7 Key Security Risks to Address when Adopting SaaS Applications

Infrastructure? Who needs it. The modern organization is ditching traditional on-premise software and related infrastructure in favor of software-as-a-service (SaaS) offerings.  SaaS provides attractive and often essential options for reducing CapEx, operational overhead and decreased deployment time — all of which translate into increased business agility.

But the increased agility isn’t without risks. Eager to keep projects moving, many internal business units will procure new SaaS applications without the guidance or approval of appropriate IT or security teams. Multi-SaaS organizations are often left to manage, protect and report on each SaaS service separately, further increasing risk with inconsistent security policies.

If your business is deploying more and more SaaS applications, be on the lookout for these seven primary security risks to understand where proper SaaS security should be applied.

  1. Phishing is still a threat.

    Email remains the most common threat vector with over 90% of the successful cyberattacks starting with a phishing email. Cybercriminals use phishing email to trick victims into delivering payloads using malicious attachments or URLs, harvest credentials via fake login pages, or commit fraud through impersonation.But modern phishing attacks also are increasing in sophistication and are often highly targeted.

    In addition, phishing has evolved to cloud-based attacks as organizations continue to accelerate the adoption of SaaS email (e.g., Office 365 or G Suite) and other productivity apps. Cloud applications present the next frontier for phishing since users need to authenticate to access their accounts, and the authentication is driven through industry-standard protocols, such as OAuth.

    For example, cybercriminals targeted O365 with highly sophisticated phishing attacks — including baseStriker, ZeroFont and PhishPoint — to bypass Microsoft security controls. Many secure email gateways, such as Mimecast, also could not stop these phishing emails.

    In another case, Google’s Gmail suffered a mass phishing attack in 2017 with an authentic-looking email that asked for permission and opened access to their email accounts and documents. The attack exploited Google’s OAuth protocol.

  2. Account takeovers open the door.

    Account takeover (ATO) attacks involve threat actors compromising an employee’s corporate credentials by either launching a credential phishing campaign against an organization or buying credentials on the Dark Web due to third-party data leaks. A threat actor then leverages the stolen credentials to gain additional access or escalate privileges. It is possible that a compromised account may remain undiscovered for a long time — or never be found at all.

  3. Data theft still profitable no matter where it’s stored.

    The risk of data breach is a top concern for organizations moving to the cloud. Sanctioning SaaS applications implies moving and storing data outside the corporate data center, where the organization’s IT department does not have control or visibility, but is still responsible for data security.The data stored in SaaS applications could be customer data, financial information, personally identifiable information (PII) and intellectual property (IP). Cybercriminals typically initiate a targeted attack or exploit poor security practices and application vulnerabilities to exfiltrate data.

  4. Loss of control may result in unauthorized access.

    Another risk of moving to the cloud is that the IT department no longer has complete control over which user has access to what data and the level of access. Employees may accidentally delete data resulting in data loss or expose sensitive data to unauthorized users resulting in data leakage.

  5. The unknown of new malware and zero-days threats.

    SaaS applications, especially file storage and file-sharing services (e.g., Dropbox, Box, OneDrive, etc.), have become a strategic threat vector to propagate ransomware and zero-day malware.According to Bitglass, 44% of scanned organizations had some form of malware in at least one of their cloud applications. Attacks taking place within SaaS environments are difficult to identify and stop as these attacks can be carried out without users’ awareness.

    One advantage of using SaaS applications is that the files and data automatically sync across devices. This can also be a channel for malware to propagate. The attacker would only have to upload a malicious PDF or Office file to the file-sharing or storage SaaS apps; the syncing features would do the rest.

  6. Compliance and audit.

    Government mandates, such as GDPR, and regulations for industries such as healthcare (HIPAA), retail (PCI DSS) and finance (SOX) require auditing and reporting tools to demonstrate cloud compliance, in addition to data protection requirements. Organizations must make sure sensitive data is secured, deploy capabilities to log user activities and enable audit trails across all sanctioned applications.

  7. The threats within.

    When it comes to security, employees are often the weakest link. Insider threats don’t always include malicious intent. User negligence can result in the accidental insider attack, which remains a top risk for organizations of all sizes. This risk isn’t isolated to weak passwords, shared credentials or lost\stolen laptops. It extends to data stored in the cloud, where it can be shared with external sources and often accessed from any device or location.

    The darker side of insider threats includes malicious intent. Insiders, such as staff and administrators for both organizations and CSPs, who abuse their authorized access to an organization’s or CSP’s networks, systems and data can cause intentional damage or exfiltrate information.

How to secure SaaS applications

Rapid adoption of SaaS email and applications, coupled with continuous technological advances, has resulted in multiple options for securing both SaaS email and data.

Geared toward the large enterprise, security vendors introduced Cloud Access Security Brokers (CASB) as a solution providing visibility, access control and data protection across cloud computing services using a gateway, proxy or APIs.

