<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Windows Firewall — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/windows-firewall/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 02 Jan 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/windows-firewall/feed.xml" rel="self" type="application/rss+xml"/><item><title>Netsh Used to Enable Remote Desktop Protocol (RDP) in Windows Firewall</title><link>https://feed.craftedsignal.io/briefs/2024-01-netsh-rdp-enable/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-netsh-rdp-enable/</guid><description>Adversaries may use the `netsh.exe` utility to enable inbound Remote Desktop Protocol (RDP) connections in the Windows Firewall, potentially allowing unauthorized remote access to compromised systems.</description><content:encoded><![CDATA[<p>Attackers can leverage the native Windows command-line tool <code>netsh.exe</code> to modify Windows Firewall rules and enable inbound Remote Desktop Protocol (RDP) connections. This can be used as a defense evasion technique to bypass existing firewall restrictions, allowing them to establish remote access to a compromised host. Ransomware operators and other malicious actors frequently utilize RDP to access victim servers, often using privileged accounts, to further their objectives. This activity can be conducted post-compromise to facilitate lateral movement and the deployment of malicious payloads. The behavior was observed being detected by Elastic Defend, Microsoft Defender XDR, SentinelOne Cloud Funnel, and Crowdstrike.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker compromises a Windows host through initial access methods (e.g., phishing, exploitation of a vulnerability).</li>
<li>The attacker gains a foothold on the system and escalates privileges as needed.</li>
<li>The attacker executes <code>netsh.exe</code> with specific arguments to modify the Windows Firewall configuration.</li>
<li>The <code>netsh</code> command creates or modifies an inbound rule to allow RDP traffic (TCP port 3389).</li>
<li>The attacker establishes an RDP connection to the compromised host.</li>
<li>The attacker uses the RDP session to perform reconnaissance, move laterally, or deploy malware.</li>
<li>The attacker may attempt to disable or modify security tools to further evade detection.</li>
<li>The attacker achieves their objective, such as data exfiltration or ransomware deployment.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this technique can lead to unauthorized remote access to systems, enabling lateral movement, data theft, and ransomware deployment. If RDP is enabled on a large number of systems, the attacker can move laterally through the environment. The impact can range from data breaches to complete operational disruption.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor process creation events for <code>netsh.exe</code> executing with arguments related to enabling inbound RDP traffic using the &ldquo;Remote Desktop Enabled in Windows Firewall by Netsh&rdquo; rule.</li>
<li>Implement the Sigma rule provided below to detect instances of <code>netsh.exe</code> being used to modify firewall rules related to RDP.</li>
<li>Enforce the principle of least privilege and restrict the use of <code>netsh.exe</code> to authorized personnel only.</li>
<li>Review existing firewall rules and remove any unnecessary or overly permissive rules.</li>
<li>Enable Sysmon process creation logging for enhanced visibility into process execution events.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>lateral-movement</category><category>windows</category><category>netsh</category><category>rdp</category></item></channel></rss>