Skip to content
Threat Feed
low advisory

Spike in Remote File Transfers via Lateral Movement

A machine learning job detects an abnormal volume of remote file transfers, potentially indicating lateral movement by attackers attempting to blend in with normal network egress activity.

The “Spike in Remote File Transfers” detection identifies potential lateral movement activity within a network by monitoring for unusual volumes of remote file transfers. Attackers often aim to locate and exfiltrate valuable information after gaining initial access. To evade detection, they may attempt to mimic normal egress activity through numerous small transfers. This detection leverages machine learning to establish a baseline of normal transfer activity and identify deviations that may indicate malicious behavior. The rule requires the Lateral Movement Detection integration assets to be installed. For Elastic Defend events on versions 8.18 and above, host.ip collection must be enabled.

Attack Chain

  1. Initial Access: An attacker gains initial access to a host within the network through an exploit or compromised credentials.
  2. Internal Reconnaissance: The attacker performs internal reconnaissance to identify valuable data and potential target systems.
  3. Lateral Movement: The attacker uses stolen credentials or exploits remote services (T1210) to gain access to other systems on the network.
  4. Tool Transfer: The attacker transfers malicious tools or scripts (T1570) to the compromised systems to facilitate further actions.
  5. Data Collection: The attacker gathers sensitive data from the compromised systems.
  6. Egress Activity: The attacker initiates numerous small remote file transfers, attempting to blend in with normal network traffic.
  7. Data Exfiltration: The attacker exfiltrates the stolen data to an external location.

Impact

A successful lateral movement attack involving anomalous file transfers can lead to data exfiltration, intellectual property theft, and reputational damage. Even though the severity is low, undetected lateral movement can escalate quickly into high severity incidents like ransomware or data breaches. This detection focuses on the early stages of lateral movement, allowing security teams to respond before significant damage occurs.

Recommendation

  • Ensure host IP collection is enabled in Elastic Defend configurations, following the steps in the helper guide.
  • Install the Lateral Movement Detection integration assets as described in the setup instructions in the rule documentation.
  • Investigate alerts generated by the “Spike in Remote File Transfers” rule, paying close attention to the source and destination of the file transfers.
  • Review authentication logs for signs of compromised accounts, such as unusual login times or locations, as described in the rule’s triage notes.
  • Tune the machine learning job’s anomaly threshold based on your environment’s baseline activity and false positive analysis.

Detection coverage 2

Detect Remote File Transfers via Uncommon Processes

medium

Detects remote file transfers initiated by processes that are not typically associated with network activity, which may indicate lateral movement.

sigma tactics: lateral_movement techniques: T1570 sources: process_creation, windows

Detect High Volume SMB Traffic

low

Detects an unusual volume of Server Message Block (SMB) traffic, which can be indicative of lateral movement activities.

sigma tactics: lateral_movement techniques: T1021.002 sources: network_connection, windows

Detection queries are kept inside the platform. Get full rules →