While traditional CASBs provide robust capabilities for the large enterprise, this isn’t always practical for every organization. In additional to being costly — with often complex deployments — few CASBs provide email security for SaaS-based email like Office 365 Mail and Gmail, leaving organizations to implement and manage separate security controls.

Expanded adoption of SaaS email and applications across organizations has created a need for an affordable, easy-to-use SaaS security solution. Thankfully, there are some approaches that can help close or eliminate new risks caused by SaaS applications.

Secure Your Entire Cloud Office Suite, Including Office 365 or G Suite

For example, SonicWall Cloud App Security (CAS) combines advanced email protection and data protection for SaaS email and applications. This approach delivers advanced threat protection against targeted phishing attacks, business email compromise, zero-day threats, data loss and account takeovers.

Cloud App Security also seamlessly integrates with sanctioned SaaS applications using native APIs. This approach provides email security and CASB functionalities that are critical to protecting the SaaS landscape and ensure consistent policies across the cloud applications being used.

When used with Capture Security Center Analytics, and integrated with SonicWall next-generation firewalls, Cloud App Security delivers Shadow IT visibility and control through automated cloud discovery.

Cyber Security News & Trends – 09-13-19

This week, spyware is found in the Android store, maritime cybersecurity protections are considered, and your gas pump could be the next target for a hacker.


SonicWall Spotlight

The CyberWire Daily Podcast – The CyberWire

  • SonicWall CEO Bill Conner speaks with The CyberWire for their story on the dangers of side-channel malware attacks. He details how previous big side-channel attacks like Spectre and Meltdown worked and explains that it’s only a matter of time before someone else manages to find a way of exploiting similar chipset vulnerabilities in the wild.

Rich, Smart and Sensibly Grown-Up? You’re the Hackers’ Dream – The Telegraph (UK)

  • The Telegraph builds a profile of the standard person who gets hacked and takes a look at the “hacker’s menu” – an itemized list detailing the cost of hacking personal information. To make their case they refer to the SonicWall 2019 Cyber Threat Report Mid-Year Update for information on ransomware.

RB Music Uses Spyware to Steal Sensitive Information From the Infected Device – VARINDIA

  • Following up on the SonicWall Alert detailing spyware in the RB Music player on the Android Store, VARINDIA talks to SonicWall’s Debasish Mukherjee. Mukherjee explains that it is common for malware code to be reused by different developers over time and even when an app appears to be legitimate it may contain dangerous code waiting to be activated.

Cybersecurity News

FBI Cyber Warning: Attacks on Key Employees up 100%, as 281 Are Arrested – Forbes

  • The FBI has warned that Business Email Compromise attacks have doubled between June 2018 and July 2019, even as a worldwide crackdown on the practice led to 281 arrests worldwide. Learn how you can protect yourself from Business Email Compromise with SonicWall’s Email Security Appliances.

Cyber-Security Incident at US Power Grid Entity Linked to Unpatched Firewalls – ZDNet

  • A recently released report has detailed how the “cyber-incident” reported on the US Power Grid in June of this year turned out to be a cyberattack that was able to take place because of unpatched firewalls.

Exploit for Wormable BlueKeep Windows Bug Released Into the WildArs Technica

  • A rough but workable exploit for the Bluekeep vulnerability has been coded and released into the wild. While it is highly unlikely that the exploit will be successful in infecting any users in its current form it serves as a proof-of-concept and could be the first step towards bigger problems in the future.

Swedish GDPR Fine Highlights Legal Challenges in Use of Biometrics – Security Week

  • A school in Sweden has been fined for using biometrics on its students, even though the school had obtained consent from both the students and their parents. A court ruling decided that due to the imbalance of power between students and the school, freely-given consent could not be possible. The case highlights the possibility of future problems in wider biometric implementation if, for example, it is argued that employees cannot consent to employers using biometrics in the workplace for similar reasons.

The State of Maritime Cybersecurity – WorkBoat

  • Maritime magazine WorkBoat interviews the creators of a recent survey on the current state of maritime cybersecurity. They discuss why the survey was created, why many companies are not prepared in the current threat landscape and what needs to be done to prevent another problem like the 2017 ransomware attack on global shipper Maersk.

