<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Lateral Movement — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/lateral-movement/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 04 May 2026 21:18:23 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/lateral-movement/feed.xml" rel="self" type="application/rss+xml"/><item><title>Potential Direct Kubelet API Access via Process Arguments</title><link>https://feed.craftedsignal.io/briefs/2024-01-09-kubelet-access/</link><pubDate>Mon, 04 May 2026 21:18:23 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-09-kubelet-access/</guid><description>This rule detects potential direct Kubelet API access attempts on Linux by identifying process executions whose arguments contain URLs targeting Kubelet ports (10250/10255) enabling discovery and lateral movement in Kubernetes environments.</description><content:encoded><![CDATA[<p>This detection identifies potential direct Kubelet API access attempts on Linux systems. The Kubelet, acting as the primary node agent, exposes an API accessible via ports 10250 and 10255. Attackers may exploit this API to enumerate pods, fetch logs, or even attempt remote execution. This access can lead to significant breaches in Kubernetes environments, facilitating discovery, lateral movement, and ultimately, compromise of sensitive data or control over cluster resources. The detection focuses on identifying process executions where the command-line arguments contain URLs targeting these Kubelet ports, indicating a potential attempt to interact with the Kubelet API directly.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a compromised host within the Kubernetes cluster or a host with network access to the Kubelet ports.</li>
<li>The attacker uses a utility like <code>curl</code>, <code>wget</code>, <code>python</code>, or similar tools to craft an HTTP request targeting the Kubelet API on ports 10250 or 10255.</li>
<li>The request includes a path like <code>/pods</code>, <code>/runningpods</code>, <code>/metrics</code>, <code>/exec</code>, or <code>/containerLogs</code> to gather information about the cluster&rsquo;s state and configuration.</li>
<li>The attacker examines the response to identify potential targets for lateral movement, such as specific pods or containers of interest.</li>
<li>The attacker attempts to execute commands within a container using the <code>/exec</code> endpoint, potentially leveraging exposed service account tokens or other credentials.</li>
<li>The attacker uses gathered information to move laterally to other pods or nodes within the cluster, escalating privileges as they go.</li>
<li>The attacker compromises sensitive data or critical applications running within the Kubernetes cluster.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to full cluster compromise. Attackers can gain unauthorized access to sensitive data, disrupt critical applications, and move laterally to other resources within the Kubernetes environment. This could lead to significant financial losses, reputational damage, and legal liabilities. The potential impact includes data breaches, denial of service, and complete control over the Kubernetes infrastructure.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Kubelet API Access via Process Arguments</code> to your SIEM to detect suspicious process executions.</li>
<li>Restrict access to Kubelet ports 10250/10255 at the network layer to limit pod-to-node or host-to-node traffic as recommended in the overview section.</li>
<li>Harden Kubelet configuration by disabling anonymous authentication and enforcing webhook authentication/authorization as described in the overview section.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>kubernetes</category><category>kubelet</category><category>lateral-movement</category><category>discovery</category><category>execution</category><category>linux</category></item><item><title>Potential WSUS Abuse for Lateral Movement via PsExec</title><link>https://feed.craftedsignal.io/briefs/2024-07-wsus-psexec/</link><pubDate>Mon, 04 May 2026 14:17:05 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-07-wsus-psexec/</guid><description>Adversaries may exploit Windows Server Update Services (WSUS) to execute PsExec for lateral movement within a network by abusing the trusted update mechanism to run signed binaries.</description><content:encoded><![CDATA[<p>This detection identifies potential abuse of Windows Server Update Services (WSUS) for lateral movement by executing PsExec. WSUS is designed to manage updates for Microsoft products, ensuring only signed binaries are executed. Attackers can exploit this by using WSUS to distribute and execute Microsoft-signed tools like PsExec, which can then be used to move laterally within the network. This technique leverages the trust relationship inherent in WSUS to bypass security controls. The rule focuses on detecting suspicious processes initiated by <code>wuauclt.exe</code> (the Windows Update client) executing PsExec from the SoftwareDistribution Download Install directories. Defenders should monitor WSUS activity and PsExec executions to detect and respond to this potential threat.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker compromises a system within the target network.</li>
<li>The attacker gains control over the WSUS server or performs a man-in-the-middle attack to spoof WSUS.</li>
<li>The attacker uses the compromised WSUS server to approve a malicious update containing PsExec.</li>
<li>The WSUS client (<code>wuauclt.exe</code>) on targeted machines downloads the &ldquo;approved&rdquo; update from the WSUS server, placing PsExec in the <code>C:\Windows\SoftwareDistribution\Download\Install\</code> directory.</li>
<li>The WSUS client executes PsExec.</li>
<li>PsExec is used to execute commands or transfer files to other systems on the network.</li>
<li>The attacker uses the compromised systems to gather credentials or move laterally to other high-value targets.</li>
<li>The attacker achieves their objective, such as data exfiltration or ransomware deployment.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to achieve lateral movement within the network, leading to the compromise of additional systems and sensitive data. This can result in data breaches, financial loss, and reputational damage. The scope of impact depends on the level of access achieved by the attacker and the value of the compromised systems.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>WSUS PsExec Execution</code> to detect potential WSUS abuse involving PsExec execution.</li>
<li>Enable Sysmon process creation logging (Event ID 1) to gain visibility into process executions, as referenced in the <a href="https://ela.st/sysmon-event-1-setup">setup instructions</a>.</li>
<li>Implement enhanced monitoring and logging for WSUS activities to detect unauthorized changes or updates.</li>
<li>Investigate and remove any unauthorized binaries found in the <code>C:\Windows\SoftwareDistribution\Download\Install\</code> directory.</li>
<li>Review and restrict the accounts authorized to manage WSUS to prevent unauthorized modifications.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>lateral-movement</category><category>wsus</category><category>psexec</category><category>windows</category></item><item><title>Potential Pass-the-Hash (PtH) Attempt Detection</title><link>https://feed.craftedsignal.io/briefs/2024-01-potential-pth/</link><pubDate>Mon, 04 May 2026 14:17:05 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-potential-pth/</guid><description>This rule detects potential Pass-the-Hash (PtH) attempts in Windows environments by monitoring successful authentications with specific user IDs (S-1-5-21-* or S-1-12-1-*) and the `seclogo` logon process, where attackers use stolen password hashes to authenticate and move laterally across systems without needing plaintext passwords.</description><content:encoded><![CDATA[<p>Pass-the-Hash (PtH) is a technique where attackers leverage stolen password hashes to authenticate and move laterally within a Windows environment, bypassing standard system access controls. Instead of needing the plaintext password, adversaries use a hash of the password to authenticate to a remote service or server. This detection rule focuses on identifying potential PtH attempts by monitoring for successful logins using specific user IDs (S-1-5-21-* or S-1-12-1-*) and the <code>seclogo</code> logon process, which is commonly associated with credential theft and misuse. The rule aims to detect anomalous authentication patterns indicating that an attacker is using PtH to gain unauthorized access to systems. This is important because successful PtH attacks can lead to widespread compromise of sensitive data and critical infrastructure.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to a system through phishing or exploiting a vulnerability.</li>
<li>The attacker dumps password hashes from the compromised system using tools like Mimikatz.</li>
<li>The attacker identifies a target system within the network.</li>
<li>The attacker uses the stolen password hash to authenticate to the target system using the <code>seclogo</code> logon process.</li>
<li>Windows validates the hash, granting the attacker access without requiring the plaintext password.</li>
<li>The attacker successfully authenticates with the stolen credentials and a user ID matching the pattern S-1-5-21-* or S-1-12-1-*.</li>
<li>The attacker leverages their unauthorized access to move laterally to other systems or access sensitive data.</li>
<li>The attacker achieves their final objective, such as data exfiltration or deploying ransomware.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful Pass-the-Hash attacks can lead to significant damage, including unauthorized access to sensitive data, lateral movement within the network, and potential data exfiltration or ransomware deployment. Organizations can experience financial losses, reputational damage, and operational disruptions. While the specific number of victims is not stated, PtH is a common technique used in many breaches, potentially affecting any organization that relies on Windows authentication.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Audit Logon to generate the necessary Windows Security Event Logs as referenced in the setup instructions <a href="https://ela.st/audit-logon">https://ela.st/audit-logon</a>.</li>
<li>Deploy the Sigma rule to your SIEM to detect potential Pass-the-Hash attempts. Tune the rule to account for legitimate uses of the <code>seclogo</code> logon process.</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on correlating the successful authentication events with other security logs to identify any lateral movement or access to sensitive systems.</li>
<li>Review and update access controls and permissions for the affected accounts to ensure they adhere to the principle of least privilege after an incident, as detailed in the Response and Remediation section.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>lateral-movement</category><category>threat-detection</category><category>windows</category></item><item><title>Local Account TokenFilter Policy Modification for Defense Evasion and Lateral Movement</title><link>https://feed.craftedsignal.io/briefs/2024-01-02-local-account-token-filter-policy-disabled/</link><pubDate>Mon, 04 May 2026 14:17:05 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-02-local-account-token-filter-policy-disabled/</guid><description>Adversaries may modify the LocalAccountTokenFilterPolicy registry key to bypass User Account Control (UAC) and gain elevated privileges remotely by granting high-integrity tokens to remote connections from local administrators, facilitating lateral movement and defense evasion.</description><content:encoded><![CDATA[<p>The LocalAccountTokenFilterPolicy is a Windows registry setting that, when enabled (set to 1), allows remote connections from local members of the Administrators group to be granted full high-integrity tokens during negotiation. This bypasses User Account Control (UAC) restrictions, allowing for elevated privileges remotely. Attackers may modify this registry setting to facilitate lateral movement within a network. This rule detects modifications to this specific registry setting, alerting on potential unauthorized changes that could lead to defense evasion and privilege escalation. The modification of this policy has been observed being leveraged in conjunction with pass-the-hash attacks.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to a system through an exploit, such as phishing or exploiting a vulnerability.</li>
<li>The attacker obtains local administrator credentials on the compromised system.</li>
<li>The attacker modifies the LocalAccountTokenFilterPolicy registry key to a value of 1. This is done to allow remote connections from local administrator accounts to receive high-integrity tokens. The registry key is typically located at <code>HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\LocalAccountTokenFilterPolicy</code>.</li>
<li>The attacker leverages a &ldquo;pass the hash&rdquo; attack (T1550.002) using the compromised local administrator credentials.</li>
<li>The attacker attempts to move laterally to other systems within the network using the &ldquo;pass the hash&rdquo; technique and the modified LocalAccountTokenFilterPolicy.</li>
<li>Due to the LocalAccountTokenFilterPolicy being enabled, the remote connection from the local administrator account receives a full high-integrity token.</li>
<li>The attacker bypasses UAC on the remote system, gaining elevated privileges.</li>
<li>The attacker performs malicious activities on the remote system, such as data exfiltration or deploying ransomware.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful modification of the LocalAccountTokenFilterPolicy allows attackers to bypass User Account Control (UAC) and gain elevated privileges on remote systems, potentially leading to unauthorized access to sensitive data, lateral movement across the network, and the deployment of ransomware. The overall impact can include data breaches, financial loss, and reputational damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Local Account TokenFilter Policy Enabled</code> to your SIEM and tune for your environment to detect unauthorized modifications to the LocalAccountTokenFilterPolicy registry key.</li>
<li>Enable Sysmon registry event logging to capture modifications to the registry, which is required for the <code>Local Account TokenFilter Policy Enabled</code> Sigma rule.</li>
<li>Review the processes excluded in the rule query and ensure they are legitimate and necessary to prevent false positives.</li>
<li>Monitor registry events for changes to the <code>HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\LocalAccountTokenFilterPolicy</code> path, specifically looking for changes to the value data.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>lateral-movement</category><category>persistence</category><category>registry-modification</category></item><item><title>UNC6692 Combines Social Engineering, Malware, and Cloud Abuse</title><link>https://feed.craftedsignal.io/briefs/2026-04-unc6692-social-engineering/</link><pubDate>Tue, 28 Apr 2026 14:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-unc6692-social-engineering/</guid><description>UNC6692 is a newly discovered, financially motivated threat actor that combines social engineering via Microsoft Teams, custom malware named SNOWBELT, and abuse of legitimate AWS S3 cloud infrastructure in its attack campaigns to steal credentials and prepare for data exfiltration.</description><content:encoded><![CDATA[<p>UNC6692 is a newly tracked, financially motivated threat group that employs a multi-stage intrusion campaign combining persistent social engineering and custom modular malware. The actor begins by flooding a target&rsquo;s email inbox before contacting them via Microsoft Teams, posing as help desk personnel to resolve the issue. This leads to a phishing attack where victims are tricked into downloading and executing malicious payloads. UNC6692 abuses legitimate cloud infrastructure, specifically AWS S3 buckets, for payload delivery, command and control (C2), and data exfiltration, allowing them to bypass traditional network reputation filters. The group&rsquo;s operations are focused on gaining access and stealing credentials for further actions, ultimately aiming to exfiltrate data of interest from compromised systems. The initial campaign was observed in late December.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker floods a target&rsquo;s email inbox to create a sense of urgency.</li>
