<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Devtunnels — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/devtunnels/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 03 Jan 2024 10:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/devtunnels/feed.xml" rel="self" type="application/rss+xml"/><item><title>Microsoft Devtunnels Execution for Covert Communication</title><link>https://feed.craftedsignal.io/briefs/2024-01-devtunnels-execution/</link><pubDate>Wed, 03 Jan 2024 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-devtunnels-execution/</guid><description>The execution of Microsoft devtunnels.exe can be abused by attackers to expose compromised systems to the internet, establish covert communication channels, and bypass network security measures, facilitating data exfiltration or command-and-control.</description><content:encoded><![CDATA[<p>Microsoft Devtunnels, a feature within Visual Studio, enables developers to expose local development environments to the internet via secure tunnels. While designed for legitimate testing and debugging, attackers can abuse this functionality to establish covert communication channels from compromised systems. By executing <code>devtunnel.exe</code> or loading <code>devtunnel.dll</code>, an attacker can bypass network security measures and blend malicious activity with legitimate development traffic. This allows for remote access, data exfiltration, or command-and-control communications, making detection more challenging. This technique could be used to expose internal services or systems without proper authentication to the outside world, potentially leading to further compromise.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial compromise of a system via typical methods (e.g., phishing, exploit).</li>
<li>Attacker gains a foothold and establishes persistence on the compromised system.</li>
<li>Attacker executes <code>devtunnel.exe</code> or loads <code>devtunnel.dll</code>.</li>
<li>The Dev Tunnels feature is configured to expose a service or the entire system to the internet.</li>
<li>A secure, temporary tunnel is established, bypassing normal network security measures.</li>
<li>The attacker uses the tunnel to remotely access the compromised system.</li>
<li>Data exfiltration or command-and-control activities are performed through the tunnel.</li>
<li>The attacker maintains persistent access and control over the compromised system, blending their activities with legitimate development traffic.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to create covert communication channels, bypass network security measures, and exfiltrate sensitive data. The use of Dev Tunnels can make it difficult to detect malicious activity, as it blends in with legitimate development traffic. This can lead to prolonged access to compromised systems and significant data breaches. Lateral movement may be easier if internal services are exposed through the tunnel. The number of victims and the extent of the damage depend on the specific targets and the attacker&rsquo;s objectives.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Implement the Sigma rules provided in this brief to detect the execution of <code>devtunnel.exe</code> and the loading of <code>devtunnel.dll</code> within your environment.</li>
<li>Monitor process creation events (Sysmon EventID 1, Windows Event Log Security 4688, CrowdStrike ProcessRollup2) for the execution of <code>devtunnel.exe</code>.</li>
<li>Investigate any instances of <code>devtunnel.exe</code> execution, especially those originating from unusual locations or user accounts.</li>
<li>Filter alerts (as mentioned in the known_false_positives) for approved development environments and users to reduce false positives.</li>
<li>Enable Sysmon process-creation logging to ensure the effectiveness of the provided Sigma rules.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>devtunnels</category><category>reverse-proxy</category><category>command-and-control</category><category>defense-evasion</category><category>windows</category></item><item><title>Microsoft Devtunnels Image Load Detection</title><link>https://feed.craftedsignal.io/briefs/2024-01-02-devtunnels-image-load/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-02-devtunnels-image-load/</guid><description>This detection identifies potential misuse of Microsoft Devtunnels within Visual Studio by detecting image load events, indicating that an attacker could expose a compromised system or service to the internet for covert communication and data exfiltration.</description><content:encoded><![CDATA[<p>Microsoft Devtunnels, a feature within Visual Studio, allows developers to expose their local development environment to the internet through secure, temporary tunnels. While intended for legitimate purposes like testing webhooks and APIs, attackers can abuse this functionality. By exploiting Devtunnels, a malicious actor could expose a compromised system to the internet, establishing a covert communication channel that circumvents traditional network security measures. This unauthorized access enables data exfiltration, command-and-control (C2) communications, and further compromise of the environment while blending the malicious activity with legitimate development traffic. Defenders should monitor for anomalous image loads associated with Devtunnels to identify potential misuse.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker compromises a system within the target network.</li>
<li>Attacker installs or leverages an existing Visual Studio installation on the compromised system.</li>
<li>The attacker configures Microsoft Devtunnels to expose the compromised system to the internet. This may involve creating a new tunnel or hijacking an existing one.</li>
<li>A malicious DLL (devtunnel.dll) is loaded from the temp directory (<code>*\\AppData\\Local\\Temp\\.net\\devtunnel\\*</code>) to establish the tunnel.</li>
<li>The attacker uses the established Devtunnel to create a reverse proxy to bypass network security measures.</li>
<li>The attacker uses the Devtunnel for command and control, sending commands and receiving responses from the compromised system.</li>
<li>The attacker exfiltrates sensitive data from the compromised system through the Devtunnel.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of Microsoft Devtunnels can lead to significant security breaches. Attackers can establish persistent covert communication channels, exfiltrate sensitive data, and maintain long-term control over compromised systems. This can result in financial losses, reputational damage, and legal liabilities. The use of Devtunnels can bypass existing network security measures, making detection challenging and increasing the dwell time of attackers within the network.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Sysmon EventID 7 to monitor image load events, which is the data source for the provided detection rule.</li>
<li>Deploy the Sigma rule <code>Detect Devtunnels Image Load</code> to your SIEM and tune the filter <code>windows_devtunnels_image_loaded_filter</code> for your environment to reduce false positives from legitimate developer activity.</li>
<li>Monitor network traffic for connections associated with Devtunnels to identify potential covert communication channels.</li>
<li>Investigate any alerts triggered by the <code>Detect Devtunnels Image Load</code> rule, focusing on systems with development tools installed.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>devtunnels</category><category>reverse-proxy</category><category>command-and-control</category><category>data-exfiltration</category><category>windows</category></item></channel></rss>