Think Your iPhone Is Safe From Hackers? That’s What They Want You to Think… – The Guardian

  • The Guardian investigates the world of zero-day exploits that are sold on dark web marketplaces and warn that despite Apple’s iOS having a reputation of being close to unhackable, there are, in fact, vulnerabilities in it that have been exploited for years.
And Finally:

IoT Security: Now Dark Web Hackers Are Targeting Internet-Connected Gas Pumps – ZDNet

  • As hackers turn their sights on Internet of Things devices, and the number of these devices worldwide grow, hackers online have been turning their sights on web-connected Gas Pumps. It’s early days yet but researchers hypothesize that the reasons for this could range from obtaining cheap fuel to something much more explosive…

In Case You Missed It

Microsoft Security Bulletin Coverage for September 2019

SonicWall Capture Labs Threat Research Team has analyzed and addressed Microsoft’s security advisories for the month of September 2019. A list of issues reported, along with SonicWall coverage information are as follows:

CVE-2019-0787 Remote Desktop Client Remote Code Execution Vulnerability
IPS 14391 :Remote Desktop Client Remote Code Execution (Sept 19) 1
IPS 14393 :Remote Desktop Client Remote Code Execution (Sept 19) 2

CVE-2019-0788 Remote Desktop Client Remote Code Execution Vulnerability
ASPY 5634:Malformed-File exe.MP.105

CVE-2019-0928 Windows Hyper-V Denial of Service Vulnerability
There are no known exploits in the wild.

CVE-2019-1138 Chakra Scripting Engine Memory Corruption Vulnerability
There are no known exploits in the wild.

CVE-2019-1142 .NET Framework Elevation of Privilege Vulnerability
There are no known exploits in the wild.

CVE-2019-1208 VBScript Remote Code Execution Vulnerability
There are no known exploits in the wild.

CVE-2019-1209 Lync 2013 Information Disclosure Vulnerability
There are no known exploits in the wild.

CVE-2019-1214 Windows Common Log File System Driver Elevation of Privilege Vulnerability
ASPY 5632:Malformed-File exe.MP.103

CVE-2019-1215 Windows Elevation of Privilege Vulnerability
ASPY 5633:Malformed-File exe.MP.104

CVE-2019-1216 DirectX Information Disclosure Vulnerability
ASPY 5623:Malformed-File exe.MP.98

CVE-2019-1217 Chakra Scripting Engine Memory Corruption Vulnerability
There are no known exploits in the wild.

CVE-2019-1219 Windows Transaction Manager Information Disclosure Vulnerability
ASPY 5624:Malformed-File exe.MP.99

CVE-2019-1220 Microsoft Browser Security Feature Bypass Vulnerability
There are no known exploits in the wild.

CVE-2019-1221 Scripting Engine Memory Corruption Vulnerability
There are no known exploits in the wild.

CVE-2019-1231 Rome SDK Information Disclosure Vulnerability
There are no known exploits in the wild.

CVE-2019-1232 Diagnostics Hub Standard Collector Service Elevation of Privilege Vulnerability
There are no known exploits in the wild.

CVE-2019-1233 Microsoft Exchange Denial of Service Vulnerability
There are no known exploits in the wild.

CVE-2019-1235 Windows Text Service Framework Elevation of Privilege Vulnerability
There are no known exploits in the wild.

CVE-2019-1236 VBScript Remote Code Execution Vulnerability
There are no known exploits in the wild.

CVE-2019-1237 Chakra Scripting Engine Memory Corruption Vulnerability
There are no known exploits in the wild.

CVE-2019-1240 Jet Database Engine Remote Code Execution Vulnerability
There are no known exploits in the wild.

CVE-2019-1241 Jet Database Engine Remote Code Execution Vulnerability
There are no known exploits in the wild.

CVE-2019-1242 Jet Database Engine Remote Code Execution Vulnerability
There are no known exploits in the wild.

CVE-2019-1243 Jet Database Engine Remote Code Execution Vulnerability
There are no known exploits in the wild.

CVE-2019-1244 DirectWrite Information Disclosure Vulnerability
There are no known exploits in the wild.

CVE-2019-1245 DirectWrite Information Disclosure Vulnerability
There are no known exploits in the wild.

CVE-2019-1246 Jet Database Engine Remote Code Execution Vulnerability
There are no known exploits in the wild.

CVE-2019-1247 Jet Database Engine Remote Code Execution Vulnerability
There are no known exploits in the wild.

CVE-2019-1248 Jet Database Engine Remote Code Execution Vulnerability
There are no known exploits in the wild.

CVE-2019-1249 Jet Database Engine Remote Code Execution Vulnerability
There are no known exploits in the wild.

CVE-2019-1250 Jet Database Engine Remote Code Execution Vulnerability
There are no known exploits in the wild.

CVE-2019-1251 DirectWrite Information Disclosure Vulnerability
There are no known exploits in the wild.

CVE-2019-1252 Windows GDI Information Disclosure Vulnerability
There are no known exploits in the wild.

CVE-2019-1253 Windows Elevation of Privilege Vulnerability
There are no known exploits in the wild.

CVE-2019-1254 Windows Hyper-V Information Disclosure Vulnerability
There are no known exploits in the wild.

CVE-2019-1256 Win32k Elevation of Privilege Vulnerability
ASPY 5625:Malformed-File exe.MP.100

CVE-2019-1257 Microsoft SharePoint Remote Code Execution Vulnerability
ASPY 5626:Malformed-File xml.MP.2

CVE-2019-1259 Microsoft SharePoint Spoofing Vulnerability
There are no known exploits in the wild.

