<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Encrypted-Channel — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/encrypted-channel/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 03 Jan 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/encrypted-channel/feed.xml" rel="self" type="application/rss+xml"/><item><title>Unusual Windows Processes Connecting to Domains Using Free SSL Certificates</title><link>https://feed.craftedsignal.io/briefs/2024-01-freesslcert-c2/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-freesslcert-c2/</guid><description>This rule identifies unusual Windows processes connecting to domains using known free SSL certificates such as Let's Encrypt, which adversaries may use to conceal command and control traffic.</description><content:encoded><![CDATA[<p>This detection rule identifies Windows processes communicating with domains using free SSL certificates from providers like Let&rsquo;s Encrypt, SSLforFree, ZeroSSL, and FreeSSL. Attackers can leverage these certificates to encrypt command and control (C2) communications, blending malicious traffic with legitimate encrypted web traffic. The rule focuses on detecting unusual processes, specifically those originating from standard Windows system paths that would not typically establish connections to services using free SSL certificates. This excludes known benign processes to reduce false positives and highlight potentially malicious C2 activity. This rule was published on 2020/11/04 and last updated on 2026/05/04.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker compromises a Windows host.</li>
<li>The attacker installs a malicious agent on the compromised host.</li>
<li>The agent is configured to use a domain that utilizes a free SSL certificate for C2 communication.</li>
<li>The malicious agent establishes a DNS connection to a domain ending in *.letsencrypt.org, *.sslforfree.com, *.zerossl.com, or *.freessl.org.</li>
<li>The infected host bypasses host-based firewalls, as the traffic is encrypted.</li>
<li>The agent receives commands from the C2 server over the encrypted channel.</li>
<li>The attacker executes commands to perform lateral movement or data exfiltration.</li>
<li>The attacker exfiltrates sensitive data from the compromised host.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation could lead to undetected command and control activity within the network. Attackers could use this encrypted channel to exfiltrate sensitive data, deploy ransomware, or move laterally to other systems. Due to the use of free SSL certificates, the traffic appears legitimate and can bypass basic network security controls. While the rule severity is low, a successful C2 channel can lead to critical impact.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule to your SIEM to detect potentially malicious processes using free SSL certificates for communication, tuning the false positives for your environment.</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on processes not typically associated with network activity originating from the defined Windows system paths.</li>
<li>Monitor DNS query logs for connections to domains using free SSL certificates from unusual or untrusted processes.</li>
<li>Update the Sigma rule with new free SSL certificate providers and adjust the excluded processes based on observed false positives in your environment.</li>
<li>Enable Sysmon Event ID 22 (DNS Query) logging for better visibility into DNS requests.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>command-and-control</category><category>encrypted-channel</category><category>freessl</category></item></channel></rss>