<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Impair-Defenses — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/impair-defenses/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 03 Jan 2024 18:23:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/impair-defenses/feed.xml" rel="self" type="application/rss+xml"/><item><title>Cisco ASA Logging Message Suppression</title><link>https://feed.craftedsignal.io/briefs/2024-01-cisco-asa-logging-suppression/</link><pubDate>Wed, 03 Jan 2024 18:23:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-cisco-asa-logging-suppression/</guid><description>Detection of 'no logging message' command usage on Cisco ASA devices, potentially indicating an adversary suppressing security-critical log events to evade detection.</description><content:encoded><![CDATA[<p>The &ldquo;no logging message&rdquo; command in Cisco ASA devices allows administrators to suppress specific syslog messages, identified by their message ID. Attackers may abuse this functionality to selectively disable logging of events that would otherwise reveal their malicious activity. By suppressing specific message IDs related to authentication failures, configuration changes, or suspicious network activity, attackers can evade detection while allowing normal logging operations to continue, avoiding suspicion that might arise from completely disabling logging. This activity is associated with actors such as LINE-VIPER. This detection focuses on identifying instances where message suppression is configured using message IDs 111008 and 111010.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains unauthorized access to a Cisco ASA device, potentially through stolen credentials or exploiting a vulnerability.</li>
<li>The attacker authenticates to the ASA device, gaining privileged EXEC mode access.</li>
<li>The attacker executes the &ldquo;configure terminal&rdquo; command to enter global configuration mode.</li>
<li>The attacker uses the &ldquo;no logging message &lt;message_id&gt;&rdquo; command, specifying message IDs related to security events such as authentication failures (e.g., 111008, 111010).</li>
<li>The ASA device stops logging events associated with the specified message IDs, preventing security alerts related to those events.</li>
<li>The attacker performs malicious activities that would normally trigger these security alerts, knowing that they will not be logged.</li>
<li>The attacker exits configuration mode and continues their malicious activity undetected.</li>
<li>The attacker maintains persistence to continue evading detection.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to operate within a network without triggering security alerts related to their actions on Cisco ASA devices. This can lead to prolonged periods of undetected lateral movement, data exfiltration, or other malicious activities. The suppression of logging messages hinders incident response efforts, making it difficult to investigate and remediate security breaches. The number of potential victims is large given the widespread deployment of Cisco ASA devices.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Cisco ASA Logging Message Suppression&rdquo; to your SIEM and tune for your environment to detect unauthorized logging suppression.</li>
<li>Investigate any instances of logging message suppression, especially those involving security-critical message IDs (authentication, authorization, configuration changes).</li>
<li>Correlate detected suppression events with other security alerts to identify potentially compromised ASA devices.</li>
<li>Review and enforce strict access controls for Cisco ASA devices to prevent unauthorized configuration changes.</li>
<li>Configure Cisco ASA devices to generate and forward message ID 111008 and 111010 as per the documentation to ensure the effectiveness of the provided rule.</li>
<li>Establish a baseline of approved suppressed message IDs to identify anomalous configurations, addressing potential false positives as described in the KFP section.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>impair-defenses</category><category>network</category></item><item><title>Sysmon Driver Unload via fltMC.exe</title><link>https://feed.craftedsignal.io/briefs/2024-01-sysmon-driver-unload/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-sysmon-driver-unload/</guid><description>Detection of the Sysmon filter driver being unloaded via `fltMC.exe`, which can blind security monitoring and allow malicious actions to go undetected.</description><content:encoded><![CDATA[<p>Attackers may attempt to disable or uninstall security tools like Sysmon to evade detection and hide malicious activities on a compromised system. This is achieved by unloading the Sysmon filter driver using <code>fltMC.exe</code>, a legitimate Windows utility. Once Sysmon is disabled, adversaries can execute further attacks without being logged, potentially leading to data breaches, privilege escalation, or persistent access within the environment. This technique is significant because it directly impacts the visibility and effectiveness of security monitoring.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to the system through various means (e.g., compromised credentials, exploiting vulnerabilities, or social engineering).</li>
<li>The attacker escalates privileges if necessary to gain administrative rights on the system.</li>
<li>The attacker uses <code>fltMC.exe</code> to unload the Sysmon filter driver (<code>SysmonDrv</code>). The command executed is typically <code>fltMC.exe unload SysmonDrv</code>.</li>
<li>The operating system processes the <code>fltMC.exe</code> command, removing the Sysmon filter driver from the system.</li>
<li>Sysmon ceases to collect event data as its driver is no longer active.</li>
<li>The attacker executes malicious commands, scripts, or binaries without being logged by Sysmon.</li>
<li>The attacker establishes persistence, moves laterally, exfiltrates data, or achieves other objectives without Sysmon alerting.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful unloading of the Sysmon driver allows attackers to operate without being detected by Sysmon. This can lead to a complete loss of visibility into attacker activities, enabling data breaches, privilege escalation, and persistent access. The impact is significant as it directly undermines the effectiveness of security monitoring and incident response capabilities.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Sysmon Driver Unload via FltMC.exe</code> to detect the execution of <code>fltMC.exe</code> with the <code>unload</code> and <code>SysmonDrv</code> parameters.</li>
<li>Enable Sysmon process creation logging (Event ID 1) to ensure the required data is available for detection.</li>
<li>Investigate any instances of <code>fltMC.exe</code> being used to unload drivers, especially if the parent process is suspicious.</li>
<li>Consider implementing host-based intrusion prevention system (HIPS) rules to prevent the execution of <code>fltMC.exe</code> or restrict its usage to authorized administrators.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>defense-evasion</category><category>impair-defenses</category><category>windows</category></item></channel></rss>