<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>TeamViewer — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/teamviewer/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 03 Jan 2024 14:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/teamviewer/feed.xml" rel="self" type="application/rss+xml"/><item><title>Potential RemoteMonologue Attack via Registry Modification</title><link>https://feed.craftedsignal.io/briefs/2024-01-remotemonologue-regmod/</link><pubDate>Wed, 03 Jan 2024 14:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-remotemonologue-regmod/</guid><description>This rule detects potential RemoteMonologue attacks by identifying attempts to perform session hijacking via COM object registry modification, specifically when the RunAs value is set to Interactive User.</description><content:encoded><![CDATA[<p>The RemoteMonologue attack technique abuses Component Object Model (COM) objects to coerce authentication from a remote system. This is achieved by modifying the <code>RunAs</code> registry value associated with a COM object. Setting this value to &ldquo;Interactive User&rdquo; forces the COM object to run under the context of the interactive user, enabling attackers to hijack sessions and potentially escalate privileges. This technique is often used as a defense evasion or persistence mechanism by adversaries after gaining initial access to a system. The attack involves modifying registry keys associated with COM objects to trigger NTLM authentication coercion. This can be used for lateral movement and gaining access to sensitive resources. This rule is designed to detect registry modifications indicative of the RemoteMonologue attack.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial Access: An attacker gains initial access to the target system through unspecified means.</li>
<li>Identify COM Objects: The attacker identifies suitable COM objects for abuse.</li>
<li>Modify Registry: The attacker modifies the registry to set the <code>RunAs</code> value for the selected COM object to <code>Interactive User</code>. This involves modifying the registry path <code>HKCR\AppID\{Clsid}\RunAs</code>.</li>
<li>Trigger COM Object Execution: The attacker triggers the execution of the modified COM object, potentially through a remote procedure call or other inter-process communication mechanisms.</li>
<li>Authentication Coercion: The execution of the COM object triggers NTLM authentication to a system controlled by the attacker.</li>
<li>Relay Attack: The attacker relays the coerced NTLM authentication to gain access to other resources on the network.</li>
<li>Session Hijacking: Successful relay leads to session hijacking, allowing the attacker to impersonate the user.</li>
<li>Lateral Movement/Privilege Escalation: The attacker uses the hijacked session for lateral movement or privilege escalation within the network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful RemoteMonologue attack can lead to unauthorized access to sensitive systems and data. By coercing authentication and hijacking sessions, attackers can bypass security controls and escalate their privileges within the network. The scope of the impact depends on the privileges of the hijacked user account and the resources accessible to that account. This attack can enable lateral movement, data exfiltration, and other malicious activities.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect RemoteMonologue Registry Modification</code> to your SIEM to identify suspicious registry modifications related to COM object hijacking.</li>
<li>Enable Sysmon registry event logging to capture the necessary data for the Sigma rules to function effectively.</li>
<li>Investigate any alerts generated by the Sigma rule by reviewing the registry event logs and identifying the user account and process responsible for the registry modification.</li>
<li>Implement enhanced monitoring on critical systems to detect any attempts to modify COM object registry settings.</li>
<li>Block the attack by ensuring &ldquo;RunAs&rdquo; value is not set to &ldquo;Interactive User&rdquo;.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>remotemonologue</category><category>defense-evasion</category><category>persistence</category><category>windows</category></item><item><title>Multiple Remote Management Tool Vendors on Same Host</title><link>https://feed.craftedsignal.io/briefs/2024-01-multiple-rmm-vendors/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-multiple-rmm-vendors/</guid><description>This rule identifies Windows hosts where two or more distinct remote monitoring and management (RMM) or remote-access tool vendors are observed starting processes within the same eight-minute window, potentially indicating compromise, shadow IT, or attacker staging of redundant access.</description><content:encoded><![CDATA[<p>This detection rule identifies Windows systems running multiple Remote Monitoring and Management (RMM) tools from different vendors within an eight-minute timeframe. While legitimate MSP environments might utilize several tools, the presence of multiple RMM solutions on a single host can signify a compromise, unauthorized software installation (shadow IT), or attackers establishing redundant access points. The rule maps process names to vendor labels to avoid inflated counts from multiple binaries of the same vendor. This activity has been observed as a component of broader attack campaigns, including those leveraging compromised MSP infrastructure, and is described in CISA AA23-025A. The timeframe analyzed is &ldquo;now-9m&rdquo;, and the rule triggers if two or more different vendors are detected.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial Access: The attacker gains initial access to the system, possibly through phishing, exploiting vulnerabilities, or stolen credentials.</li>
<li>Tool Deployment: The attacker deploys an initial RMM tool (e.g., AnyDesk, TeamViewer) for remote access and control.</li>
<li>Persistence: The attacker establishes persistence by configuring the RMM tool to start automatically on system boot.</li>
