• Netizen: Monday Security Brief (9/23/2024)

    Today’s Topics:

    • Infiltration by Resume: How Fake North Korean Workers Tricked Over 300 U.S. Companies
    • Chinese Hackers Exploit GeoServer Flaw to Target APAC Nations with EAGLEDOOR Malware
    • How can Netizen help?

    Infiltration by Resume: How Fake North Korean Workers Tricked Over 300 U.S. Companies

    Google’s Mandiant team recently uncovered a scheme where an American collaborator helped fake North Korean IT workers land jobs at U.S. companies, raking in roughly $6.8 million over three years. The operation, known as UNC5267, involved stealing identities and using fake resumes to infiltrate over 300 companies between 2020 and 2023.

    According to Mandiant, North Korea is behind the effort, using these jobs to generate revenue, dodge sanctions, and fund its nuclear and missile programs. The IT workers, mostly based in China and Russia, use clever evasion tactics, such as fake companies and money laundering, to juggle multiple jobs at once. One individual even used over 60 stolen identities to keep the operation going.

    These workers gain access to U.S. companies through “laptop farms” run by paid facilitators, who remotely manage company devices using tools like GoToRemote, AnyDesk, and TeamViewer. The workers connect from abroad via VPNs like Astrill and avoid video chats, often producing below-average work, making them difficult to spot without strict vetting.

    In one case, security firm KnowBe4 caught a North Korean operative trying to install malware just 25 minutes after getting hired. Mandiant warns that while espionage hasn’t been confirmed yet, the high-level access these workers gain could be leveraged in the future. The report also found that many of the profiles feature AI-generated photos and fake credentials, making it tricky for employers to identify the scam during the hiring process.

    To counter these risks, Mandiant advises companies to tighten their background checks with biometric verification and ensure on-camera interviews are conducted. They also recommend monitoring remote tools and VPN usage while training HR and IT teams to spot potential hiring fraud.


    Chinese Hackers Exploit GeoServer Flaw to Target APAC Nations with EAGLEDOOR Malware

    A sophisticated cyber-espionage campaign, believed to be orchestrated by Chinese hackers, has been targeting government organizations and industries across the Asia-Pacific (APAC) region. According to research conducted by Trend Micro, the attacks exploited a recently patched vulnerability in OSGeo GeoServer GeoTools, and introduced a new malware strain dubbed EAGLEDOOR. The threat actor behind these activities, known as Earth Baxia, has been active since July 2024.

    The campaign focused on government agencies, telecommunication companies, and energy organizations in countries like Taiwan, South Korea, Vietnam, Thailand, and the Philippines. Researchers also discovered lure documents written in Simplified Chinese, suggesting that sectors within China may have been targeted as well, though more evidence is needed to confirm this.

    The identified method of intrusion involved spear-phishing emails and exploitation of a critical vulnerability in GeoServer (CVE-2024-36401, with a CVSS score of 9.8). This flaw, if exploited, allows attackers to deliver a combination of Cobalt Strike—a common tool used in post-exploitation frameworks—and the newly discovered EAGLEDOOR malware.

    EAGLEDOOR is designed for information gathering and remote control, using multiple methods to communicate with its command-and-control (C2) servers over DNS, HTTP, TCP, and even Telegram. While the first three protocols serve to monitor victim status, the core malware capabilities are driven by Telegram Bot API, allowing attackers to upload and download files, execute commands, and further infiltrate compromised systems.

    Researchers highlighted that Earth Baxia used the GrimResource and AppDomainManager injection techniques, paired with decoy files, to maintain persistence and deploy additional malware. One notable payload, dubbed RIPCOY, was hidden within a ZIP archive attachment, masquerading as a legitimate file.

    Interestingly, Earth Baxia’s tactics mirror those observed in campaigns attributed to APT41, a notorious Chinese cyber-espionage group. Both groups leveraged similar spear-phishing techniques and utilized Cobalt Strike with domains mimicking public cloud providers like Amazon Web Services (AWS) and Microsoft Azure. These domains, such as “s3cloud-azure” and “s3bucket-azure,” helped obscure their malicious activities and made detection more difficult.

    Japanese cybersecurity company NTT Security Holdings recently uncovered a cluster of activity that shares many characteristics with the Earth Baxia campaign, specifically targeting military and energy sectors in Taiwan, the Philippines, and Vietnam.

    The sophistication of these attacks highlights the evolving tactics used by Earth Baxia and other Chinese-linked APT groups. By exploiting critical vulnerabilities in software and leveraging public cloud services like AWS and Microsoft Azure, these groups can infiltrate systems while maintaining a low profile. The deployment of customized malware, such as EAGLEDOOR, underscores their adaptability and intent to exfiltrate sensitive data from high-value targets.

    While the specific end goal of these operations may still be unclear, the elevated system access gained through EAGLEDOOR and Cobalt Strike presents a significant risk for future exploitation or potential espionage.


    How Can Netizen Help?

    Netizen ensures that security gets built-in and not bolted-on. Providing advanced solutions to protect critical IT infrastructure such as the popular “CISO-as-a-Service” wherein companies can leverage the expertise of executive-level cybersecurity professionals without having to bear the cost of employing them full time. 

    We also offer compliance support, vulnerability assessments, penetration testing, and more security-related services for businesses of any size and type. 

    Additionally, Netizen offers an automated and affordable assessment tool that continuously scans systems, websites, applications, and networks to uncover issues. Vulnerability data is then securely analyzed and presented through an easy-to-interpret dashboard to yield actionable risk and compliance information for audiences ranging from IT professionals to executive managers.

    Netizen is a CMMI V2.0 Level 3, ISO 9001:2015, and ISO 27001:2013 (Information Security Management) certified company. We are a proud Service-Disabled Veteran-Owned Small Business that is recognized by the U.S. Department of Labor for hiring and retention of military veterans. 


  • Signal or Noise? The Chaos of Chinese Noise Storms

    GreyNoise Intelligence has been tracking something alarming since early 2020: a phenomenon they’ve named “Noise Storms,” which involves waves of spoofed web traffic originating from millions of IP addresses. These storms have cybersecurity experts on edge as they attempt to piece together what’s really happening. While the exact origins remain murky, GreyNoise’s research suggests a possible link to China—raising serious concerns about global internet security.


    Origins and Characteristics of Noise Storms

    Noise Storms typically involve TCP connections, though some use ICMP packets as well. Interestingly, there’s never been any UDP traffic involved, which is notable because UDP is often associated with DDoS attacks. This suggests that whoever’s behind these storms is being selective about how the traffic moves, indicating a high level of control. The precision of the attacks further points to a sophisticated player who likely has a specific agenda in mind.

    One of the key tactics in these attacks is the use of Time To Live (TTL) spoofing, which makes the traffic look like it’s hopping between legitimate network nodes. Adding to the complexity, the storms spoof window sizes to imitate traffic from various operating systems, making it even harder for cybersecurity teams to distinguish between real and fake data. What’s also puzzling is that the storms seem to avoid big players like AWS, instead focusing on other internet providers like Cogent, Lumen, and Hurricane Electric.


    Unusual Traffic Patterns and Tactics

    A current Noise Storm GreyNoise is watching involves roughly five million IPs, seemingly based in Brazil. However, deeper analysis points back to China as the true source. The Autonomous System Number (ASN) linked to the ICMP traffic is tied to a Chinese content delivery network (CDN) that supports major platforms like QQ, WeChat, and WePay. This connection has raised suspicions that a sophisticated, state-sponsored actor could be pulling the strings.

