Flair Data Systems Cybersecurity Updates - 11/9/2023

My name is Brent Forrest and I serve as a vCISO at Flair Data Systems. Here is your cybersecurity update for 11/9/2023...

I hope all are doing well and enjoying the Fall weather. We are finally seeing a little Fall in the Dallas Metroplex, even a little rain! Time to get out the sweaters. We also have a little bragging to do...the Texas Rangers won the world series! It was a great way to celebrate last week as well!


For those of you who are just joining us, I send out a weekly update to my mailing list and hope to translate those same topics for a wider audience in a cybersecurity blog. I hope you enjoy the post!


Going into this week's cybersecurity update, there were a lot of pressing topics on my mind. So, let's jump into my highlights in cybersecurity news...


Critical Firepower Vulnerability 

https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-cmd-inj-29MP49hN 

https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwd02925  (requires a CCO account) 

  • CVE-2023-20048 (CVSS 9.9): Vulnerability within the web services interface of the FMC could allow an authenticated, remote attacker to execute certain unauthorized configuration commands on a FTD device that is managed by the FMC 
  • Due to insufficient authorization of configuration commands that are sent through the web service interface 
  • For successful exploitation, an attacker would need valid credentials on the FMC software 
  • Currently there are no known exploitations of this in the wild 
  • Known affected releases: 6.2.3, 6.3.0, 6.4.0, 6.5.0, 6.6.0, 6.7.0, 7.0.0, 7.1.0, 7.2.0, 7.3.0 
  • Known fixed releases: 6.4.0.17, 7.0.6, 7.2.4 

 

CVSS 4.0 Now Official 

https://www.first.org/cvss/v4-0/index.html 

https://blog.qualys.com/product-tech/2023/11/02/cvss-v4-is-now-live-and-what-do-you-need-to-know 

  • Officially gone to GA as of Nov 1st, the last revised over 8 years ago with the release of CVSS v3.0 (June 2015) 
  • Includes more granular breakdown of the Base Metrics, introduction of new nomenclature to denote combinations of Base, Threat, and Environmental metrics alongside new Base metric values for User Interaction (passive or active) 

 

MOZI Botnet Killswitch 

https://www.welivesecurity.com/en/eset-research/who-killed-mozi-finally-putting-the-iot-zombie-botnet-in-its-grave/ 

https://www.theregister.com/2023/11/01/mozi_botnet_kill_switch/ 

  • Mozi Bot, emerged in late 2019, accounted for roughly 90% of all malicious IoT network traffic 
  • In August of 2023, ESET noticed the Mozi traffic took a major slowdown, first in India (Aug 8) and then in China (Aug 16) 
  • ESET researchers found that the control payload inside a UDP message acting as the kill switch 
  • Disabling some system services 
  • Replaced the original application file 
  • Reordered some router/device configuration commands 
  • Disabled access to various ports 
  • The “who” behind the kill order is unknown but the assumption is either Chinese law enforcement or the creator 

 

Power outage darkens Cloudflare dashboard and APIs 

https://www.bleepingcomputer.com/news/security/cloudflare-dashboard-and-apis-down-after-data-center-power-outage/ 

https://www.cloudflarestatus.com/incidents/hm7491k53ppg 

  • Cloudflare is stating that the root cause of the outage is due a regional power issue caused by generator failures that took down facilities. 
  • Due to a regional outage, it affected multiple data center facilities within the state of Oregon that hosts Cloudflare’s control plane (dashboard, logging, etc.) 
  • Investigation of the regional power outage and failure of generators is ongoing with data center vendors. 
  • This outage impacted all services that rely on Cloudflare API infrastructure including Alerts, Dashboard functionality, Zero Trust, WARP, Cloudflared, Waiting Room, Gateway, Stream, Magic WAN, API Shield, Pages, and Workers 

 

Boeing says cyber incident affects parts and distribution 

https://www.cybersecuritydive.com/news/citrixbleed-patch-hunt-malicious/699164/#:~:text=%E2%80%9CWe%20are%20aware%20of%20a,law%20enforcement%20and%20regulatory%20authorities. 

https://nvd.nist.gov/vuln/detail/CVE-2023-4966 

  • CVE-2023-4966: Sensitive information disclosure in NetScaler ADC and NetScaler Gateway when configured as a Gateway (VPN virtual server, ICA Proxy, CVPN RDP Proxy) or AAA virtual server 
  • Threat actors are targeting this vulnerability to expose users to session hijacking and other threat activity 
  • Exploitation of the above vulnerability has been called CitrixBleed, where a patch was released on Oct 10 but attacks are still occurring. 
  • Rapid7 has seen activity targeting retail, healthcare, and manufacturing. 
  • Recommendation: Patch. 

