CISA Issues Binding Operational Directive To Increase The Security Of Cloud Services

Posted in Commentary with tags on December 18, 2024 by itnerd

The CISA has recently put out a Binding Operational Directive on Implementing Secure Practices for Cloud Services:

Malicious threat actors have increasingly targeted cloud environments and evolved tactics to gain initial cloud access. In recent cybersecurity incidents, the improper configuration of security controls in cloud environments introduced substantial risk and resulted in actual compromises. To combat these threats, the Cybersecurity and Infrastructure Security Agency (CISA) initiated the Secure Cloud Business Applications (SCuBA) project. Through the SCuBA project, CISA developed Secure Configuration Baselines, providing consistent and manageable cloud security configurations and assessment tools, allowing agencies and CISA to improve security for Federal Civilian Executive Branch (FCEB) assets hosted in cloud environments. This Directive requires agencies to implement a set of SCuBA Secure Configuration Baselines for certain Software as a Service (SaaS) products widely used in the FCEB, deploy CISA developed automated configuration assessment tools to measure against the required baselines, integrate with CISA’s continuous monitoring infrastructure, and remediate deviations from the secure configuration baselines. These steps reduce risks highlighted by recent adversary activity and increase resiliency for FCEB agencies against cyber threats. 

Jim Routh, Chief Trust Officer, Saviynt had this comment:

“IT Hygiene is a way of describing an enterprise’s capabilities to identify IT assets, manage the configuration of those assets, apply vulnerability management to those assets and to update those assets when necessary. The new Directive from CISA is requiring federal agencies to improve their IT Hygiene for cloud hosted services supporting their needs. The configuration management requirements in cloud computing are different from IT assets hosted in proprietary data centers. Federal agencies with legacy infrastructure (non-cloud) must apply a different way to manage the configuration of cloud hosted IT assets that includes discovery, asset inventory management, configuration management and vulnerability management.”

Paul Zolfaghari, President, Saviynt follow up with this:

“As we navigate an increasingly complex cyber landscape, the issuance of Binding Operational Directive 25-01 by the Cybersecurity and Infrastructure Security Agency (CISA) represents a pivotal advance in cloud security. This directive underscores our collective commitment to not only securing our nation’s digital infrastructure but also setting a benchmark for future cloud security measures. By mandating secure configuration baselines and integrating continuous monitoring, CISA is leading the charge in fortifying our federal networks against sophisticated cyber threats. This proactive approach is essential in ensuring the resilience and security of our cloud environments, and we are proud to support these vital initiatives.”

The CISA really has a great grasp as to what it needs to do to ensure that government does not become a target for threat actors. Private industry needs to copy what they are doing as they are really on the ball.

 UPDATE: Chris Botelho, Sr. Solutions Engineer, LimaCharlie adds this:

“The directive forces these agencies to modernize their security controls in order to better protect against malicious actors and software. Given the increase in activity of both nation-state actors and ransomware groups targeting third-parties that contract with the federal government rather than the federal government itself, it has become even more important to not only ensure federal systems are protected, but also the organizations that the federal government contracts with in order to protect data and prevent large-scale incidents. Malicious actors will always go for the weakest link in the chain, which currently are the SMBs that frequently don’t have the knowledge, time, expertise, or budget for implementing recommended security controls.

“Most of the controls being required by the directive are part of Microsoft’s own best practices and should already in place. The controls and scanner are provided for free from CISA, so they can be implemented without any licensing costs. If an organization is using an enterprise M356 license, then they will likely have all the required controls available to them. However, organizations using F3 licenses or purchasing their M365 subscriptions through a third-party provider will likely need to upgrade their licenses or purchase additional licenses to gain access to the security controls required by the directive, such as Microsoft Purview. There will also be a time cost to implement the controls and update internal policies such as password management policies to reflect the new control requirements.

