
SANS Stormcast Friday Mar 7th: Chrome vs Extensions; Kibana Update; PrePw0n3d Android TV Sticks; Identifying APTs (@sans_edu, Eric LeBlanc)
Loading summary
A
Hello and welcome to the Friday March 7, 2025 edition of the SANS and its storm centers Stormcast. My name is Johannes Ulrich and today I'm recording from Baltimore, Maryland. Well, we all know it's important to keep your browsers up to date. Last week Google did release a new update for Google Chrome. Unfortunately, they're sort of doubling down on getting rid of older extensions that are still using the version 2 of manifest. The problem here is that these older extensions had more privileges to interact with Chrome, which Google no longer wants to allow. However, there are also some beneficial extensions that took advantage of this access. One that's very vocal here is Uplock Origin. Uplock Origin now in this latest update is automatically being deactivated and then if a user is trying to manage their extensions well, they're kind of pushed in the direction of actually uninstalling and removing this extension. The problem is, well, you don't actually have to remove it, you are able to reactivate it. For now, just Google doesn't make that very obvious. This has been an ongoing battle between sort of UBlock origin and Google not 100% sure if UBlock origin could come up with other ways to do its work and block advertisements. Of course one of the suspicions here is that Google's reliance on advertisement revenue makes them more likely to actually prevent users from running these type of extensions in their browsers.
B
Let me have some critical updates to talk about.
A
First of all, Kibana Kibana of course is also part of our Honeypot Seam. It's the popular dashboard for elasticsearch and it suffers from a prototype pollution vulnerability that could allow arbitrary code execution in order to exploit the vulnerability and attacker would have to have access as viewer to the dashboard. Now this is of course a low privilege account usually and often provided without password or with well known password just to allow users to for example review a particular public dashboard. So updated. There's also a quick workaround that you can enable. I'll link to the advisory from Kibana in the show Notes Fired has a story, well that we have sadly seen before and that's Android web TV devices that are showing up with preinstalled backdoors. These are these commonly known sort of as TV stick devices, usually just a little HDMI plug that you plug into your tv, maybe some USB for a power supply. But yes, these devices come with adware and the like preinstalled and apparently just another batch has been found with about a million or so compromised devices. Not too much really you can do.
B
About this other than well Be careful.
A
Where you're buying these devices from and also probably not necessarily going to the cheapest device out there from any kind of no name supplier. Well, and it's Friday and I do have another sans Edu student to interview here. Eric, could you introduce yourself please?
C
Sure. My name is Eric LeBlanc, I'm a senior cybersecurity engineer at the US Strategic Petroleum Reserve. And my paper was on a new technique that I developed for attempting to detect advanced persistent threat actors within an environment.
B
Yeah, so advanced persistent threat actors, of course one thing they try to do to stay persistent is not to get detected. So what was the new technique that you came up with there?
C
So here I created a thing that I call meta detection. So it examines your detections over a longer period of time than you might traditionally look at for detections. It works similar to how risk based alerting works in that you're looking at things over time. However, specifically what I was looking at was tracking things using the MITRE, ATT and CK framework and specifically known TTPs that have been used by specific threat actor groups. So effectively trying to identify known ones that known actors that might be specifically looking for a given enterprise. So it requires you to go through a good threat modeling process to know what actors might actually be targeting you as well as understanding their tradecraft and what they're doing. But specifically it's looking at how they have acted in historic intrusions and trying to connect dots within your environment.
B
Okay, cool, so let's make a little bit more specific. What was one of the threat actors that you selected there?
C
Yeah, so specifically I was looking at apt 29 for the experiment that I conducted because they're fairly well known and well researched entity already and we had a very large history to pull from and look at for their potential techniques. And it was interesting in my experiments it showed as effective as risk based alerting, which was a bit of a surprise to me.
B
Yeah, and so what was like one of the indicators or TDPs that you sort of looked for here?
C
Yeah, so specifically we were looking at things that they'd done historically. So we were looking at some of the same lateral movement techniques that they were using, like via remote management or Windows administration tools, things like that. We were looking for all of these various sub techniques that they had done in the past, but we were looking to connect them within the environment over a history. So basically one of the problems we had found with risk based alerting is that you need to set that threshold because there's going to be some amount of noise. Administration tools look a lot like hacker tools many times. So basically a problem can be filtering the noise from what is normal behavior. One of the things that I found was that normal behavior doesn't strictly follow the known plan of an apt actor in many cases. So it was easier to say, okay, well I see this execution activity. And then I've later, weeks later, okay, well then this host I saw execution activity on ended up attempting lateral movement or, or attempted to do reconnaissance or something like that by unknown method. So like say it was they were doing SMB enumeration or they were doing something more specific that is not routinely done within the environment and linking those things together through a series of detections that are looking at historical data from within the environment.
B
Yeah, so basically not them exploiting it or doing lateral movement right away, but waiting then for this. And yeah, that's certainly something that APD sometimes tends to do sort of as they sort of figure out what they have and don't have. The one challenge that I can sort of think of, the alarm bell that sort of goes off right away is how to deal with all the data.