 

Rightway Breach 

https://www.cybersecuritydive.com/news/okta-employees-third-party-attack/698662/ 

  • Rightway (third-party vendor to Okta) had data breached on Sept 23rd that included an eligibility census file of roughly 5k current and former employees of Okta that included names, SS#, and health insurance plan numbers 
  • This breach did not impact Okta services, but does not help the fact that Okta has experienced their own share of breaches in the recent months 

 

Okta explains hack source and response timeline 

https://www.bleepingcomputer.com/news/security/okta-says-its-support-system-was-breached-using-stolen-credentials/ 

https://sec.okta.com/harfiles 

  • Threat actors were able to access systems that contained HAR files used for troubleshooting issues, the threat actors were able to access 5 customers Okta platforms – 3 of which are known as 1Password, Cloudflare, and BeyondTrust 
  • During the investigation Okta found that an employee was signed-in to their personal Google profile on the Chrome browser of their Okta-managed laptop, where the username and password of the service account had been saved into the employee’s personal Google account 
  • It was also discovered that depending on how someone viewed the HAR files, the log entries were generated differently (log entry and ID’s were different) 
  • Multiple remediations are being put in place 
  • Disable the compromised server account (completed) 
  • Blocking the use of personal Google profiles with Google Chrome (complete) 
  • Enhance monitoring for customer support systems (complete) 
  • Binding Okta administrator session tokens based on network location (complete) 

  

Looney Tunables now being exploited 

https://www.helpnetsecurity.com/2023/11/07/kinsing-exploiting-looney-tunables/ 

https://www.helpnetsecurity.com/2023/10/05/cve-2023-4911/ 

  • Looney Tunables – 
  • CVE-2023-9841 a critical remote code execution vulnerability in the PHP testing framework PHPUnit for initial access 
  • CVE-2023-4911 a buffer overflow vulnerability in the GNU C Library’s dynamic loader to achieve root privileges on the underlying Linux distribution 
  • Kinsing (Money Libra) is a threat actor that has been active since late 2021 targeting cloud-native environments and applications to deploy cryptominers 
  • The actors have been manually probing the environment for system and user information and started a new interactive shell session 
  • They also downloaded and ran several scripts and another one that creates a webshell backdoor 

 

Lazarus Group uses KandyKorn against blockchain engineers 

https://securityaffairs.com/153622/hacking/lazarus-kandykorn-malware.html#:~:text=North%20Korea%2Dlinked%20Lazarus%20APT,interact%20with%2C%20and%20avoid%20detection. 

  • Lazarus APT group (North Korea-linked) has been seeing using the new KandyKorn macOS malware in attacks against blockchain engineers 
  • KandyKorn is an advanced implant that contains a variety of capabilities such as monitoring, interactions, and detection avoidance; and utilizes reflective loading, a direct-memory form of execution that could bypass detections 
  • Lazurus is impersonating blockchain engineering community members on a public Discord server, which then trick members to download and decompress a Zip file containing malicious Python code masquerading by an arbitrage bot 
  • Arbitrage bot is a tool that allows users to profit from cryptocurrency rate differences between platforms 

 

Mr. Cooper has experienced an incident 

https://www.bleepingcomputer.com/news/security/mortgage-giant-mr-cooper-hit-by-cyberattack-impacting-it-systems/ 

  • Mr. Cooper, a U.S. mortgage lending company based out of the DFW area shutdown its IT systems on Oct 31st due to a cyberattack, including access to the online payment portal 
  • On November 2nd, the company notified its customers of the incident – the type of attack and/if any data that was exfiltrated is unknown at this point in time. 

 

New Microsoft Exchange Zero Days 

https://www.bleepingcomputer.com/news/microsoft/new-microsoft-exchange-zero-days-allow-rce-data-theft-attacks/ 

