<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>CISCO Talos — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/cisco-talos/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 03 Jan 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/cisco-talos/feed.xml" rel="self" type="application/rss+xml"/><item><title>Potential Lateral Tool Transfer via SMB Share</title><link>https://feed.craftedsignal.io/briefs/2024-01-lateral-tool-transfer-smb/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-lateral-tool-transfer-smb/</guid><description>The rule identifies the creation or change of a Windows executable file over network shares, indicating potential lateral tool transfer via SMB, which adversaries may use to move tools between systems in a compromised environment.</description><content:encoded><![CDATA[<p>This detection rule identifies the potential transfer of malicious tools within a Windows environment using SMB shares. Attackers commonly leverage SMB shares to propagate malware, tools, or scripts to compromised systems for lateral movement. The rule focuses on detecting the creation or modification of executable files (e.g., .exe, .dll, .ps1) on network shares, which is a strong indicator of malicious activity. The rule leverages Elastic Defend data to detect this activity and can be used to identify systems that may be compromised. This technique is used to deploy additional payloads, credential dumpers, or other malicious tools.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a system within the network.</li>
<li>The attacker identifies accessible SMB shares within the compromised environment.</li>
<li>The attacker uses the compromised system to connect to a target SMB share (port 445) on another system.</li>
<li>The attacker copies an executable file (e.g., malware, a credential dumping tool, or a PowerShell script) to the SMB share.</li>
<li>The target system detects a new file creation or change event on the SMB share.</li>
<li>A user or process on the target system executes the transferred file.</li>
<li>The executed file performs malicious actions on the target system, such as credential theft or lateral movement.</li>
<li>The attacker uses the newly compromised system to further expand their access within the network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to propagate malware or malicious tools throughout the network, leading to widespread compromise. Lateral movement enables attackers to access sensitive data, escalate privileges, and ultimately achieve their objectives, which may include data exfiltration, ransomware deployment, or system disruption. The rule aims to detect this activity early in the attack chain and mitigate potential damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rules to your SIEM to detect suspicious executable file creation/modification events on SMB shares.</li>
<li>Enable Elastic Defend on all Windows endpoints to provide the necessary data for the detection rule to function.</li>
<li>Investigate any alerts triggered by the Sigma rules, focusing on the process execution chain, file reputation, and user activity.</li>
<li>Review and restrict write access to network shares to minimize the risk of unauthorized file transfers.</li>
<li>Monitor network connections to port 445 (SMB) for suspicious activity, especially connections originating from unusual source IPs (Sigma rule, log source).</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">threat</category><category>lateral-movement</category><category>smb</category><category>file-transfer</category><category>windows</category></item></channel></rss>