teams, for the most part. Sometimes we inherit them, but often times we do get to build them. And so while Berkley sees shepherding as inherently good and engineering as inherently ineffective, I think there is value in both kinds of leadership.
Though, itâs crucial to recognize when to shift between the roles of shepherd and engineer.
When should we focus on nurturing and guiding our team members, and when is it more appropriate to concentrate on building systems, introducing technology, or altering processes?
ICYMI
đď¸ Something I wrote: I summed up what we know and what we donât know about the Microsoft Storm-0558 breach.
đ§ď¸ Something I heard: I heard a monk seal that was hanging out on a beach near my hotel. It sounded otherworldly!
đ¤ Something I said: Besides âAlohaâ - I talked about the news of the week in about ten minutes over on Youtube.
đ Something I read: This great thread on product market fit by Havlar
Vulnerable News
Starting off the crazy news week weâve had Citizen Lab being very busy warning us about Zero-Dayâs used in the wild by big spyware tools such as Pegasus. If you havenât seen this news yet, please update your iOS devices immediately. This vulnerability is a zero click takeover of your phone via just receiving an iMessage. - Ars did a good writeup on the patch and issue here.
If youâre not familiar - Citizen Lab does a lot of work tracking government backed spyware campaigns, especially when they target journalists or civilians. When they holler, I listen. (read more)
At this point Iâd not touch ManageEngine or Fortinet with a 10ft pole on my network. Especially if exposed to the Internet. CISA has put out an advisory based on in-the-wild exploits seen using this 1-2 punch of CVEs gaining initial access via ManageEngine and then exploiting FortiOS on the network to get around and escalate privileges. .(read more)
In the ongoing series of â.gov has been holding telecom feet to the fire over cybersecurity issuesâ - Verizon Business Network Services has agreed to pay over $4 million to settle allegations under the False Claims Act that it did not fully implement required cybersecurity controls in an IT service provided to federal agencies from 2017 to 2021. The issue revolves around Verizon's Managed Trusted Internet Protocol Service (MTIPS), which was supposed to offer secure connections to public internet and other networks for federal agencies but allegedly failed to meet three necessary cybersecurity controls.(read more)
This post is awesome. Even with the crazy amount of news to cover this week, I wanted to include this one since it was so good. If youâre a blue team, detection engineering, or just overall looking how to automate parts of your detection and response lifecycle this post is great. Evidence: the phishing group that has been having so much success across the internet lately (latest victim being MGM) hit Coinbase a few months back - post mortem here - Amazingly, they had the threat actor shut down in ten minutes so they didnât steal anything. Insane response time. (read more)
Lets get into the hell that Vegas has been going through:
vx-underground has been one of my favorite accounts to follow for this issue. They keep close tabs on threat actors and gave some of the most real time updates I saw on stories like this. Theyâre point here is that it didnât take some major zero-day or nation state attacker, it took impersonating an employee to the help desk.
Attacks like this are plaguing our industry and many huge orgs are falling for it. Most of the time it doesnât even take a SIM Swap.(read more)
It started at MGM but took over most of Vegas. As of writing this, weâre 3 days into the attack and Iâm still seeing videos of hotel check in lines a mile long as their computers are down.(read more)
While some of the hotels are scrambling to figure out what to do, it seems Caesars just went ahead and paid the ransom to get back online. If you do the math, these casinos make billions per day so every hour they are offline is a real impact on the income. There are no locks on the front doors of Vegas hotels because they never close. A whole floor of slot machines giving blue screens means hundreds of millions in lost revenue.
I canât say I blame them, but boy is this frustrating. Two paths here, this opens up security budgets as a case study in hundreds of millions lost in downtime so your budget doesnât seem so bad of an ask. Two, ransomware gangs are invigorated by other industries where downtime equals major revenue lost and increased payout pressure. Maybe both are true.(read more or non-paywall version)
More concerning - reports are coming out that Caesars loyalty program customer data has been stolen âŚand they havenât told the victims. This includes drivers license info and SSNs. If they donât comply with breach notification regulations soon theyâre going to be in even more hot water. Breached, gobs of lost revenue, paid ransom, and still lost data, talk about a bad week. (read more)
As more details come out, it seems more than just the slot machines are shut down. Reports are saying 100+ ESXi hypervisors have been encrypted. This also includes data exfiltration and Iâd guess a whole lot of persistence. Judging by how completely Vegas has shut down, this will take weeks to unwind. (read more)
Ok, enough about Vegas. Iâm sure weâll be combing through news on that one for a bit. Onto the next Zero-Day of the week, Cisco. They have alerted users to a zero-day vulnerability in its Adaptive Security Appliance (ASA) and Firepower Threat Defense (FTD) software, which has been exploited in Akira ransomware attacks since August. The flaw, identified as CVE-2023-20269 exists in the remote access VPN feature of the Cisco ASA and FTD. It can be exploited remotely without authentication during brute force attacks, allowing attackers to identify valid username-password pairs and establish a clientless SSL VPN session with unauthorized users. Cisco is working on security updates (aka No patch available yet) to address this vulnerability and recommends users to apply suggested workarounds in the meantime.(read more)
Kudos to this takedown operation by Meta focused at Chinese and Russian disinformation bots. The op involved thousands of fake accounts and pages across various platforms, including Facebook and Instagram, aiming to spread misinformation and influence public opinion on a range of issues including the politics of the U.S, China, and created fake articles to weaken support for Ukraine. (read more)
Coincidence? I think not. Google, Apple, Citizen Lab released some patches for Zero-Day related to WebP in Chrome. Same week as the iOS updates related to spyware groups and Pegasus. I think these are related even though it hasnât explicitly been said. - Google has released an emergency update for its Chrome browser to address a critical zero-day vulnerability, tracked as CVE-2023-4863, which was discovered being exploited in the wild. This vulnerability, located in the WebP component, could potentially allow attackers to execute arbitrary code on the affected systems.(read more)
In an always good write-up, Krebs has put all these together this week. I included this because it is a reminder of all the updates we all have to do for ourselves and our organizations this week. The urgency by people who have inside information about active exploitation on these is loud and clear. These latest CVEs are a race to patch or see more widespread weaponization.(read more)
It is seeming like a common occurrence for us to be covering a UK government or similar breach. We just talked a few weeks ago about how police information was leaked from a UK database. This time theyâre fighting off a ransomware attack paired with some more stolen information. (read more)
Weâve talked about Flax Typhoon a lot lately, now lets flex that new Microsoft naming convention and switch over to Iranian threat actors. Since February 2023, Microsoft has been tracking a high volume of password spray attacks orchestrated by an Iranian nation-state group known as Peach Sandstorm (also known as HOLMIUM, APT33, Elfin, and Refined Kitten). This group has been targeting organizations globally, especially those in the satellite, defense, and pharmaceutical sectors, to facilitate intelligence collection for Iranian state interests. The attacks involve using both publicly available and custom tools for discovery, persistence, lateral movement, and in some cases, data exfiltration. (read more)
Miscellaneous mattjay
If you use Semgrep and Hashicorp this is super useful
Woof
Security headlines over the past 2-3 days:
- Two Apple iOS, macOS zero-days
- Adobe PDF Reader 0day exploited
- Cisco ASA 0day exploited in Akira ransomware
- Google patches Chrome 0-da reported by Apple
- Microsoft Patches 2 New Exploited zero-daysStay blessed.
â Ryan Naraine (@ryanaraine)
5:37 PM ⢠Sep 12, 2023
Thanks Clint over at TLDRsec for turning me onto this one. AI powered threat modeling is a side project Iâve been dabbling with. Here is someone else doing the same:
Your 24/7 SOC Analyst when the spicy alerts are firing.
â Matt Johansen (@mattjay)
5:04 PM ⢠Sep 13, 2023
Upcoming Appearances
Iâll be on Shared Securityâs podcast with Tom Eston next week, keep an eye on his feed if you donât already:
How'd I do this edition?It's hard doing this in a vacuum. Screaming into a void. Feedback is incredibly valuable to make sure I'm making a newsletter you love getting every week. |
Extra Credit
Help us grow! If you know someone who might be interested in joining the Vulnerable U community, please share this newsletter with them!
Parting Thoughts:
Community was foundational in launching and propelling my career. Community is the only reason I can stand being in Texas during the summer months. Community is the point. Today, I invite you to embrace discomfort on the road to a more vulnerable you.
Stay safe, Matt Johansen
@mattjay