    In some recent storms, researchers found a curious and somewhat eerie detail: the ASCII string ‘LOVE’ embedded in the ICMP packets. While it seems harmless, this odd inclusion fuels theories that the storms might be more than just cyberattacks—they could be a covert communication channel or something even more complex. The timing of these storms has also coincided with significant military events, adding another layer of suspicion to their purpose.


    Suspicious Links to Chinese Infrastructure

    China’s involvement in large-scale cyber activities is nothing new, and the evidence pointing to Chinese infrastructure in these Noise Storms is a big red flag. Just this past April, the cybersecurity firm Infoblox reported on the Chinese-linked threat actor “Muddling Meerkat,” which was using China’s Great Firewall to probe the internet via DNS mail server records. It’s clear that China has leveraged its internet infrastructure for cyber espionage and other malicious actions before, and these storms might be yet another example.

    Despite years of tracking, no one has definitively figured out the true aim of these Noise Storms. Theories within the cybersecurity world range from misconfigured routers to covert communication systems to efforts to manipulate network traffic for intelligence gathering. Some even believe the storms might represent a new kind of DDoS attack designed to create congestion for nefarious purposes.

    These developments have serious implications for internet providers and cybersecurity professionals everywhere. The fact that they’re targeting specific internet infrastructure and selectively avoiding major providers points to a well-funded and highly capable adversary.

    The level of these attacks is clear. The attackers are using tactics like TTL manipulation and operating system spoofing, which make it tough to differentiate between legitimate and malicious traffic. Recent storms have set TTL values between 120 and 200, making the traffic look more like standard network behavior. Meanwhile, the selective targeting of internet providers shows that the attackers have a deep understanding of global internet infrastructure and are fine-tuning their approach to have the most impact.


    Possible Motivations Behind Noise Storms

    The frequency and persistence of Noise Storms raise big questions about the overall strategy at play. Given their connection to major Chinese platforms and the timing of certain storms with geopolitical events, it’s possible that these storms are part of a larger, state-sponsored campaign—whether for espionage, cyber warfare, or something else entirely. While much of this remains speculative, the link to Chinese infrastructure can’t be ignored.


    GreyNoise’s Call for Global Collaboration

    GreyNoise has urged security leaders to take these threats seriously and to rethink their defense strategies. Traditional methods for detecting DDoS attacks or network anomalies may not be enough to deal with threats like Noise Storms. GreyNoise stresses the need for advanced, real-time monitoring tools that can pick up on unusual patterns in TCP and ICMP traffic, as well as more proactive measures to stay ahead of these sophisticated threats.

    In the meantime, GreyNoise is continuing its investigation and has called on the cybersecurity community to help analyze the traffic associated with Noise Storms. The company has shared packet captures (PCAPs) of recent storms on its GitHub, inviting researchers to collaborate and uncover more about this mysterious activity. While much remains unknown, the persistence and evolution of Noise Storms over the past four years show that this is a threat we can’t afford to ignore.

    As this situation unfolds, it’s crucial for the cybersecurity community to stay engaged and keep exploring what these Noise Storms might mean. While the full purpose behind them is still unclear, the evidence so far points to a well-coordinated effort by a capable adversary—one whose intentions, though still a mystery, could have serious consequences if left unchecked.


    How Can Netizen Help?

    Netizen ensures that security gets built-in and not bolted-on. Providing advanced solutions to protect critical IT infrastructure such as the popular “CISO-as-a-Service” wherein companies can leverage the expertise of executive-level cybersecurity professionals without having to bear the cost of employing them full time. 

    We also offer compliance support, vulnerability assessments, penetration testing, and more security-related services for businesses of any size and type. 

    Additionally, Netizen offers an automated and affordable assessment tool that continuously scans systems, websites, applications, and networks to uncover issues. Vulnerability data is then securely analyzed and presented through an easy-to-interpret dashboard to yield actionable risk and compliance information for audiences ranging from IT professionals to executive managers.

    Netizen is an ISO 27001:2013 (Information Security Management), ISO 9001:2015, and CMMI V 2.0 Level 3 certified company. We are a proud Service-Disabled Veteran-Owned Small Business that is recognized by the U.S. Department of Labor for hiring and retention of military veterans. 

    Questions or concerns? Feel free to reach out to us any time –

    https://www.netizen.net/contact


  • Chinese Espionage Network ‘Raptor Train’ Exploits IoT Devices in Massive Botnet Operation

    Researchers at Lumen Technologies have uncovered a large botnet operation, code-named Raptor Train, orchestrated by the Chinese cyberespionage group Flax Typhoon. Unlike most botnets, this one has recruited over 200,000 routers, IP cameras, and network storage devices, building an extensive network aimed directly at military and government entities in the U.S. and Taiwan. The scale of this operation is enormous, and since its launch in May 2020, it has continued to expand, with no signs of slowing down.


    Behind the Botnet

    What makes this botnet particularly concerning is its multi-tiered structure. At the lowest level (Tier 1), everyday devices like routers, IP cameras, and network storage units aren’t just passive tools—they’re actively helping maintain the botnet’s integrity. These compromised devices perform tasks like data relay and sustaining the botnet’s communications. Moving up to Tier 2, servers are responsible for handling exploits, managing botnet activity, and directing traffic across infected nodes. The top level (Tier 3) operates through a cross-platform control app called Sparrow, which allows the attackers to execute commands in real-time, transfer files between compromised devices, and, while not yet observed, execute DDoS attacks with ease. This layered approach demonstrates the technical sophistication of the operation and the attackers’ ability to maintain and scale the botnet without significant disruption.


    Nosedive Malware: Stealthy and Dynamic Operations

    The malware behind Raptor Train is equally worrisome. Lumen’s research team, Black Lotus Labs, discovered a custom version of the infamous Mirai malware, which they have named Nosedive. This malware is exceptionally stealthy. It resides in the device’s memory, erasing traces of itself from the hard drive to avoid detection. Even more troublesome is the dynamic nature of the botnet—compromised devices rotate in and out of the network regularly. On average, a device like a router might remain part of the botnet for just 17 days before being swapped out for a new victim. This constant rotation makes it challenging for defenders to isolate and eliminate threats, as the infected devices are frequently changing, and the attackers can quickly replace lost assets.


    Exploiting Known Vulnerabilities in Consumer and Enterprise Devices

    One of the primary factors behind the botnet’s rapid spread is the exploitation of known vulnerabilities in widely used devices. The attackers are focusing on common consumer brands, such as ASUS and Mikrotik routers, Hikvision and Panasonic IP cameras, and even specific enterprise-level software like Atlassian Confluence servers and Ivanti Connect Secure appliances. In some cases, they’re using zero-day vulnerabilities to compromise the devices, while in others, they’re taking advantage of well-known security flaws that have not been patched by users. This highlights a critical issue: despite the availability of security updates, many users neglect to apply them, leaving their devices exposed to such threats.


    U.S. Government Response and the Link to Chinese State-Sponsored Activity

    In response to the growing threat, the U.S. government has stepped in. A joint advisory from the FBI, CNMF, and NSA has pointed fingers at a Chinese company, Integrity Technology Group, for its role in managing the botnet’s operations. Investigators have traced much of the botnet’s command structure back to China Unicom’s Beijing Province Network, further linking the operation to Chinese state-sponsored activity. Despite these efforts, the constant rotation of infected devices complicates the task of dismantling the botnet, meaning it could take time before significant progress is made.


    The Urgent Need for IoT Security and Patching

    Raptor Train serves as a stark reminder of the evolving tactics used by nation-state actors. By weaponizing IoT devices—items that most people don’t even consider computers—these attackers are gaining footholds in critical infrastructure systems, with potentially devastating consequences. The need to prioritize patching and securing IoT devices has never been more urgent. Many of these devices are deployed in homes and businesses, often with little thought given to their security, but their compromise could enable future espionage or disruption efforts on a much larger scale.


    How Can Netizen Help?

    Netizen ensures that security gets built-in and not bolted-on. Providing advanced solutions to protect critical IT infrastructure such as the popular “CISO-as-a-Service” wherein companies can leverage the expertise of executive-level cybersecurity professionals without having to bear the cost of employing them full time. 

    We also offer compliance support, vulnerability assessments, penetration testing, and more security-related services for businesses of any size and type. 

    Additionally, Netizen offers an automated and affordable assessment tool that continuously scans systems, websites, applications, and networks to uncover issues. Vulnerability data is then securely analyzed and presented through an easy-to-interpret dashboard to yield actionable risk and compliance information for audiences ranging from IT professionals to executive managers.

    Netizen is an ISO 27001:2013 (Information Security Management), ISO 9001:2015, and CMMI V 2.0 Level 3 certified company. We are a proud Service-Disabled Veteran-Owned Small Business that is recognized by the U.S. Department of Labor for hiring and retention of military veterans. 

    Questions or concerns? Feel free to reach out to us any time –

    https://www.netizen.net/contact


  • Netizen’s Insider Threat Kill Chain: Uncovering and Preventing Internal Risks

    Insider threats are a significant risk to any organization, involving individuals with legitimate access who may misuse their permissions for harmful purposes. These threats can range from malicious actions to unintentional errors. It is crucial to adopt a comprehensive approach to detection and mitigation. The Netizen Insider Threat Kill Chain provides a structured framework to address these risks, outlining key phases and strategies for effective management.


    The Netizen Insider Threat Kill Chain

    1. Reconnaissance

    The reconnaissance phase is where insiders begin gathering information about the organization. This stage involves identifying valuable assets, understanding network configurations, and probing security measures. Insiders may conduct covert research by accessing internal documentation, mapping out network structures, or exploring potential vulnerabilities. Key indicators of this phase include:

    • Unusual Access Patterns: Frequent access to sensitive files or systems that are not aligned with the individual’s typical work duties.
    • Unauthorized Use of Tools: Employment of scanning or diagnostic tools not commonly used within the organization.
    • Abnormal Querying: Searching for information or running queries that are out of the ordinary.

    Detecting these early signs can prevent the escalation of malicious activities and help in fortifying the organization’s defenses.

    2. Circumvention

    During the circumvention phase, insiders attempt to evade detection by bypassing security measures. This can involve disabling security features, using encryption to conceal data, or exploiting system vulnerabilities. Notable behaviors to watch for include:

    • Disabling Security Features: Attempts to turn off or modify antivirus software, firewalls, or other security tools.
    • Manipulating System Configurations: Unauthorized changes to system settings or security protocols.
    • Use of Anonymizing Technologies: Employing VPNs or proxy servers to mask activities.

    Monitoring for these actions is crucial as they indicate attempts to undermine security controls and can signal an imminent insider threat.

    3. Aggregation

    In the aggregation phase, insiders collect and consolidate data, preparing for its eventual exfiltration. This often involves compiling sensitive information into large files, using automated scripts to gather data, or creating archives for easy transport. Indicators include:

    • Large Data Transfers: Significant volumes of data being moved or aggregated in an unusual manner.
    • Creation of Archives: Bundling files into large zip or other archive formats that could facilitate mass data exfiltration.
    • Abnormal Clipboard Activities: Excessive copying and pasting of data or using scripts to automate data collection.

    Effective monitoring of data aggregation activities can help in identifying potential data breaches before they occur.

    4. Obfuscation

    During the obfuscation phase, insiders work to conceal their activities to avoid detection. This can involve renaming files, changing file extensions, or using encryption to hide the content. Key signs include:

    • File Renaming and Modification: Frequent changes in file names or types, or alterations that do not correspond with normal operations.
    • Use of Steganography: Hiding data within other files or using sophisticated methods to obscure data.
    • Unusual File Access Patterns: Accessing or modifying files in ways that deviate from standard practices.

    Detecting obfuscation techniques requires advanced analytics and behavioral monitoring to uncover hidden activities and potential threats.

    5. Exfiltration

    The exfiltration phase is where insiders transfer stolen data outside the organization. This can involve various methods such as using physical media, encrypted transfers, or leveraging external cloud services. Signs of exfiltration include:

    • Unusual Data Transfers: Large data uploads or downloads, particularly to external servers or cloud services.
    • Physical Media Usage: Unauthorized use of USB drives or other physical storage devices to extract data.
    • Encrypted Communications: Use of encryption for data transfers that may indicate attempts to protect the exfiltrated data from detection.

    Monitoring for these activities is essential for identifying and preventing data breaches and ensuring the security of sensitive information.


    Addressing Common Security Gaps

    Many traditional security solutions face limitations in addressing insider threats:

    • Log File-Based Analytics: Often result in false positives due to lack of context. They analyze aggregated data but may miss nuanced user behaviors.
    • Network Detection and Response (NDR): Provides insights into network traffic but may not capture the behavioral context of insider threats, leading to alert fatigue.
    • Endpoint Detection and Response (EDR): Generates extensive data that can be overwhelming and prone to misconfigurations.
    • Data Loss Prevention (DLP): Relies on static keywords and patterns, which can be insufficient for detecting sophisticated insider threat tactics.

    Comprehensive Insider Threat Management

    To overcome these gaps, a holistic insider threat management approach is needed. This involves integrating behavioral analytics, user activity monitoring, and data loss prevention into a unified system. Key features of an effective insider threat platform include:

    • Focused Observation: Employing tools for screen capture, trigger-based observations, and forensic analysis to gain deeper insights into user activities.
    • Holistic Coverage: Utilizing a combination of user and entity behavior analytics (UEBA), user activity monitoring (UAM), and data loss prevention (DLP) for comprehensive threat detection.
    • Contextual Insights: Offering detailed analysis of user actions and data interactions to enhance real-time threat detection and response.

    How Can Netizen Help?

    Netizen ensures that security gets built-in and not bolted-on. Providing advanced solutions to protect critical IT infrastructure such as the popular “CISO-as-a-Service” wherein companies can leverage the expertise of executive-level cybersecurity professionals without having to bear the cost of employing them full time. 

    We also offer compliance support, vulnerability assessments, penetration testing, and more security-related services for businesses of any size and type. 

    Additionally, Netizen offers an automated and affordable assessment tool that continuously scans systems, websites, applications, and networks to uncover issues. Vulnerability data is then securely analyzed and presented through an easy-to-interpret dashboard to yield actionable risk and compliance information for audiences ranging from IT professionals to executive managers.

    Netizen is an ISO 27001:2013 (Information Security Management), ISO 9001:2015, and CMMI V 2.0 Level 3 certified company. We are a proud Service-Disabled Veteran-Owned Small Business that is recognized by the U.S. Department of Labor for hiring and retention of military veterans. 

    Questions or concerns? Feel free to reach out to us any time –

    https://www.netizen.net/contact


  • Netizen: Monday Security Brief (9/16/2024)

    Today’s Topics:

    • Windows 11 to Redefine How Anti-Malware Tools Operate After Costly Disruption
    • Hadooken Malware: A Powerful Combo Attack of Crypto Mining and DDoS on Linux Servers
    • How can Netizen help?

    Windows 11 to Redefine How Anti-Malware Tools Operate After Costly Disruption

    The fallout from a major IT disruption in July, caused by a faulty CrowdStrike update, has spurred Microsoft to rethink how anti-malware tools interact with the Windows kernel. With billions of dollars lost and systems worldwide affected, Microsoft is now focusing on making Windows 11 more resilient by reconfiguring how third-party security vendors operate.

    In response, Microsoft plans to implement a fundamental change in how security software integrates with its operating system. Rather than allowing these tools to access the Windows kernel—an area where any malfunction can cause widespread system failures—the company is redesigning its platform so that third-party vendors can function outside of kernel mode. This effort, still in development, aims to safeguard against future disruptions like those that left CrowdStrike customers struggling during the July outage.

    David Weston, Microsoft’s Vice President of Enterprise and OS Security, outlined the company’s approach following a summit held in Redmond. Weston said the goal is to boost both security and system stability without the inherent risks that come with kernel-level access. According to him, these changes are designed to better support security vendors while increasing the flexibility and reliability of Windows-based systems.

    “Our focus is on ensuring solution providers can secure systems without needing kernel access,” Weston said. “With Windows 11, we can offer greater flexibility by moving vendors out of the kernel, while still maintaining the necessary level of protection.”

    Microsoft’s push also includes reinforcing Safe Deployment Practices (SDP) for Endpoint Detection and Response (EDR) vendors. SDP calls for a phased, controlled release of updates, which would allow any potential problems to be identified before they reach a large user base. Weston highlighted how this could prevent incidents like the July CrowdStrike update, where a single faulty release caused significant downtime and disruptions for many businesses.

    The summit addressed additional concerns, including the challenges of operating outside kernel mode and maintaining anti-tampering measures. Microsoft is particularly focused on ensuring the next generation of security tools doesn’t compromise system performance while remaining secure against cyber threats.

    As part of this broader strategy, Microsoft is encouraging vendors to share more information about their products’ stability and compatibility, not only during development but after updates are released. This transparency is meant to foster greater cooperation between Microsoft and its security partners, ensuring a more streamlined response when incidents occur.

    By overhauling how third-party tools interact with its system, Microsoft is clearly signaling a shift toward long-term reliability. The upcoming platform changes in Windows 11 could set a new precedent for how security software integrates with operating systems, minimizing the risk of widespread outages while keeping critical systems secure.


    Hadooken Malware: A Powerful Combo Attack of Crypto Mining and DDoS on Linux Servers

    A newly discovered malware campaign is targeting Linux environments by exploiting vulnerabilities in Oracle Weblogic servers to conduct cryptocurrency mining and spread botnet malware, according to cloud security researchers at Aqua Security.

    The malware, dubbed Hadooken, is designed to infiltrate Linux-based systems and deliver a double payload: a cryptocurrency miner and a distributed denial-of-service (DDoS) botnet known as Tsunami (also called Kaiten). Tsunami has previously been linked to attacks on Jenkins and Weblogic services deployed within Kubernetes environments.

    The attackers are using known vulnerabilities in Oracle Weblogic, as well as common misconfigurations, such as weak credentials, to gain an initial foothold in targeted systems. Once compromised, the system executes arbitrary code via two primary payloads—one written in Python and the other as a shell script. Both payloads are designed to retrieve Hadooken from remote servers located at “89.185.85[.]102” or “185.174.136[.]204.”

    One notable aspect of the shell script version is its ability to comb through directories containing SSH data, such as user credentials and host information. Using this data, the malware spreads laterally across connected systems, further propagating Hadooken within the targeted infrastructure.

    Once Hadooken is deployed, it drops both a cryptocurrency miner and the Tsunami botnet, the latter of which has been linked to attacks on Kubernetes environments. The malware ensures persistence by creating cron jobs that run the cryptocurrency miner periodically, keeping the malicious activity ongoing at irregular intervals to evade detection.

    Hadooken employs several defense evasion tactics, including the use of Base64-encoded payloads and disguising malicious processes under seemingly benign names such as “bash” and “java.” This technique allows the malware to blend in with legitimate system processes, reducing the likelihood of detection by security tools. Additionally, Hadooken cleans up after itself by deleting any artifacts of its malicious activity post-execution.

    Both IP addresses linked to the malware—89.185.85[.]102 and 185.174.136[.]204—are associated with the hosting company Aeza International LTD. Aeza is a bulletproof hosting provider, with operations based in Germany and links to data centers in Moscow and Frankfurt. This type of hosting service is notorious for sheltering cybercriminals, making it difficult to trace and shut down operations.

    A report from cybersecurity firm Uptycs in February 2024 had previously linked Aeza to the 8220 Gang, another cybercrime group responsible for a cryptocurrency campaign exploiting vulnerabilities in Apache Log4j and Atlassian Confluence.

    With its multi-faceted attack strategy—combining cryptocurrency mining, lateral movement, and DDoS botnet deployment—Hadooken poses a significant threat to organizations running vulnerable systems.

    Security teams managing Linux systems, especially those leveraging Oracle Weblogic or Kubernetes, should remain vigilant and ensure all vulnerabilities are patched, misconfigurations are addressed, and monitoring tools are in place to detect any suspicious activity.


    How Can Netizen Help?

    Netizen ensures that security gets built-in and not bolted-on. Providing advanced solutions to protect critical IT infrastructure such as the popular “CISO-as-a-Service” wherein companies can leverage the expertise of executive-level cybersecurity professionals without having to bear the cost of employing them full time. 

    We also offer compliance support, vulnerability assessments, penetration testing, and more security-related services for businesses of any size and type. 

    Additionally, Netizen offers an automated and affordable assessment tool that continuously scans systems, websites, applications, and networks to uncover issues. Vulnerability data is then securely analyzed and presented through an easy-to-interpret dashboard to yield actionable risk and compliance information for audiences ranging from IT professionals to executive managers.

    Netizen is a CMMI V2.0 Level 3, ISO 9001:2015, and ISO 27001:2013 (Information Security Management) certified company. We are a proud Service-Disabled Veteran-Owned Small Business that is recognized by the U.S. Department of Labor for hiring and retention of military veterans. 


  • Penetration Testing Essentials: A Quick Guide on Preparing for a Successful Assessment

    Penetration testing, also known as ethical hacking, is crucial for assessing and improving your organization’s cybersecurity defenses. It involves simulating real-world attacks to identify weaknesses and evaluate how well your defenses hold up. Proper preparation is key to making sure the test yields useful insights and aligns with your security goals.

    Here’s a guide to help you prepare effectively for a penetration test, ensuring you get the most out of the assessment and strengthen your organization’s security posture.


    1. Define Technical Objectives and Scope

    Objective Definition: Begin by setting clear technical goals for the penetration test. Are you focusing on network security, web application security, or perhaps something like IoT devices or cloud infrastructure? Clearly outlining your objectives will help tailor the test to meet your specific needs and business aims.

    Scope Specification: Detail what will be included in the test:

    • Network Segments: Specify which network segments (internal, external, DMZ) are to be tested.
    • Applications: Identify which web applications, APIs, or other software will be tested.
    • Systems: Outline which systems (servers, workstations, etc.) are in-scope and which are not.

    Work closely with your penetration testing provider to finalize the scope, ensuring it covers critical assets and areas of concern.


