Archive for September 14, 2024

Fortinet Pwned Via Third-Party Attack 

Posted in Commentary with tags on September 14, 2024 by itnerd

Fortinet has just disclosed that it has suffered a data breach after a threat actor gained unauthorized access to a third-party it used.

Initially, the data breach at Fortinet was detected on a hacking forum, with the threat actor claiming that their Azure SharePoint was leaked, with 440 GB of data. This is part of what the company said:

An individual gained unauthorized access to a limited number of files stored on Fortinet’s instance of a third-party cloud-based shared file drive, which included limited data related to a small number (less than 0.3%) of Fortinet customers.

Evan Dornbush, former NSA cybersecurity expert had this to say:

Modern business IT ecosystems are complex, relying on external providers and a hodgepodge of “shared responsibility” agreements as pertains to security. So long as the data is valuable, attackers will take interest.

This could become an interesting 8-k as the breach is Fortinet’s material event (as defined by the SEC) even if the customer data was stored on a third-party platform. As of the time of this writing how the access occurred has not been disclosed (at least I haven’t been able to find it).

Ted Miracco, CEO, Approov follows with this:

  “Data centers are now as vital as power plants—meaning tighter security, more government oversight, and faster responses to cyber threats. Expect more scrutiny, but also more investment in the sector. This recognition highlights the critical role that data centers play in supporting the healthcare, finance, and broader public services sectors of the economy, particularly in light of growing cyber threats and the increasing reliance on digital infrastructure.

  “Though good for security and investment, this could hamper innovation with over-regulation. It’s a necessary step, but bureaucratic hurdles could be an issue. Given that data centers house sensitive information, such as NHS patient records and financial data, their inclusion in CNI status means they will receive prioritized access to security resources like the National Cyber Security Centre (NCSC). This added layer of oversight and support can improve incident response, reduce downtime, and protect critical data during outages or attacks.

  “The move should improve overall resilience against attacks, but unless the private sector steps up on security innovation, it may not stop the next big breach. Cybersecurity vendors, especially those providing robust API and cloud security solutions may see this development as an opportunity to expand into the CNI-protected sectors by offering more advanced security services tailored for data centers.”

Finally Stephen Gates, Principal Security SME, Horizon3.ai:

  “As someone deeply motivated by security, I see this as a crucial step in safeguarding citizens, public and private sector organizations, and the nation as a whole. Today’s critical infrastructures—such as energy, water, and emergency services, and so on—already rely heavily on the continuous operation of the nation’s data centres.

  “With these data centres now being classified similar to other critical infrastructure, they will likely be subject to the same regulations and directives designed to protect private data, ensure operational uptime, and demonstrate cyber resilience. Additionally, the need for continuous cyber risk assessments of these environments will be imperative to identifying cyber risks, mitigating emerging threats, and ensuring that these centres remain resilient against evolving cyberattacks.”

Clearly Fortinet are trying to minimize the scope of this as 440 GB doesn’t sound like a “limited number of files” to me. That likely means that this is pretty bad. And when the details finally appear, we won’t like the scope of this hack at all.

5.2 Million Files Allegedly Stolen From ICBC’s London HQ

Posted in Commentary with tags on September 14, 2024 by itnerd

On Thursday, ransomware gang Hunters International claimed to have stolen more than 5.2 million files from the London branch of the Industrial and Commercial Bank of China (ICBC).

The threat actors allegedly swiped 6.6 TB of the bank’s data after hacking their network, and threatened to publish all of it unless ICBC pays up by September 13th. Which was yesterday.

ICBC is the world’s largest bank by assets, and, almost a year ago, the US arm of ICBC was hit by ransomware that disrupted trading in the US treasury markets. LockBit told Reuters that the bank paid the ransom after that attack.

Comparitech researchers logged 127 ransomware attacks claimed by Hunters so far in 2024, but these haven’t been acknowledged by the targets.

I have two comments on this. Starting with Evan Dornbush, former NSA cybersecurity expert:

“Is there a more cost-effective way to fight ransomware?

  “This is a timely reminder that organizations should continually question the effectiveness of their cybersecurity measures lest they too be caught in a vicious cycle of reactive spending while failing to address the root causes of these attacks.

  “Simply throwing money at security solutions isn’t enough. This may be an ideal time for the industry to consider a shift in focus towards disrupting the economic model of ransomware attackers rather than dealing with the effects of their crimes.”