A
Over that amount of time.
C
So in this instance, I am both gifted and cursed by working in a federal environment. So one of the big OMB memos that came out in recent years involved logging and log retention periods. So by OMB rule, we have to maintain minimum one year of logs in hot storage so that we have to have that available to look over as well as an additional 18 months in archive storage. So at any given time within the environment that I was testing in, we have a whole year of logs to look at. So it's very pricey. It's a luxury that not a lot of entities have. However, per regulatory orders, we have to have that. So within federal governments at least, you're going to have those locks.
A
Yeah. And also the ability to search then.
B
Because that's the other cost factor here. Storage is cheap to some extent, but fast storage that you can actually search with queries like this. Were you able to do some sort of pre filtering or such to speed that up or any sort of data management procedures that helped here?
C
Sure. So in this case we were querying across the previous detection specifically. So we're not looking at all of the underlying log data, we're looking at the records generated from previously fired detections. So all of that data is pretty small and pretty easily searched through. Specifically we were annotating within the detection field saying okay, using MITRE technique IDs or. And also the kill chain phase that a given detection corresponds to. So from there you can say show me all of the detections that fired with actions on objectives as the kill chain phase. And it would then filter out based on whatever your query was, whether you were looking at an individual host, you were looking at the whole environment, things like that. So in this case specifically, I was working within Splunk Enterprise Security. You can do the same thing with other siems as well. I know Soft Elk, you can have annotations for your detections. And yeah, it's not unique to that specific tool, but it was one that we're using in our environment.
A
Yeah.
B
Give us a little bit an idea of the scalability and practicality of this. Can you say approximately, like how many logs or how many endpoints are such you. You're monitoring?
C
Yeah. So for this environment we were looking at approximately, I think it was around 3 to 4,000 endpoints total between end user devices, networking equipment, servers, all that. So it's not a small environment, but I would say it. I think our total number of users is around 12 to 1300 end users. So not a small business for sure. But it's not necessarily the size of some worldwide enterprises. But in theory the logic should scale because you're looking at previously detected events, so you're not having to pour through terabytes of actual log files. You're really only looking at previous detections. So what might be considered either an event of interest or you know, choose your, your favorite vocabulary for that. But yeah, so you're only looking at sort of the summarized events and what.
B
Sort of detection delay then like, no, basically after the event happened, how long would it take you like you run these queries daily, hourly or.
C
Yeah, so I was running these queries and at the, as part of the experiment I was running them every 15 minutes. So they run very quickly. It only took I think maybe a couple seconds for the actual query to run through. So I was doing them periodically. Over a large enterprise, you may want to scale that up some. It depends on the sensitivity that you're looking for. But because you're going over summarized data, it's much faster.
A
Yeah.
B
And I guess in a large enterprise you would also not run it necessarily over the entire enterprise, but some department, some critical enclave or something like that.
C
Yeah, something that you've identified as part of your crown jewels analysis or something like that.
A
Yeah.
B
So that's really cool you're using this.
A
Right now in your day to day job.
C
Yes.
A
Yeah.
B
So great. The link to the paper will be added to the show notes so if anybody's interested in any more details here and how this all exactly worked any final words Eric anything to give people on their way to implement this sure.
C
So don't be daunted by how much it goes like how much needs to be done beforehand because this really isn't something that I would expect to work early on in the maturity process for an environment you need a whole lot of base level skills to make this work you need have an active threat intelligence practice both consuming and producing you need to have very mature detection engineering that you know that these individual detections that are firing have good fidelity and have already been tuned well it it takes a lot and it is a journey so there's a lot of underlying assumptions there that are required and you the only way to get there is to actually do the work yeah Creighton.
B
Thanks for being here thanks for everybody listening and talk to you again on Monday bye.
This episode of the SANS Internet Stormcenter Daily Cyber Security Podcast, hosted by Johannes B. Ullrich, provides a concise but comprehensive roundup of pressing security topics: Chrome's crackdown on Manifest V2 extensions, a critical Kibana vulnerability, the latest in compromised Android TV devices, and an interview with SANS Edu student Eric LeBlanc on innovative methods for APT (Advanced Persistent Threat) detection in large environments. The episode blends actionable news with a deeper dive into emerging detection methodologies.
[04:15–05:15]
Notable Quote:
[07:34–10:27]
Notable Quote:
On Chrome and uBlock Origin:
On Android TV Backdoors:
On Meta Detection Approach:
On Real-World Implementation:
Final Advice for Listeners:
This episode blends practical news with strategy advice: Chrome's ad blocker clampdown, Kibana’s urgent vulnerability, and another wave of compromised IoT devices serve as reminders of evolving cyber risks. The main feature, Eric LeBlanc’s interview, offers a high-level, actionable look at meta detection for APTs: using smarter, longer-term analysis powered by structured threat intelligence and detection engineering. If you want to know how mature organizations chase adversaries across months—and what it takes to implement those techniques—this brisk listen is essential.