Downclimb

2017.05.21

RSS feed

Weekly infosec news summary for 2017.05.14 – 2017.05.21

News from Summit Route

Following on interest from my flaws.cloud tutorial, I’ll now be providing independent AWS security consulting work, including security assessments, training, and assistance with detection engineering (ie. collecting logs and setting up alerting). Contact me at scott@summitroute.com for more info.

Quotes

“Microsoft patched WannaCry XP flaw in February but only for paying customers. Now blaming NSA for 0day ‘stockpiling’. […] Timestamp for XP patch is February 11, 2017.” Patrick Gray (1, 2)

 

“APT28 still going through about 2 0days a month, they don’t stockpile, they burn.” ‏@thegrugq

 

“Pentesters are just way too scope limited these days. You’re not simulating real threats until they can kidnap sysadmins’ family members.” scriptjunkie‏

 

“The only difference between this worm and every other worm is we know this one happened because it has ransomware.” ‏Dave Aitel

 

“During early L0pht days I was a Unix admin for ~50 DoD/USG systems. The government would not let me make needed changes to secure them. The default configs were so bad the systems would crash w/o needing to be exploited. Of the ~50 boxes one, at Ramstein Air Base, never had problems. It ran perfectly with out need for intervention, unlike the others. I figured since it was a ‘blessed’ configuration, I could find out what was different and ask the govt. to recreate elsewhere. This system had been compromised was being used to distribute pirated software. They also patched the vulns I wasn’t permitted to fix. My response was to request [agency] allow their other systems to be compromised to improve uptime and integrity of operations. It seemed a much easier path than getting the core changes to the system(s) approved.” [‏Mudge]https://twitter.com/dotMudge/status/865987293084917760()

 

“Ransomware should become this generation’s ‘The dog ate my homework.’” ‏Ryan Huber

 

Top stories

WannaCry follow-up

98% of systems infected by the WannaCry worm from last week were Windows 7 (link). Although some researchers discovered that you could extract the WannaCry decryption key from memory on Windows XP systems, the only Windows XP systems that were apparently infected were researcher’s own systems that they had infected manually. The vuln used does impact Windows XP, but the WannaCry worm’s exploit only worked against Windows 7 and Windows 2008 (link). The tool gentilkiwi/wanakiwi may be able to decrypt ransomed files on Windows 7.

As odd as it sounds, there are suspicions that WannaCry may have been developed by the Lazarus group (North Korea). The technical reasoning behind that is tenuous, but the grugq offers some insights on that theory here.

Prior to WannaCry, another worm (Adylkuzz) was actually exploiting the same vuln, but had gone unnoticed because instead of displaying a ransomware message, it was quietly mining bitcoin (link). This worm was also disabling SMB after installing, so if you had Windows 7 boxes exposed to the Internet that weren’t infected with ransomware, then they may be mining bitcoin now. This bitcoin mining earned them at least $43K, whereas the WannaCry ransoming has so far earned $95K. The guy that registered the domain that acted as a killswitch for the WannaCry worm was awarded $10K by HackerOne (link), which he donated to charity.

Business

Other reads