<li>The attacker contacts the target via Microsoft Teams, impersonating help desk personnel.</li>
<li>The attacker sends a phishing link via Teams, promising a local patch to fix the email spamming issue.</li>
<li>The target clicks the link, which downloads a renamed AutoHotKey binary and an AutoHotkey script from a threat actor-controlled AWS S3 bucket.</li>
<li>Execution of the AutoHotKey binary automatically runs the script, initiating reconnaissance commands and installing the SNOWBELT malicious Chromium browser extension.</li>
<li>SNOWBELT facilitates the download of additional tools, including the Snowglaze Python tunneler, the Snowbasin Python bindshell (used as a persistent backdoor), additional AutoHotkey scripts, and a portable Python executable with required libraries.</li>
<li>The attacker uses a Python script to scan the local network for ports 135, 445, and 3389 and enumerate local administrator accounts.</li>
<li>The attacker uses a local administrator account to initiate an RDP session via Snowglaze from the compromised system to a backup server, then dumps LSASS process memory and uses pass-the-hash to move laterally to the domain controller.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The UNC6692 attack leads to the compromise of targeted systems, credential theft, and potential data exfiltration. If successful, the attacker gains control over the domain controller, allowing them to access sensitive information and potentially cause significant damage to the organization. The abuse of AWS S3 buckets allows the threat actor to blend in with legitimate cloud traffic, making detection more difficult. The financial motivation suggests that stolen credentials and data could be used for further malicious activities, such as ransomware attacks or sale on the dark web.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor for AutoHotKey execution, especially when associated with downloads from unusual locations like AWS S3 buckets, to detect initial payload execution (see Sigma rule below).</li>
<li>Implement network monitoring to detect unusual RDP connections initiated from compromised systems to internal servers, as this is a key lateral movement technique used by UNC6692 (see Sigma rule below).</li>
<li>Monitor for the installation of new Chromium extensions, especially those not distributed through the Chrome Web Store, as this is how the SNOWBELT malware is deployed.</li>
<li>Monitor for the use of Python scripts to scan the local network for open ports (135, 445, 3389) and enumerate local administrator accounts.</li>
<li>Investigate any Microsoft Teams messages delivering links that promise to fix technical problems, as this is the initial social engineering tactic used by UNC6692.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">threat</category><category>social-engineering</category><category>malware</category><category>cloud-abuse</category><category>credential-theft</category><category>lateral-movement</category></item><item><title>AWS Credentials Used from GitHub Actions and Non-CI/CD Infrastructure</title><link>https://feed.craftedsignal.io/briefs/2024-01-aws-github-actions-credential-theft/</link><pubDate>Wed, 22 Apr 2026 17:45:55 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-aws-github-actions-credential-theft/</guid><description>Attackers are stealing AWS credentials configured as GitHub Actions secrets and using them from non-CI/CD infrastructure, indicating potential credential theft and unauthorized access to AWS resources.</description><content:encoded><![CDATA[<p>This threat involves the unauthorized use of AWS credentials stolen from GitHub Actions secrets. Attackers exfiltrate these credentials and use them from their own infrastructure, bypassing the intended CI/CD environment. The activity is detected by observing AWS access keys appearing in CloudTrail logs originating from both legitimate GitHub Actions runners (identified by Microsoft ASN or the <code>github-actions</code> user agent string) and suspicious infrastructure outside the expected CI/CD provider ASNs (Amazon, Google, Microsoft). This indicates a breach of GitHub repository or organization secrets, leading to potential unauthorized access and control over AWS resources. This activity can begin with compromised Github accounts.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains unauthorized access to a GitHub repository or organization with AWS credentials stored as secrets.</li>
<li>The attacker exfiltrates the AWS access key ID and secret access key, either manually or through automated means, such as modifying a GitHub Action workflow to expose the secrets.</li>
<li>The attacker configures the stolen AWS credentials on their own infrastructure, using tools like the AWS CLI or boto3.</li>
<li>The attacker attempts to authenticate to AWS using the stolen credentials. This generates CloudTrail logs with the attacker&rsquo;s source IP address and ASN.</li>
<li>The attacker performs reconnaissance activities, such as calling <code>sts:GetCallerIdentity</code>, <code>ListBuckets</code>, <code>DescribeInstances</code>, or <code>ListUsers</code>, to understand the AWS environment and identify potential targets.</li>
<li>The attacker attempts to escalate privileges or move laterally within the AWS environment by exploiting the compromised credentials.</li>
<li>The attacker may create, modify, or delete AWS resources, such as EC2 instances, S3 buckets, or IAM roles, depending on the permissions associated with the stolen credentials.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation leads to unauthorized access to AWS resources, potentially resulting in data breaches, service disruptions, or financial losses. The impact depends on the permissions associated with the stolen AWS credentials. A single compromised credential could expose sensitive data, disrupt critical services, or allow attackers to deploy malicious infrastructure within the victim&rsquo;s AWS environment. Identifying and responding to this threat quickly is vital to minimize damages.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;AWS Credentials Used from GitHub Actions and Non-CI/CD Infrastructure&rdquo; to your SIEM and tune for your environment to detect suspicious usage patterns.</li>
<li>Rotate the compromised AWS access key in IAM immediately and update the corresponding GitHub repository/organization secret as described in the rule documentation.</li>
<li>Implement OIDC-based authentication (<code>aws-actions/configure-aws-credentials</code> with <code>role-to-assume</code>) instead of long-lived access keys as mentioned in the rule documentation.</li>
<li>If using OIDC, add IP condition policies to the IAM role trust policy to restrict <code>AssumeRoleWithWebIdentity</code> to known GitHub runner IP ranges, based on the information in the rule documentation.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cloud</category><category>aws</category><category>github</category><category>credential-theft</category><category>initial-access</category><category>lateral-movement</category></item><item><title>Bad Apples: Weaponizing Native macOS Primitives for Lateral Movement and Execution</title><link>https://feed.craftedsignal.io/briefs/2026-04-bad-apples-macos-lotl/</link><pubDate>Tue, 21 Apr 2026 10:01:16 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-bad-apples-macos-lotl/</guid><description>Adversaries are increasingly targeting macOS environments, leveraging native tools like Remote Application Scripting (RAS) and Spotlight metadata to bypass security controls for remote code execution and lateral movement.</description><content:encoded><![CDATA[<p>With macOS adoption growing in enterprise environments, particularly among developers and DevOps teams, it has become an attractive target for malicious actors. This report highlights the under-documented &ldquo;living-off-the-land&rdquo; (LOTL) techniques specific to macOS. Attackers are exploiting native features like Remote Application Scripting (RAS) to achieve remote execution and are abusing Spotlight metadata (Finder comments) for payload staging, evading traditional static file analysis. Additionally, attackers can use built-in protocols such as SMB, Netcat, Git, TFTP, and SNMP to establish persistence and move toolkits. Defenders should shift their focus from static file scanning to monitoring process lineage, inter-process communication (IPC) anomalies, and enforcing strict MDM policies to disable unnecessary administrative services.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Access:</strong> The attacker gains initial access to a macOS system, possibly through spearphishing or exploiting a vulnerability in a network service (details of initial access aren&rsquo;t specified in the provided document but is a necessary assumption for the rest of the chain).</li>
<li><strong>Discovery:</strong> The attacker uses native tools to enumerate the environment, such as <code>diskutil list</code> to identify connected volumes.</li>
<li><strong>Credential Access:</strong> The attacker attempts to access stored credentials, SSH keys, or cloud credentials.</li>
<li><strong>Lateral Movement (RAS):</strong> The attacker leverages Remote Application Scripting (RAS) to remotely query Finder for mounted volumes using <code>osascript -e 'tell application &quot;Finder&quot; to get the name of every disk' eppc://user:password@target_ip</code>.</li>
<li><strong>Remote Execution (RAS):</strong> The attacker uses RAS and Terminal.app as an execution proxy to bypass Apple&rsquo;s security restrictions.</li>
<li><strong>Payload Deployment (RAS/Base64):</strong> The attacker encodes a malicious script using Base64 and uses RAS to instruct the remote Terminal.app to decode the script to a temporary file and make it executable using <code>chmod +x</code>.</li>
<li><strong>Payload Invocation (RAS/bash):</strong> The attacker uses a second RAS command to explicitly invoke the deployed script via bash, ensuring a proper shell context.</li>
<li><strong>Persistence (SMB/Netcat/Git/TFTP/SNMP):</strong> The attacker utilizes built-in protocols such as SMB, Netcat, Git, TFTP, or SNMP to establish persistence on the compromised system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of these LOTL techniques allows attackers to bypass traditional security controls on macOS systems, leading to unauthorized access to sensitive data, source code repositories, and cloud infrastructure. With over 45% of organizations utilizing macOS, these attacks can result in significant financial losses, reputational damage, and disruption of business operations. Compromised developer or DevOps workstations can be leveraged as pivot points to further compromise production environments.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor process creation events for <code>osascript</code> executing with the <code>eppc://</code> URI to detect potential RAS-based lateral movement (see Sigma rule &ldquo;Detect Remote Apple Event Lateral Movement&rdquo;).</li>
<li>Monitor process creation for <code>Terminal.app</code> executing <code>bash</code> with command-line arguments indicative of Base64 decoding and execution to identify RAS-based remote execution attempts (see Sigma rule &ldquo;Detect Terminal.app as Execution Proxy&rdquo;).</li>
<li>Implement strict MDM policies to disable unnecessary administrative services and protocols like Remote Apple Events to reduce the attack surface.</li>
<li>Monitor inter-process communication (IPC) anomalies, particularly involving <code>AppleEventsD</code>, to identify suspicious activity related to RAS.</li>
<li>Enable Sysmon process-creation logging to capture the process lineage and command-line arguments necessary for the rules above.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>macos</category><category>lotl</category><category>lateral-movement</category><category>execution</category></item><item><title>BRICKSTORM Malware Targeting VMware vSphere Environments</title><link>https://feed.craftedsignal.io/briefs/2026-04-brickstorm-vsphere/</link><pubDate>Thu, 02 Apr 2026 13:55:05 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-brickstorm-vsphere/</guid><description>The BRICKSTORM malware targets VMware vSphere environments, specifically vCenter Server Appliance (VCSA) and ESXi hypervisors, by exploiting weak security configurations to establish persistence at the virtualization layer, leading to administrative control and potential data exfiltration.</description><content:encoded><![CDATA[<p>The BRICKSTORM campaign targets VMware vSphere environments, with a focus on the vCenter Server Appliance (VCSA) and ESXi hypervisors. This campaign, building on previous BRICKSTORM research, highlights the increasing threats targeting virtualized infrastructure. By gaining persistence at the virtualization layer, attackers bypass traditional security measures, such as endpoint detection and response (EDR) agents, which are often ineffective in these environments. The attackers exploit weak security architectures, identity design flaws, lack of host-based configuration enforcement, and limited visibility within the virtualization layer. This allows them to maintain long-term persistence and gain administrative control over the entire vSphere environment, making the VCSA a prime target due to its centralized control. This activity is not due to vendor vulnerabilities but rather misconfigurations and security gaps. vSphere 7 reached End of Life (EoL) in October 2025, so organizations using this version are at increased risk.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Access:</strong> The attacker gains initial access to the vSphere environment, potentially through compromised credentials or vulnerabilities in externally facing services.</li>
<li><strong>VCSA Compromise:</strong> The attacker targets the vCenter Server Appliance (VCSA) to gain centralized control over the vSphere environment.</li>
<li><strong>Privilege Escalation:</strong> The attacker escalates privileges within the VCSA to gain root or administrative access to the underlying Photon Linux OS.</li>
<li><strong>Persistence:</strong> The attacker establishes persistence by modifying system files or creating malicious services that survive reboots. This may involve writing scripts to <code>/etc/rc.local.d</code> or modifying startup files.</li>
<li><strong>Lateral Movement:</strong> The attacker uses the compromised VCSA to move laterally to other ESXi hosts and virtual machines within the environment.</li>
<li><strong>Data Access:</strong> The attacker accesses the underlying storage (VMDKs) of virtual machines, bypassing operating system permissions and traditional file system security, to exfiltrate sensitive data.</li>
<li><strong>Control of ESXi Hosts:</strong> The attacker resets root credentials on any managed ESXi host, providing full control of the hypervisor.</li>
