<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Elastic — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/elastic/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 30 Jan 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/elastic/feed.xml" rel="self" type="application/rss+xml"/><item><title>Spike in Number of RDP Connections from a Single Source IP</title><link>https://feed.craftedsignal.io/briefs/2024-01-spike-in-rdp-connections/</link><pubDate>Tue, 30 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-spike-in-rdp-connections/</guid><description>A machine learning job detected a high count of destination IPs establishing RDP connections with a single source IP, indicating potential lateral movement attempts after initial compromise.</description><content:encoded><![CDATA[<p>This threat brief addresses the potential for lateral movement within a network facilitated by an unusual spike in Remote Desktop Protocol (RDP) connections originating from a single source IP address. This activity is detected using an Elastic machine learning job designed to identify anomalies in network connection patterns. The rule &ldquo;Spike in Number of Connections Made from a Source IP&rdquo; leverages this ML job to flag instances where a single host initiates RDP connections to a significantly higher than normal number of distinct destination IPs, potentially indicating that an attacker is attempting to pivot and gain access to additional systems after compromising an initial foothold. This detection mechanism is available in Elastic Security 9.4.0 and later, with the Lateral Movement Detection integration assets installed.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Compromise:</strong> An attacker gains initial access to a host within the network through methods such as phishing, exploiting a vulnerability, or credential theft.</li>
<li><strong>Establish Foothold:</strong> The attacker establishes a foothold on the compromised system, potentially installing tools for reconnaissance and lateral movement.</li>
<li><strong>Internal Reconnaissance:</strong> The attacker performs internal reconnaissance to identify potential target systems accessible via RDP.</li>
<li><strong>RDP Connection Attempts:</strong> The attacker initiates RDP connections to a large number of internal IP addresses from the compromised host.</li>
<li><strong>Credential Harvesting:</strong> The attacker attempts to harvest credentials from the targeted systems to gain further access.</li>
<li><strong>Lateral Movement:</strong> The attacker successfully connects to additional systems using RDP, leveraging harvested or stolen credentials.</li>
<li><strong>Privilege Escalation:</strong> On newly accessed systems, the attacker attempts to escalate privileges to gain administrative control.</li>
<li><strong>Objective Completion:</strong> With broader access and elevated privileges, the attacker achieves their objective, which may include data exfiltration, ransomware deployment, or disruption of services.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>If successful, this lateral movement can result in widespread compromise across the targeted network. A single compromised host can serve as a launching point to access sensitive data, critical systems, and ultimately, inflict significant damage. The &ldquo;Spike in Number of Connections Made from a Source IP&rdquo; rule aims to detect these lateral movement attempts early, minimizing potential damage. The impact of a successful attack could range from data breaches and financial losses to operational disruption and reputational damage, affecting organizations across various sectors.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable host IP collection if using Elastic Defend (versions 8.18 and above), by following the configuration steps outlined in the Elastic documentation to ensure the <code>host.ip</code> field is populated.</li>
<li>Install the Lateral Movement Detection integration assets as described in the <a href="https://docs.elastic.co/en/integrations/lmd">official Elastic documentation</a>.</li>
<li>Review and tune the false positive analysis steps within the detection rule&rsquo;s documentation. Whitelist known administrative IPs or legitimate RDP usage patterns to minimize noise.</li>
<li>Implement network segmentation to limit RDP access to only necessary systems and users, reducing the attack surface as recommended in the rule&rsquo;s response and remediation guidance.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>lateral-movement</category><category>rdp</category><category>elastic</category></item><item><title>Unusual Remote File Directory Lateral Movement Detection</title><link>https://feed.craftedsignal.io/briefs/2024-01-22-unusual-remote-file-directory/</link><pubDate>Mon, 22 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-22-unusual-remote-file-directory/</guid><description>An Elastic machine learning job detects anomalous remote file transfers to unusual directories, indicating potential lateral movement by attackers attempting to bypass standard security monitoring.</description><content:encoded><![CDATA[<p>This detection identifies potential lateral movement within a network by flagging unusual remote file transfers to directories that are not commonly monitored. Attackers often leverage less scrutinized file paths to evade standard security measures and deploy malicious payloads. This detection relies on the &ldquo;lmd_rare_file_path_remote_transfer_ea&rdquo; machine learning job within Elastic Security, which analyzes file and Windows RDP process events to identify anomalous file transfers based on the destination directory. The detection is part of the Lateral Movement Detection integration and requires Elastic Defend and Fleet for full functionality. This is important for defenders because attackers will try to blend in with normal file transfer activity by using uncommon directories.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to a system within the network (e.g., via phishing or exploitation of a vulnerability).</li>
<li>The attacker identifies a target host for lateral movement.</li>
<li>The attacker uses a remote service (e.g., RDP, SMB) to connect to the target host.</li>