CVE-2019-1260 Microsoft SharePoint Elevation of Privilege Vulnerability
There are no known exploits in the wild.

CVE-2019-1261 Microsoft SharePoint Spoofing Vulnerability
There are no known exploits in the wild.

CVE-2019-1262 Microsoft Office SharePoint XSS Vulnerability
There are no known exploits in the wild.

CVE-2019-1263 Microsoft Excel Information Disclosure Vulnerability
There are no known exploits in the wild.

CVE-2019-1264 Microsoft Office Security Feature Bypass Vulnerability
There are no known exploits in the wild.

CVE-2019-1265 Microsoft Yammer Security Feature Bypass Vulnerability
There are no known exploits in the wild.

CVE-2019-1266 Microsoft Exchange Spoofing Vulnerability
There are no known exploits in the wild.

CVE-2019-1267 Microsoft Compatibility Appraiser Elevation of Privilege Vulnerability
There are no known exploits in the wild.

CVE-2019-1268 Winlogon Elevation of Privilege Vulnerability
There are no known exploits in the wild.

CVE-2019-1269 Windows ALPC Elevation of Privilege Vulnerability
There are no known exploits in the wild.

CVE-2019-1270 Microsoft Windows Store Installer Elevation of Privilege Vulnerability
There are no known exploits in the wild.

CVE-2019-1271 Windows Media Elevation of Privilege Vulnerability
There are no known exploits in the wild.

CVE-2019-1272 Windows ALPC Elevation of Privilege Vulnerability
There are no known exploits in the wild.

CVE-2019-1273 Active Directory Federation Services XSS Vulnerability
There are no known exploits in the wild.

CVE-2019-1274 Windows Kernel Information Disclosure Vulnerability
There are no known exploits in the wild.

CVE-2019-1277 Windows Audio Service Elevation of Privilege Vulnerability
There are no known exploits in the wild.

CVE-2019-1280 LNK Remote Code Execution Vulnerability
There are no known exploits in the wild.

CVE-2019-1282 Windows Common Log File System Driver Information Disclosure Vulnerability
There are no known exploits in the wild.

CVE-2019-1283 Microsoft Graphics Components Information Disclosure Vulnerability
There are no known exploits in the wild.

CVE-2019-1284 DirectX Elevation of Privilege Vulnerability
ASPY 5630:Malformed-File exe.MP.101

CVE-2019-1285 Win32k Elevation of Privilege Vulnerability
ASPY 5631:Malformed-File exe.MP.102

CVE-2019-1286 Windows GDI Information Disclosure Vulnerability
There are no known exploits in the wild.

CVE-2019-1287 Windows Network Connectivity Assistant Elevation of Privilege Vulnerability
There are no known exploits in the wild.

CVE-2019-1289 Windows Update Delivery Optimization Elevation of Privilege Vulnerability
There are no known exploits in the wild.

CVE-2019-1290 Remote Desktop Client Remote Code Execution Vulnerability
There are no known exploits in the wild.

CVE-2019-1291 Remote Desktop Client Remote Code Execution Vulnerability
There are no known exploits in the wild.

CVE-2019-1292 Windows Denial of Service Vulnerability
There are no known exploits in the wild.

CVE-2019-1293 Windows SMB Client Driver Information Disclosure Vulnerability
There are no known exploits in the wild.

CVE-2019-1294 Windows Secure Boot Security Feature Bypass Vulnerability
There are no known exploits in the wild.

CVE-2019-1295 Microsoft SharePoint Remote Code Execution Vulnerability
IPS 14392:Microsoft SharePoint Remote Code Execution Vulnerability (SEP 19) 2

CVE-2019-1296 Microsoft SharePoint Remote Code Execution Vulnerability
IPS 14390:Microsoft SharePoint Remote Code Execution Vulnerability (SEP 19) 1

CVE-2019-1297 Microsoft Excel Remote Code Execution Vulnerability
There are no known exploits in the wild.

CVE-2019-1298 Chakra Scripting Engine Memory Corruption Vulnerability
There are no known exploits in the wild.

CVE-2019-1299 Microsoft Edge based on Edge HTML Information Disclosure Vulnerability
There are no known exploits in the wild.

CVE-2019-1300 Chakra Scripting Engine Memory Corruption Vulnerability
There are no known exploits in the wild.

CVE-2019-1301 .NET Core Denial of Service Vulnerability
There are no known exploits in the wild.

CVE-2019-1302 ASP.NET Core Elevation Of Privilege Vulnerability
There are no known exploits in the wild.

CVE-2019-1303 Windows Elevation of Privilege Vulnerability
There are no known exploits in the wild.

CVE-2019-1305 Team Foundation Server Cross-site Scripting Vulnerability
There are no known exploits in the wild.

CVE-2019-1306 Azure DevOps and Team Foundation Server Remote Code Execution Vulnerability
There are no known exploits in the wild.