<li><strong>Impact:</strong> The attacker can power off, delete, or reconfigure any virtual machine, encrypt datastores, disable virtual networks, and exfiltrate data. The ultimate objective could be data theft, disruption of services, or ransomware deployment.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful BRICKSTORM attack can have severe consequences, including complete compromise of the vSphere environment. This can lead to data exfiltration of Tier-0 assets, disruption of critical services (such as domain controllers), and potential ransomware deployment across all virtual machines. Organizations may face significant financial losses, reputational damage, and legal liabilities. The lack of command-line logging on the Photon OS shell further hinders incident response efforts.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Harden the vCenter Server Appliance (VCSA) by implementing the security configurations recommended in the Mandiant vCenter Hardening Script (reference: vCenter Hardening Script link in Overview).</li>
<li>Implement logging and monitoring for the Photon OS shell to detect unauthorized access and command execution (reference: Phase 4 in Content).</li>
<li>Upgrade to a supported version of vSphere to receive critical security patches (reference: vSphere 7 End of Life in Content).</li>
<li>Enable Secure Boot, strictly firewall management interfaces, and disable shell access on ESXi hosts and the VCSA (reference: Technical Hardening in Content).</li>
<li>Deploy the Sigma rule to detect modifications to startup files for persistence on Photon OS (reference: Sigma rule: &ldquo;Detect Startup File Modification in Photon OS&rdquo;).</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">threat</category><category>vsphere</category><category>virtualization</category><category>brickstorm</category><category>persistence</category><category>lateral-movement</category></item><item><title>SSH Authorized Key File Modification Inside a Container</title><link>https://feed.craftedsignal.io/briefs/2026-04-ssh-authorized-keys-modification-inside-a-container/</link><pubDate>Thu, 02 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-ssh-authorized-keys-modification-inside-a-container/</guid><description>The rule detects the creation or modification of an authorized_keys file inside a container, a technique used by adversaries to maintain persistence on a victim host by adding their own public key(s) to enable unauthorized SSH access for lateral movement or privilege escalation.</description><content:encoded><![CDATA[<p>This detection focuses on identifying malicious actors who modify SSH authorized_keys files inside containers to gain unauthorized access. SSH authorized keys are used for public key authentication, and modification of these files allows attackers to maintain persistence or move laterally within a containerized environment. The rule specifically looks for file creation and modification events of authorized_keys files within Linux-based containers. Introduced as part of the Defend for Containers integration in Elastic Stack version 9.3.0, this detection is crucial because unauthorized SSH access can lead to significant compromise within cloud environments and containerized workloads. Defenders need to be aware of unexpected SSH key modifications as indicators of compromise inside containerized environments.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a container, possibly through a software vulnerability or misconfiguration.</li>
<li>The attacker executes commands within the container to locate the SSH authorized_keys file (typically located at <code>/home/&lt;user&gt;/.ssh/authorized_keys</code> or <code>/root/.ssh/authorized_keys</code>).</li>
<li>The attacker modifies the authorized_keys file, adding their own SSH public key to the file using commands like <code>echo &quot;ssh-rsa AAAAB3Nz...&quot; &gt;&gt; /root/.ssh/authorized_keys</code>.</li>
<li>The attacker uses the newly added SSH key to authenticate and log into the container without needing a password.</li>
<li>The attacker uses the SSH session to execute further commands, potentially escalating privileges or moving laterally to other containers or systems.</li>
<li>The attacker maintains persistence by ensuring their SSH key remains in the authorized_keys file, allowing them to re-access the container at any time.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful modification of the authorized_keys file enables persistent, unauthorized SSH access to the compromised container. This can lead to lateral movement within the container environment, privilege escalation, data exfiltration, or further attacks on other systems. The rule aims to detect these modifications early, preventing significant damage. While the number of specific victims isn&rsquo;t stated, a successful attack targeting containers can affect critical cloud infrastructure and applications.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule to your SIEM to detect unauthorized modifications of SSH authorized_keys files within containers (rule: <code>SSH Authorized Key File Activity</code>).</li>
<li>Enable <code>Elastic Defend for Containers</code> integration (minimum version 9.3.0) to provide the necessary file event data for the Sigma rule to function correctly.</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on the process and user context of the file modifications, as outlined in the rule&rsquo;s description (rule: <code>SSH Authorized Key File Activity</code>).</li>
<li>Implement stricter access controls and monitoring on SSH usage within containers to prevent similar incidents in the future, as recommended in the incident response section.</li>
<li>Create exceptions for known update processes or deployment scripts that regularly alter these files to reduce false positives, as suggested in the false positive analysis.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>container</category><category>persistence</category><category>lateral-movement</category><category>privilege-escalation</category><category>ssh</category></item><item><title>Stealthy WMI Lateral Movement via StealthyWMIExec.py</title><link>https://feed.craftedsignal.io/briefs/2024-05-stealthy-wmi-exec/</link><pubDate>Mon, 16 Mar 2026 19:03:04 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-05-stealthy-wmi-exec/</guid><description>The StealthyWMIExec.py script facilitates lateral movement via WMI, potentially evading standard detection mechanisms by employing stealthy techniques.</description><content:encoded><![CDATA[<p>The information describes a lateral movement technique leveraging Windows Management Instrumentation (WMI) using a tool named StealthyWMIExec.py. This tool aims to provide a &ldquo;stealthy&rdquo; approach to executing commands on remote systems. The original post on Reddit&rsquo;s blueteamsec forum, dating back to March 2026, discusses a method for achieving lateral movement while potentially bypassing traditional security monitoring that focuses on standard command execution patterns. Defenders should consider that adversaries might try to use WMI for command execution to blend in with legitimate activity and evade detection.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains initial access to a system within the target network.</li>
<li>Attacker uses valid credentials or exploits a vulnerability to authenticate to a remote host.</li>
<li>Attacker uses the StealthyWMIExec.py script (or similar WMI-based execution tool).</li>
<li>The script establishes a WMI connection to the target machine.</li>
<li>The script executes commands on the remote host using WMI&rsquo;s <code>Win32_Process</code> class.</li>
<li>The output of the executed command is retrieved via WMI.</li>
<li>The attacker uses the information obtained to further compromise the network or achieve other objectives.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation via WMI-based lateral movement can lead to the compromise of multiple systems within a network. This can lead to data exfiltration, ransomware deployment, or other malicious activities, depending on the attacker&rsquo;s objectives. The use of &ldquo;stealthy&rdquo; techniques may allow attackers to remain undetected for longer periods, increasing the potential damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor WMI event logs (Event ID 5861, 5857, 5858, 5859) for suspicious WMI activity indicative of lateral movement.</li>
<li>Implement the Sigma rules provided to detect unusual WMI process creation and script execution.</li>
<li>Enable and review process creation logs (Sysmon Event ID 1) with command-line arguments to identify suspicious WMI activity.</li>
<li>Restrict WMI access to authorized users and systems only to limit the attack surface for this technique.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>lateral-movement</category><category>wmi</category><category>windows</category></item><item><title>AWS STS Role Assumption by User</title><link>https://feed.craftedsignal.io/briefs/2026-03-aws-sts-role-assumption/</link><pubDate>Wed, 04 Mar 2026 18:01:49 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-aws-sts-role-assumption/</guid><description>Detection of a user assuming a role in AWS Security Token Service (STS) to obtain temporary credentials, which can indicate privilege escalation or lateral movement.</description><content:encoded><![CDATA[<p>This detection rule identifies when an IAM user assumes a role in AWS Security Token Service (STS) within an AWS environment. The AWS Security Token Service (STS) allows users to request temporary, limited-privilege credentials for accessing AWS resources. While legitimate role assumption is common for authorized access, adversaries can abuse this mechanism to escalate privileges or move laterally within a compromised AWS account. This behavior is detected by monitoring AWS CloudTrail logs for <code>AssumeRole</code> events from IAM users. The rule focuses on identifying potentially malicious role assumptions by correlating the user identity, assumed role, and source information.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to an AWS account as an IAM user, potentially through compromised credentials or an exposed access key.</li>
<li>The attacker enumerates available IAM roles within the AWS environment to identify roles with elevated privileges or access to sensitive resources.</li>
<li>The attacker calls the <code>AssumeRole</code> API in AWS STS, requesting temporary credentials for the target role, using a <code>roleSessionName</code> for context.</li>
<li>The STS service validates the request and, if authorized, issues temporary credentials consisting of an <code>accessKeyId</code>, <code>secretAccessKey</code>, and <code>sessionToken</code>.</li>
<li>The attacker configures their AWS CLI or SDK with the temporary credentials obtained from the STS service.</li>
<li>The attacker uses the temporary credentials to access AWS resources and perform actions permitted by the assumed role, such as modifying security groups, accessing S3 buckets, or launching EC2 instances.</li>
<li>The attacker may attempt to further escalate privileges by assuming additional roles or creating new IAM users with administrative privileges.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful role assumption can grant an attacker access to sensitive data, allow them to disrupt critical services, or provide a foothold for further attacks within the AWS environment. While this rule has a low severity, a high volume of alerts should be reviewed as it could indicate ongoing lateral movement and privilege escalation. The impact of a successful attack can range from data breaches and service disruptions to complete compromise of the AWS environment.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule provided below to your SIEM and tune for your environment to detect suspicious role assumptions.</li>
<li>Investigate any alerts generated by the rule by reviewing the associated CloudTrail logs, specifically the <code>aws.cloudtrail.user_identity.arn</code> and <code>aws.cloudtrail.resources.arn</code> fields.</li>
<li>Implement additional monitoring for high-risk roles with elevated permissions, and create exceptions for trusted patterns.</li>
<li>Regularly review IAM policies and roles to minimize the risk of privilege escalation.</li>
<li>Refer to the AWS STS documentation for more details on managing and securing AWS STS in your environment.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>aws</category><category>privilege-escalation</category><category>lateral-movement</category></item><item><title>Powercat PowerShell Implementation Detection</title><link>https://feed.craftedsignal.io/briefs/2024-11-powercat-detection/</link><pubDate>Mon, 04 Nov 2024 14:27:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-11-powercat-detection/</guid><description>Adversaries may leverage Powercat, a PowerShell implementation of Netcat, to establish command and control channels or perform lateral movement within a compromised network.</description><content:encoded>&lt;p>Powercat is a PowerShell script that functions similarly to the traditional Netcat utility, allowing for network communication using TCP and UDP. Attackers can use Powercat to establish reverse shells, transfer files, and perform port scanning within a compromised environment. This activity is often employed during post-exploitation phases to maintain access and propagate further into the network. Defenders should be aware of PowerShell scripts invoking Powercat, especially in environments…&lt;/p>
</content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>command-and-control</category><category>execution</category><category>lateral-movement</category><category>powershell</category></item><item><title>Bitbucket Global SSH Settings Changed</title><link>https://feed.craftedsignal.io/briefs/2024-11-bitbucket-ssh-change/</link><pubDate>Fri, 01 Nov 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-11-bitbucket-ssh-change/</guid><description>An attacker modifies Bitbucket global SSH settings to potentially enable unauthorized access and lateral movement.</description><content:encoded><![CDATA[<p>This brief focuses on the detection of unauthorized changes to Bitbucket&rsquo;s global SSH settings. While the specific actor remains unknown, the modification of these settings is a significant security concern. The activity is detected via Bitbucket audit logs. Modification of global SSH settings can allow attackers to gain unauthorized access to repositories, potentially leading to code compromise, data breaches, or further lateral movement within the network. This activity is particularly important for organizations relying on Bitbucket for source code management and secure development workflows. The audit logs are the primary source of information, specifically focusing on events categorized as &lsquo;Global administration&rsquo; with the action &lsquo;SSH settings changed&rsquo;.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to a Bitbucket account with administrative privileges, possibly through credential compromise or exploiting a vulnerability.</li>
<li>The attacker authenticates to the Bitbucket web interface.</li>
<li>The attacker navigates to the global SSH settings configuration page within the Bitbucket administration panel.</li>
<li>The attacker modifies global SSH settings, such as adding a new public key or changing authentication requirements.</li>
<li>Bitbucket logs the &lsquo;SSH settings changed&rsquo; event in the audit logs under the &lsquo;Global administration&rsquo; category.</li>
<li>The attacker leverages the modified SSH settings to clone repositories or push malicious code.</li>
<li>The attacker uses compromised code or data to move laterally within the organization&rsquo;s network, targeting other systems and resources.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful modification of Bitbucket global SSH settings can allow unauthorized access to all repositories within the Bitbucket instance. This can lead to code theft, injection of malicious code, and data breaches. The impact may extend beyond the Bitbucket environment if the compromised code is deployed to production systems or used in other development processes. Organizations using Bitbucket for critical projects are at higher risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule to your SIEM to detect unauthorized changes to Bitbucket global SSH settings in the audit logs.</li>