    2. Assemble a Technical Response Team

    Team Composition: Form a technical team to support the penetration testing process. This team should include:

    • IT Administrators: To manage and provide access to systems.
    • Security Analysts: To review and validate findings.
    • Compliance Officers: To ensure the test adheres to regulatory requirements.

    Clearly define roles and responsibilities for coordinating with the penetration testing team, handling technical queries, and managing access permissions.


    3. Obtain Authorization and Legal Compliance

    Authorization Documentation: Secure written authorization for the test, detailing the scope, methodologies, and any specific restrictions. Make sure your legal team reviews and approves all documents to avoid potential issues.

    Compliance Considerations: Ensure the penetration test complies with relevant industry standards and regulations, such as GDPR, HIPAA, or PCI-DSS. Include provisions for handling sensitive data and maintaining data protection throughout the process.


    4. Prepare the Environment

    System Backups: Perform full backups of critical systems and data to ensure you can recover any lost or altered data resulting from the test.

    Access Control: Provide the penetration testing team with necessary credentials and access while making sure security controls don’t interfere with the test. This includes:

    • Network Access: Ensure access to required network segments.
    • Application Access: Provide credentials for web applications and APIs, if they are included in the test.
    • Security Controls: Temporarily adjust or disable certain security measures, like Intrusion Detection Systems (IDS), based on agreements with the testing provider.

    5. Communicate Technical Details

    System Information: Share relevant technical details with the penetration testing team, including:

    • Network Diagrams: Detailed network topology diagrams.
    • Application Architecture: Information on application structures, dependencies, and third-party integrations.
    • Vulnerability History: Known vulnerabilities and recent changes to the environment.

    Maintain open communication with the testing team to address any technical issues or questions that arise during the test.


    6. Define Reporting and Remediation Processes

    Reporting Requirements: Specify how the test results should be documented and reported. The report should include:

    • Detailed Findings: Descriptions of identified vulnerabilities, including technical details, risk assessments, and exploitability.
    • Recommendations: Actionable steps and best practices for addressing the vulnerabilities.

    Remediation Planning: Develop a structured approach for addressing findings, including:

    • Prioritization: Rank vulnerabilities based on their risk and impact.
    • Action Plan: Assign tasks and deadlines for remediation efforts.
    • Verification: Plan for retesting to ensure vulnerabilities have been resolved.

    7. Post-Test Activities

    Findings Review: Thoroughly review the test findings with your internal security team. Analyze the implications of each vulnerability and its potential impact on your organization.

    Remediation Implementation: Address the vulnerabilities identified in the test according to your action plan. This may involve:

    • Patch Management: Applying patches or updates to affected systems.
    • Configuration Changes: Adjusting system or network configurations to mitigate risks.
    • Security Enhancements: Implementing additional security measures or controls.

    Follow-Up Testing: Schedule follow-up penetration tests to verify that remediation efforts have been effective and to evaluate your current security posture. This helps ensure continuous improvement and resilience against evolving threats.


    How Can Netizen Help?

    At Netizen, we make sure security is built into your IT infrastructure from the start, not just added as an afterthought. With our CISO-as-a-Service, you get the expertise of top-tier cybersecurity professionals without the cost of a full-time executive.

    We offer a comprehensive suite of services including compliance support, vulnerability assessments, and penetration testing tailored to businesses of all sizes. Our automated assessment tool continuously scans your systems, websites, applications, and networks, providing actionable insights through an intuitive dashboard.

    As an ISO 27001:2013, ISO 9001:2015, and CMMI V 2.0 Level 3 certified company, and a Service-Disabled Veteran-Owned Small Business recognized for our commitment to veterans, Netizen is dedicated to delivering high-quality, reliable cybersecurity solutions.

    Questions or concerns? Feel free to reach out to us any time –

    https://www.netizen.net/contact


  • Navigating the Landscape of Modern Network Security

    Network security is more than a technical requirement—it’s a vital part of maintaining organizational strength. As technology advances and cyber threats grow more sophisticated, protecting network systems has become increasingly complex. From cloud setups to IoT devices, ensuring robust network security now requires a multi-layered approach to safeguard data and keep operations running smoothly.

    In this article, we’ll explore the latest developments and best practices in network security. You’ll find a detailed look at the solutions that are defining the field, whether you’re handling cloud environments, countering advanced cyber threats, or dealing with regulatory issues. We’ll cover essential technologies such as cloud security, intrusion detection, and digital forensics, and highlight key features, benefits, and top vendors. By the end, you’ll have a solid grasp of how to strengthen your organization’s security and tackle the challenges of today’s fast-paced digital environment.


    Cloud Security: Adopting a Multi-Layered Approach

    Cloud security demands more than traditional measures; it requires a comprehensive strategy that integrates both technological and human factors. As organizations increasingly rely on cloud environments, securing these platforms involves deploying tools like Secure Access Service Edge (SASE), Identity and Access Management (IAM), and Data Loss Prevention (DLP). However, it’s equally important to focus on user behavior and education. Regular security training programs can help mitigate human error, a significant vulnerability in cloud environments.

    Advanced features in cloud security include AI-powered anomaly detection, which uses artificial intelligence to identify unusual patterns in cloud usage and enables real-time responses to potential breaches. Automated policy enforcement is another key feature, applying security policies across the cloud infrastructure to ensure compliance and ease the burden on IT teams. Major vendors such as Microsoft Azure and Amazon Web Services (AWS) offer comprehensive cloud security suites, making them essential for enterprises transitioning to the cloud.


    Intrusion Detection and Prevention Systems (IDPS): Evolving Defense Mechanisms

    Intrusion Detection and Prevention Systems (IDPS) must go beyond simple threat detection to incorporate proactive defense mechanisms. Modern IDPS solutions, like those from Palo Alto Networks and Cisco, utilize machine learning algorithms to adapt to new threat vectors continuously. This dynamic approach provides a robust defense that evolves alongside emerging threats.

    Key enhancements in IDPS include behavioral analytics, which analyzes normal user and network behavior to identify anomalies indicating potential intrusions. This reduces false positives and ensures timely threat response. Additionally, integrating IDPS systems with global threat intelligence networks allows for real-time updates on emerging threats, enhancing protection and response times.


    Digital Forensics: Advancing Incident Response

    Digital forensics is increasingly vital as threats become more sophisticated. Modern forensic tools, such as those from Guidance Software and Cellebrite, not only collect evidence but also analyze it in real-time. This capability provides actionable insights that can guide immediate remediation efforts.

    Advanced forensic capabilities include cross-platform analysis, which enables investigations across various platforms, including cloud environments and mobile devices. Chain of custody management is another crucial aspect, with automated features ensuring that digital evidence is handled and documented correctly, which is essential for legal and internal investigations.


    DDoS Protection: Advanced Strategies for Ensuring Uptime

    Distributed Denial of Service (DDoS) attacks are growing in sophistication, necessitating advanced defense strategies that combine on-premise and cloud-based solutions. Companies like Akamai and Cloudflare lead the way with hybrid solutions that automatically detect and mitigate attacks before they impact critical systems.

    Enhanced DDoS mitigation techniques include AI-driven traffic analysis, which distinguishes between legitimate and malicious traffic in real-time, and scalable defense architectures that adapt to increasing traffic volumes, ensuring network availability during large-scale attacks.


    Rootkit Scanning and Removal: Addressing Stealthy Threats

    Rootkit detection has evolved significantly, with modern solutions capable of identifying sophisticated threats at the kernel level. Continuous monitoring and real-time scanning are critical for environments where rootkits can remain undetected for long periods.