Adobe coverage:

CVE-2019-8069 Same Origin Method Execution Vulnerability
ASPY 5635:Malformed-File swf.MP.602

CVE-2019-8070 Use After Free Vulnerability
ASPY 5636:Malformed-File swf.MP.603

Cyber Security News & Trends – 09-06-19

This week, vote for SonicWall in the 2019 Computing Security Awards, a deep dive into 5G cybersecurity, and ransomware is under the spotlight before the 2020 elections.


SonicWall Spotlight

2019 Computing Security Awards – Vote for SonicWall

Vote today!

6 Essential Hardware Firewall Solutions For A Small Business 2019 – Welp Magazine

  • The SonicWall TZ400 is named as the number 1 essential firewall solution for a small business, with traffic targeting ability and scalability as your business grows called out as particular plus points.

7 Sophisticated Cyber-Attacks that are Growing in 2019 – Security Boulevard


Cybersecurity News

Why 5G Requires New Approaches to Cybersecurity – Brookings Institute

  • Former Federal Communication Chairman Tom Wheeler stresses the need to zero in on protecting 5G wireless networks from cyberthreats in a new paper published by the Brookings Institute.

Cybersecurity and the Explosion Of Augmented Reality – The Forbes Tech Council

  • Paul Ryznar of the Forbes Technology Council explores the cybersecurity implications that have arisen from the explosion of Augmented Reality technology products, including security vulnerabilities, cloud technology complications and wearable device exposures.

A Huge Database of Facebook Users’ Phone Numbers Found Online – Tech Crunch

  • An exposed Facebook database of phone numbers linked to Facebook account IDs has been found online. The company argue that the data is old and taken from a time before they updated their security systems.

Rising Fines Will Push Breach Costs Much Higher Dark Reading

  • Market forecast by Juniper Research predicts that fines from data-protection laws like GDPR are going to rise dramatically, with the cost likely to exceed $5 trillion by 2024.

Taxpayers Against Cities Paying up in Ransomware Attacks, Says Survey – ZDNet

  • A survey of US citizens in cities has found that 60% of those questioned are against local tax dollars being used to pay ransomware demands in their city. At the same time, 90% are in favor of increasing cybersecurity funding for their local services.

Top NSA Cyber Official Points to Ransomware Attacks as Key Threat to 2020 Elections – The Hill

  • The newly formed Cybersecurity Directorate at the National Security Agency is keeping a close eye on developments in ransomware in the run up to the 2020 election. With a number of ransomware attacks disrupting cities across America in recent weeks, ensuring nothing untoward happens in the election is a top priority.
And Finally:

Teenage Hackers Wanted: Could Your Kid Be the Next £20M Cybersecurity Superhero? – Forbes

  • A growth of Cyber Discovery Clubs in both the U.K. and the U.S is leading to a new generation of young hackers entering the cybersecurity field.

In Case You Missed It

Hildacrypt Ransomware actively spreading in the wild

The SonicWall Capture Labs Threat Research Team observed reports of a new variant family of Hildacrypt ransomware [Hildacrypt.RSM] actively spreading in the wild.

The Hildacrypt ransomware encrypts the victim’s files with a strong encryption algorithm until the victim pays a fee to get them back.

Infection Cycle:

The ransomware adds the following files to the system:

  • Malware.exe
    • % App.path%\ TXT
      • Instruction for recovery
    • %App.path%\ [Name]. HILDA!

Once the computer is compromised, the ransomware runs the following commands:

The ransomware encrypts all the files and appends the [.HILDA!]  extension onto each encrypted file’s filename.

After encrypting all personal documents, the ransomware shows the following text file containing a message reporting that the computer has been encrypted and to contact its developer for unlock instructions.

SonicWall Capture Labs provides protection against this threat via the following signature:

  • GAV: Hildacrypt.RSM (Trojan)

This threat is also detected by SonicWALL Capture ATP w/RTDMI and the Capture Client endpoint solutions.

 

Multiple HTTP/2 Implementation Vulnerabilities

What is HTTP/2?
An HTTP/2 is an application-layer protocol running on top of a TCP connection. HTTP/2 is a major revision of the HTTP protocol.

HTTP/1.0 allowed only one request to be outstanding at a time on a given TCP connection. HTTP/1.1 added request pipelining, but this only partially addressed request concurrency and still suffers from head-of-line blocking. Therefore, HTTP/1.0 and HTTP/1.1 clients that need to make many requests use multiple connections to a server in order to achieve concurrency and this result in excessive latency.

HTTP/2 improves upon the widely used HTTP/1.1 standard by providing data compression of HTTP headers, pipelining of requests, fixing the head-of-line blocking and multiplexing multiple requests over a single TCP connection. It also allows prioritization of requests, letting more important requests complete more quickly, further improving performance and reduces latency.