<li>The attacker attempts to transfer malicious files to the target host.</li>
<li>Instead of using common directories like &ldquo;C:\Windows\Temp&rdquo; or &ldquo;C:\ProgramData&rdquo;, the attacker chooses a less monitored directory to evade detection.</li>
<li>The remote service is leveraged to perform the file transfer to the atypical directory.</li>
<li>The transferred file is then executed, potentially leading to command execution or privilege escalation.</li>
<li>The attacker achieves their objective (e.g., data exfiltration, ransomware deployment) on the target host.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack can lead to unauthorized access to sensitive data, compromise of critical systems, and potential disruption of business operations. Although this detection is rated as low severity, successful lateral movement can lead to significant damage. The number of affected hosts and the severity of the impact depends on the attacker&rsquo;s objectives and the organization&rsquo;s security posture. Lateral movement allows attackers to gain a deeper foothold within the network and increase the scope of their malicious activities.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Ensure the <code>host.ip</code> field is populated in Elastic Defend events by following the configuration steps in the <a href="https://www.elastic.co/docs/solutions/security/configure-elastic-defend/configure-data-volume-for-elastic-endpoint#host-fields">Elastic documentation</a>.</li>
<li>Install the Lateral Movement Detection integration assets as described in the <a href="https://www.elastic.co/guide/en/security/current/prebuilt-ml-jobs.html">setup instructions</a>.</li>
<li>Tune the anomaly_threshold in the machine learning job configuration based on your environment&rsquo;s baseline activity to minimize false positives, as mentioned in the rule&rsquo;s configuration.</li>
<li>Investigate any alerts generated by this rule, paying close attention to the source and destination IP addresses, the user account involved, and the specific directory used for the file transfer as outlined in the <a href="#triage-and-analysis">triage and analysis section</a>.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>lateral-movement</category><category>machine-learning</category><category>elastic</category></item><item><title>Unusual Remote File Extension Detected via Machine Learning</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-unusual-remote-file-extension/</link><pubDate>Wed, 03 Jan 2024 15:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-unusual-remote-file-extension/</guid><description>An Elastic machine learning rule detects unusual remote file transfers with rare extensions, potentially indicating lateral movement activity on a host and suggesting adversaries bypassing security measures.</description><content:encoded><![CDATA[<p>This brief focuses on a detection rule from Elastic&rsquo;s Lateral Movement Detection (LMD) integration that utilizes machine learning to identify unusual remote file transfers. The rule, &ldquo;Unusual Remote File Extension,&rdquo; is designed to detect anomalies in file transfers, specifically those involving rare file extensions, which could be indicative of lateral movement within a network. This rule leverages the <code>lmd_rare_file_extension_remote_transfer_ea</code> machine learning job ID. The rule requires the Lateral Movement Detection integration assets to be installed, as well as file and Windows RDP process events collected by the Elastic Defend integration. The rule operates by analyzing <code>host.ip</code> and detecting anomalies in file transfers, where host IP collection needs to be enabled on Elastic Defend versions 8.18 and above.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a system within the network.</li>
<li>The attacker attempts to move laterally to other systems using remote services like RDP or SMB.</li>
<li>As part of the lateral movement, the attacker transfers tools or files to the remote system.</li>
<li>The attacker uses a rare or uncommon file extension for the transferred files, potentially to evade detection based on known file types.</li>
<li>The file transfer occurs over the network, triggering file event logs on the source and destination systems.</li>
<li>Elastic Defend, with host IP collection enabled, monitors these file events and forwards the data to the Elastic Security platform.</li>
<li>The &ldquo;Unusual Remote File Extension&rdquo; machine learning job identifies the transfer of a file with a rare extension, comparing it against historical data.</li>
<li>If the file extension is deemed anomalous based on its rarity, the rule triggers, indicating potential lateral movement.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful lateral movement attack can allow an adversary to gain access to sensitive data, critical systems, or privileged accounts. By using uncommon file extensions, attackers attempt to bypass security measures that rely on identifying known file types. This can lead to undetected malware deployment, data exfiltration, or further compromise of the network. Though this rule is of low severity, it can provide an early warning signal to stop an attack before greater damage occurs.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable the <code>host.ip</code> field within Elastic Defend configurations (versions 8.18 and above) to ensure proper data collection for the machine learning job.</li>
<li>Install the Lateral Movement Detection integration assets within Kibana as per the provided setup instructions to activate the &ldquo;Unusual Remote File Extension&rdquo; rule.</li>
<li>Tune the anomaly threshold of the machine learning job to reduce false positives, considering your organization&rsquo;s typical file transfer patterns.</li>
<li>Deploy the &ldquo;Detect Remote File Extension Transfer&rdquo; Sigma rule to identify file transfers with rare extensions using process creation logs.</li>
<li>Review the triage and analysis steps in the rule&rsquo;s documentation to effectively investigate and respond to triggered alerts.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>lateral-movement</category><category>machine-learning</category><category>elastic</category></item></channel></rss>