“Controls required by federal agencies frequently influence the controls implemented by private businesses both directly, through direct implementation of the controls based on the agency’s requirements, but also indirectly through regulatory bodies such as HITRUST and PCI-DSS that adopt the federal agency’s requirements as part of their own requirements. Additionally, by adopting federal controls, the effort required by leadership to create their own security controls is reduced while providing a tested and vetted method for ensuring the controls are implemented and can be easily tested through readily-available tools such as CISA’s SCuBA, without additional cost.

“The biggest challenge will be changing the user and management mindset for many of the historical security controls that no longer apply or work in today’s computing environments as well as the cost that would be involved if a business’s current license(s) don’t include the controls prescribed by the mandate. This could be something such as MFA, which may not be included in a business’s current service license and historically is seen by many as an unnecessary extra step, but significantly increases the authentication security of a business. Additionally, there may be regulations in place that a business has to follow that are in conflict with the CISA directive. For example, the new controls require that passwords are set to never expire. Historically, the industry standard was to change passwords every 60-90 days. However, research has shown that this actually decreases password security, but many organizations still do this because it has been the practice for decades and regulations such as PCI-DSS still require it.”

Hammerspace and Cachengo Partner 

Posted in Commentary with tags on December 18, 2024 by itnerd

 Hammerspace, the company orchestrating the next data cycle, today announced a partnership with Cachengo, the decentralized cloud company, to provide a joint energy-efficient solution for capturing and processing data, coupled with hybrid cloud (data) storage and orchestration for AI at the edge. 

Cachengo’s peer-to-peer encrypted and trusted business model called Rent-a-Node  decentralizes and democratizes AI, compute and storage – offering an economically compelling alternative to the public cloud by allowing brick-and-mortar businesses to become the Infrastructure-as-a-Service providers to other clouds, thus allowing content to be distributed very close to the end-users.

With its unique peer-to-peer network architecture, Cachengo connects thousands of Symbiotes (compute and storage nodes) on-demand, enabling massive scalability and enhanced data security without any form of egress fees for data at a fraction of the price of other traditional cloud services. 

Cachengo platforms are optimized as both servers and storage systems, enabling them to leverage the Hammerspace Tier 0 capability, utilizing their Bento and Pizza products for internal storage as part of Hammerspace’s Global Data Platform for high performance, lower cost and greater power efficiency. The combination of Hammerspace data orchestration and Cachengo’s Rent-a-Node is pioneering AI at the edge.

Learn More

Phreesia ConnectOnCall Breach Exposes Medications SSNs of 900K Patients

Posted in Commentary with tags on December 17, 2024 by itnerd

After-hours Telehealth platform ConnectOnCall started notifying 914,138 patients that their personal and health data was exposed in a May breach. The company’s Notice of Security Incident notes: “On May 12, 2024, ConnectOnCall learned of an issue impacting ConnectOnCall and immediately began an investigation and took steps to secure the product and ensure the overall security of its environment.”

Social security numbers, diagnoses and medications are among patient data potentially compromised. ConnectOnCall is a subsidiary of Phreesia, a patient intake software as a service provider. Based on the investigation, there is no evidence that Phreesia’s other services have been affected. In response, Dispersive cybersecurity expert Lawrence Pingree (formerly with Gartner) offers perspective.

Lawrence Pingree, VP, Dispersive had this comment:

“This breach looks like it’s application security related, likely a breach of the application via SQL injection or credential theft exposure, but since no details of the breach are available, it’s hard to say. In any case, isolating critical systems and applications with the best possible multi-factor authentication and protecting applications through micro-segmentation are key approaches to isolate the breadth of breach.”

This is yet another example of health care being the target of a cyberattack. This was an ongoing theme in 2024, and it is likely going to be an ongoing theme in 2025 unfortunately.

TEMU was Canada’s most downloaded iPhone application in 2024

Posted in Commentary with tags on December 17, 2024 by itnerd

Temu has been the Top downloaded iPhone app in Canada for 2024, according to App Store data just released by Apple. Temu is also the only e-commerce app in the top 15 free apps in the Apple rankings.

