<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Secure Endpoint — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/secure-endpoint/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 03 Jan 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/secure-endpoint/feed.xml" rel="self" type="application/rss+xml"/><item><title>Cisco Secure Endpoint Uninstallation via SFC Utility</title><link>https://feed.craftedsignal.io/briefs/2024-01-cisco-secure-endpoint-uninstall/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-cisco-secure-endpoint-uninstall/</guid><description>The sfc.exe utility is used with the "-u" parameter to uninstall Cisco Secure Endpoint components, potentially disabling endpoint protection and facilitating further exploitation.</description><content:encoded><![CDATA[<p>The System File Checker (sfc.exe) is a Windows utility used to scan and restore corrupted system files. However, it can also be abused to uninstall components of security software. This detection focuses on the use of <code>sfc.exe</code> with the <code>-u</code> parameter, a legitimate but potentially malicious use case related to Cisco Secure Endpoint. An attacker might leverage this command to remove or disable parts of the endpoint protection suite, creating an opportunity to deploy malware, exfiltrate data, or perform other malicious activities without immediate detection. This type of tampering aims to weaken defenses before a more significant attack. This activity is often part of a broader effort to disable security mechanisms to avoid detection.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial access to the system is achieved through unspecified means (e.g., compromised credentials, software vulnerability).</li>
<li>The attacker gains elevated privileges on the compromised system.</li>
<li>The attacker executes <code>sfc.exe</code> with the <code>-u</code> parameter to attempt to uninstall the Cisco Secure Endpoint Immunet service.</li>
<li><code>sfc.exe</code> attempts to uninstall the specified Cisco Secure Endpoint component.</li>
<li>If successful, the targeted component of Cisco Secure Endpoint is disabled or removed from the system.</li>
<li>The attacker leverages the weakened state of the endpoint security to deploy malware or perform other malicious activities.</li>
<li>The attacker attempts to move laterally within the network.</li>
<li>The attacker exfiltrates sensitive data from the compromised system or network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful execution of this attack can lead to the complete removal or disabling of Cisco Secure Endpoint protection on a targeted system. This leaves the system vulnerable to malware infection, data exfiltration, and other malicious activities. The impact can range from individual system compromise to a widespread breach affecting numerous endpoints within an organization, leading to significant data loss and operational disruption.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect Cisco Secure Endpoint Uninstall via SFC</code> to your SIEM and tune for your environment.</li>
<li>Monitor process execution logs for instances of <code>sfc.exe</code> being used with the <code>-u</code> parameter, as highlighted in the Sigma rule and the <code>search</code> field in the provided source.</li>
<li>Investigate any detected instances of this behavior to determine if they are legitimate or malicious, per the <code>known_false_positives</code> from the original source.</li>
<li>Implement strict access controls to limit the ability of users to execute system utilities like <code>sfc.exe</code>.</li>
<li>Enable Sysmon process-creation logging to activate the rules above.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>security-solution-tampering</category><category>endpoint</category><category>windows</category></item><item><title>Cisco Secure Endpoint Tampering via SFC Utility</title><link>https://feed.craftedsignal.io/briefs/2024-01-cisco-secure-endpoint-sfc-unblock/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-cisco-secure-endpoint-sfc-unblock/</guid><description>The sfc.exe utility is being used with the '-unblock' parameter, a feature within Cisco Secure Endpoint, to remove system blocks imposed by the endpoint protection, potentially indicating an attempt to bypass security measures and execute blocked malicious payloads.</description><content:encoded><![CDATA[<p>This analytic focuses on detecting the misuse of the System File Checker (sfc.exe) utility with the <code>-unblock</code> parameter, a specific feature integrated within Cisco Secure Endpoint. This functionality is designed to remove system-level blocks that Cisco Secure Endpoint imposes on files or processes identified as potentially malicious. While legitimate use cases exist for troubleshooting and resolving false positives, adversaries can exploit this command to bypass endpoint protection mechanisms. By unblocking files, attackers can facilitate the execution of malware, evade detection, and maintain persistence within the compromised environment. The targeted use of <code>sfc.exe -unblock</code> is a significant indicator of potential security solution tampering.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a compromised endpoint, possibly through phishing or exploiting a software vulnerability.</li>
