<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>SharePoint — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/sharepoint/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Sat, 14 Dec 2024 14:30:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/sharepoint/feed.xml" rel="self" type="application/rss+xml"/><item><title>Potential Web Shell ASPX File Creation</title><link>https://feed.craftedsignal.io/briefs/2024-12-potential-web-shell-aspx-file-creation/</link><pubDate>Sat, 14 Dec 2024 14:30:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-12-potential-web-shell-aspx-file-creation/</guid><description>The creation of ASPX files in web server directories, excluding legitimate processes, indicates potential web shell deployment for persistence on Windows systems.</description><content:encoded><![CDATA[<p>Attackers frequently deploy web shells to maintain persistence and execute arbitrary commands on compromised web servers. This rule identifies the creation of ASPX files, commonly used in Windows environments, within directories typically targeted for web shell deployment. The rule focuses on the &ldquo;?:\Program Files\Common Files\Microsoft Shared\Web Server Extensions\*&rdquo; path, a common location for web server extensions and potential web shell placements. By excluding legitimate processes such as msiexec.exe and psconfigui.exe, the rule aims to detect suspicious ASPX file creation events indicative of malicious activity. The detection logic helps defenders identify potential web shell installations, allowing for timely response and remediation to prevent further compromise. This activity has been observed in exploitation attempts targeting SharePoint servers.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to the target system, potentially through exploiting a vulnerability in a web application or service running on the server (e.g., SharePoint).</li>
<li>The attacker leverages the compromised web application to upload a malicious ASPX file to a directory within the web server&rsquo;s file system, specifically targeting locations like &ldquo;?:\Program Files\Common Files\Microsoft Shared\Web Server Extensions\*&rdquo;.</li>
<li>The uploaded ASPX file contains malicious code designed to provide the attacker with remote access and control over the server.</li>
<li>The attacker triggers the execution of the ASPX file by sending a request to the web server, which processes the ASPX file and executes the embedded malicious code.</li>
<li>The web shell allows the attacker to execute arbitrary commands on the server, potentially escalating privileges and moving laterally within the network.</li>
<li>The attacker uses the web shell to establish persistence on the compromised server, ensuring continued access even after the initial vulnerability is patched.</li>
<li>The attacker may use the web shell to exfiltrate sensitive data from the server or to deploy additional malware and tools.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful web shell deployment can lead to complete compromise of the affected server, potentially impacting numerous organizations. Attackers can use web shells to execute arbitrary code, steal sensitive data, and establish persistent access to internal networks. The impact includes data breaches, financial losses, and reputational damage. Successful exploitation of SharePoint vulnerabilities leading to web shell deployment has been observed in the wild.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Web Shell ASPX File Creation in Common Directories&rdquo; to detect suspicious ASPX file creation events, filtering out legitimate processes to reduce false positives.</li>
<li>Enable Sysmon Event ID 11 (File Create) to capture file creation events on Windows systems, which is a data source for the Sigma rule.</li>
<li>Investigate any alerts generated by the Sigma rule &ldquo;Web Shell ASPX File Creation in Common Directories&rdquo; by examining the file path, creating process, and network activity around the time of the event.</li>
<li>Monitor web server logs for suspicious requests targeting ASPX files in common web server directories, as referenced in the rule description.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">threat</category><category>web-shell</category><category>persistence</category><category>windows</category></item><item><title>Detection of Command and Control Activity via Commonly Abused Web Services</title><link>https://feed.craftedsignal.io/briefs/2024-01-04-c2-web-services/</link><pubDate>Thu, 04 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-04-c2-web-services/</guid><description>This rule detects command and control activity using common web services by identifying Windows hosts making DNS requests to a list of commonly abused web services from processes outside of known program locations, potentially indicating adversaries attempting to blend malicious traffic with legitimate network activity.</description><content:encoded><![CDATA[<p>Adversaries may implement command and control (C2) communications that use common web services to hide their activity. This attack technique is typically targeted at an organization and uses web services common to the victim network, which allows the adversary to blend into legitimate traffic activity. These popular services are typically targeted since they have most likely been used before compromise, which helps malicious traffic blend in. This detection focuses on identifying connections from Windows hosts to a predefined list of commonly abused web services from processes running outside of typical program installation directories, indicating a potential C2 channel leveraging legitimate services. The rule aims to detect this behavior by monitoring network connections and DNS requests originating from unusual locations.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial access is achieved via an unknown method (e.g., phishing, exploit).</li>
<li>Malware is installed on the victim&rsquo;s system, likely outside typical program directories.</li>
<li>The malware establishes a DNS connection to a commonly abused web service (e.g., pastebin.com, raw.githubusercontent.com) to obscure C2 traffic.</li>
<li>The malware sends encrypted or encoded commands to the web service.</li>
<li>The web service acts as an intermediary, relaying the commands to the attacker&rsquo;s C2 server.</li>
<li>The C2 server responds with instructions, which are then relayed back to the compromised host through the same web service.</li>
<li>The malware executes the received commands, potentially leading to data exfiltration, lateral movement, or other malicious activities.</li>
<li>The attacker maintains persistent access and control over the compromised system using the web service as a hidden C2 channel.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to data theft, system compromise, and further propagation within the network. Since commonly used web services are utilized, the malicious activity can blend in with legitimate network traffic, making it difficult to detect. The impact can range from minor data breaches to complete network compromise, depending on the attacker&rsquo;s objectives and the level of access gained.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect Commonly Abused Web Services via DNS</code> to your SIEM to identify suspicious DNS queries to known C2 web services originating from anomalous processes.</li>
<li>Enable DNS query logging on Windows endpoints to provide the data source required for the Sigma rule.</li>
<li>Review network connection logs for processes outside standard installation directories communicating with domains listed in the <code>query</code> section of the Sigma rule to identify potential C2 activity.</li>
<li>Implement network segmentation to limit the potential impact of compromised hosts.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>command-and-control</category><category>windows</category><category>threat-detection</category></item><item><title>Impact of Poor Security Operation Center (SOC) Metrics</title><link>https://feed.craftedsignal.io/briefs/2024-01-02-soc-metrics/</link><pubDate>Tue, 02 Jan 2024 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-02-soc-metrics/</guid><description>Poorly chosen performance metrics can significantly impair a SOC's ability to detect and respond to threats, leading to ineffective security operations and potential compromise.</description><content:encoded><![CDATA[<p>The National Cyber Security Centre (NCSC) blog post highlights the detrimental effects of using inappropriate metrics to evaluate SOC performance. Focusing on easily quantifiable metrics like &rsquo;number of tickets processed&rsquo;, &rsquo;time taken to close a ticket&rsquo;, &rsquo;number of detection rules written&rsquo;, and &lsquo;volume of logs collected&rsquo; can incentivize analysts to prioritize metric optimization over effective threat detection. These perverse incentives can lead to a high number of false positives, alert fatigue, and a failure to identify genuine security incidents. The blog emphasizes the importance of focusing on metrics that truly reflect a SOC&rsquo;s efficacy in detecting and responding to attacks in a timely manner, using red and purple teaming to simulate attacks.</p>
<h2 id="attack-chain">Attack Chain</h2>
<p>This attack chain describes how an attacker might evade detection in a SOC environment using ineffective metrics.</p>
<ol>
<li><strong>Initial Foothold:</strong> An attacker gains initial access via a vulnerability or credential compromise. This is not directly measured by common SOC metrics.</li>
<li><strong>Internal Reconnaissance:</strong> The attacker performs internal reconnaissance, such as <code>searching for passwords in a SharePoint</code>.</li>
<li><strong>Lateral Movement:</strong> The attacker uses discovered credentials to move laterally within the network.</li>
<li><strong>Data Access:</strong> The attacker accesses sensitive data, potentially including intellectual property or personal information.</li>
<li><strong>Exfiltration Preparation:</strong> The attacker prepares the data for exfiltration, such as compressing or encrypting it.</li>
<li><strong>Exfiltration:</strong> The attacker exfiltrates the data to an external server.</li>
<li><strong>Persistence:</strong> The attacker establishes persistence mechanisms to maintain access for future operations.</li>
<li><strong>Impact:</strong> The attacker achieves their objective, which could be data theft, system disruption, or financial gain. The lack of focus on TTD/TTR means the breach goes unnoticed until significant damage is done.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The use of poor metrics can lead to a significant increase in dwell time, allowing attackers more time to achieve their objectives. Organizations may experience data breaches, financial losses, reputational damage, and regulatory fines. The NCSC observed SOCs with great potential rendered entirely ineffective through poor choice and application of metrics. If &ldquo;time to close a ticket&rdquo; is prioritized, analysts may quickly dismiss alerts as false positives, missing crucial indicators of a real attack.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Implement TTD/TTR as primary metrics to measure SOC effectiveness, using red/purple teaming to generate data.</li>
<li>Prioritize hypothesis-led threat hunting to proactively identify potential threats and improve detection capabilities.</li>
<li>Establish and maintain hard thresholds for false positive rates to minimize alert fatigue and ensure analysts focus on genuine threats.</li>
<li>Evaluate and refine detection rules to maximize true positives and minimize false positives.</li>
<li>Focus on the value of collected logs rather than sheer volume to ensure relevant data is available for threat detection.</li>
<li>Develop detection rules based on understanding likely attackers and their techniques mentioned in the overview.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>soc</category><category>metrics</category><category>threat-hunting</category><category>detection</category></item></channel></rss>