HTTP/2 Connection
Each endpoint is required to send a connection preface data to establish the HTTP/2 connection. The client connection begins with a 24-byte magic preface: “PRI * HTTP/2.0\x0d\x0a\x0d\x0aSM\x0d\x0a\x0d\x0a”. Once the HTTP/2 connection is established, endpoints can begin exchanging frames. All HTTP/2 frames begin with a fixed 9-byte header followed by a variable-length payload.

HTTP/2 Frame:

Length: The length of the frame payload

Type: The 8-bit type of the frame ((e.g. 0x0 DATA, 0x1 HEADERS, 0x5 PUSH_PROMISE, 0x6 PING)

Flags: An 8-bit field reserved for boolean flags specific to the frame type.

R: A reserved 1-bit field.

Stream Identifier: A stream identifier to which this frame belong, expressed as an unsigned 31-bit integer.

HTTP/2 Vulnerabilities:

Netflix has discovered several resource exhaustion vulnerabilities affecting a variety of third-party HTTP/2 implementations. These attack vectors can be used to launch Denial of Service attacks against servers that support HTTP/2 communication.

CVE-2019-9511 : Data Dribble
The attacker requests a large amount of data from a specified resource over multiple streams. They manipulate window size and stream priority to force the server to queue the data in 1-byte chunks. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both, potentially leading to a denial of service.

CVE-2019-9512 : Ping Flood
The attacker sends continual pings to an HTTP/2 peer, causing the peer to build an internal queue of responses. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both, potentially leading to a denial of service.

CVE-2019-9513 : Resource Loop
The attacker creates multiple request streams and continually shuffles the priority of the streams in a way that causes substantial churn to the priority tree. This can consume excess CPU, potentially leading to a denial of service.

CVE-2019-9514 : Reset Flood
The attacker opens a number of streams and sends an invalid request over each stream that should solicit a stream of RST_STREAM frames from the peer. Depending on how the peer queues the RST_STREAM frames, this can consume excess memory, CPU, or both, potentially leading to a denial of service.

CVE-2019-9515 : Settings Flood
The attacker sends a stream of SETTINGS frames to the peer. Since the RFC requires that the peer reply with one acknowledgement per SETTINGS frame, an empty SETTINGS frame is almost equivalent in behavior to a ping. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both, potentially leading to a denial of service.

CVE-2019-9516 : 0-Length Headers Leak
The attacker sends a stream of headers with a 0-length header name and 0-length header value, optionally Huffman encoded into 1-byte or greater headers. Some implementations allocate memory for these headers and keep the allocation alive until the session dies. This can consume excess memory, potentially leading to a denial of service.

CVE-2019-9517 : Internal Data Buffering
The attacker opens the HTTP/2 window so the peer can send without constraint; however, they leave the TCP window closed so the peer cannot actually write (many of) the bytes on the wire. The attacker then sends a stream of requests for a large response object. Depending on how the servers queue the responses, this can consume excess memory, CPU, or both, potentially leading to a denial of service.

CVE-2019-9518 : Empty Frame Flooding
The attacker sends a stream of frames with an empty payload and without the end-of-stream flag. These frames can be DATA, HEADERS, CONTINUATION and/or PUSH_PROMISE. The peer spends time processing each frame disproportionate to attack bandwidth. This can consume excess CPU, potentially leading to a denial of service.

Remediation:

Affected vendors are Microsoft, Akamai, Amazon, Apache, Apple, Cloudflare, Envoy, Facebook, Go Programming Language, gRPC, Netty, nghttp2, nginx, Node.js, Synology, Twisted & Ubuntu.

Please find the matrix of affected products and vulnerabilities here.

Apply the latest updates from the HTTP/2 implementers. 

To be fully protected from the vulnerabilities, Microsoft recommends configuring the server to limit the number of HTTP/2 packets accepted. Refer to the respective vendor advisory regarding these vulnerabilities.

SonicWall Capture Labs Threat Research team provides protection against this exploit with the following signatures:

IPS: 14362 Windows HTTP/2 Server DoS (AUG 19)
IPS: 14366 Windows HTTP/2 Server DoS (AUG 19) 2
IPS: 14375 Windows HTTP/2 Server DoS 4 (AUG 19)
IPS: 14373 HTTP/2 SERVER Informational 
IPS: 14374 Windows HTTP/2 PING Informational

SonicWall Capture Labs Threat Research team continue to monitor any attempts to exploit the recently patched http/2 vulnerabilities.

 

Cyber Security News & Trends – 08-30-19

This week, Security in the Cloud with SonicWall, finding a way of measuring cybersecurity, and a long-term spyware attack on Apple’s operating system.


SonicWall Spotlight

How to Make Your Smart Home More Secure – Engadget

  • With Smart Homes becoming a reality, Engadget look at how to secure them from cyberattacks, including using a SonicWall TZ350.

Ping Episode 1: Security in the Cloud, Starring SonicWall – Firewalls.com podcast

  • Firewalls.com have launched a new podcast titled Ping and they interview SonicWall’s Shannon Emmons in their very first episode. She discusses makes Cloud App Security a uniquely SonicWall offering and outlines the types of subscriptions and support available to make Cloud App Security a convenient fit for SMBs and enterprises alike.