Next up is Ted Miracco, CEO, Approov:

Privacy, security and possible culprit behind the attack:

  • Privacy – Financial institutions are custodians of highly sensitive data, and a breach of this magnitude could result in heavy fines and penalties, as well as lawsuits from affected customers and businesses. If Hunters publishes ICBC’s data, it will lead to severe legal and compliance breaches, especially in regions with stringent financial and data privacy regulations, such as the EU’s GDPR or the UK’s Data Protection Act.
  • Security – The attack by Hunters underscores the prevalence of ransomware-as-a-service (RaaS), where groups like this operate with increasing efficiency. The involvement of RaaS models lowers the bar for cybercriminals, enabling them to outsource sophisticated ransomware attacks and focus on large, lucrative targets such as banks. A key part of protecting financial data involves strengthening the security of mobile applications and APIs, which are often targeted as points of entry for ransomware attacks. However, organizations have demonstrated their capability to compromise even large and presumably secure institutions like ICBC, because API security vulnerabilities remain largely unaddressed.
  • Culprit? – The fact that Hunters does not target Russian organizations suggests a potential association with Russia’s safe harbor policy for cybercriminals operating within its borders. This geopolitical dynamic is common with ransomware gangs, especially those with links to Russia, which often avoid targeting domestic organizations to stay under government protection. Ransomware attacks focused on extortion for financial gain, are a hallmark of many Russia-based cybercrime.”

ICBC has paid ransoms before. And my feeling is that they will pay up this time around. That’s unfortunate as I believe that organizations should not pay ransoms under any circumstances because that only encourages threat actors to launch more attacks. Besides, that money would likely be better spent ensuring that they do not pwned in the first place.

Horizon3.ai Releases A Deep Dive On An Ivanti Vulnerability

Posted in Commentary with tags on September 14, 2024 by itnerd

Horizon3.ai Exploit Developer James Horseman has just published “CVE-2024-29847 Deep Dive: Ivanti Endpoint Manager AgentPortal Deserialization of Untrusted Data Remote Code Execution Vulnerability” and posted a proof of concept exploit.

“Ivanti Endpoint Manager (EPM) is an enterprise endpoint management solution that allows for centralized management of devices within an organization. On September 12th, 2024, ZDI and Ivanti released an advisory describing a deserialization vulnerability resulting in remote code execution with a CVSS score of 9.8. In this post we detail the internal workings of this vulnerability. Our POC can be found here. We would like to credit @SinSinology with the discovery of this vulnerability.”

In addition to his detailed examination of the vulnerability and the vulnerability proof of concept, James also looks at the two main fixes he found in the patched version of EPM, and offers some caveats.

CVE-2024-29847 Deep Dive: Ivanti Endpoint Manager AgentPortal Deserialization of Untrusted Data Remote Code Execution Vulnerability: https://www.horizon3.ai/attack-research/attack-blogs/cve-2024-29847-deep-dive-ivanti-endpoint-manager-agentportal-deserialization-of-untrusted-data-remote-code-execution-vulnerability/

Trump Says He Won’t Sell Truth Social Stake… Stock Soars

Posted in Commentary with tags on September 14, 2024 by itnerd

We’ve been speculating what Donald Trump will do with his stake in Trump Media. Will he hold onto the stock or sell it to pay for his various “problems”.

Here’s the answer:

Trump Media & Technology Group, the social media business owned by former president Donald Trump, surged on Friday after Trump said he has “absolutely no intention of selling” his stake in the Truth Social owner.

And:

“A lot of people think the reason it’s down is a lot of people think I’m going to sell, and if I sell, it’s not going to be the same,” Trump said. “But I have absolutely no intention of selling.”

That caused the stock to do this:

That’s still over 70% below what it started trading at. But it’s the first positive news that the stock has had in a while. But it wasn’t all good news for Trump. He had a bit of a meltdown in the style of a two year old because of this:

Trump’s declaration prompted the stock to go parabolic. Not surprisingly, NASDAQ stopped trading on the security, which is standard practice when a stock’s price experiences huge swings in one direction or another. Trading was halted twice, each for five minutes. The security was one of dozens of listings on the exchange to be halted on Friday.

In response, the ex-president went on Truth Social to express his bewilderment and to threaten the operators of the exchange:

Seriously, this guy has lost the plot, lost his mind, is a couple fries short of a Happy Meal. Pick the metaphor that works for you or leave one in the comments. The point is that for a guy who claims he understands business, this is a massive over reaction to a pair of very brief trading halts that happen all the time. And he did this on a good news day for his stock. Though as I mentioned he’s still underwater from where the stock started trading at.

Mark my words, this will be short lived. Something will happen either with the election, or with his numerous criminal proceedings or civil proceedings that will trigger him to sell this stock to get money in a hurry. And this will cause the stock to crash. I’m calling now, this is not over.