SEC504: Hacker Tools, Techniques, and Incident Handling

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usConnect, learn, and share with other cybersecurity professionals
Engage, challenge, and network with fellow CISOs in this exclusive community of security leaders
Become a member for instant access to our free resources.
Sign UpMission-focused cybersecurity training for government, defense, and education
Explore industry-specific programming and customized training solutions
Sponsor a SANS event or research paper
We're here to help.
Contact UsCertificate authority SSL.com has revoked 11 certificates after a researcher reported a bug in a domain control validation (DCV) method that would allow a user to erroneously validate their ownership of the domain of their verification email address. SSL.com allows DCV establishment via email challenge response, including validation through a DNS TXT record, but the site's implementation of this method mistakenly adds the domain name of the user's email address to their list of verified domains, allowing a user to then request certificates for that domain. Fraudulently obtained TLS certificates could be abused to create spoofed phishing sites, to decrypt HTTPS traffic and enable man-in-the middle attacks, and more. There is no evidence the now-revoked certificates issued using this bug were obtained maliciously; SSL.com has temporarily disabled this DCV process until the flaw is fixed, and will issue an incident report by May 2, 2025.
SSL.com revoked the misidentified certificates within 24 hours of discovery. Strong validation of the FQDN/email address is in their certificate practices statement, so these actions are consistent with that and should avoid any motions to make their CA untrusted. With shortened certificate lifecycles, automation is key to survival, which includes automated DCV, which needs to remain both scalable and fraud resistant, which can be opposing forces. Expect providers to be working on these to improve security. Double check your validation mechanism to be sure it's active and consistent with your provider's requirements.
remove requirementIssues in implementing the domain ownership verification correctly keep coming up. This should be functionality that is thoroughly tested and reviewed. A lot of effort has been spent in the past to improve the CA ecosystem in recent years, but basic code and implementation quality issues still appear to be a big problem.
removeThe DCV seems still in flux. I am somewhat surprised, as we do have a working reference protocol for this with ACME, but these things do tend to happen. It's software. Interesting that it's even being looked at and caught. That is the most fascinating part of the story.
Health insurance provider Blue Shield of California has posted a notice of a data breach discovered on February 11, 2025, also disclosing in a legally required report to the US Department of Health and Human Services (HHS) that approximately 4.7 million people will be notified their data may have been exposed. No attack nor threat actor was involved: Blue Shield had been using Google Analytics "to internally track website usage of members who entered certain Blue Shield sites," and discovered that Between April 2021 and January 2024 the service "was configured in a way that allowed certain member data to be shared with Google's advertising product, Google Ads, that likely included protected health information," making this a possible breach of HIPAA compliance. Sensitive member data that may have been leaked and subsequently used in focused ad campaigns targeting members as a result include: "Insurance plan name, type and group number; city; zip code; gender; family size; Blue Shield assigned identifiers for members' online accounts; medical claim service date and service provider, patient name, and patient financial responsibility; and 'Find a Doctor' search criteria and results (location, plan name and type, provider name and type)." Social Security Numbers, driver's license numbers, and banking and credit card information were not involved. Blue Shield disconnected Google Analytics from Google Ads on its sites in January 2024, and is reviewing its sites "to ensure that no other analytics tracking software is impermissibly sharing members' protected health information." The notice encourages members to be vigilant, reviewing and protecting their accounts and credit reports.
wy title?Sensitive websites must not use Google Ads or Google Analytics. These and similar tools are designed to record browsing data that often includes PII and other sensitive data.
//This is not the first data leak attributed to usage tracking. Be careful with trackers and analytics on pages with sensitive information. A free service needs to be paid for somehow; find out how and where your information fits into the equation. If you're not actively using the analytics, remove the trackers.
??This was preventable, but then, that is often the case with cybersecurity incidents. Use of website analytics or any software app that 'touches' user data should be a risk register entry and regularly reviewed as part of one's risk management program. At a minimum, notice should be given that online tracking technology is employed on the website.
