<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Paste.ee — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/paste.ee/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 03 Jan 2024 15:30:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/paste.ee/feed.xml" rel="self" type="application/rss+xml"/><item><title>Windows Hosts Querying Abused Web Services</title><link>https://feed.craftedsignal.io/briefs/2024-01-windows-abused-web-services/</link><pubDate>Wed, 03 Jan 2024 15:30:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-windows-abused-web-services/</guid><description>Adversaries may use abused web services such as paste sites, VoIP, and file hosting to host malicious payloads or facilitate command and control, detected via DNS queries from Windows hosts to these services.</description><content:encoded><![CDATA[<p>This threat brief highlights the abuse of legitimate web services by threat actors to host and distribute malicious content, as well as to facilitate command and control (C2) activities. The activity is identified through DNS queries originating from Windows hosts to a list of known, abused web services, including paste sites (e.g., Pastebin), file hosting services (e.g., Mediafire), and cloud platforms (e.g., Cloudflare Workers). This technique allows attackers to evade traditional network-based detections by leveraging the reputation and infrastructure of these legitimate services. Detection is based on Sysmon Event ID 22 (DNS Query) logs. This is significant as it may indicate initial access, command and control or lateral movement within the network.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>A user on a Windows host inadvertently clicks a malicious link or opens a compromised document.</li>
<li>The malicious content triggers a process (e.g., PowerShell, cmd.exe) to execute.</li>
<li>The executed process initiates a DNS query to a known, abused web service (e.g., pastebin.com, mega.nz) using Windows DNS client.</li>
<li>The DNS query resolves to the IP address of the web service hosting the malicious payload or C2 instructions.</li>
<li>The process establishes a network connection (HTTP/HTTPS) to the resolved IP address to download a file or receive commands.</li>
<li>The downloaded file is saved to disk or executed directly in memory.</li>
<li>The executed payload performs malicious activities, such as establishing persistence, exfiltrating data, or deploying additional malware.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to the initial compromise of a system, allowing attackers to establish a foothold within the network. This can result in data theft, deployment of ransomware, or further propagation of the attack to other systems on the network. Identifying systems making these queries can help identify compromised systems and prevent further damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Sysmon DNS query logging (Event ID 22) to capture DNS requests for external domains.</li>
<li>Deploy the Sigma rule <code>Detect Windows Abused Web Services DNS Queries</code> to your SIEM and tune for your environment.</li>
<li>Monitor network traffic for connections to the domains listed in the IOC table and investigate any suspicious activity.</li>
<li>Implement network segmentation to limit the impact of a compromised host.</li>
<li>Block the C2 domains listed in the IOC table at the DNS resolver.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>abused-web-service</category><category>command-and-control</category><category>initial-access</category><category>windows</category></item></channel></rss>