<li>Lateral Movement: The attacker uses the initial access to discover other systems on the network.</li>
<li>Additional RMM Deployment: The attacker deploys a second RMM tool (e.g., ScreenConnect, Splashtop) from a different vendor to create a redundant access method.</li>
<li>Privilege Escalation: The attacker escalates privileges using the compromised RMM tools, if necessary.</li>
<li>Remote Control: The attacker uses the RMM tools to remotely control the system, execute commands, and access sensitive data.</li>
<li>Data Exfiltration or Further Exploitation: The attacker exfiltrates sensitive data or uses the compromised system to launch further attacks on the network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack leveraging multiple RMM tools can result in unauthorized access to sensitive data, system compromise, and lateral movement within the network. The presence of multiple RMM tools increases the attacker&rsquo;s resilience, making it harder to detect and remediate the intrusion. Affected systems can be used as a staging ground for further attacks, leading to significant financial and reputational damage. This can impact any Windows-based system, and the CISA advisory AA23-025A specifically highlights the risk of MSP infrastructure compromise.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Multiple RMM Vendors on Same Host</code> to your SIEM and tune for your environment.</li>
<li>Investigate hosts triggering the rule to confirm legitimate use of multiple RMM tools. Check <code>Esql.vendors_seen</code> and <code>Esql.processes_name_values</code> for insight into the involved tools.</li>
<li>Review asset inventory and change tickets to verify authorized RMM software installations.</li>
<li>Isolate any unauthorized or unexplained hosts and remove unapproved RMM tools.</li>
<li>Enforce a single approved RMM stack per asset class where possible.</li>
<li>Enable Sysmon process creation logging (Event ID 1) on Windows endpoints to enhance detection capabilities as described in the rule&rsquo;s setup instructions.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>remote-access-tool</category><category>command-and-control</category><category>rmm</category><category>windows</category></item><item><title>Mshta Making Network Connections Indicative of Defense Evasion</title><link>https://feed.craftedsignal.io/briefs/2024-01-mshta-network-connections/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-mshta-network-connections/</guid><description>Mshta.exe making outbound network connections may indicate adversarial activity, as it is often used to execute malicious scripts and evade detection by proxying execution of untrusted code.</description><content:encoded><![CDATA[<p>Mshta.exe is a legitimate Windows utility used to execute Microsoft HTML Application (HTA) files. Adversaries exploit it to run malicious scripts, leveraging its trusted status to bypass security measures. This activity can be difficult to detect because Mshta.exe is a signed Microsoft binary. This detection identifies suspicious network activity by Mshta.exe, excluding known benign processes, to flag potential threats. Legitimate uses of Mshta.exe include software updates, installations, and automation scripts using HTA files. This rule helps identify unauthorized network connections indicative of malicious intent and flags suspicious use of mshta.exe.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access through an unknown method, such as phishing or exploiting a software vulnerability.</li>
<li>The attacker executes a malicious script, such as VBScript or JavaScript, using Mshta.exe.</li>
<li>Mshta.exe interprets and executes the script, bypassing application control policies due to its signed status.</li>
<li>The script establishes a network connection to an external command and control (C2) server.</li>
<li>The C2 server provides instructions to the compromised host, such as downloading additional malware.</li>
<li>The downloaded malware executes, performing actions such as data exfiltration or lateral movement.</li>
<li>The attacker leverages the compromised host to move laterally within the network, compromising additional systems.</li>
<li>The attacker achieves their objective, such as stealing sensitive data or deploying ransomware.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to the execution of arbitrary code, potentially compromising sensitive data, facilitating lateral movement, and establishing a persistent presence within the network. Systems affected by this activity may be used as a beachhead for further attacks, leading to significant data breaches, financial loss, and reputational damage. The number of victims can vary depending on the scope of the initial compromise and the attacker&rsquo;s objectives.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Sysmon process creation logging to capture the command-line arguments used by Mshta.exe.</li>
<li>Deploy the &ldquo;Mshta Network Connection&rdquo; Sigma rule to your SIEM and tune for your environment.</li>
<li>Implement application whitelisting to prevent unauthorized execution of Mshta.exe and similar system binaries.</li>
<li>Monitor network connections initiated by Mshta.exe, including destination IP addresses, domains, and ports, to identify any connections to known malicious or suspicious endpoints.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>system-binary-proxy-execution</category><category>windows</category></item><item><title>Remote File Copy via TeamViewer</title><link>https://feed.craftedsignal.io/briefs/2024-01-teamviewer-file-copy/</link><pubDate>Wed, 03 Jan 2024 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-teamviewer-file-copy/</guid><description>Attackers may abuse legitimate utilities such as TeamViewer to deploy malware interactively by remotely copying executable or script files during a TeamViewer session.</description><content:encoded><![CDATA[<p>Attackers sometimes transfer malicious tools into a compromised environment using the command and control channel, but they also abuse legitimate utilities like TeamViewer to drop these files. TeamViewer is a remote access and control tool frequently used by help desks and system administrators for support activities; however, attackers and scammers also leverage it to deploy malware and conduct other malicious activities. This detection identifies instances of the TeamViewer process creating files with suspicious extensions on Windows systems, indicating potential misuse of the tool for unauthorized file transfers. The rule is designed to detect suspicious remote file copies during TeamViewer sessions, focusing on files with extensions commonly associated with executables and scripts.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a system through various means.</li>