Launched in Canada in February 2023Temu empowered qualified sellers to manage their logistics and ship products directly from local warehouses in Canada. This initiative expanded our product range and significantly reduced delivery times for local customers. Canadian consumers can now enjoy the convenience of receiving their Temu orders in as little as one business day.

Globally, Temu is ranked #1 in Canada, as well as 23 other markets out of the 30+ countries and regions with an official ranking released by Apple such as the U.S., UK, Germany, and South Korea. In the US, Temu has maintained its #1 position for two consecutive years (2023 and 2024).

Temu launched in the U.S. in 2022 and has since expanded to serve consumers in over 80 markets across the Americas, Europe, the Middle East, Africa, Asia, and Oceania. Through its direct-from-factory model, Temu connects consumers directly with manufacturers, minimizing the number of intermediaries and associated costs. These savings are passed directly to customers through competitive pricing.

Data Dog Does A Deep Dive Into A WordPress Supply Chain Attack

Posted in Commentary with tags on December 17, 2024 by itnerd

Since I am a WordPress user, any security news related to WordPress tends to catch my attention. The this research by Data Dog certainly did. In short A threat actor tracked as MUT-1244 has stolen over 390,000 WordPress credentials. This campaign is huge and has been going on for years. Thus it is far from trivial. Full details in terms of how this campaign worked are in the research that I linked to. But if you want the TL:DR, Matt Bromiley, Lead Solution Engineer at LimaCharlie can help you with that:

“This attack utilized two initial access mechanisms. These techniques are the methods by which adversaries attempt to infect victim users. The two mechanisms were:

  • Spearphishing – This mechanism targeted academics. The phishing emails were crafted to look like kernel upgrade notifications, providing a link to run malicious code.
  • Trojanized GitHub Repositories – This mechanism mimicked GitHub repositories of legitimate proof-of-concept (PoC) exploits for known CVEs. However, the PoC code was changed to utilize malicious libraries, subsequently infecting the systems of victims who ran the copied repositories.

The term same second-stage payload indicates that regardless of phishing or malicious PoC code, the secondary payload dropped onto the victim systems was the same. Essentially, this means that the attackers had two delivery mechanisms – and targeted victims – to deliver the same payload, which was a backdoor that exfiltrated systems details and credentials, amongst other information.

The report indicated 49 malicious repositories masquerading as legitimate PoC code. They were strategically named to appear legitimate, as not to tip off adversaries. It is not irregular to see these types of numbers, as replicating a code repository with malicious code is trivial.

This is classified as a supply chain attack due to the exploit of libraries or tools utilized in code. In this case, the victims did not executed inherently malicious code. Instead, they executed code that incorporated a malicious package. Thus, analysis of the initial code would not warrant suspicion. It would require that users analyze the imported libraries in order to identify the malicious backdoor.”

This attack is very crafty which is why it has been so successful. It shows that defenders need to alter how they defend so that the next attack that uses methods like these aren’t nearly as successful.


2025 Predictions from Srikant Sreenivasan, CEO of Connect Secure

Posted in Commentary with tags on December 17, 2024 by itnerd

Connect Secure Srikant Sreenivasan, CEO has offered the following 2025 technology predictions on trends in the governance, risk and compliance industry as it relates to MSPs.

Secure Data Clouds Become Non-Negotiable for Compliance

With compliance frameworks like CMMC (Cybersecurity Maturity Model Certification) and stricter global regulations, secure data clouds will shift from being optional enhancements to essential infrastructure. Organizations in defense, healthcare, and other regulated industries will prioritize secure, compliant cloud solutions to meet mandatory standards and avoid penalties. Businesses not adopting these technologies risk falling behind or being excluded from critical contracts.

Exploited Vulnerabilities Emerge as the Fastest-Growing Threat

By 2025, exploited vulnerabilities will surpass phishing as the most rapidly growing cybersecurity threat. Attackers are increasingly automating the discovery and exploitation of unpatched systems, leaving organizations exposed. The sheer volume and sophistication of attacks will force Managed Service Providers (MSPs) to evolve, incorporating proactive vulnerability management solutions into their service offerings to protect clients and mitigate risks.