Cybersecurity News

Google Unearths 2-Year-Long iPhone Spyware Attack – Financial Times

  • Google’s security team has revealed a series of security flaws in Apple’s iOS operating system, active from iOS 10 to iOS 12. While the vulnerabilities have now been patched, they were actively exploited by an unknown entity for at least two years.

How to Make $1 Million From Hacking: Meet Six Hacker Millionaires – Forbes

  • Six millionaires who made their money through legitimate hacking, mostly cashing in on bug bounties, are interviewed by Forbes telling their stories.

French ‘Cybercops’ Dismantle Pirate Computer Network – BBC

  • French “cybergendarmes” have dismantled a botnet that had infected more than 850,000 computers worldwide after working with the FBI to track down the command server.

Hackers Could Steal a Tesla Model S by Cloning Its Key Fob—Again – Wired

  • Tesla’s flawed and patched Model S keyfob system has been shown to have another vulnerability – found by the same team who discovered the problems the first-time round. The good news is that where previously the keyfobs had to be replaced, the new flaws can be fixed with a wireless software update.

Android Google Play App With 100 Million Downloads Starts to Deliver Malware – ZDNet

  • CamScanner PDF creator is a hugely popular app that has been downloaded 100 million times since it was first released on the Google Play Store in 2010. It has now been removed from the store after it was discovered that it was delivering a Trojan to people who had it installed on their device. This is most likely due to a problem with the ad library the app uses rather than a decision by the makers of the app themselves.

How to Measure Cybersecurity – Lawfare Blog

  • In a complex article Lawfare Blog investigates quantitative vs. qualitative attempts to find a successful metric for measuring cybersecurity systems.

Quantum Computing: The New Moonshot in the Cyber Space Race – HelpNetSecurity

  • The race to develop quantum computing has been heating up since China launched the first quantum communications satellite in 2016. HelpNetSecurity covers the history of quantum computing as China and the USA compete to be the first country to successfully reach “Q-Day.”
And Finally:

Astronaut Accused of Identity Theft, Accessing Estranged Wife’s Bank Account, From International Space Station – SC Magazine

  • An astronaut is being accused of identity theft after accessing her estranged wife’s financial information… from the International Space Station.

In Case You Missed It

Android streaming music player borrows spyware components from Ahmyth RAT

 

Reusing software code is a practice that brings efficiency in the software development cycle and is followed by many developers,  including malware developers. It is not uncommon to see malware writers reuse parts of code from other malware families or malware that were active in the past. SonicWall Capture Labs Threats Research Team observed reports of few cases where an Android malware was seen carrying code present in a relatively older Remote Access Trojan (RAT) called Ahmyth RAT. More information regarding this RAT can be found on our March 6, 2018 blog post.

A streaming Android music player app that goes by the name RB music was found to contain spyware related components of the Ahmyth RAT that allows it to steal sensitive information from the infected device.

Infection Cycle

The app appears in the app drawer with the icon as shown below:

Upon starting the app, we found a number of features like online music streaming were not functioning, mainly because the server this app communicates with – h[xx]p://radiobalouch.com – is down:

However the original intention was to give the victims a fully working streaming music player, so that the victim does not suspect the app and steal sensitive victim information in the background.

 

Trafficking Sensitive User Information

Upon execution, the app starts communicating with the server, one of the first things it does is it registers the infected device with the server. The id used to register is the IMEI of the device:

Shortly, contacts from the infected device are transmitted to the server:

It should be noted that the above mentioned data exchange happens over HTTP raising more security issues. For instance, if the victim is connected to an unsecured wifi connection anyone can snoop over the traffic and extract sensitive information that is being transmitted by this malware.

Additionally, we observed the following functionality in the malware’s code but did not see it execute during our analysis:

  • Access SMS messages on the infected device
  • Send app download links to a number via SMS – this would allow the attacker to propagate this threat further

Connection with the Ahmyth RAT

This malware contains parts of code that are identical to that present in Ahmyth RAT:

 

 

Overall, this threat showcases how malware writers reuse code from other malware samples and package legitimate applications with malicious code. A lot of times malicious applications do not contain usable code and once executed these apps simply do not do anything. But, sometimes malware writers package legitimate or working apps with malicious components. In such cases if the victim is not vigilant he may never suspect that his device is already infected with malware.

Sonicwall Capture Labs provides protection against this threat with the following signature:

  • AndroidOS.Ahmyth.RB

Indicators of Compromise (IOC’s):

  • e268743d7f6cb6901a9a7ed4306a8bb3
  • ef9346f9cd1d535622126ebaa1008769

Fake Installer for a Popular VPN Program installs Trojan

This week, the SonicWall Capture Labs Threat Research Team has analyzed a malware sample purporting to be a NordVPN installer but was also distributing a Trojan. Purporting to be a legitimate software while slipping in a malicious program is a behavior many malware authors utilize to trick unsuspecting users in installing malware to gain access to their systems. In this case, a user’s objective in installing the supposedly legitimate program might be to protect and secure their privacy online but instead gets the complete opposite.