Blue Shield
The Register
The Record
BleepingComputer
TechCrunch
Among the highlights of Verizon's 2025 Data Breach Investigations Report: thirty percent of breaches involved third-party entities, double the figure from the previous year; while forty-four percent of breaches involved ransomware, the number of organizations that refused to pay the ransomware demand was 64 percent, up from 50 two years ago, and the average ransomware payment was $115,000, down from last year's average of $150,000. The report data are drawn from incidents that took place between November 1, 2023 and October 31, 2024.
??The DBIR began the current era of open source intelligence and continues to be valuable. Avail yourself of it.
???As always, a huge shout out to the folks at Verizon for publishing the investigations report. Two things, among many, stand out to me: 1) the increase in attacks via a third-party provider; and 2) time to remediate a vulnerability. For the first, bring third-party providers into you risk management review, and that means more than simply sending them a questionnaire. For the second, if we don't find a way to automate patching, the adversary will always win.
??It's getting safe to assume a breach will, de facto, include ransomware. At the same time, the need to pay is not required to recover, indicating people have taken mitigation and advance planning to heart. If you don't know what your response plan and mitigations are, find out now. If nobody knows, assume that needs to be addressed and get on it.
The Record
GovInfoSecurity
The Register
SCWorld
SecurityWeek
HelpNetSecurity
Verizon
In 2024, the FBI's Internet Crime Complaint Center (IC3) received reports of losses incurred from cyberattacks totaling $16.6 billion, mostly from fraud and ransomware. This marks a 33 percent increase over 2023 reported losses. Deputy Assistant Director of the FBI's Cyber Division Cynthia Kaiser told reporters that the figure is not representative of total losses to cybercrime, as not all cybercrime is reported to contact law enforcement. Ransomware was the largest threat to critical infrastructure organizations. In all, IC3 received nearly 860,000 complaints in 2024.
??While not all cybercrime is reported to IC3, the numbers are significant, not only in the type and volume of attacks, but also in prevention. It is estimated that since 2022, over 800 million USD have been saved by their services, which include providing free decryption keys. If IC3 is not in your resource list, they need to be: establish contact before you need them.
??IC3 is the latest addition to the FBI's storied history of crime measurement and reporting. When looking at the loss number, keep in mind that direct loss is only a portion of the cost. Some of the other components, for example reputation or lost business, are difficult to quantify but real nonetheless.
Cyberscoop
The Record
GovInfosecurity
SecurityWeek
BleepingComputer
The Register
IC3
The US Cybersecurity and Infrastructure Security Agency (CISA) has published Industrial Control System (ICS) advisories regarding vulnerabilities affecting products from Siemens, Schneider Electric, and ABB. The Siemens advisories address multiple SQL injection vulnerabilities and an improper handling of length parameter inconsistency issue in Siemens TeleControl Server Basic. The Schneider advisories address an information exposure vulnerability in Schneider Electric Wiser Home Controller WHC-5918A and an incorrect calculation of buffer size issue in Schneider Electric Modicon M580 PLCs, BMENOR2200H and EVLink Pro AC. The ABB advisory addresses multiple improper input validation vulnerabilities, an improper restriction of operations within the bounds of a memory buffer vulnerability, and an out-of-bounds write vulnerability in ABB MV Drives.
??A recurring theme here is these are remotely exploitable with low complexity. Beyond applying relevant updates, you need to validate access is limited to authorized systems, and don't expose control systems to the internet. Next, verify your monitoring can detect unwelcome advances, just in case.
??As our infrastructure becomes more and more automated, the distinction between IT and OT will disappear. Indeed, the distinction between cyber and infrastructure may well disappear.
The computer systems and website of Spanish water supplier Aigues de Matar— experienced a cyberattack; the company, which oversees both drinking water and sewage systems for the town of Matar—, says that while billing and other administrative services have been disrupted, their quality control systems were unaffected by the incident. They have notified customers that their personal information may have been compromised in the attack.
??While it doesn't appear to be the case in this attack, connecting IT and OT systems can have a deleterious effect on critical infrastructure. Organizations should use as a risk management tabletop exercise and actively discuss the threats posed to critical infrastructure.
??While it doesn't appear to be the case in this attack, connecting IT and OT systems can have a deleterious effect on critical infrastructure. Organizations should use as a risk management tabletop exercise and actively discuss the threats posed to critical infrastructure.