<li>The attacker installs or leverages an existing TeamViewer instance on the compromised system.</li>
<li>The attacker establishes a remote connection to the compromised system using TeamViewer.</li>
<li>The attacker initiates a file transfer session within TeamViewer.</li>
<li>The attacker transfers a malicious executable or script file (e.g., .exe, .dll, .ps1) to the compromised system.</li>
<li>The transferred file is saved to a location on the compromised system.</li>
<li>The attacker executes the transferred file, leading to further malicious activities such as malware installation or command execution.</li>
<li>The attacker performs post-exploitation activities, like lateral movement or data exfiltration.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation via remote file copy can lead to the introduction of malware into the targeted environment, potentially compromising sensitive data and causing significant operational disruption. The severity of the impact depends on the nature of the transferred file and the subsequent actions performed by the attacker.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>TeamViewer Remote File Copy</code> to your SIEM and tune for your environment.</li>
<li>Investigate any alerts generated by this rule by examining process execution chains and file origins.</li>
<li>Block the file extensions listed in the <code>file.extension</code> field in the query at the network level to prevent the transfer of potentially malicious files.</li>
<li>Enable Elastic Defend or SentinelOne Cloud Funnel to collect the necessary file creation events to trigger the detection.</li>
<li>Review TeamViewer usage within your organization and restrict its use to authorized personnel only.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>command-and-control</category><category>remote-access</category><category>teamviewer</category></item><item><title>Multiple Remote Management Tool Vendors on Same Host</title><link>https://feed.craftedsignal.io/briefs/2024-01-02-multiple-rmm-vendors/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-02-multiple-rmm-vendors/</guid><description>This detection identifies a Windows host where two or more distinct remote monitoring and management (RMM) or remote-access tool vendors are observed starting processes within the same eight-minute window, potentially indicating compromise, shadow IT, or attacker staging of redundant access.</description><content:encoded><![CDATA[<p>This detection rule identifies Windows hosts running multiple remote monitoring and management (RMM) tools from different vendors within an eight-minute timeframe. While legitimate MSP environments may utilize multiple tools, this activity can also indicate malicious behavior, such as an attacker establishing redundant access to a compromised system. The rule maps various RMM processes to vendor labels, ensuring that multiple binaries from the same vendor do not inflate the count. The processes monitored include popular RMM tools like TeamViewer, AnyDesk, ScreenConnect, and many others. This rule is designed to detect suspicious activity within the environment and alert security teams to potential compromises. The timeframe is set to eight minutes to reduce false positives.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial Access: An attacker gains initial access to a Windows host, possibly through phishing or exploitation of a vulnerability.</li>
<li>Tool Deployment: The attacker deploys an initial RMM tool for remote access and control.</li>
<li>Secondary Tool Deployment: The attacker deploys a second RMM tool from a different vendor to ensure redundant access in case the first tool is detected or removed.</li>
<li>Privilege Escalation: The attacker escalates privileges to gain SYSTEM or Administrator rights, if necessary, to maintain persistent access and control.</li>
<li>Lateral Movement: The attacker uses the RMM tools to move laterally within the network to access additional systems and data.</li>
<li>Data Exfiltration/Malicious Activity: The attacker uses the established RMM connections to exfiltrate sensitive data or perform other malicious activities such as deploying ransomware.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack can lead to unauthorized access to sensitive systems and data, potentially resulting in data breaches, financial loss, and reputational damage. This detection rule helps identify hosts that might be compromised by malicious actors utilizing multiple RMM tools for command and control. Identifying potentially compromised systems is key to preventing widespread damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rules in this brief to your SIEM to detect multiple RMM tools running on the same host within an eight-minute window.</li>
<li>Investigate systems triggering this alert by reviewing process execution logs and network connections to identify the source of the RMM tool installation.</li>
<li>Enforce a policy of a single approved RMM stack per asset class to minimize the risk of unauthorized RMM tool usage.</li>
<li>Tune the provided Sigma rules with host or organizational unit exceptions for legitimate MSP/IT tooling environments.</li>
<li>Review asset inventory and change tickets for approved RMM software to identify unauthorized installations.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>command-and-control</category><category>rmm</category><category>windows</category><category>threat-detection</category></item></channel></rss>