<li>Investigate any detected instances of &ldquo;SSH settings changed&rdquo; in the Bitbucket audit logs to determine the legitimacy of the changes.</li>
<li>Enforce multi-factor authentication (MFA) for all Bitbucket accounts, especially those with administrative privileges, to mitigate credential compromise as an initial access vector.</li>
<li>Review Bitbucket&rsquo;s audit log configuration to ensure the &ldquo;Advance&rdquo; log level is enabled to capture the necessary audit events.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>lateral-movement</category><category>defense-impairment</category><category>bitbucket</category></item><item><title>OpenCanary HTTPPROXY Login Attempt Detection</title><link>https://feed.craftedsignal.io/briefs/2024-10-opencanary-httpproxy/</link><pubDate>Sat, 26 Oct 2024 18:22:34 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-10-opencanary-httpproxy/</guid><description>Detection of attempted HTTP proxy use on an OpenCanary node, indicating potential reconnaissance or lateral movement by an attacker attempting to proxy another page.</description><content:encoded><![CDATA[<p>This threat brief focuses on detecting malicious attempts to use an OpenCanary node as an HTTP proxy. OpenCanary is a low-interaction honeypot designed to detect intruders on a network. An attacker attempting to use an OpenCanary node as an HTTP proxy is a strong indicator of reconnaissance or lateral movement, as they are attempting to route their traffic through the honeypot. This activity is logged by OpenCanary and can be detected with appropriate monitoring. The default configuration of OpenCanary includes an HTTPPROXY service that listens for proxy requests. Defenders should monitor OpenCanary logs for event ID 7001, which indicates an attempted HTTP proxy login.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains initial access to a network (e.g., through phishing or exploiting a vulnerability).</li>
<li>Attacker performs network reconnaissance to identify potential targets, including the OpenCanary node.</li>
<li>Attacker attempts to configure their system or tools to use the OpenCanary node as an HTTP proxy.</li>
<li>The attacker sends HTTP requests through the configured proxy, attempting to reach other systems on the network.</li>
<li>OpenCanary logs the attempted proxy connection with event ID 7001.</li>
<li>The defender detects the suspicious HTTP proxy attempt in the OpenCanary logs.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful HTTP proxy attempt indicates that an attacker is actively exploring the network and attempting to move laterally. This could lead to further compromise of sensitive systems and data exfiltration. While the OpenCanary node itself is a honeypot and not a production asset, the detection of proxy attempts signals a breach and ongoing malicious activity within the network.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule <code>OpenCanary HTTPPROXY Login Attempt</code> to your SIEM and tune for your environment to detect unauthorized proxy attempts on OpenCanary nodes.</li>
<li>Investigate any alerts generated by the Sigma rule to determine the source and target of the attempted proxy connection.</li>
<li>Review OpenCanary configuration to ensure that the HTTPPROXY service is properly configured and secured.</li>
<li>Implement network segmentation to limit the impact of potential lateral movement by attackers.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>opencanary</category><category>honeypot</category><category>httpproxy</category><category>lateral-movement</category></item><item><title>Unusual Remote File Size Indicating Lateral Movement</title><link>https://feed.craftedsignal.io/briefs/2024-04-30-unusual-remote-file-size/</link><pubDate>Tue, 30 Apr 2024 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-04-30-unusual-remote-file-size/</guid><description>A machine learning job has detected an unusually high file size shared by a remote host, indicating potential lateral movement as attackers bundle data into a single large file transfer to evade detection when exfiltrating valuable information.</description><content:encoded><![CDATA[<p>This detection leverages machine learning to identify unusual remote file sizes, a tactic often used during lateral movement. After gaining initial access, adversaries frequently aim to locate and exfiltrate valuable data. To avoid raising alarms with numerous small transfers, they may consolidate data into a single large file. This rule, built upon the Elastic Lateral Movement Detection integration, specifically uses the <code>lmd_high_file_size_remote_file_transfer_ea</code> machine learning job. The integration requires the <code>host.ip</code> field to be populated and Elastic Defend to be properly configured. This detection is critical for organizations seeking to identify and prevent data exfiltration attempts early in the attack lifecycle. The integration assets must be installed and file and Windows RDP process events collected by Elastic Defend.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial Access: An attacker gains access to a host within the network, potentially through compromised credentials or exploitation of a vulnerability.</li>
<li>Discovery: The attacker performs reconnaissance to identify valuable data stores, network shares, and potential exfiltration targets.</li>
<li>Collection: The attacker gathers sensitive data from various sources within the compromised network. This data could include documents, databases, or other confidential information.</li>
<li>Data Consolidation: To avoid detection, the attacker bundles the collected data into a single, large file. This could involve archiving, compression, or other methods of aggregation.</li>
<li>Lateral Tool Transfer: The attacker uses remote services or tools to transfer the large file to a remote host within the network (T1570).</li>
<li>Exfiltration Preparation: The attacker stages the large file on the remote host, preparing it for exfiltration outside the network.</li>
<li>Exfiltration: The attacker initiates the transfer of the large file from the compromised network to an external destination, potentially using protocols like RDP.</li>
<li>Cleanup: The attacker attempts to remove traces of the activity, such as deleting temporary files or logs, to avoid detection.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack can lead to the exfiltration of sensitive data, potentially resulting in financial loss, reputational damage, and legal liabilities. The detection of unusual remote file sizes can help organizations identify and prevent data exfiltration attempts before they cause significant harm. Depending on the sensitivity of the exfiltrated data, the impact could range from minor inconvenience to a major security breach affecting thousands of individuals or customers.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Ensure the <code>host.ip</code> field is populated as required by the rule. For Elastic Defend versions 8.18 and above, verify that host IP collection is enabled following the provided <a href="https://www.elastic.co/docs/solutions/security/configure-elastic-defend/configure-data-volume-for-elastic-endpoint#host-fields">helper guide</a>.</li>
<li>Install the Lateral Movement Detection integration assets, including the <code>lmd_high_file_size_remote_file_transfer_ea</code> machine learning job. Follow the setup instructions detailed in the <a href="https://www.elastic.co/guide/en/security/current/prebuilt-ml-jobs.html">documentation</a>.</li>
<li>Review and tune the anomaly threshold (<code>anomaly_threshold = 70</code>) of the machine learning job based on your environment&rsquo;s baseline to reduce false positives.</li>
<li>Implement network segmentation to limit lateral movement, as suggested in the &ldquo;Response and remediation&rdquo; section of the rule documentation.</li>
<li>Enhance monitoring and logging for unusual file transfer activities and remote access attempts as stated in the rule documentation.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>lateral-movement</category><category>data-exfiltration</category><category>machine-learning</category></item><item><title>Potential Abuse of AWS Console GetSigninToken</title><link>https://feed.craftedsignal.io/briefs/2024-04-aws-get-signin-token-abuse/</link><pubDate>Mon, 29 Apr 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-04-aws-get-signin-token-abuse/</guid><description>Adversaries may abuse the AWS GetSigninToken API to create temporary federated credentials for obfuscating compromised AWS access keys and pivoting to console sessions without MFA, potentially leading to lateral movement within the AWS environment.</description><content:encoded><![CDATA[<p>The AWS GetSigninToken API, typically used for legitimate console access, can be abused by attackers to generate temporary, federated credentials. This technique, often facilitated by tools like <code>aws_consoler</code>, allows attackers to obfuscate the compromised access keys used to generate the tokens. By pivoting from the AWS CLI to console sessions with these temporary credentials, adversaries bypass MFA requirements and complicate forensic investigations. This activity is crucial for defenders to monitor, especially in environments not configured for AWS SSO, as it can indicate unauthorized access and lateral movement within the AWS infrastructure. The tool <code>aws_consoler</code> is specifically designed to automate this process, creating a streamlined path for malicious actors to leverage compromised credentials for further exploitation.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to AWS environment using compromised credentials (access key, secret key).</li>
<li>The attacker uses the compromised credentials with the AWS CLI or SDK to call the <code>GetSigninToken</code> API.</li>
<li>AWS CloudTrail logs the <code>GetSigninToken</code> event with the event source <code>signin.amazonaws.com</code> and event name <code>GetSigninToken</code>.</li>
<li>The <code>GetSigninToken</code> API returns a temporary sign-in token.</li>
<li>The attacker uses the temporary token along with the AWS account ID to construct a sign-in URL.</li>
<li>The attacker accesses the AWS Management Console via the crafted URL, bypassing MFA if the original compromised credentials required it.</li>
<li>Once in the console, the attacker performs reconnaissance, identifies valuable resources, and escalates privileges as needed.</li>
<li>The attacker moves laterally within the AWS environment, accessing and potentially exfiltrating sensitive data, or disrupting services.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful abuse of the <code>GetSigninToken</code> API can lead to unauthorized access to the AWS Management Console, enabling lateral movement and data exfiltration.  The obfuscation of the original compromised credentials makes incident response more difficult. While the exact number of victims is unknown, this technique has been observed in intrusions targeting telecom and BPO companies.  The impact includes potential data breaches, service disruptions, and reputational damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule to your SIEM to detect suspicious <code>GetSigninToken</code> events in AWS CloudTrail logs.</li>
<li>Investigate any <code>GetSigninToken</code> events originating from outside of expected AWS SSO user agents or other known legitimate sources.</li>
<li>Monitor AWS CloudTrail logs for <code>GetSigninToken</code> events where the requesting user identity does not match expected patterns.</li>
<li>Implement and enforce MFA for all AWS IAM users, even though this attack bypasses it for console access using the temporary tokens.</li>
<li>Review and restrict IAM policies to adhere to the principle of least privilege, minimizing the potential impact of compromised credentials.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>aws</category><category>cloud</category><category>lateral-movement</category><category>credential-access</category></item><item><title>Network-Level Authentication (NLA) Disabled via Registry Modification</title><link>https://feed.craftedsignal.io/briefs/2024-01-disable-nla/</link><pubDate>Wed, 31 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-disable-nla/</guid><description>Adversaries may disable Network-Level Authentication (NLA) by modifying specific registry keys to bypass authentication requirements for Remote Desktop Protocol (RDP) and enable persistence mechanisms.</description><content:encoded><![CDATA[<p>Network Level Authentication (NLA) is a security feature in Windows that requires users to authenticate before establishing a full RDP session, adding an extra layer of protection against unauthorized access. Attackers might attempt to disable NLA to gain access to the Windows sign-in screen without proper authentication. This tactic can facilitate the deployment of persistence mechanisms, such as leveraging Accessibility Features like Sticky Keys, or enable unauthorized remote access. This brief addresses the registry modifications associated with disabling NLA and provides detection strategies to identify such attempts. The references indicate that this technique is used in conjunction with other attacks for lateral movement within a compromised network.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial access to the system is gained (potentially via compromised credentials or vulnerability exploitation).</li>
<li>The attacker elevates privileges to modify system-level settings.</li>
<li>The attacker modifies the registry key <code>HKLM\SYSTEM\ControlSet*\Control\Terminal Server\WinStations\RDP-Tcp\UserAuthentication</code> to disable NLA.</li>
<li>The <code>UserAuthentication</code> value is set to &ldquo;0&rdquo; or &ldquo;0x00000000&rdquo;.</li>
<li>The attacker attempts to establish an RDP connection to the compromised system.</li>
<li>Due to the disabled NLA, the attacker bypasses the initial authentication screen.</li>
<li>The attacker leverages accessibility features (e.g., Sticky Keys) for persistence or further exploitation.</li>
<li>The attacker gains unauthorized access to the system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful disabling of NLA allows attackers to bypass authentication and gain unauthorized access to systems via RDP. This can lead to data theft, malware installation, or further lateral movement within the network. While the exact number of victims and sectors targeted are unspecified, the potential impact includes significant data breaches and system compromise.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Sysmon process-creation and registry event logging to detect the registry modifications (Elastic Defend, Elastic Endgame, Microsoft Defender XDR, SentinelOne, Sysmon).</li>
<li>Deploy the Sigma rule provided to detect attempts to modify the <code>UserAuthentication</code> registry key (Sysmon Registry Events).</li>
<li>Review and harden RDP configurations across the environment to prevent unauthorized access (Microsoft documentation).</li>
<li>Monitor endpoint security policies to detect unauthorized registry modifications (Endpoint Security Policies).</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>lateral-movement</category><category>registry-modification</category><category>windows</category></item><item><title>Spike in Number of RDP Connections from a Single Source IP</title><link>https://feed.craftedsignal.io/briefs/2024-01-spike-in-rdp-connections/</link><pubDate>Tue, 30 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-spike-in-rdp-connections/</guid><description>A machine learning job detected a high count of destination IPs establishing RDP connections with a single source IP, indicating potential lateral movement attempts after initial compromise.</description><content:encoded><![CDATA[<p>This threat brief addresses the potential for lateral movement within a network facilitated by an unusual spike in Remote Desktop Protocol (RDP) connections originating from a single source IP address. This activity is detected using an Elastic machine learning job designed to identify anomalies in network connection patterns. The rule &ldquo;Spike in Number of Connections Made from a Source IP&rdquo; leverages this ML job to flag instances where a single host initiates RDP connections to a significantly higher than normal number of distinct destination IPs, potentially indicating that an attacker is attempting to pivot and gain access to additional systems after compromising an initial foothold. This detection mechanism is available in Elastic Security 9.4.0 and later, with the Lateral Movement Detection integration assets installed.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Compromise:</strong> An attacker gains initial access to a host within the network through methods such as phishing, exploiting a vulnerability, or credential theft.</li>
<li><strong>Establish Foothold:</strong> The attacker establishes a foothold on the compromised system, potentially installing tools for reconnaissance and lateral movement.</li>
<li><strong>Internal Reconnaissance:</strong> The attacker performs internal reconnaissance to identify potential target systems accessible via RDP.</li>
<li><strong>RDP Connection Attempts:</strong> The attacker initiates RDP connections to a large number of internal IP addresses from the compromised host.</li>
<li><strong>Credential Harvesting:</strong> The attacker attempts to harvest credentials from the targeted systems to gain further access.</li>
<li><strong>Lateral Movement:</strong> The attacker successfully connects to additional systems using RDP, leveraging harvested or stolen credentials.</li>
<li><strong>Privilege Escalation:</strong> On newly accessed systems, the attacker attempts to escalate privileges to gain administrative control.</li>
<li><strong>Objective Completion:</strong> With broader access and elevated privileges, the attacker achieves their objective, which may include data exfiltration, ransomware deployment, or disruption of services.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>If successful, this lateral movement can result in widespread compromise across the targeted network. A single compromised host can serve as a launching point to access sensitive data, critical systems, and ultimately, inflict significant damage. The &ldquo;Spike in Number of Connections Made from a Source IP&rdquo; rule aims to detect these lateral movement attempts early, minimizing potential damage. The impact of a successful attack could range from data breaches and financial losses to operational disruption and reputational damage, affecting organizations across various sectors.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable host IP collection if using Elastic Defend (versions 8.18 and above), by following the configuration steps outlined in the Elastic documentation to ensure the <code>host.ip</code> field is populated.</li>
<li>Install the Lateral Movement Detection integration assets as described in the <a href="https://docs.elastic.co/en/integrations/lmd">official Elastic documentation</a>.</li>
<li>Review and tune the false positive analysis steps within the detection rule&rsquo;s documentation. Whitelist known administrative IPs or legitimate RDP usage patterns to minimize noise.</li>
<li>Implement network segmentation to limit RDP access to only necessary systems and users, reducing the attack surface as recommended in the rule&rsquo;s response and remediation guidance.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>lateral-movement</category><category>rdp</category><category>elastic</category></item><item><title>Unusually High Mean of RDP Session Duration Detected by Machine Learning</title><link>https://feed.craftedsignal.io/briefs/2024-01-high-mean-rdp-session/</link><pubDate>Wed, 24 Jan 2024 18:10:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-high-mean-rdp-session/</guid><description>A machine learning job detected an unusually high mean of RDP session duration, indicative of potential lateral movement or persistent access attempts by adversaries abusing RDP.</description><content:encoded><![CDATA[<p>This threat brief addresses the detection of unusually long Remote Desktop Protocol (RDP) sessions, identified by a pre-built Elastic machine learning job named <code>lmd_high_mean_rdp_session_duration_ea</code>. Attackers can abuse RDP for lateral movement and maintaining persistence within a network. Extended RDP sessions can also be used to evade detection mechanisms. This detection leverages machine learning to identify deviations from normal RDP session durations, potentially indicating malicious activity. The detection rule has been available since October 2023, and the corresponding ML job is part of the Lateral Movement Detection integration, requiring Elastic Stack version 9.4.0 or later. The rule depends on the <code>host.ip</code> field to be populated, which may require enabling host IP collection in Elastic Defend versions 8.18 and above.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a system within the network, possibly through phishing or exploiting a public-facing application.</li>
<li>The attacker leverages valid credentials or exploits a vulnerability to establish an RDP connection to a target system.</li>
<li>The RDP session is maintained for an extended period, significantly longer than typical RDP sessions within the environment.</li>
<li>During the prolonged RDP session, the attacker performs reconnaissance, gathering information about the network and target systems.</li>
<li>The attacker moves laterally to other systems within the network, using the established RDP session as a persistent access point.</li>
<li>The attacker executes malicious commands or transfers files, potentially installing malware or exfiltrating sensitive data.</li>
<li>The unusually long RDP session duration helps the attacker to remain undetected and evade security measures.</li>
<li>The attacker achieves their final objective, such as data theft, system compromise, or ransomware deployment.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation and undetected lateral movement via prolonged RDP sessions can lead to significant data breaches, system compromise, and financial loss. The impact includes potential theft of sensitive information, disruption of business operations, and reputational damage. If an adversary establishes a persistent foothold via RDP, they can maintain long-term access to the compromised environment.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Ensure <code>host.ip</code> field is populated by enabling host IP collection if using Elastic Defend versions 8.18 and above, as described in the <a href="https://www.elastic.co/docs/solutions/security/configure-elastic-defend/configure-data-volume-for-elastic-endpoint#host-fields">helper guide</a>.</li>
<li>Install and configure the Lateral Movement Detection integration in Kibana as described in the <a href="https://www.elastic.co/guide/en/security/current/prebuilt-ml-jobs.html">setup guide</a>.</li>
<li>Tune the machine learning job <code>lmd_high_mean_rdp_session_duration_ea</code> by adjusting the <code>anomaly_threshold</code> based on your environment and RDP usage patterns.</li>
<li>Investigate triggered alerts from the &ldquo;High Mean of RDP Session Duration&rdquo; rule following the <a href="https://www.elastic.co/guide/en/security/current/prebuilt-ml-jobs.html">triage and analysis guide</a>.</li>
<li>Monitor Windows RDP process events collected by the <a href="https://docs.elastic.co/en/integrations/endpoint">Elastic Defend</a> integration for suspicious activity.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>lateral-movement</category><category>rdp</category><category>machine-learning</category></item><item><title>Spike in Number of Processes in an RDP Session</title><link>https://feed.craftedsignal.io/briefs/2024-01-rdp-process-spike/</link><pubDate>Tue, 23 Jan 2024 14:35:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-rdp-process-spike/</guid><description>A machine learning job has detected an unusually high number of processes started within a single Remote Desktop Protocol (RDP) session, potentially indicating lateral movement activity.</description><content:encoded><![CDATA[<p>This detection identifies potential lateral movement by flagging spikes in the number of processes initiated during a single RDP session. The rule, based on an Elastic machine learning job named <code>lmd_high_sum_rdp_number_of_processes_ea</code>, aims to uncover suspicious remote activity indicative of an attacker attempting to execute commands or deploy tools on a compromised host. This detection matters because RDP is a common vector for attackers to gain access to internal networks and subsequently move laterally. The detection leverages Windows RDP process events and file events collected by the Elastic Defend integration. Identifying anomalous process creation within RDP sessions can help defenders identify and respond to potential security incidents faster.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a system within the network.</li>
<li>The attacker leverages valid credentials or exploits an RDP vulnerability to establish a remote session (T1021.001).</li>
<li>Once connected via RDP, the attacker begins to execute a series of commands to enumerate the system and network.</li>
<li>The attacker attempts to install malware or other malicious tools, triggering the creation of multiple processes.</li>
<li>The machine learning job detects a significant increase in the number of processes started within the RDP session.</li>
<li>The detection rule triggers, alerting analysts to the anomalous activity.</li>
<li>The attacker uses the newly installed tools to move laterally to other systems on the network.</li>
<li>The attacker achieves their objective, such as data exfiltration or ransomware deployment.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful lateral movement attack can lead to significant damage, including data breaches, system compromise, and financial loss. While the severity is low, a spike in RDP processes can be an early indicator of compromise. Attackers often use RDP to propagate through a network after gaining initial access, making this detection critical for preventing widespread damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable host IP collection by following the configuration steps in the <a href="https://www.elastic.co/docs/solutions/security/configure-elastic-defend/configure-data-volume-for-elastic-endpoint#host-fields">Elastic Defend documentation</a> to ensure the <code>host.ip</code> field is populated.</li>
<li>Install the Lateral Movement Detection integration assets as described in the rule&rsquo;s setup instructions to enable the machine learning job <code>lmd_high_sum_rdp_number_of_processes_ea</code>.</li>
<li>Review and tune the anomaly threshold to reduce false positives based on your organization&rsquo;s typical RDP usage.</li>
<li>Investigate RDP sessions flagged by this rule to identify the source of the process spike and potential malicious activity as described in the rule&rsquo;s &ldquo;Triage and Analysis&rdquo; notes.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>lateral-movement</category><category>threat-detection</category><category>windows</category></item><item><title>Unusual Remote File Directory Lateral Movement Detection</title><link>https://feed.craftedsignal.io/briefs/2024-01-22-unusual-remote-file-directory/</link><pubDate>Mon, 22 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-22-unusual-remote-file-directory/</guid><description>An Elastic machine learning job detects anomalous remote file transfers to unusual directories, indicating potential lateral movement by attackers attempting to bypass standard security monitoring.</description><content:encoded><![CDATA[<p>This detection identifies potential lateral movement within a network by flagging unusual remote file transfers to directories that are not commonly monitored. Attackers often leverage less scrutinized file paths to evade standard security measures and deploy malicious payloads. This detection relies on the &ldquo;lmd_rare_file_path_remote_transfer_ea&rdquo; machine learning job within Elastic Security, which analyzes file and Windows RDP process events to identify anomalous file transfers based on the destination directory. The detection is part of the Lateral Movement Detection integration and requires Elastic Defend and Fleet for full functionality. This is important for defenders because attackers will try to blend in with normal file transfer activity by using uncommon directories.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to a system within the network (e.g., via phishing or exploitation of a vulnerability).</li>
<li>The attacker identifies a target host for lateral movement.</li>
<li>The attacker uses a remote service (e.g., RDP, SMB) to connect to the target host.</li>
<li>The attacker attempts to transfer malicious files to the target host.</li>
<li>Instead of using common directories like &ldquo;C:\Windows\Temp&rdquo; or &ldquo;C:\ProgramData&rdquo;, the attacker chooses a less monitored directory to evade detection.</li>
<li>The remote service is leveraged to perform the file transfer to the atypical directory.</li>
<li>The transferred file is then executed, potentially leading to command execution or privilege escalation.</li>
<li>The attacker achieves their objective (e.g., data exfiltration, ransomware deployment) on the target host.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack can lead to unauthorized access to sensitive data, compromise of critical systems, and potential disruption of business operations. Although this detection is rated as low severity, successful lateral movement can lead to significant damage. The number of affected hosts and the severity of the impact depends on the attacker&rsquo;s objectives and the organization&rsquo;s security posture. Lateral movement allows attackers to gain a deeper foothold within the network and increase the scope of their malicious activities.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Ensure the <code>host.ip</code> field is populated in Elastic Defend events by following the configuration steps in the <a href="https://www.elastic.co/docs/solutions/security/configure-elastic-defend/configure-data-volume-for-elastic-endpoint#host-fields">Elastic documentation</a>.</li>
<li>Install the Lateral Movement Detection integration assets as described in the <a href="https://www.elastic.co/guide/en/security/current/prebuilt-ml-jobs.html">setup instructions</a>.</li>
<li>Tune the anomaly_threshold in the machine learning job configuration based on your environment&rsquo;s baseline activity to minimize false positives, as mentioned in the rule&rsquo;s configuration.</li>
<li>Investigate any alerts generated by this rule, paying close attention to the source and destination IP addresses, the user account involved, and the specific directory used for the file transfer as outlined in the <a href="#triage-and-analysis">triage and analysis section</a>.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>lateral-movement</category><category>machine-learning</category><category>elastic</category></item><item><title>Potential Ransomware Behavior - Note Files Dropped via SMB</title><link>https://feed.craftedsignal.io/briefs/2024-01-22-potential-ransomware-smb/</link><pubDate>Mon, 22 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-22-potential-ransomware-smb/</guid><description>This rule detects potential ransomware behavior by identifying the creation of multiple files with the same name over SMB by the SYSTEM account, potentially indicating remote execution of ransomware dropping note files.</description><content:encoded><![CDATA[<p>This detection identifies potential ransomware activity through the rapid creation of ransom notes via SMB shares. The rule focuses on file creation events originating from the SYSTEM account (PID 4), targeting common ransom note file extensions like .txt, .html, .pdf, and image files. This activity suggests an attacker has achieved lateral movement and is deploying ransom notes across multiple systems. The rule aggregates events within a 60-second window to reduce false positives and focus on high-frequency creation patterns indicative of automated ransomware deployment. Successful detection can help defenders quickly identify and contain ransomware outbreaks before widespread encryption occurs. The original Elastic detection rule was published on 2024-05-03 and updated on 2026-05-04.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to a system through an exploit or compromised credentials.</li>
<li>The attacker moves laterally to other systems on the network using valid accounts or exploits. (T1021.002 - SMB/Windows Admin Shares)</li>
<li>The attacker uses a tool to remotely create files over SMB. (T1021.002 - SMB/Windows Admin Shares)</li>
<li>The SYSTEM account (PID 4) on a compromised host is used to create multiple files with the same name but different paths (C:*) over SMB.</li>
<li>The created files have file extensions commonly associated with ransom notes: .txt, .htm, .html, .hta, .pdf, .jpg, .bmp, .png.</li>
<li>The files are dropped into at least 3 unique paths within a short time frame (60 seconds).</li>
<li>The attacker encrypts data and leaves the ransom notes to instruct victims on how to pay the ransom. (T1486 - Data Encrypted for Impact)</li>
<li>The organization experiences data loss, financial damage, and reputational harm.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful ransomware attacks can lead to significant data loss, financial costs associated with ransom payments, recovery efforts, and reputational damage. Organizations may experience business disruption, regulatory fines, and legal liabilities. The Akira ransomware group, referenced in the original rule&rsquo;s documentation, has been known to target various sectors, demanding substantial ransoms from victims. The widespread distribution of ransom notes indicates an advanced stage of the ransomware attack, necessitating immediate containment to prevent further data encryption and system compromise.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Potential Ransomware Note File Dropped via SMB</code> to your SIEM to detect suspicious file creation activity indicative of ransomware deployment.</li>
<li>Enable Elastic Defend for enhanced endpoint detection and response capabilities, as recommended in the rule&rsquo;s setup instructions.</li>
<li>Monitor incoming network connections to port 445 (SMB) on critical assets, as suggested in the rule&rsquo;s triage analysis.</li>
<li>Investigate file names with unusual extensions to identify potential ransom notes, as mentioned in the triage analysis.</li>
<li>Isolate any hosts identified as creating multiple note files over SMB to prevent further lateral movement and data encryption, as described in the rule&rsquo;s response and remediation steps.</li>
<li>Review and enforce network segmentation policies to limit lateral movement and reduce the impact of potential ransomware attacks (TA0008).</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>ransomware</category><category>impact</category><category>lateral-movement</category><category>windows</category></item><item><title>NetExec File Creation Detection</title><link>https://feed.craftedsignal.io/briefs/2024-01-netexec-file-indicators/</link><pubDate>Thu, 18 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-netexec-file-indicators/</guid><description>This brief covers the detection of NetExec, a post-exploitation and lateral movement tool, through monitoring for unique file creation patterns associated with its execution and file extraction in Windows environments.</description><content:encoded><![CDATA[<p>NetExec (formerly CrackMapExec) is a widely used post-exploitation tool favored by penetration testers and malicious actors for Active Directory enumeration, credential harvesting, and remote code execution. When executed on a Windows system, NetExec extracts its embedded data files into a temporary directory named &ldquo;_MEI&rdquo; followed by a random string, located under the user&rsquo;s Temp folder. A specific subdirectory, &ldquo;\nxc\data&quot;, within this extraction path contains files unique to NetExec. These file creation events offer a reliable indicator for detecting NetExec execution on a host. This activity is important for defenders as it signals potential reconnaissance, lateral movement attempts, or the establishment of a foothold within the network.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a system through various means (e.g., compromised credentials, exploiting a vulnerability).</li>
<li>The attacker uploads the NetExec executable (nxc.exe) to the compromised host.</li>
<li>The attacker executes nxc.exe.</li>
<li>NetExec extracts its embedded data files into a temporary directory. The path follows the pattern: <code>\Temp\_MEI&lt;random&gt;\</code>.</li>
<li>Within the temporary directory, a specific subdirectory <code>\nxc\data\</code> is created, containing NetExec&rsquo;s data files.</li>
<li>NetExec utilizes these files for Active Directory enumeration, credential harvesting, and reconnaissance activities.</li>
<li>The attacker leverages gathered information to move laterally within the network, potentially targeting other systems or services.</li>
<li>The attacker may attempt to execute code remotely using harvested credentials, furthering their access and control within the environment.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful NetExec deployment can lead to extensive reconnaissance of Active Directory environments, enabling attackers to map out network infrastructure, identify valuable targets, and harvest credentials. This can result in unauthorized access to sensitive data, lateral movement to critical systems, and ultimately, a complete compromise of the domain. Organizations in all sectors are vulnerable, with the impact ranging from data breaches and financial loss to reputational damage and operational disruption.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule <code>Detect NetExec File Creation</code> to your SIEM to detect NetExec&rsquo;s unique file creation patterns (logsource: file_event, product: windows).</li>
<li>Monitor file creation events in the <code>\Temp</code> directory for filenames containing <code>_MEI</code> and <code>\nxc\data\</code>, as these indicate NetExec&rsquo;s extraction process.</li>
<li>Enable process-creation logging with command-line arguments to identify the execution of <code>nxc.exe</code> (logsource: process_creation, product: windows).</li>
<li>Investigate any alerts generated by these rules to determine the extent of the compromise and contain any further lateral movement.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>netexec</category><category>crackmapexec</category><category>lateral-movement</category><category>post-exploitation</category><category>hacktool</category></item><item><title>NLTEST.EXE Used for Domain Trust Discovery</title><link>https://feed.craftedsignal.io/briefs/2024-01-nltest-domain-trust-discovery/</link><pubDate>Thu, 11 Jan 2024 17:49:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-nltest-domain-trust-discovery/</guid><description>Adversaries may use the `nltest.exe` command-line utility to enumerate domain trusts and gain insight into trust relationships to facilitate lateral movement within a Microsoft Windows NT Domain.</description><content:encoded><![CDATA[<p>The <code>nltest.exe</code> utility is a command-line tool used to manage and troubleshoot Windows NT domains. While legitimate domain administrators may use this utility for information gathering, adversaries can also abuse it to enumerate domain trusts and gain insight into trust relationships, which exposes the state of Domain Controller (DC) replication within a Windows NT Domain. This activity is more suspicious in environments with Windows Server 2012 and newer, where its usage is less common for legitimate purposes. Attackers can leverage this information to facilitate lateral movement and other malicious activities within the network.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a compromised host within the target environment.</li>
<li>The attacker executes <code>nltest.exe</code> with specific arguments such as <code>/DOMAIN_TRUSTS</code>, <code>/DCLIST:*</code>, <code>/DCNAME:*</code>, <code>/DSGET*</code>, <code>/LSAQUERYFTI:*</code>, <code>/PARENTDOMAIN</code>, or <code>/BDC_QUERY:*</code> to enumerate domain trusts.</li>
<li>The <code>nltest.exe</code> utility queries the Active Directory to gather information about domain trusts, domain controllers, and other domain-related information.</li>
<li>The attacker parses the output of <code>nltest.exe</code> to identify trust relationships, domain controllers, and other relevant information about the domain infrastructure.</li>
<li>The attacker uses the gathered information to map out potential lateral movement paths within the environment.</li>
<li>The attacker leverages discovered trust relationships to authenticate to other domains or resources.</li>
<li>The attacker moves laterally to other systems or domains, leveraging the discovered trust relationships and compromised credentials.</li>
<li>The attacker establishes persistence and continues to perform malicious activities, such as data exfiltration or ransomware deployment.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful enumeration of domain trusts via <code>nltest.exe</code> can provide attackers with valuable information to facilitate lateral movement and escalate privileges within a Windows NT Domain. This can lead to the compromise of sensitive data, disruption of critical services, and ultimately, a complete takeover of the affected environment. While the specific number of victims and sectors targeted are unknown, the impact can be significant for organizations relying on Active Directory for authentication and authorization.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor process execution for <code>nltest.exe</code> with command-line arguments indicative of domain trust discovery, using the provided Sigma rule.</li>
<li>Investigate any instances of <code>nltest.exe</code> execution, especially when initiated by non-administrative users or from unusual locations, as identified by the Sigma rule.</li>
<li>Enable Sysmon process creation logging to capture the necessary process execution data for the provided Sigma rule.</li>
<li>Review and restrict the use of <code>nltest.exe</code> to authorized personnel only.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>discovery</category><category>domain trust</category><category>lateral movement</category><category>windows</category></item><item><title>PowerShell Share Enumeration via ShareFinder or Native APIs</title><link>https://feed.craftedsignal.io/briefs/2024-01-09-powershell-share-enumeration/</link><pubDate>Tue, 09 Jan 2024 15:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-09-powershell-share-enumeration/</guid><description>Detection of PowerShell scripts employing ShareFinder functions or Windows share enumeration APIs to discover accessible network shares for reconnaissance, lateral movement, or ransomware deployment.</description><content:encoded><![CDATA[<p>This detection identifies PowerShell scripts utilizing ShareFinder functions (Invoke-ShareFinder/Invoke-ShareFinderThreaded) or native Windows API calls for share enumeration. These techniques are commonly used by attackers to map accessible network shares within an environment. This reconnaissance is often a precursor to data collection, lateral movement, or the deployment of ransomware. The activity is detected via script block logging, and focuses on identifying specific function calls and API usage within the PowerShell script content. Defenders should be aware of this activity, particularly when performed by unexpected users or on unusual systems, as it may indicate malicious reconnaissance within the network. The references indicate that this activity can lead to corporate insurance policy exfiltration or Conti ransomware deployment.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Windows system, potentially through phishing or compromised credentials.</li>
<li>The attacker executes a PowerShell script, either directly or through a fileless execution method.</li>
<li>The PowerShell script utilizes ShareFinder functions (Invoke-ShareFinder, Invoke-ShareFinderThreaded) or Windows share enumeration APIs (NetShareEnum, NetApiBufferFree) to discover network shares.</li>
<li>The script identifies accessible network shares by leveraging API calls and parsing the results for share names (shi1_netname) and remarks (shi1_remark).</li>
<li>The attacker analyzes the identified shares to determine those that are accessible and contain valuable data.</li>
<li>The attacker may then attempt to access these shares using compromised credentials or exploiting existing vulnerabilities.</li>
<li>Once access is gained, the attacker may collect sensitive data from the shares, move laterally to other systems, or deploy ransomware.</li>
<li>The ultimate goal is data exfiltration, system compromise, or financial gain through ransomware.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this reconnaissance technique can lead to significant data breaches, lateral movement within the network, and potential ransomware deployment. Organizations that fail to detect and prevent share enumeration may suffer financial losses, reputational damage, and operational disruption. The referenced &ldquo;Stolen Images&rdquo; campaign led to Conti ransomware deployment, and the &ldquo;Hunting for corporate insurance policies&rdquo; post highlights data exfiltration.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable PowerShell script block logging to capture the necessary events for detection (as referenced in the rule setup).</li>
<li>Deploy the Sigma rule &ldquo;PowerShell Share Enumeration Script via Invoke-ShareFinder&rdquo; to your SIEM and tune for your environment.</li>
<li>Deploy the Sigma rule &ldquo;PowerShell Share Enumeration via NetShareEnum API&rdquo; to detect share enumeration using native Windows APIs.</li>
<li>Investigate any alerts generated by these rules, focusing on the PowerShell launch context and the scope of the share discovery (see triage steps in the original rule).</li>
<li>Review and restrict PowerShell execution policies to prevent unauthorized script execution, especially from user-writable locations.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>discovery</category><category>powershell</category><category>share-enumeration</category><category>lateral-movement</category><category>ransomware</category></item><item><title>DCOM Lateral Movement via ShellWindows/ShellBrowserWindow</title><link>https://feed.craftedsignal.io/briefs/2024-01-dcom-lateral-movement/</link><pubDate>Thu, 04 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-dcom-lateral-movement/</guid><description>This analytic identifies the use of Distributed Component Object Model (DCOM) to execute commands on a remote host, specifically when launched via ShellBrowserWindow or ShellWindows Application COM objects, indicating potential lateral movement by an attacker.</description><content:encoded><![CDATA[<p>This detection identifies the abuse of Distributed Component Object Model (DCOM) for lateral movement within a Windows environment. DCOM allows software components to communicate across a network, and attackers may leverage it to execute commands remotely. This rule specifically focuses on the use of ShellBrowserWindow or ShellWindows Application COM objects as the launching point for these remote commands. The technique enables stealthy lateral movement, as it leverages legitimate Windows functionality. This activity is detected by identifying incoming TCP connections on high ports associated with <code>explorer.exe</code> spawning child processes, which are indicative of DCOM abuse. The rule is designed to detect this behavior and alert security teams to potential unauthorized lateral movement attempts.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a compromised host within the network.</li>
<li>The attacker uses DCOM to initiate a connection to a target host.</li>
<li>The DCOM connection is established to the target host via high TCP ports (above 49151).</li>
<li>The <code>explorer.exe</code> process on the target host receives the DCOM connection.</li>
<li>The attacker uses ShellBrowserWindow or ShellWindows COM objects to execute commands.</li>
<li><code>explorer.exe</code> spawns a child process to execute the attacker-supplied command.</li>
<li>The spawned process performs malicious actions, such as reconnaissance or further lateral movement.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to execute arbitrary commands on the target system, leading to potential data exfiltration, system compromise, and further lateral movement within the network. This can result in significant damage, including data breaches, financial losses, and reputational harm. The DCOM protocol is commonly used in many Windows environments, so this technique could be broadly applicable across many victim organizations.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;DCOM Lateral Movement with Explorer.exe&rdquo; to your SIEM and tune for your environment to detect suspicious process creations spawned by explorer.exe.</li>
<li>Enable Sysmon Event ID 3 (Network Connection) and Event ID 1 (Process Creation) logging to ensure the required data is available for the Sigma rule to function correctly.</li>
<li>Review network activity for incoming TCP connections to high ports (49151+) associated with <code>explorer.exe</code>, as highlighted in the &ldquo;Incoming DCOM Lateral Movement with ShellBrowserWindow or ShellWindows&rdquo; detection.</li>
<li>Investigate any unusual or unexpected child processes spawned by <code>explorer.exe</code>, as detected by the Sigma rule.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>lateral-movement</category><category>dcom</category><category>windows</category></item><item><title>Incoming Execution via PowerShell Remoting</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-powershell-remoting/</link><pubDate>Wed, 03 Jan 2024 18:53:23 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-powershell-remoting/</guid><description>This rule identifies remote execution via Windows PowerShell remoting, which allows a user to run any Windows PowerShell command on one or more remote computers, potentially indicating lateral movement.</description><content:encoded><![CDATA[<p>This detection identifies potential lateral movement through the exploitation of Windows PowerShell remoting. PowerShell remoting is a feature that enables administrators and attackers to execute commands on remote Windows systems. The detection focuses on identifying incoming network connections on ports 5985 (HTTP) and 5986 (HTTPS), the default ports used for PowerShell Remoting, followed by the execution of processes spawned by <code>wsmprovhost.exe</code>, the Windows Remote Management process host. This activity, when originating from unexpected sources, may indicate unauthorized access and lateral movement within a network. The rule is designed to detect suspicious activity by monitoring network traffic and process execution, flagging potential unauthorized remote executions, and enabling security teams to respond swiftly.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a network, possibly through phishing or exploiting a vulnerability on an internet-facing system.</li>
<li>The attacker leverages PowerShell remoting to initiate a connection to a target system on ports 5985 or 5986.</li>
<li>The target system accepts the incoming PowerShell Remoting connection.</li>
<li>The <code>wsmprovhost.exe</code> process is launched on the target system to facilitate the remote PowerShell session.</li>
<li>The attacker executes commands remotely, spawning child processes from <code>wsmprovhost.exe</code>.</li>
<li>The attacker attempts to escalate privileges or move laterally to other systems within the network using the remote PowerShell session.</li>
<li>The attacker uses tools such as <code>net.exe</code> or <code>PsExec</code> over the remote PowerShell session to further propagate.</li>
<li>The attacker achieves their objective, such as data exfiltration or deploying ransomware, by leveraging the established remote session.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of PowerShell Remoting for lateral movement can lead to widespread compromise within an organization. An attacker could gain control over multiple systems, potentially leading to data breaches, system outages, or ransomware deployment. The number of affected systems could range from a few critical servers to a significant portion of the network, depending on the attacker&rsquo;s objectives and the organization&rsquo;s security posture. The impact could include financial losses, reputational damage, and disruption of business operations.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Incoming Execution via PowerShell Remoting</code> to your SIEM to detect suspicious PowerShell remoting activity and tune for your environment.</li>
<li>Monitor network connections to ports 5985 and 5986, and investigate any unauthorized or unexpected traffic using the <code>network_connection</code> log source.</li>
<li>Investigate processes spawned by <code>wsmprovhost.exe</code> for unusual or malicious activity using the <code>process_creation</code> log source.</li>
<li>Whitelist authorized administrative IP addresses or user accounts that frequently perform remote management tasks, as mentioned in the false positives analysis.</li>
<li>Review and document automated scripts or scheduled tasks that use PowerShell Remoting for system maintenance, then create exceptions for their specific process names or execution paths.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>lateral-movement</category><category>powershell</category><category>remoting</category></item><item><title>Unusual Time or Day for an RDP Session Detected by Machine Learning</title><link>https://feed.craftedsignal.io/briefs/2024-01-unusual-rdp-session/</link><pubDate>Wed, 03 Jan 2024 18:50:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-unusual-rdp-session/</guid><description>A machine learning job detected an RDP session initiated at an unusual time or day, potentially indicating lateral movement activity within a network.</description><content:encoded><![CDATA[<p>This alert originates from a machine learning job designed to detect anomalous RDP session start times. RDP is a common vector for lateral movement, and attackers may initiate sessions during off-peak hours to evade detection. The machine learning model flags sessions started outside of normal business hours or on unusual weekdays. While not inherently malicious, this activity warrants investigation as it can be an early indicator of a broader attack. The rule is part of the Lateral Movement Detection (LMD) integration from Elastic, requiring a minimum stack version of 9.4.0 and leverages Entity Analytics (EA) fields. Lateral Movement Detection integration detects lateral movement activity by identifying abnormalities in file and Windows RDP events using Elastic&rsquo;s Anomaly Detection feature.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a system, possibly through compromised credentials or a software vulnerability (not described in source).</li>
<li>The attacker leverages RDP to attempt lateral movement to other systems within the network.</li>
<li>The RDP session is initiated at an unusual time or day, deviating from typical user behavior.</li>
<li>The machine learning job detects this anomaly based on the unusual RDP session start time.</li>
<li>An alert is triggered, flagging the potentially suspicious activity.</li>
<li>The attacker may attempt to access sensitive data or resources on the target system.</li>
<li>The attacker could install malware or establish persistence mechanisms (not described in source).</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful lateral movement attack can allow an attacker to gain access to sensitive data, compromise critical systems, and ultimately disrupt business operations. While the detection of an unusual RDP session is an early warning sign, it is critical to investigate these alerts promptly to prevent further escalation. If the suspicious RDP session is part of a broader attack, the impact could range from data theft to ransomware deployment. The lack of immediate action could lead to significant financial and reputational damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable host IP collection within Elastic Defend if using versions 8.18 and above, following the configuration steps in the <a href="https://www.elastic.co/docs/solutions/security/configure-elastic-defend/configure-data-volume-for-elastic-endpoint#host-fields">helper guide</a>.</li>
<li>Ensure the Lateral Movement Detection integration assets are installed, as well as file and Windows RDP process events collected by the Elastic Defend integration, as mentioned in the <a href="https://www.elastic.co/guide/en/security/current/prebuilt-ml-jobs.html">setup instructions</a>.</li>
<li>Investigate all alerts generated by the &ldquo;Unusual Time or Day for an RDP Session&rdquo; rule, correlating the RDP session with other security events.</li>
<li>Tune the anomaly threshold (currently 70) to reduce false positives while maintaining effective detection capabilities.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>lateral-movement</category><category>threat-detection</category><category>windows</category></item><item><title>Suspicious AWS SAML Activity Detection</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-aws-suspicious-saml/</link><pubDate>Wed, 03 Jan 2024 18:22:30 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-aws-suspicious-saml/</guid><description>This rule identifies suspicious SAML activity in AWS, such as AssumeRoleWithSAML and UpdateSAMLProvider events, which could indicate an attacker gaining backdoor access, escalating privileges, or establishing persistence.</description><content:encoded><![CDATA[<p>This detection identifies potentially malicious Security Assertion Markup Language (SAML) activity within Amazon Web Services (AWS). The activity includes monitoring for <code>AssumeRoleWithSAML</code> and <code>UpdateSAMLProvider</code> events. An adversary might exploit SAML to gain unauthorized access, escalate privileges, move laterally within the AWS environment, or establish persistent backdoor access. The focus is on detecting unusual or unauthorized modifications to SAML configurations and role assumptions, which could indicate a compromised identity provider or malicious actor leveraging SAML for illicit purposes. Defenders should prioritize monitoring SAML-related API calls to identify and mitigate potential threats early in the attack chain.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker compromises or creates a malicious SAML identity provider.</li>
<li>The attacker configures the AWS environment to trust the malicious SAML provider using <code>UpdateSAMLProvider</code>.</li>
<li>The attacker crafts a SAML assertion to assume a specific role within the AWS environment.</li>
<li>The attacker uses the <code>AssumeRoleWithSAML</code> API call to authenticate with AWS using the crafted SAML assertion.</li>
<li>AWS STS validates the SAML assertion and, if valid, provides temporary credentials for the assumed role.</li>
<li>The attacker uses the temporary credentials to perform actions within AWS, potentially escalating privileges.</li>
<li>The attacker moves laterally within the AWS environment, accessing resources and services authorized for the assumed role.</li>
<li>The attacker establishes persistent access by creating backdoors or modifying existing IAM policies, leveraging the initially gained access.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation via SAML manipulation can lead to a complete compromise of the AWS environment. Attackers can gain unauthorized access to sensitive data, disrupt critical services, and deploy malicious infrastructure. The impact includes potential data breaches, financial losses, and reputational damage. The number of affected resources depends on the permissions associated with the roles assumed by the attacker.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule for <code>AssumeRoleWithSAML</code> events to detect suspicious role assumptions (see &ldquo;AssumeRoleWithSAML Detection Rule&rdquo;).</li>
<li>Deploy the Sigma rule for <code>UpdateSAMLProvider</code> events to detect unauthorized SAML provider modifications (see &ldquo;UpdateSAMLProvider Detection Rule&rdquo;).</li>
<li>Investigate any <code>AssumeRoleWithSAML</code> events originating from unfamiliar user agents or IP addresses by reviewing CloudTrail logs.</li>
<li>Monitor <code>UpdateSAMLProvider</code> events for unexpected changes to SAML provider configurations. Review associated CloudTrail logs for user identity, user agent, and hostname to ensure authorized access.</li>
<li>Tune the provided Sigma rules for your environment, addressing false positives by exempting known, legitimate behavior.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>aws</category><category>saml</category><category>cloudtrail</category><category>initial-access</category><category>lateral-movement</category><category>persistence</category><category>privilege-escalation</category><category>stealth</category></item><item><title>Unusual Remote File Extension Detected via Machine Learning</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-unusual-remote-file-extension/</link><pubDate>Wed, 03 Jan 2024 15:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-unusual-remote-file-extension/</guid><description>An Elastic machine learning rule detects unusual remote file transfers with rare extensions, potentially indicating lateral movement activity on a host and suggesting adversaries bypassing security measures.</description><content:encoded><![CDATA[<p>This brief focuses on a detection rule from Elastic&rsquo;s Lateral Movement Detection (LMD) integration that utilizes machine learning to identify unusual remote file transfers. The rule, &ldquo;Unusual Remote File Extension,&rdquo; is designed to detect anomalies in file transfers, specifically those involving rare file extensions, which could be indicative of lateral movement within a network. This rule leverages the <code>lmd_rare_file_extension_remote_transfer_ea</code> machine learning job ID. The rule requires the Lateral Movement Detection integration assets to be installed, as well as file and Windows RDP process events collected by the Elastic Defend integration. The rule operates by analyzing <code>host.ip</code> and detecting anomalies in file transfers, where host IP collection needs to be enabled on Elastic Defend versions 8.18 and above.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a system within the network.</li>
<li>The attacker attempts to move laterally to other systems using remote services like RDP or SMB.</li>
<li>As part of the lateral movement, the attacker transfers tools or files to the remote system.</li>
<li>The attacker uses a rare or uncommon file extension for the transferred files, potentially to evade detection based on known file types.</li>
<li>The file transfer occurs over the network, triggering file event logs on the source and destination systems.</li>
<li>Elastic Defend, with host IP collection enabled, monitors these file events and forwards the data to the Elastic Security platform.</li>