    Next-generation rootkit protection includes behavior-based detection, which analyzes system behavior to identify potential rootkits, and automated remediation, which isolates and removes detected rootkits to minimize system impact and downtime.


    Container and Kubernetes Security: Securing Modern Application Environments

    The rise of containerization presents new security challenges, particularly in vulnerability management and runtime security. Tools from companies like Aqua Security and Sysdig offer end-to-end security for containerized environments, integrating with CI/CD pipelines to embed security in the development process from the start.

    Comprehensive container security features include image scanning to ensure container images are free from known vulnerabilities before deployment, and runtime protection that monitors containers in real-time for suspicious activity, mitigating threats as they arise.


    Governance, Risk, and Compliance (GRC): Strategic Role in Cybersecurity

    Governance, Risk, and Compliance (GRC) solutions are increasingly important as regulatory requirements become more stringent and cyber threats more pervasive. Tools from vendors like RSA and MetricStream provide comprehensive frameworks for managing risk, ensuring compliance, and aligning security efforts with business objectives.

    Advanced GRC capabilities include risk quantification, which helps prioritize security investments based on potential impact, and automated compliance reporting, which generates accurate, up-to-date reports to maintain regulatory standing and avoid fines.


    How Can Netizen Help?

    Netizen ensures that security gets built-in and not bolted-on. Providing advanced solutions to protect critical IT infrastructure such as the popular “CISO-as-a-Service” wherein companies can leverage the expertise of executive-level cybersecurity professionals without having to bear the cost of employing them full time. 

    We also offer compliance support, vulnerability assessments, penetration testing, and more security-related services for businesses of any size and type. 

    Additionally, Netizen offers an automated and affordable assessment tool that continuously scans systems, websites, applications, and networks to uncover issues. Vulnerability data is then securely analyzed and presented through an easy-to-interpret dashboard to yield actionable risk and compliance information for audiences ranging from IT professionals to executive managers.

    Netizen is an ISO 27001:2013 (Information Security Management), ISO 9001:2015, and CMMI V 2.0 Level 3 certified company. We are a proud Service-Disabled Veteran-Owned Small Business that is recognized by the U.S. Department of Labor for hiring and retention of military veterans. 

    Questions or concerns? Feel free to reach out to us any time –

    https://www.netizen.net/contact


  • DevOps and DevSecOps: Key Differences and Integrations

    In today’s fast-paced software development world, terms like DevOps, DevSecOps, and security posture are frequently discussed. These concepts help streamline complex processes but can sometimes lead to confusion if not used correctly. DevOps and DevSecOps, in particular, are pivotal to modern development practices, yet they are often misunderstood.

    DevOps, a concept introduced in 2009, represents a move towards integrating development and operations teams to speed up deployment, reduce failures, and enable faster recovery. Despite its goals, many organizations find that the practical application of DevOps doesn’t always meet the ideal vision. DevSecOps builds on the principles of DevOps, incorporating security into the development process from the beginning.


    Core Aspects of DevOps and How They Evolve with DevSecOps

    Agile Methodology

    The Agile methodology, integral to DevOps, promotes shorter development cycles and quick iterations, allowing teams to respond rapidly to customer feedback. However, traditional Agile practices often did not account for operational feedback and security needs, treating them as secondary. DevSecOps addresses these gaps by integrating security considerations early in the Agile process, making security a priority from the outset.

    Container Technologies

    Container technologies have transformed the Software Development Lifecycle (SDLC) by enabling developers to work independently of operational resources. This separation, while boosting development speed, often resulted in a disconnect between development and operations, with security being overlooked. Tools like Kubernetes now help collaboration between development and operations, and DevSecOps ensures that security is integrated into these containerization and orchestration processes.

    Automation

    Automation is crucial in both DevOps and DevSecOps, enabling efficient development and deployment. While DevOps focuses on automating code integration, testing, and deployment, DevSecOps takes it further by adding automated security checks into Continuous Integration (CI) pipelines. This approach provides developers with immediate feedback on security issues, helping them address vulnerabilities without delaying development.

    In DevSecOps, security teams act as partners rather than obstacles. They provide secure base images and implement automated checks to maintain a secure codebase. This collaboration makes security a seamless part of the development process.

    Everything as Code

    The “everything-as-code” principle is central to both DevOps and DevSecOps. DevOps emphasizes version-controlled, repeatable infrastructure and application configurations. DevSecOps extends this by applying the same principles to security, with YAML files defining security policies and permissions. This ensures that security is consistent and transparent, with all configurations undergoing rigorous version control and collaboration.

    Proper documentation is essential for maintaining a secure and efficient development environment. Documenting pipeline configurations and security practices prevents the loss of knowledge and supports shared learning across the organization.

    Communication and Collaboration

    Effective communication and collaboration are key to both DevOps and DevSecOps. DevOps breaks down barriers between development and operations teams, fostering a culture of trust and shared responsibility. DevSecOps builds on this by making security a shared responsibility that involves ongoing dialogue between development, operations, and security teams.

    Intent plays a critical role in this collaboration. Misunderstandings about the goals of each team can hinder effectiveness. Security teams are often seen as obstacles to rapid development, but they are essential in protecting the organization. Development teams, while focused on meeting deadlines, must also understand the importance of security. Bridging this gap requires a cultural approach that values security as integral to development.


    Looking Ahead with DevSecOps

    As organizations increasingly adopt DevSecOps, several practices are becoming essential:

    • Short Iterative Cycles: Embedding automated security checks in each iteration ensures continuous evaluation and improvement.
    • Consistent Environments: Applying uniform security controls across all environments reduces vulnerabilities.
    • Version-Controlled CI Pipelines: Rigorous version control over CI pipelines supports post-incident analysis and ongoing improvement.
    • Thorough Documentation: Declarative methods for documenting security policies help retain and share knowledge.
    • Cultural Change: Encouraging a culture that embraces security as a shared responsibility is vital for DevSecOps success.

    DevSecOps is more about fostering a culture of collaboration and commitment to security than about specific tools. While tools play a role, the methodology’s success relies on teamwork and a shared focus on security. The future of DevSecOps depends on its ability to adapt and evolve, keeping security at the forefront of software development.

    Embracing DevSecOps enables organizations to build more secure, reliable, and efficient software, making security a foundational element of success.


    How Can Netizen Help?

    Netizen ensures that security gets built-in and not bolted-on. Providing advanced solutions to protect critical IT infrastructure such as the popular “CISO-as-a-Service” wherein companies can leverage the expertise of executive-level cybersecurity professionals without having to bear the cost of employing them full time. 

    We also offer compliance support, vulnerability assessments, penetration testing, and more security-related services for businesses of any size and type. 

    Additionally, Netizen offers an automated and affordable assessment tool that continuously scans systems, websites, applications, and networks to uncover issues. Vulnerability data is then securely analyzed and presented through an easy-to-interpret dashboard to yield actionable risk and compliance information for audiences ranging from IT professionals to executive managers.

    Netizen is an ISO 27001:2013 (Information Security Management), ISO 9001:2015, and CMMI V 2.0 Level 3 certified company. We are a proud Service-Disabled Veteran-Owned Small Business that is recognized by the U.S. Department of Labor for hiring and retention of military veterans. 

