<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Audit-Tampering — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/audit-tampering/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 03 Jan 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/audit-tampering/feed.xml" rel="self" type="application/rss+xml"/><item><title>Windows Audit Policy Cleared via Auditpol</title><link>https://feed.craftedsignal.io/briefs/2024-01-auditpol-clear/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-auditpol-clear/</guid><description>The execution of `auditpol.exe` with the `/clear` or `/remove` command-line arguments indicates potential defense evasion by adversaries or Red Teams, aiming to limit data that can be leveraged for detections and audits, potentially leading to full machine compromise or lateral movement.</description><content:encoded><![CDATA[<p>Attackers, including Red Teams, may attempt to disable or clear Windows audit policies to evade detection and prevent security analysts from identifying malicious activity. This involves using the <code>auditpol.exe</code> utility with the <code>/clear</code> or <code>/remove</code> command-line arguments, effectively erasing existing audit configurations. This action eliminates crucial data points that security teams rely on for detecting and responding to threats. By clearing audit policies, adversaries can operate with a reduced risk of being detected, potentially allowing for prolonged access and further exploitation of compromised systems. The activity is significant as it indicates a deliberate attempt to subvert security measures and gain an advantage within the targeted environment.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to the target system (e.g., via compromised credentials or exploiting a vulnerability).</li>
<li>The attacker escalates privileges to an account with sufficient permissions to modify audit policies.</li>
<li>The attacker executes <code>auditpol.exe</code> with the <code>/clear</code> or <code>/remove</code> command-line argument.</li>
<li>The <code>auditpol.exe</code> process modifies the system&rsquo;s audit policy settings.</li>
<li>Windows event logging is disabled or significantly reduced due to the cleared audit policy.</li>
<li>The attacker performs malicious activities without generating standard audit logs.</li>
<li>The attacker moves laterally within the network to compromise additional systems.</li>
<li>The attacker achieves their final objective, such as data theft or deploying ransomware.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Clearing the Windows audit policy can have a severe impact on an organization&rsquo;s security posture. The lack of audit logs hinders incident response efforts, making it difficult to investigate security incidents and identify compromised systems. Attackers can move laterally, steal sensitive data, or deploy ransomware without triggering standard alerts. This can result in significant financial losses, reputational damage, and regulatory penalties. In some instances, attackers might clear audit policies as a precursor to a larger attack campaign, such as the Solorigate supply chain attack.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect Auditpol Clear Command</code> to your SIEM to identify instances of <code>auditpol.exe</code> being used to clear audit policies.</li>
<li>Enable Sysmon process creation logging (Event ID 1) to capture the execution of <code>auditpol.exe</code> with command-line arguments.</li>
<li>Monitor Windows Event Log Security events (4688) for process creation events related to <code>auditpol.exe</code>.</li>
<li>Investigate any instances where <code>auditpol.exe</code> is executed with the <code>/clear</code> or <code>/remove</code> arguments, as this could indicate malicious activity.</li>
<li>Implement strict access controls to limit the number of accounts that can modify audit policies.</li>
<li>Deploy the Sigma rule <code>Detect Auditpol Remove Command</code> to detect <code>auditpol.exe</code> executions with <code>/remove</code>.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">threat</category><category>defense-evasion</category><category>audit-tampering</category><category>windows</category></item><item><title>ESXi Audit Tampering Detection</title><link>https://feed.craftedsignal.io/briefs/2024-01-esxi-audit-tampering/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-esxi-audit-tampering/</guid><description>Detection identifies the use of the esxcli system auditrecords commands to tamper with logging on an ESXi host, potentially evading detection and hindering forensic analysis.</description><content:encoded><![CDATA[<p>This detection identifies attempts to tamper with audit records on VMware ESXi hosts. Attackers with administrative privileges on an ESXi host can use the <code>esxcli system auditrecords</code> command to modify or delete audit logs. This can be done either remotely or locally on the host, and is indicative of an attacker attempting to cover their tracks, evade detection, and hinder subsequent forensic investigations. Successfully tampering with audit logs allows malicious actors to operate undetected within the environment, potentially leading to long-term compromise and data exfiltration. This activity is particularly relevant in cases involving ransomware, such as Black Basta, where attackers may attempt to erase evidence of their lateral movement and payload deployment.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a system with privileges to access the ESXi host.</li>
<li>The attacker authenticates to the ESXi host, either locally or remotely, likely using compromised credentials.</li>
<li>The attacker executes the <code>esxcli system auditrecords</code> command.</li>
<li>The command is used with parameters to modify existing audit records, such as deleting entries or changing timestamps.</li>
<li>The attacker may target specific log entries related to their activities to erase evidence.</li>
<li>After tampering, the attacker continues their malicious activities (e.g., lateral movement, data exfiltration, or ransomware deployment) with reduced risk of detection.</li>
<li>The absence of relevant audit logs impairs incident response and forensic analysis efforts.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful tampering of ESXi audit records can severely hinder incident response and forensic analysis. Without accurate logs, security teams will struggle to determine the scope and timeline of an attack. In environments affected by ransomware like Black Basta, this can lead to delayed containment and increased data loss. The blurring of the attack timeline prevents recovery and remediation efforts. While there are no victim statistics available for this specific technique, the impact on affected organizations can be significant, resulting in financial losses, reputational damage, and regulatory fines.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Syslog on all ESXi hosts and forward logs to a centralized logging server to ensure logs are captured and retained even if local logs are tampered with.</li>
<li>Deploy the Sigma rule &ldquo;ESXi Audit Tampering Detection&rdquo; to your SIEM to detect the usage of <code>esxcli system auditrecords</code> command.</li>
<li>Investigate any alerts triggered by the Sigma rule, focusing on the source and destination of the command execution.</li>
<li>Monitor the risk score associated with the impacted systems using the <code>risk_objects</code> field in the report.</li>
<li>Review access controls and privileges assigned to ESXi hosts to minimize the attack surface.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>vmware</category><category>esxi</category><category>audit-tampering</category><category>defense-evasion</category></item></channel></rss>