Demand for Proactive Cybersecurity Outpaces Traditional Approaches

As exploited vulnerabilities dominate headlines and compliance mandates intensify, businesses will demand proactive cybersecurity measures over reactive ones. MSPs that offer real-time threat detection, vulnerability assessments, and patching services will become the trusted partners of the future. The expectation will shift from simply responding to incidents to ensuring systems are continually hardened against evolving threats.

RunSafe Security Launches New Software Supply Chain Security Platform

Posted in Commentary with tags on December 17, 2024 by itnerd

RunSafe Security, a leader in immunizing software from cyberattacks through a patented, frictionless process, today announced the release of the RunSafe Security Platform that automates risk identification, exploit prevention, and runtime software monitoring. Now, developers can generate a high-fidelity software bill of materials (SBOM) at build time, ensuring the highest level of accuracy in identifying software components and related vulnerabilities. This powerful, comprehensive solution includes the authoritative, build-time C/C++ SBOM generation for embedded systems and enhances a system’s resiliency by automating the remediation of memory safety vulnerabilities in compiled code.

Software supply chain transparency can reduce risks and build trust. With regulations such as the Cyber Resiliency Act and the FD&C Act, building and including SBOMs is quickly becoming a business must. These requirements are driven by software supply chain security concerns, which underscores the critical need for SBOMs to identify risks and stay ahead of potential threats.

Leading global software organizations, including Lockheed Martin, Vertiv, and Critical Software, already use the RunSafe Security Platform. “RunSafe’s platform is timely given the new EU Cyber Resilience Act’s product liability,” says Critical Software CEO Joao Carreira. “Not only can organizations generate a complete SBOM, they can immediately mitigate vulnerabilities and future-proof against zero days using automated tools freeing developers to focus on new feature development.”

Powered by 400-plus vulnerability data sources, the RunSafe Security Platform delivers comprehensive cybersecurity solutions for embedded systems deployed across critical infrastructure. By generating an SBOM with complete visibility into software components, the platform reveals software dependencies, identifies vulnerabilities and quantifies risks. Organizations are provided with actionable insights to reduce exploit paths and enhance their security posture using automated tools throughout the development lifecycle.

Key capabilities and benefits include:

  • RunSafe Identify generates SBOMs for embedded systems at software build time, identifies software vulnerabilities, and quantifies available risk reduction technologies for those vulnerabilities. By offering insights into software components, vulnerabilities, and effective mitigation strategies, RunSafe empowers organizations to enhance their software’s resilience against evolving cyber threats.
  • RunSafe Protect mitigates cyber exploits by relocating software functions in memory every time the software is run. This results in a unique memory layout to prevent attackers from exploiting memory-based vulnerabilities. This approach maintains system performance and functionality without modifying the original software. RunSafe also offers a repository of pre-hardened open-source packages and containers, providing immediate protection against attacks in open-source software commonly used in proprietary software.
  • RunSafe Monitor provides real-time crash data and heuristics to determine whether a crash was a software bug or the result of a cyber attack. This capability enables precise triage, minimizing time and effort wasted on false positives. RunSafe’s passive monitoring listens for software crashes, collecting data on stability, reliability, and potential vulnerabilities. When a crash occurs, this data is swiftly directed to incident response teams for accurate and efficient triage, enhancing overall software security and resilience.

The RunSafe Security Platform will be generally available on December 16, 2024. To learn more, visit https://runsafesecurity.com/runsafe-platform/

Rhode Island Benefits System Hit By Cyberattack

Posted in Commentary with tags on December 17, 2024 by itnerd

Rhode Island officials have revealed that hundreds of thousands of residents’ personal and financial information was likely stolen in a ransomware attack on the state’s government assistance programs. The breached data affects people who have applied for or received benefits since 2016 such as Medicaid, SNAP benefits, TANF, Childcare Assistance, long-term services and supports, HealthSource RI and other benefits. Data involved may include names, addresses, dates of births, social Security numbers and certain banking information.