SMS Gateway Scans; Commvault Exploit; Patch Window Shrinkage; More inetpub issues
https://isc.sans.edu/podcastdetail/9424
Attackers are actively scanning for SMS Gateways. These attacks take advantage of default passwords and other commonly used passwords.
https://isc.sans.edu/diary/Attacks+against+Teltonika+Networks+SMS+Gateways/31888
Commvault, about a week ago, published an advisory and a fix for a vulnerability in its backup software. watchTowr now released a detailed writeup and exploit for the vulnerability
Vulncheck published a summary of exploitation trends, pointing out that about a quarter of vulnerabilities are exploited a day after a patch is made available.
https://vulncheck.com/blog/exploitation-trends-q1-2025
The inetpub directory introduced by Microsoft in its April patch may lead to a denial of service against applying patches on Windows if an attacker can create a junction for that location pointing to an existing system binary like Notepad.
Honeypot iptables Maintenance; XRPL.js Compromise; Erlang/OTP SSH Vuln affecting Cisco
https://isc.sans.edu/podcastdetail/9422
In this diary, Jesse is talking about some of the tasks to maintain a honeypot, like keeping filebeats up to date and adjusting configurations in case your dynamic IP address changes
https://isc.sans.edu/diary/Honeypot+Iptables+Maintenance+and+DShieldSIEM+Logging/31876
An unknown actor was able to push malicious updates of the XRPL.js library to NPM. The library is officially recommended for writing Riple (RPL) cryptocurrency code. The malicious library exfiltrated secret keys to the attacker
https://github.com/XRPLF/xrpl.js/security/advisories/GHSA-33qr-m49q-rxfx
Cisco published an advisory explaining which of its products are affected by the critical Erlang/OTP SSH library vulnerability
More xorsearch Updates; DKIM Replay Attack; SSL.com Vulnerability Fixed
https://isc.sans.edu/podcastdetail/9420
Adhoc YARA rules allow for easy searches using command line arguments without having to write complete YARA rules for simple use cases like string and regex searches
https://isc.sans.edu/diary/xorsearchpy+Ad+Hoc+YARA+Rules/31856
DKIM replay attacks are a known issue where the attacker re-uses a prior DKIM signature. This will work as long as the headers signed by the signature are unchanged. Recently, this attack has been successful against Google.
https://easydmarc.com/blog/google-spoofed-via-dkim-replay-attack-a-technical-breakdown/
SSL.com E-Mail Validation Bug
SSL.com did not properly verify which domain a particular email address is authorized to receive certificates for. This could have been exploited against webmail providers.
Catch up on recent editions of NewsBites or browse our full archive of expert-curated cybersecurity news.
Browse ArchiveShort description of the section to provide users context and value of the content being featured in this carousel.
Webcast | SANS 2025 CTI Survey Webcast & Forum: Navigating Uncertainty in Today's Threat Landscape | May 21, 10:30 am ET As the cyber threat landscape continues to evolve, the past year has presented unique challenges and opportunities for cyber threat intelligence professionals. Save your seat today so you can explore with Rebekah Brown and Andreas Sfakianakis this year's survey results.
Webcast | The Future of Cloud Security Starts with Runtime | May 29, 1:00 ET Modern cloud attacks are fast, stealthy, and constantly evolving-can your security strategy keep up? Join us for an eye-opening session that explores why traditional security tools are falling short and how runtime visibility is becoming a critical pillar of modern cloud defense. Save your seat today.
Webcast | Resiliency and Business Continuity in the Cloud Era | May 22, 1:00 pm ET Join Dave Shackleford and Chris Newman as they discuss - How cloud use is growing and changing, with some emphasis on zero trust and user access strategies - The types of security controls most organizations have implemented in the cloud, Changing compliance and regulatory requirements - Why-and how-we need to rethink business continuity to ensure consistent coverage, even when outages occur Save your seat today.
Webcast | Be a DLP Hero: How to Quickly Deliver Value from Your DLP Program and Set It Up for Future Success | June 4, 1:00 ET Join us for this practical, insight-packed webcast and learn how to confidently launch or strengthen your DLP program for immediate value and long-term success. Save your seat today.