    Questions or concerns? Feel free to reach out to us any time –

    https://www.netizen.net/contact


  • Microsoft September 2024 Patch Tuesday: 79 Vulnerabilities, 3 Actively Exploited Zero-Days

    Summary of Critical Updates

    Microsoft’s September 2024 Patch Tuesday addresses a total of 79 vulnerabilities, including four zero-days, three of which have been actively exploited. Seven critical vulnerabilities were patched this month, primarily focusing on remote code execution (RCE) and elevation of privilege (EoP) flaws.

    The breakdown of vulnerabilities patched includes:

    • 30 Elevation of Privilege (EoP) vulnerabilities
    • 23 Remote Code Execution (RCE) vulnerabilities
    • 11 Information Disclosure vulnerabilities
    • 8 Denial of Service (DoS) vulnerabilities
    • 4 Security Feature Bypass vulnerabilities
    • 3 Spoofing vulnerabilities

    For additional details on non-security updates, you can explore the latest Windows 11 KB5043076 and Windows 10 KB5043064 cumulative updates.


    Zero-Day Vulnerabilities

    1. CVE-2024-43491 | Windows Update Remote Code Execution (RCE):
      This vulnerability affects the Windows Update mechanism and primarily targets Windows 10 Enterprise 2015 LTSB and IoT versions. It was rated as a critical zero-day with a CVSS score of 9.8 and has been exploited in the wild, albeit indirectly. The issue stems from an incorrect handling of optional components in the Servicing Stack, which causes rollbacks of previously patched vulnerabilities. While Microsoft found no direct exploitation, observed rollbacks of previously exploited CVEs led them to assess this flaw as actively exploited.
    2. CVE-2024-38217 | Windows Mark of the Web (MOTW) Security Feature Bypass:
      Exploited in the wild and publicly disclosed before patching, this vulnerability affects the security feature designed to mark files downloaded from the internet. Attackers can trick users into opening specially crafted files that bypass MOTW protections, making it easier to launch malicious code. The flaw had been exploited for over six years, with the earliest exploitation dating back to 2018.
    3. CVE-2024-38014 | Windows Installer Elevation of Privilege (EoP):
      This zero-day targets the Windows Installer and allows attackers to gain SYSTEM-level privileges once exploited. Though the exact method of exploitation has not been disclosed, this vulnerability could be used in post-compromise scenarios, enabling attackers to escalate their control over compromised networks.
    4. CVE-2024-38226 | Microsoft Publisher Security Feature Bypass:
      Affecting Microsoft Publisher, this vulnerability allows attackers to bypass Office macro protections by getting users to download specially crafted files. Exploited in the wild, this flaw poses a significant risk since it undermines one of the core defenses against malicious macros in Office documents.

    Other Critical Vulnerabilities:

    1. CVE-2024-43491 | Windows Update RCE:
      The most severe vulnerability this month, affecting optional components in Windows Update, poses an extreme risk because successful exploitation could revert previously mitigated vulnerabilities, enabling attackers to re-exploit older flaws. The issue impacts several optional features, including Internet Explorer 11, .NET Framework, and Windows Media Player.
    2. CVE-2024-38018 | Microsoft SharePoint Server RCE:
      This vulnerability allows attackers with authenticated access to execute arbitrary code on Microsoft SharePoint Server with a CVSS score of 8.8. While Microsoft has not disclosed exact exploit methods, an attacker could leverage page creation permissions to inject malicious code into SharePoint environments.
    3. CVE-2024-26186, CVE-2024-26191 | SQL Server Native Scoring RCE:
      A cluster of six RCE vulnerabilities in Microsoft SQL Server Native Scoring poses risks for data integrity. While rated important with a CVSS score of 8.8, the vulnerabilities allow authenticated attackers to manipulate pre-trained models and apply them to their data without leaving the database. These flaws could escalate to RCE if combined with other exploits or security misconfigurations.

    Adobe and Other Vendor Updates:

    In addition to Microsoft’s patches, Adobe released updates addressing vulnerabilities across its product line. Key updates include:

    • Adobe Acrobat and Reader: Addressing 17 vulnerabilities, some of which were rated as critical, allowing for remote code execution.
    • Adobe Photoshop: Five vulnerabilities were addressed, primarily focusing on memory corruption flaws that could lead to RCE.
    • Adobe After Effects: A smaller update, fixing two vulnerabilities related to security feature bypass.

    Active exploitation of some Adobe products is suspected, particularly in Adobe Reader, where malicious PDFs can be used to exploit vulnerabilities before users have a chance to update.


    Best Practices for Users

    Given the critical nature of these updates, it is crucial for users to stay up-to-date with the latest security patches from Microsoft and Adobe. While it’s recommended to install these updates promptly, waiting a day or two can be prudent. This approach allows time for any immediate issues with the updates to be addressed. Furthermore, backing up data or imaging the Windows drive before applying new updates can prevent data loss in case of problems during the update process.

    To mitigate risks associated with the vulnerabilities addressed in September’s Patch Tuesday, users are encouraged to:

    • Update promptly: Apply security updates as soon as possible to avoid exposure to actively exploited vulnerabilities.
    • Back up data: Before installing updates, ensure that important data is backed up in case any system issues arise during patch deployment.
    • Monitor trusted sources: Stay informed on further developments by monitoring trusted resources like the SANS Internet Storm Center and vendor-specific advisories for any post-update complications or new attack vectors.

    By following these practices, users can reduce their risk of falling victim to attacks targeting unpatched vulnerabilities.


    How Can Netizen Help?

    Netizen ensures that security gets built-in and not bolted-on. Providing advanced solutions to protect critical IT infrastructure such as the popular “CISO-as-a-Service” wherein companies can leverage the expertise of executive-level cybersecurity professionals without having to bear the cost of employing them full time. 

    We also offer compliance support, vulnerability assessments, penetration testing, and more security-related services for businesses of any size and type. 

    Additionally, Netizen offers an automated and affordable assessment tool that continuously scans systems, websites, applications, and networks to uncover issues. Vulnerability data is then securely analyzed and presented through an easy-to-interpret dashboard to yield actionable risk and compliance information for audiences ranging from IT professionals to executive managers.

    Netizen is an ISO 27001:2013 (Information Security Management), ISO 9001:2015, and CMMI V 2.0 Level 3 certified company. We are a proud Service-Disabled Veteran-Owned Small Business that is recognized by the U.S. Department of Labor for hiring and retention of military veterans. 

    Questions or concerns? Feel free to reach out to us any time –

    https://www.netizen.net/contact


  • Netizen: Monday Security Brief (9/9/2024)

    Today’s Topics:

    • CISA Responds to Controversial ‘Airport Security Bypass’ Vulnerability
    • U.S. Offers $10 Million for Info on Russian Cadet Blizzard Hackers Behind Major Attacks
    • How can Netizen help?

    CISA Responds to Controversial ‘Airport Security Bypass’ Vulnerability

    In late August 2024, cybersecurity researchers Ian Carroll and Sam Curry revealed a potentially alarming security flaw within FlyCASS, a third-party web-based application utilized by smaller airlines as part of the Cockpit Access Security System (CASS) and Known Crewmember (KCM) programs. These programs play a critical role in enabling Transportation Security Administration (TSA) security officers to verify the identity and employment status of airline crewmembers, allowing pilots and flight attendants to bypass regular security screening procedures.

    The disclosed vulnerability, an SQL injection flaw, could allegedly allow malicious actors to gain unauthorized access to the application’s administrative functions. With this access, attackers could manipulate the list of pilots and flight attendants associated with a participating airline. According to Carroll and Curry, they successfully added a fictitious employee to the database, highlighting the severity of the issue.