Infection cycle:

The installer arrives as a winrar self-extracting archive using a legitimate NordVPN icon.

It drops the following files into the temp directory:

  • %Temp%/Rarsfx0/nordvpnsetup.exe
  • %Temp%/Rarsfx0/nord-sig.exe

It executes nordvpnsetup.exe and installs the legitimate software, NordVPN, along with the appropriate .NET framework version if the system does not have this prerequisite program installed.

It then executes nord-sig.exe which uses the following icon and also pretends to be another legitimate software.

It performs a slew of malicious actions which include the following:

  • It spawns svchost.exe to connect and send encrypted data to remote servers:
    • sync-time.xyz
    • afsasdfa33.xyz
    • bacloud.info
    • mivocloud.com

      

  • It executes a batch file which then executes a powershell script to download additional components.

  • These components are legitimate programs that we can assume will be used for malicious intent. The files are then saved in the following directories:
    • \Windows\Help\tmp<random>.dat – RDP wrapper library that can be used to establish remote terminal connections
    • \Windows\Help\tmp<random>.dat – installs legitimate components in the %APPDATA%\local\<random> folder which utilizes Microsoft Connection Manager Profile Installer (cmstp.exe) which can be used to run arbitrary commands remotely using an INF file
    • \Windows\Help\tmp<random>.dat – also creates another random folder under %APPDATA%\local\ directory and  installs legitimate components utilizing WFS.exe – Windows Fax and Scanner ultility which can be used to send and received documents as email attachments from the computer.

The intention of this Trojan is clear. We urge our users to always be vigilant and cautious when installing software programs particularly if you are not certain of the source.

SonicWall Capture Labs provides protection against this threat via the following signatures:

  • GAV: Kpot.G (Trojan)
  • GAV: Kpot.S (Trojan)
  • GAV: Kpot.D (Trojan)
  • GAV: Kpot.D_2 (Trojan)

This threat is also detected by SonicWALL Capture ATP w/RTDMI and the Capture Client endpoint solutions.

 

 

 

 

 

 

Simda Process Injection into Winlogon DGA Found

Overview:

SonicWall Capture Labs Threat Research Team recently found a new sample and activity in August for Simda. Simda steals information and is capable of modifying websites through injection. Microsoft first detailed Simda long ago, the first use of the DGA was identified in 2012. However, the domains that are generated are active until the year 2106. The algorithm that generates the domain names uses an encrypted set of parameters describing how many characters the domain shall have and what TLD (Top Level Domain) to use. TLDs observed so far in this sample are “.com” only. However, other TLDs have been identified such as (.eu, .info, .com, .su, and .net).

Sample Static Information:

Process Injection:

Within Windows Operating Systems there are multiple approaches to injecting code into a live process. This particular sample uses Dynamic-Link Library (DLL) injection. This involves writing multiple components of the injection process into the remote process with an API named “WriteProcessMemory” and “CreateRemoteThread”.

The remote process that will be supplying the code cave is called “Winlogon”. Winlogon has multiple responsibilities: Window Station and desktop protection, Standard SAS recognition, SAS routine dispatching, User profile loading, Assignment of security to user shells, Screen Saver control, Multiple Network Provider Support. Winlogon is also responsible for loading the GINA libraries which are responsible for collecting logon credentials from the user.

Code Cave with Stub aka ShellCode:

The code cave will call an array of Windows APIs to get the DLL loaded into the Winlogon process. Some of the APIs that are called are: RtlImageHeader, VirtualQuery, VirtualAlloc, GetModuleHandleA, LoadLibraryExA, and SetCurrentDirectoryA. The DLL that will be loaded is called “WinSCard.dll”.

Here is what the code cave looks like in Ida Pro as a memory dump:

DLL Injection:

The “WinSCard.dll” dumped into Ida Pro. This shows the typical dll injection. It just calls one thread and executes everything in it.

This is the top of the thread that gets called in DLL Main:

DGA (Domain Generation Algorithm) Found:

Adversaries may make use of Domain Generation Alogirthms (DGAs) to dynamically identify a destination for command and control traffic rather than relying on a list of static IP addresses or domains. This has an advantage of making it harder for defenders to block, track, or take over the command and control channel. This sample makes use of the following DGA:

A little lower down in the same function:

Reversing the DGA into C/C++:

A small list from the DGA output is as follows:



The Domain Generation Algorithm will produce 1,000 active Domains. The domains will be active until the year 2106.

SonicWall, (GAV) Gateway Anti-Virus, provides protection against this threat:

  • GAV: Simda.S
  • GAV: MalAgent.J_65494