<li>The attacker identifies a file or process blocked by Cisco Secure Endpoint.</li>
<li>The attacker elevates privileges to execute commands with administrative rights.</li>
<li>The attacker uses the <code>sfc.exe</code> utility with the <code>-unblock</code> parameter, specifying the blocked file&rsquo;s path as an argument: <code>sfc.exe /UNBLOCK=&lt;file_path&gt;</code>.</li>
<li>SFC removes the block imposed by Cisco Secure Endpoint on the specified file.</li>
<li>The attacker executes the previously blocked file, initiating the malicious payload.</li>
<li>The malicious payload performs actions such as establishing command and control, lateral movement, or data exfiltration.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to bypass Cisco Secure Endpoint&rsquo;s protective measures, enabling the execution of blocked malware or tools. This can lead to a full system compromise, data theft, or disruption of services. The impact is especially severe if critical system files are unblocked, potentially destabilizing the operating system.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect Cisco Secure Endpoint File Unblock via SFC</code> to identify instances where <code>sfc.exe</code> is used with the <code>-unblock</code> parameter.</li>
<li>Investigate any identified instances of <code>sfc.exe -unblock</code> to determine if the action was legitimate and authorized.</li>
<li>Monitor process execution for any files unblocked via <code>sfc.exe</code>, and correlate with other security events to detect malicious activity.</li>
<li>Implement additional endpoint monitoring to detect suspicious activity following the use of <code>sfc.exe -unblock</code>.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>defense-evasion</category><category>endpoint</category><category>cisco</category></item><item><title>Cisco Secure Endpoint Tampering via SFC Utility</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-cisco-secure-endpoint-tampering/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-cisco-secure-endpoint-tampering/</guid><description>An attacker attempts to disable the Immunet Protect service of Cisco Secure Endpoint by leveraging the `sfc.exe` utility with the `-k` parameter, potentially blinding the EDR for further compromise.</description><content:encoded><![CDATA[<p>This threat brief addresses the potential tampering of Cisco Secure Endpoint&rsquo;s Immunet Protect service. The technique involves leveraging the <code>sfc.exe</code> utility, a legitimate component within the Cisco Secure Endpoint installation, to stop the Immunet service. The abuse of <code>sfc.exe</code> with the <code>-k</code> parameter is a critical indicator, as it&rsquo;s not a typical administrative function and signals a deliberate attempt to weaken endpoint defenses. This activity matters because a compromised endpoint with disabled security measures can lead to further exploitation, lateral movement, and data exfiltration. The technique was observed in the Splunk security content and can be detected via endpoint telemetry.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial access is assumed to have been achieved via other means (e.g., phishing, exploit).</li>
<li>The attacker gains a foothold on the targeted endpoint.</li>
<li>The attacker identifies the presence of Cisco Secure Endpoint and Immunet Protect.</li>
<li>The attacker executes <code>sfc.exe</code> with the <code>-k</code> parameter, specifically targeting the Immunet Protect service.</li>
<li>The command execution stops the Immunet Protect service, effectively disabling real-time protection.</li>
<li>The attacker leverages the weakened security posture to deploy malware or execute malicious scripts.</li>
<li>The attacker attempts lateral movement to other systems on the network.</li>
<li>The attacker achieves their objective (e.g., data theft, ransomware deployment) without detection.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack can lead to the disabling of real-time protection offered by Immunet Protect, a component of Cisco Secure Endpoint. This allows attackers to bypass endpoint security measures and execute malicious code without detection. The impact may include data breaches, ransomware infections, and further compromise of systems within the network. The number of victims depends on the scope of the attacker&rsquo;s lateral movement after initial compromise.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Windows Cisco Secure Endpoint Stop Immunet Service Via Sfc&rdquo; to your SIEM to detect the execution of <code>sfc.exe</code> with the <code>-k</code> parameter (see rules section).</li>
<li>Enable Sysmon process creation logging to capture command-line arguments for process monitoring and detection (see logsource).</li>
<li>Investigate any instances of <code>sfc.exe</code> execution with the <code>-k</code> parameter, especially when originating from unusual parent processes or locations.</li>
<li>Implement strict process whitelisting to prevent unauthorized execution of <code>sfc.exe</code> from non-standard paths.</li>
<li>Monitor for unusual process behavior following the execution of <code>sfc.exe</code>, such as the creation of suspicious files or network connections.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>defense-evasion</category><category>endpoint</category><category>cisco</category></item></channel></rss>