<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>FortiEDR — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/fortiedr/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 03 Jan 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/fortiedr/feed.xml" rel="self" type="application/rss+xml"/><item><title>Suspicious Firewall Modification to Allow Network Discovery</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-allow-network-discovery-firewall/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-allow-network-discovery-firewall/</guid><description>Detection of 'netsh' command execution to enable network discovery in the firewall, a technique commonly used by ransomware such as REvil and RedDot to discover and compromise additional machines on the network.</description><content:encoded><![CDATA[<p>This alert detects suspicious use of the <code>netsh</code> command to enable network discovery through the Windows Firewall. Ransomware actors like REvil and RedDot use this technique to discover and compromise additional machines on the network, leading to widespread file encryption. The detection leverages Endpoint Detection and Response (EDR) data, focusing on command-line executions involving the <code>netsh</code> command. Attackers modify the firewall to allow network discovery, which aids in lateral movement and identifying valuable targets within the compromised network. This activity is a strong indicator of reconnaissance and preparation for ransomware deployment. The detection specifically looks for <code>netsh</code> commands that enable the &ldquo;Network Discovery&rdquo; group with a &ldquo;Yes&rdquo; value, highlighting a deliberate attempt to bypass default firewall restrictions for network scanning.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial access is gained through an existing vulnerability or compromised credentials.</li>
<li>The attacker executes a command shell (e.g., cmd.exe, powershell.exe).</li>
<li>The attacker uses the <code>netsh</code> command to modify firewall settings.</li>
<li>Specifically, the attacker enables network discovery by setting the &ldquo;Network Discovery&rdquo; group to &ldquo;Yes&rdquo; in the firewall configuration.</li>
<li>The modified firewall settings allow the attacker to perform network scans.</li>
<li>The attacker uses network scanning tools (e.g., ping, nbtscan, or custom scripts) to identify vulnerable machines on the network.</li>
<li>The attacker moves laterally to these identified machines using exploits or stolen credentials.</li>
<li>Finally, the attacker deploys ransomware across multiple hosts, encrypting files and demanding ransom.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful execution of this attack can lead to widespread file encryption across multiple hosts, significantly amplifying the impact of the ransomware attack. This can result in data loss, business disruption, and significant financial costs associated with recovery and ransom payments. Victims may experience downtime, reputational damage, and potential legal repercussions due to data breaches. The impact can extend beyond the initially compromised machine, affecting critical infrastructure and sensitive data stored on other network systems.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Sysmon process creation logging to capture the command-line details required for detection (Sysmon EventID 1).</li>
<li>Deploy the Sigma rule <code>Detect Firewall Modification for Network Discovery</code> to your SIEM and tune for your environment.</li>
<li>Investigate any alerts generated by the rule, focusing on the parent processes and user accounts involved.</li>
<li>Monitor Windows Event Log Security events with event ID 4688 for process creation events, which can provide additional context for this activity.</li>
<li>Review and harden firewall configurations to prevent unauthorized modifications.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>ransomware</category><category>lateral-movement</category><category>windows</category></item><item><title>Firewall Modification for File and Printer Sharing</title><link>https://feed.craftedsignal.io/briefs/2024-01-file-sharing-firewall/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-file-sharing-firewall/</guid><description>This analytic detects the modification of Windows Firewall settings to enable file and printer sharing, a common technique used by ransomware to facilitate lateral movement and broader network encryption.</description><content:encoded><![CDATA[<p>This detection focuses on identifying suspicious modifications to Windows Firewall rules that enable file and printer sharing. Ransomware actors often leverage this technique to propagate across a network, discover valuable data, and encrypt files on multiple systems. By enabling file and printer sharing via <code>netsh</code> commands, attackers can bypass default security configurations and gain unauthorized access to network resources. This activity, if successfully executed, significantly increases the blast radius of a ransomware attack, potentially impacting critical business operations and causing significant financial losses. The detection specifically looks for command-line executions that modify firewall settings to allow file and printer sharing, providing an early warning of potential ransomware activity. The references include details about FortiEDR detecting Revil ransomware and an ANY.RUN task related to malicious firewall modifications.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a host within the network through various means (e.g., phishing, exploit).</li>
<li>The attacker executes a <code>netsh</code> command to modify the Windows Firewall settings.</li>
<li>The <code>netsh</code> command specifically targets the &ldquo;File and Printer Sharing&rdquo; group.</li>
<li>The command enables file and printer sharing, allowing inbound connections on related ports.</li>
<li>The attacker uses file and printer sharing protocols (e.g., SMB) to enumerate network shares.</li>
<li>The attacker identifies accessible file shares on other systems within the network.</li>
<li>The attacker attempts to move laterally to other systems using compromised credentials or exploits.</li>
<li>Upon successful lateral movement, the attacker deploys ransomware payloads to encrypt data across the network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation and execution of this technique can lead to widespread file encryption across the network. This can result in significant business disruption, data loss, and financial damage. The scope of impact depends on the size and complexity of the network, but can easily affect hundreds or thousands of systems. Victims may experience data breaches, compliance violations, and reputational damage. Ransomware incidents can cost organizations millions of dollars in recovery efforts, legal fees, and lost revenue.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Firewall Modification for File and Printer Sharing</code> to your SIEM and tune for your environment to detect the described behavior.</li>
<li>Enable process creation logging, specifically Sysmon Event ID 1 and Windows Event Log Security 4688, to capture the necessary command-line details.</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on the process name, command-line arguments, user context, and destination host.</li>
<li>Review and audit existing firewall rules to identify any unnecessary or overly permissive file and printer sharing configurations.</li>
<li>Consider implementing network segmentation to limit the potential impact of lateral movement.</li>
<li>Monitor for <code>netsh</code> executions that modify firewall rules (Sysmon Event ID 1)</li>
<li>Use the provided references to research additional information regarding detection and mitigation.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>ransomware</category><category>lateral-movement</category><category>windows</category></item></channel></rss>