  • Trend Micro had reported the vulnerabilities to Microsoft on September 7th and 8th, 2023 – however Microsoft decided the flaws were not severe enough to guarantee immediate servicing and postponing the fixes for later 
  • Trend Micro’s Zero Day Initiative (ZDI) posted their tracking ID’s to warn Exchange customers 
  • ZDI-23-1578: Remote Code Execution flaw in the ’ChainedSerializationBinder’ class, where user data isn’t adequately validated, allowing attackers to deserialize untrusted data 
  • Successful exploitation enables an attacker to execute arbitrary code as ‘SYSTEM’ 
  • Microsoft Response: Customers who have applied the August Security Updates are already protected. 
  • ZDI-23-1579: located in the ‘DownloadDataFromUri’ method, this flaw is due to insufficient validation of the URI before resource access 
  • Attackers can exploit it to access sensitive information from Exchange servers 
  • Microsoft Response: The technique described requires an attacker to have prior access to email credentials, and no evidence was presented that it can be leveraged to gain elevation of privilege. 
  • ZDI-23-1580: In the ‘DownloadDataFromOfficeMarketPlace’ method, also stems from improper URI validation 
  • Potentially leading to unauthorized information disclosure 
  • Microsoft Response: The technique described requires an attacker to have prior access to email credentials. 
  • ZDI-23-1581: Present in the ‘CreateAttachementFromUri’ method, this flaw resembles the previous bugs with inadequate URI validation 
  • Risking sensitive data exposure 
  • Microsoft Response: The technique described requires an attacker to have prior access to email credentials, and no evidence was presented that it can be leveraged to access sensitive customer information. 

All of the above vulnerabilities do require authentication to exploit – which made me think, why did Microsoft not prioritize fixing the bugs? 

 

Until next week, it’s Brent Forrest signing off. Be cyber safe my friends! 

Brent Forrest's Cybersecurity News Update

About the Author: Brent Forrest is a Field CISO with Flair Data Systems. In this role, Brents acts as an advisor to customers that span across different verticals providing guidance on how to include developing strategies to reduce risk with existing or new technology, while enabling the business.  With over 20 years of experience in the IT industry, Brent has been able to be a part of multiple groups within the IT field spanning from Telecom, Network, Wireless, Infrastructure, and eventually finding his passion within Security.  Roughly 20 years of that time was spent within the Oil and Gas industry working across multiple teams and leading initiatives.  Specifically with EnLink Midstream, he spent the majority of his time building resilience and developing the cybersecurity program from the ground up. 


Brent has been with Flair Data for 3 years and is CISSP, C|CISO, CvCISO, & Sec+ certified. In his free time, he likes to spend time with family, working out, or staying up with personal development.  He lives in Dallas, Texas with his wife and children. 


About: Flair Data Systems is a strategically priced IT solutions company, serving clients in the U.S., with offices in Texas and Colorado. Now a technology industry leader, we began in 1916 as the Porter Burgess Company. Flair Data Systems is your Trusted Advisor for: Collaboration, Unified Communications, Networking, Cloud, Infrastructure, Data Analytics, and Cybersecurity, serving the U.S.   


24 Apr, 2024
Brent Forrest, vCISO at Flair Data Systems, gives his weekly cybersecurity news update for 4/24/2024.
10 Apr, 2024
Brent Forrest, vCISO at Flair Data Systems, gives his weekly cybersecurity news update for 4/10/2024.
02 Apr, 2024
Are you being held hostage by the VMware pricing increases? Flair Data Systems discusses the top issues affecting your network cloud storage solutions and budget. Read on...
20 Mar, 2024
Brent Forrest, vCISO at Flair Data Systems, gives his weekly cybersecurity news update for 3/20/2024.
13 Mar, 2024
Brent Forrest, vCISO at Flair Data Systems, gives his weekly cybersecurity news update for 3/13/2024.
Brent Forrest, vCISO at Flair Data Systems, gives his weekly cybersecurity news update for 3/06/2024
06 Mar, 2024
Brent Forrest, vCISO at Flair Data Systems, gives his weekly cybersecurity news update for 3/06/2024.
On February 22nd, 2024- Flair Data Systems hosted Demo Day
05 Mar, 2024
On February 22nd, 2024- Flair hosted Demo Day, where technology partners were given the opportunity to pitch innovative technology and demo solutions to CIOs, CTOs, and CISOs from the DFW Metroplex. Read all about it!
My name is Brent Forrest and I serve as a vCISO at Flair Data Systems.
28 Feb, 2024
Brent Forrest, vCISO at Flair Data Systems, gives his weekly cybersecurity news update for 2/28/2024.
My name is Brent Forrest and I serve as a vCISO at Flair Data Systems.
21 Feb, 2024
Brent Forrest, vCISO at Flair Data Systems, gives his weekly cybersecurity news update for 2/21/2024.
My name is Brent Forrest and I serve as a vCISO at Flair Data Systems.
14 Feb, 2024
Brent Forrest, vCISO at Flair Data Systems, gives his weekly cybersecurity news update for 2/14/2024.
More Posts
Share by: