<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Secure Access Firewall — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/secure-access-firewall/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 03 Jan 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/secure-access-firewall/feed.xml" rel="self" type="application/rss+xml"/><item><title>Windows Remote Desktop Network Bruteforce Attempt</title><link>https://feed.craftedsignal.io/briefs/2024-01-rdp-bruteforce/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-rdp-bruteforce/</guid><description>This detection identifies potential RDP brute force attacks by monitoring network traffic for RDP application activity by detecting source IPs that have made more than 10 connection attempts to the same RDP port on a host within a one-hour window.</description><content:encoded><![CDATA[<p>This analytic identifies potential Remote Desktop Protocol (RDP) brute force attacks by monitoring network traffic for RDP application activity. It detects potential RDP brute force attacks by identifying source IPs that have made more than 10 connection attempts to the same RDP port on a host within a one-hour window. The results are presented in a table that includes the source and destination IPs, destination port, number of attempts, and the times of the first and last connection attempts, helping to prioritize IPs based on the intensity of activity. This activity can lead to account compromise and potential ransomware deployment.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker scans the network to identify systems with open RDP ports (TCP 3389).</li>
<li>The attacker initiates multiple RDP connection attempts to a target host, using a list of common usernames and passwords or compromised credentials.</li>
<li>The firewall logs each connection attempt, recording the source and destination IPs, ports, and timestamps.</li>
<li>Sysmon logs the network connections with Event ID 3.</li>
<li>The attacker continues to attempt connections, typically exceeding 10 attempts within an hour.</li>
<li>Upon successful authentication, the attacker gains unauthorized access to the target system.</li>
<li>The attacker may then install malware, move laterally, or exfiltrate sensitive data.</li>
<li>The attacker might deploy ransomware like SamSam or Ryuk, as referenced in external reports.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful RDP brute force attacks can lead to unauthorized access to systems, data breaches, malware infections, and ransomware deployment. Compromised systems can be used as a staging point for further attacks within the network. The references indicate that ransomware attacks have been delivered using RDP brute-force techniques.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Ensure network traffic data is populating the Network_Traffic data model to enable the provided search query.</li>
<li>Deploy the Sigma rule <code>RDP Bruteforce via Network Traffic</code> to detect brute force attempts based on network connection patterns.</li>
<li>Adjust the count and duration thresholds in the detection query to tune the sensitivity for your environment.</li>
<li>Investigate source IPs identified by the detection rule as potential attackers.</li>
<li>Monitor Sysmon EventID 3 for network connections to detect RDP brute-force attempts.</li>
<li>Review the referenced Zscaler and ReliaQuest articles for additional context and mitigation strategies.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>rdp</category><category>bruteforce</category><category>credential-access</category><category>windows</category><category>network</category></item><item><title>Outbound SMB Traffic Detection</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-outbound-smb/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-outbound-smb/</guid><description>This analytic detects outbound SMB connections from internal hosts to external servers, potentially indicating lateral movement and credential theft attempts.</description><content:encoded><![CDATA[<p>This detection identifies outbound Server Message Block (SMB) traffic from internal hosts to external servers. The activity is identified by monitoring network traffic for SMB requests directed towards the Internet, an unusual occurrence in standard operations. This analytic is crucial for Security Operations Centers (SOCs) as it can signal an attacker&rsquo;s attempt to retrieve credential hashes via compromised internal systems, a critical step in lateral movement and privilege escalation. The source mentions specific relevance to &ldquo;Hidden Cobra Malware&rdquo;, &ldquo;DHS Report TA18-074A&rdquo;, and &ldquo;NOBELIUM Group&rdquo;, suggesting possible connections to these threat actors or campaigns.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An internal host is compromised through an initial access vector (e.g., phishing, exploit).</li>
<li>The attacker attempts to enumerate network resources accessible from the compromised host.</li>
<li>The attacker leverages SMB to connect to external servers, typically on ports 139 or 445.</li>
<li>The SMB connection attempts to authenticate or negotiate with the external server.</li>
<li>The attacker may attempt to exploit vulnerabilities in the SMB protocol or server.</li>
<li>The attacker captures or relays credential hashes transmitted over the SMB connection.</li>
<li>The attacker uses the captured credentials to move laterally to other systems or escalate privileges.</li>
<li>The attacker achieves their final objective, such as data exfiltration or system compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of outbound SMB traffic can lead to unauthorized access to sensitive data and full system compromise. Lateral movement and privilege escalation are key goals. Confirmed malicious SMB traffic could enable attackers to move through the network, potentially impacting numerous systems and leading to significant data breaches. While the number of victims isn&rsquo;t specified, the detection&rsquo;s relevance to known threat actors suggests potentially widespread impact.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Outbound SMB Traffic Detected</code> to your SIEM and tune it for your environment, using the provided positive and negative test cases to ensure accurate detection.</li>
<li>Investigate and block any detected outbound SMB connections that are not explicitly authorized by legitimate business needs (reference <code>detect_outbound_smb_traffic_filter</code> macro in the original search).</li>
<li>Implement network segmentation to restrict internal hosts from directly accessing external SMB services.</li>
<li>Enforce strong password policies and multi-factor authentication to mitigate the impact of credential theft.</li>
<li>Categorize internal CIDR blocks as <code>internal</code> in your asset management system to reduce false positives (reference &ldquo;known_false_positives&rdquo; section).</li>
<li>Consider blocking external communications of all SMB versions and related protocols at the network boundary.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>network</category><category>smb</category><category>lateral-movement</category><category>privilege-escalation</category></item></channel></rss>