The online benefits platform, RIBridges, was taken offline on Friday, after the state was informed that there was a major security threat to the system. Applications are being processed on paper until the issue is remediated.

Lawrence Pingree, VP, Dispersive had this to say:

 “Ransomware continues to plague many organizations and the strategies of protection against ransomware threat actors continually evolves. A keen focus on endpoint prevention, micro segmentation along with protection and isolation of Identity systems is key to reducing the impact of ransomware threats.”

As we come to the end of the year, I fully expect to see more situations like this where governments are targeted. That’s not good and it means that defenders should act accordingly.

Equifax Canada Completes Multi-Year Cloud Transformation

Posted in Commentary with tags on December 17, 2024 by itnerd

Equifax Canada is excited to announce the successful completion of a multi-year cloud transformation of all customer products and platforms onto the Equifax CloudTM. This ambitious move allows Equifax Canada to help customers and partners leverage unique, proprietary Equifax data and patented EFX.AI capabilities to help them solve their business challenges, manage risk, and grow their business.

The Equifax Cloud is a top-tier global technology and security infrastructure backed by a more than $1.5 billion multi-year investment. It has changed nearly every aspect of the Equifax infrastructure and is one of the largest Cloud initiatives ever undertaken in the financial services industry. Today, Canada’s largest consumer credit bureau, and the largest commercial credit bureau are operating on The Equifax Cloud, delivering a new agile foundation of improved speed, security and resiliency, and more powerful insights than ever before.

Equifax partnered with Google Cloud in 2019 for this transformation and received three consecutive Google Cloud Financial Services Customer Awards for demonstrating innovative thinking, technical excellence and transformation execution.

With this comprehensive digital transformation now complete, Equifax Canada is now leveraging the Equifax Cloud to develop customer-focused solutions such as the Global Consumer Credit FileCanadian Small Business Health Index (in partnership with BDC), and Equifax Complete Protection.

For more information on the Equifax Cloud, please visit: https://www.equifax.ca/about-equifax/equifax-cloud/

Abstract Security Joins Forces with Analytica42

Posted in Commentary with tags on December 16, 2024 by itnerd

Abstract Security announced today that it has partnered with Analytica42 to help organizations easily integrate their data sources with Google SecOps platform for analytics and storage. With the new integration, Abstract Security makes it easier for customers to migrate to Google SecOps through its pipeline management features which eases the burden of data management and routes quality data to the platform. 

Abstract provides over 100 integrations for data sources with industry-leading vendors out of the box, in addition to threat intel feeds and its own in-house ASTRO threat feed. This comprehensive ecosystem enables customers to blend their unique security data with valuable threat intelligence and insights, significantly enhancing their overall security posture and enabling more informed decision-making. Further, Abstract offers customers a fully hosted solution on Google Cloud Platform or the flexibility to deploy into their own cloud environments, giving them complete control over their cybersecurity infrastructure.

Abstract’s security operations platform delivers analytics that quickly correlate data and delivers actionable insights at the business level, ensuring security teams can focus on what matters most. With Abstract’s data pipeline management tool, customers benefit from Abstract’s ability to decouple the data sources from data destinations and normalize the data in real time before it reaches a destination. Through this tool, Abstract removes dependency and makes data easily routable to any destination which saves time and money for data storage.   

Abstract has chosen to work with Analytica42 as a global delivery partner to ensure that the transition to a new environment is seamless with as little disruption as possible.

Analytica42 offers many years of experience in the integration and migration of security tools to and from a wide range of SIEMs. This enables customers to unlock their SIEMs full potential, ensuring faster detection, quicker response times & more streamlined workflows. Rather than just simply adopting a one-size-fits-all approach, Analytica42 takes the time to understand the specific requirements, utilizing a comprehensive, pre-built library of use-cases alongside more bespoke solutions to minimize false positives & ensure you have full visibility across your security landscape.