<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Application-Control-Bypass — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/application-control-bypass/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 03 Jan 2024 14:22:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/application-control-bypass/feed.xml" rel="self" type="application/rss+xml"/><item><title>Proxy Execution via Windows OpenSSH Client</title><link>https://feed.craftedsignal.io/briefs/2024-01-openssh-proxy-execution/</link><pubDate>Wed, 03 Jan 2024 14:22:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-openssh-proxy-execution/</guid><description>Detection of command execution via proxy using the Windows OpenSSH client (ssh.exe or sftp.exe) to bypass application control using trusted Windows binaries.</description><content:encoded><![CDATA[<p>This detection identifies attempts to execute commands through a proxy using the Windows OpenSSH client (ssh.exe or sftp.exe). Attackers may abuse this behavior to evade application control policies by leveraging the trusted Windows OpenSSH binaries. The technique involves using the <code>ProxyCommand</code> or <code>LocalCommand</code> options with the OpenSSH client to execute arbitrary commands on the target system. The rule focuses on detecting command lines containing potentially malicious commands such as PowerShell, schtasks, mshta, msiexec, cmd, or script execution, indicating a possible attempt to bypass security measures. The detection logic is applicable to Windows systems.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Windows system.</li>
<li>The attacker executes the Windows OpenSSH client (ssh.exe or sftp.exe) with either the <code>ProxyCommand</code> or <code>LocalCommand</code> option.</li>
<li>The <code>ProxyCommand</code> or <code>LocalCommand</code> parameter specifies a command to be executed locally on the system.</li>
<li>The command includes potentially malicious payloads such as PowerShell commands, scheduled tasks manipulation (schtasks), or execution of other LOLBINs (Living Off the Land Binaries) like mshta or msiexec.</li>
<li>The OpenSSH client executes the specified command.</li>
<li>The malicious command performs actions such as downloading and executing additional payloads, creating scheduled tasks for persistence, or executing arbitrary code.</li>
<li>The attacker achieves their objectives, such as gaining further access to the system, escalating privileges, or deploying malware.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to a complete compromise of the affected system. Attackers can bypass application control mechanisms, execute arbitrary code, and establish persistence. This can result in data theft, system disruption, or further propagation of the attack within the network. The severity of the impact depends on the privileges of the account running the OpenSSH client and the specific actions performed by the malicious commands.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable process creation logging with command line details to capture the execution of ssh.exe and sftp.exe with malicious parameters.</li>
<li>Deploy the Sigma rule <code>Proxy Execution via Windows OpenSSH</code> to your SIEM to detect suspicious OpenSSH client executions with malicious commands in the command line.</li>
<li>Monitor for the creation of child processes from ssh.exe or sftp.exe, as this can indicate the execution of malicious commands specified in the <code>ProxyCommand</code> or <code>LocalCommand</code> options.</li>
<li>Review and restrict the usage of <code>PermitLocalCommand</code> in OpenSSH server configurations to prevent attackers from executing commands locally on the system after a connection is established.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>defense-evasion</category><category>proxy-execution</category><category>openssh</category><category>application-control-bypass</category></item></channel></rss>