    “Surprisingly, there is no further check or authentication to add a new employee to the airline. As the administrator of the airline, we were able to add anyone as an authorized user for KCM and CASS,” the researchers stated. They further warned that with basic knowledge of SQL injection, an attacker could theoretically bypass airport security screening and access the cockpits of commercial airliners.

    The vulnerabilities were reported in April 2024 to several agencies, including the Federal Aviation Administration (FAA), ARINC (which operates the KCM system), and the Cybersecurity and Infrastructure Security Agency (CISA). In response, the FlyCASS service was swiftly disabled within the KCM and CASS systems, and the identified issues were patched.

    However, the researchers expressed dissatisfaction with the disclosure process. While CISA acknowledged the issue initially, the researchers allege that communication from the agency abruptly ceased, leaving them without further updates. Additionally, they criticized the TSA for issuing what they described as “dangerously incorrect statements” regarding the vulnerability, denying the severity of the findings.

    The TSA responded to the situation by downplaying the potential impact of the FlyCASS vulnerability. A TSA spokesperson emphasized that the flaw was not present in a TSA system and did not connect to any government infrastructure. The spokesperson assured that there was no impact on transportation security, and that the vulnerability had been promptly resolved by the third party responsible for the software.

    “In April, TSA became aware of a report that a vulnerability in a third party’s database containing airline crewmember information was discovered and that through testing of the vulnerability, an unverified name was added to a list of crewmembers in the database. No government data or systems were compromised and there are no transportation security impacts related to the activities,” the spokesperson said.

    Furthermore, the TSA clarified that they do not solely rely on the database in question for crewmember verification and have additional procedures in place to ensure security.

    Initially silent on the matter, CISA has now issued a statement in response to inquiries. While the statement did not provide specific details about the potential impact of the vulnerabilities, CISA confirmed its awareness and involvement in addressing the issue.

    “CISA is aware of vulnerabilities affecting software used in the FlyCASS system. We are working with researchers, government agencies, and vendors to understand the vulnerabilities in the system, as well as appropriate mitigation measures,” a CISA spokesperson stated. The agency also noted that it is actively monitoring for any signs of exploitation, though none have been observed to date.

    The disclosure of the FlyCASS vulnerability has sparked a debate over the extent of its impact and the effectiveness of the response from the involved agencies. While the researchers who discovered the flaw warn of significant security risks, the TSA maintains that the vulnerability posed no immediate threat to transportation security. As CISA and other stakeholders continue to investigate, this incident serves as a reminder of the ongoing challenges in securing critical infrastructure against evolving cyber threats.


    U.S. Offers $10 Million for Info on Russian Cadet Blizzard Hackers Behind Major Attacks

    Group of hooded hackers shining through a digital russian flag cybersecurity concept

    The U.S. government, along with a coalition of international partners, has officially linked a Russian hacking group known as Cadet Blizzard to the General Staff Main Intelligence Directorate (GRU) 161st Specialist Training Center (Unit 29155).

    “These cyber actors have been responsible for network operations targeting global entities for espionage, sabotage, and reputational damage since at least 2020,” the authorities said in a statement. “Since early 2022, their focus appears to be on disrupting efforts to provide aid to Ukraine.”

    The attacks have primarily targeted critical infrastructure and key resource sectors, including government services, financial services, transportation, energy, and healthcare sectors across NATO member states, the European Union, Central America, and Asia.

    The advisory, released last week as part of Operation Toy Soldier, is a coordinated effort involving cybersecurity and intelligence agencies from the U.S., the Netherlands, the Czech Republic, Germany, Estonia, Latvia, Ukraine, Canada, Australia, and the U.K.

    Cadet Blizzard, also known as Ember Bear, FROZENVISTA, Nodaria, Ruinous Ursa, UAC-0056, and UNC2589, first gained attention in January 2022 for deploying the destructive WhisperGate (also known as PAYWIPE) malware against multiple Ukrainian organizations in the lead-up to Russia’s full-scale invasion.

    In June 2024, Amin Timovich Stigal, a 22-year-old Russian national, was indicted in the U.S. for his role in carrying out destructive cyberattacks on Ukraine using wiper malware. However, WhisperGate is not exclusive to this group alone.

    The U.S. Department of Justice (DoJ) has also charged five officers associated with Unit 29155 with conspiracy to commit computer intrusions and wire fraud conspiracy. These charges cover a wide range of targets, including Ukraine, the U.S., and 25 other NATO nations.

    The five officers charged are:

    • Yuriy Denisov (Юрий Денисов), a colonel in the Russian military and commanding officer of Cyber Operations for Unit 29155
    • Vladislav Borovkov (Владислав Боровков), Denis Denisenko (Денис Денисенко), Dmitriy Goloshubov (Дима Голошубов), and Nikolay Korchagin (Николай Корчагин), all lieutenants in the Russian military assigned to Unit 29155 for cyber operations.

    “The defendants acted to create panic among Ukrainian citizens regarding the security of their government systems and personal data,” according to the DoJ. “Their targets included systems and data with no military or defense roles. Later, they expanded to target countries providing aid to Ukraine.”

    In conjunction with the indictment, the U.S. Department of State’s Rewards for Justice program has announced a reward of up to $10 million for information leading to the defendants’ locations or information about their cyber activities.

    Unit 29155 has been implicated in numerous destabilizing activities across Europe, including attempted coups, sabotage, influence operations, and assassination plots. Since 2020, they have extended these efforts to offensive cyber operations aimed at espionage, reputational damage, and destruction of valuable systems.

    According to the advisory, Unit 29155 is composed of junior GRU officers who collaborate with known cybercriminals and civilian enablers like Stigal to execute their missions. Their operations include website defacements, infrastructure scanning, data exfiltration, and leaking or selling sensitive data.

    Their attack methods typically begin with scanning for known vulnerabilities in platforms like Atlassian Confluence Server and Data Center, Dahua Security, and Sophos’ firewall systems. After breaching a victim’s environment, they use tools like Impacket to facilitate post-exploitation and lateral movement, ultimately exfiltrating data to designated servers.

    The advisory also mentioned that the group may have used the Raspberry Robin malware as an access broker. Another tactic involved targeting Microsoft Outlook Web Access (OWA) infrastructure with password spraying techniques to steal valid credentials.

    Organizations are urged to take immediate action to reduce their vulnerability to such attacks. Recommendations include regular system updates, prompt remediation of known vulnerabilities, network segmentation to limit the spread of malicious activity, and implementing phishing-resistant multi-factor authentication (MFA) for all externally facing account services.


    How Can Netizen Help?

    Netizen ensures that security gets built-in and not bolted-on. Providing advanced solutions to protect critical IT infrastructure such as the popular “CISO-as-a-Service” wherein companies can leverage the expertise of executive-level cybersecurity professionals without having to bear the cost of employing them full time. 

    We also offer compliance support, vulnerability assessments, penetration testing, and more security-related services for businesses of any size and type. 

    Additionally, Netizen offers an automated and affordable assessment tool that continuously scans systems, websites, applications, and networks to uncover issues. Vulnerability data is then securely analyzed and presented through an easy-to-interpret dashboard to yield actionable risk and compliance information for audiences ranging from IT professionals to executive managers.

    Netizen is a CMMI V2.0 Level 3, ISO 9001:2015, and ISO 27001:2013 (Information Security Management) certified company. We are a proud Service-Disabled Veteran-Owned Small Business that is recognized by the U.S. Department of Labor for hiring and retention of military veterans.