<li>The &ldquo;Unusual Remote File Extension&rdquo; machine learning job identifies the transfer of a file with a rare extension, comparing it against historical data.</li>
<li>If the file extension is deemed anomalous based on its rarity, the rule triggers, indicating potential lateral movement.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful lateral movement attack can allow an adversary to gain access to sensitive data, critical systems, or privileged accounts. By using uncommon file extensions, attackers attempt to bypass security measures that rely on identifying known file types. This can lead to undetected malware deployment, data exfiltration, or further compromise of the network. Though this rule is of low severity, it can provide an early warning signal to stop an attack before greater damage occurs.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable the <code>host.ip</code> field within Elastic Defend configurations (versions 8.18 and above) to ensure proper data collection for the machine learning job.</li>
<li>Install the Lateral Movement Detection integration assets within Kibana as per the provided setup instructions to activate the &ldquo;Unusual Remote File Extension&rdquo; rule.</li>
<li>Tune the anomaly threshold of the machine learning job to reduce false positives, considering your organization&rsquo;s typical file transfer patterns.</li>
<li>Deploy the &ldquo;Detect Remote File Extension Transfer&rdquo; Sigma rule to identify file transfers with rare extensions using process creation logs.</li>
<li>Review the triage and analysis steps in the rule&rsquo;s documentation to effectively investigate and respond to triggered alerts.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>lateral-movement</category><category>machine-learning</category><category>elastic</category></item><item><title>Potential Remote Credential Access via Registry</title><link>https://feed.craftedsignal.io/briefs/2024-01-remote-sam-secretsdump/</link><pubDate>Wed, 03 Jan 2024 15:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-remote-sam-secretsdump/</guid><description>Detects remote access to the registry, potentially dumping credential data from the Security Account Manager (SAM) registry hive, indicating preparation for credential access and privilege elevation.</description><content:encoded><![CDATA[<p>This detection identifies potential remote access to the Windows registry to dump credential data from the Security Account Manager (SAM) registry hive. This activity often precedes credential access and privilege elevation attempts. The rule focuses on detecting the creation of specific file types by <code>svchost.exe</code>, a legitimate Windows process, in temporary directories. However, when <code>svchost.exe</code> creates files with registry file (REGF) header bytes in temporary locations, and those files are also of a significant size, it indicates a potential secretsdump-style attack. The rule is designed for data generated by Elastic Defend.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains initial access to the target system via compromised credentials or exploiting a vulnerability.</li>
<li>Attacker uses remote registry tools or scripts, such as those based on Impacket&rsquo;s <code>secretsdump.py</code>, to connect to the target system&rsquo;s registry service.</li>
<li>The attacker initiates a connection to the RemoteRegistry service.</li>
<li>The <code>svchost.exe</code> process on the target system is leveraged to access the SAM, SECURITY, and SYSTEM registry hives.</li>
<li><code>svchost.exe</code> creates a temporary file (e.g., a <code>.tmp</code> file) in the <code>\Windows\System32\</code> or <code>\WINDOWS\Temp\</code> directory.</li>
<li>The temporary file contains the contents of the registry hive, identifiable by the &ldquo;72656766&rdquo; (REGF) header bytes and a file size greater than 30000 bytes.</li>
<li>The attacker retrieves the dumped registry hive files from the target system.</li>
<li>The attacker parses the registry hives offline to extract sensitive credential information, such as password hashes. This leads to lateral movement and privilege escalation.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack allows adversaries to extract sensitive credentials, including password hashes, from the compromised system. This can lead to lateral movement within the network, privilege escalation, and ultimately, domain compromise. The extraction of credentials provides the attacker with persistent access and the ability to move undetected through the environment.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Suspicious Svchost.exe Registry Hive Dump</code> to detect the creation of registry hive files by <code>svchost.exe</code> in temporary directories based on the <code>file.Ext.header_bytes</code> and <code>file.path</code> fields.</li>
<li>Deploy the Sigma rule <code>Suspicious RemoteRegistry File Creation</code> to detect files with REGF header bytes created by svchost.exe, outside the standard system path to catch unusual service context.</li>
<li>Enable and monitor process creation events, specifically focusing on <code>svchost.exe</code> and its command-line arguments, to identify suspicious service groups.</li>
<li>Monitor file creation events for files with the <code>.tmp</code> extension in the <code>\Windows\System32\</code> and <code>\WINDOWS\Temp\</code> directories, paying attention to file sizes and header bytes, as indicated by the file path and size conditions in the rule.</li>
<li>Review the investigation steps outlined in the rule documentation to properly triage and analyze potential incidents.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>credential-access</category><category>lateral-movement</category><category>windows</category></item><item><title>AWS Lateral Movement from Kubernetes Service Account via AssumeRoleWithWebIdentity</title><link>https://feed.craftedsignal.io/briefs/2024-01-aws-k8s-lateral-movement/</link><pubDate>Wed, 03 Jan 2024 15:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-aws-k8s-lateral-movement/</guid><description>This rule detects lateral movement in AWS environments originating from Kubernetes service accounts by identifying instances where credentials obtained for a service account are used for multiple distinct AWS control-plane actions, potentially indicating unauthorized access.</description><content:encoded><![CDATA[<p>This detection rule identifies lateral movement in AWS environments stemming from Kubernetes service accounts utilizing <code>AssumeRoleWithWebIdentity</code>. It focuses on detecting instances where credentials obtained via this method are subsequently used to perform several distinct AWS control-plane actions within a single session. This behavior deviates from typical pod traffic and could signify unauthorized access or privilege escalation. The rule prioritizes the detection of sensitive API usage, including reconnaissance activities, access to secrets, IAM modifications, and compute creation events, while strategically excluding high-volume S3 data-plane operations to minimize false positives. The targeted environments are those leveraging EKS IAM Roles for Service Accounts.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>A Kubernetes service account projects a token.</li>
<li>The service account uses <code>AssumeRoleWithWebIdentity</code> to exchange the token for short-lived IAM credentials.</li>
<li>The attacker leverages the assumed role to perform reconnaissance activities such as <code>ListUsers</code>, <code>ListRoles</code>, and <code>DescribeInstances</code>.</li>
<li>The attacker attempts to access secrets using actions like <code>GetSecretValue</code> and <code>ListSecrets</code>.</li>
<li>The attacker escalates privileges by modifying IAM policies with actions like <code>AttachRolePolicy</code> and <code>PutRolePolicy</code>.</li>
<li>The attacker attempts to create new users or roles within the AWS environment using actions like <code>CreateUser</code> and <code>CreateRole</code>.</li>
<li>The attacker performs lateral movement using actions like <code>SendCommand</code> and <code>StartSession</code>.</li>
<li>The attacker attempts to evade detection by stopping logging with the <code>StopLogging</code> action.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to unauthorized access to sensitive data, privilege escalation, and the potential compromise of the entire AWS environment. Lateral movement within the AWS infrastructure allows attackers to gain access to critical systems and data, potentially leading to data breaches, service disruptions, or other malicious activities.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule to your SIEM to detect potentially malicious activity related to <code>AssumeRoleWithWebIdentity</code> and tune for your environment.</li>
<li>Review and harden IAM role trust policies associated with Kubernetes service accounts, specifically focusing on OIDC trust conditions, as referenced in the <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_providers_create_oidc.html">IAM OIDC identity provider</a> documentation.</li>
<li>Implement strict least privilege principles for Kubernetes service accounts, limiting their access to only the necessary AWS resources, as covered in <a href="https://docs.aws.amazon.com/eks/latest/userguide/iam-roles-for-service-accounts.html">EKS IAM roles for service accounts</a>.</li>
<li>Monitor CloudTrail logs for <code>AssumeRoleWithWebIdentity</code> events followed by suspicious API calls, focusing on the actions listed in the Sigma rule detection patterns.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cloud</category><category>aws</category><category>kubernetes</category><category>lateral-movement</category><category>credential-access</category><category>discovery</category></item><item><title>Detection of NetExec Hacktool Execution</title><link>https://feed.craftedsignal.io/briefs/2024-01-netexec-execution/</link><pubDate>Wed, 03 Jan 2024 14:35:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-netexec-execution/</guid><description>The threat brief details the detection of NetExec (formerly CrackMapExec), a post-exploitation tool used for Active Directory penetration testing and network enumeration, often employed by threat actors for lateral movement and credential harvesting.</description><content:encoded><![CDATA[<p>NetExec, previously known as CrackMapExec, is a post-exploitation tool commonly used during Active Directory penetration testing. It is also favored by red teams and malicious actors for reconnaissance, lateral movement, and credential harvesting within Windows networks. This tool allows for the enumeration of hosts, exploitation of network services, and remote command execution. The use of NetExec in an enterprise environment is considered suspicious due to its capabilities for identifying vulnerable systems and facilitating unauthorized access. Defenders should monitor for its execution, as it is often a precursor to more serious attacks, including ransomware deployment, such as the Lynx ransomware.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Windows system via an exploit or compromised credentials.</li>
<li>NetExec (nxc.exe) is deployed on the compromised host, often copied to a temporary directory.</li>
<li>NetExec is executed with commands to enumerate network shares and identify potential targets using SMB.</li>
<li>The tool uses LDAP to query Active Directory for user accounts, groups, and organizational units.</li>
<li>NetExec attempts to authenticate to other systems using gathered or compromised credentials via protocols such as SMB, SSH, or RDP.</li>
<li>Successful authentication allows for remote command execution via WMI or WinRM.</li>
<li>The attacker leverages identified vulnerabilities or misconfigurations to escalate privileges on the target systems.</li>
<li>The attacker moves laterally through the network, gaining access to sensitive data or deploying ransomware like Lynx.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful execution of NetExec can lead to widespread compromise within an Active Directory environment. Attackers can identify and exploit vulnerable systems, harvest credentials, and move laterally to gain access to critical assets. This can result in data theft, system disruption, and ransomware deployment, potentially affecting hundreds or thousands of systems depending on the size of the organization. The tool is often used as a precursor to ransomware attacks, where entire networks can be encrypted, leading to significant financial and reputational damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>HackTool - NetExec Execution</code> to your SIEM to detect the execution of NetExec based on process creation logs.</li>
<li>Monitor process creation events for <code>nxc.exe</code> with command-line arguments associated with network protocols like <code>ftp</code>, <code>ldap</code>, <code>mssql</code>, <code>nfs</code>, <code>rdp</code>, <code>smb</code>, <code>ssh</code>, <code>vnc</code>, <code>winrm</code>, and <code>wmi</code>.</li>
<li>Implement strict access controls and regularly audit Active Directory to minimize the potential for lateral movement.</li>
<li>Consider using application control solutions to prevent the execution of unauthorized tools like <code>nxc.exe</code>.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>pentest</category><category>post-exploitation</category><category>lateral-movement</category><category>active-directory</category></item><item><title>RDP (Remote Desktop Protocol) from the Internet</title><link>https://feed.craftedsignal.io/briefs/2024-01-rdp-internet/</link><pubDate>Wed, 03 Jan 2024 14:30:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-rdp-internet/</guid><description>This rule detects network events indicative of RDP traffic originating from the internet, which poses a significant security risk due to its frequent exploitation as an initial access or backdoor vector.</description><content:encoded><![CDATA[<p>Remote Desktop Protocol (RDP) is a common tool for system administrators to remotely manage systems, however, exposing RDP directly to the internet creates a significant attack surface. Threat actors frequently target and exploit RDP for initial access, lateral movement, and establishing backdoors within compromised networks. This activity is detected by monitoring network traffic for RDP connections originating from outside the internal network (RFC1918 IP ranges). This is important because successful RDP compromise often leads to broader network infiltration and data exfiltration. This detection focuses on the network level characteristics of RDP connections from the internet to internal assets.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a publicly accessible RDP service.</li>
<li>The attacker attempts to brute-force RDP login credentials or exploits a known RDP vulnerability (e.g. BlueKeep CVE-2019-0708).</li>
<li>Upon successful authentication or exploitation, the attacker gains remote access to the targeted system.</li>
<li>The attacker uses the compromised system as a pivot point to perform reconnaissance on the internal network.</li>
<li>The attacker moves laterally within the network using stolen credentials or by exploiting other vulnerabilities.</li>
<li>The attacker installs malware or establishes persistence mechanisms (e.g., creating new user accounts or modifying system configurations).</li>
<li>The attacker gathers sensitive data from internal systems.</li>
<li>The attacker exfiltrates the stolen data to an external server or deploys ransomware.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Compromised RDP services can lead to significant data breaches, system downtime, and financial losses. Attackers can leverage RDP access to steal sensitive information, install ransomware, or disrupt critical business operations. While the number of affected organizations varies, RDP exploitation remains a prevalent attack vector, especially for organizations with inadequate security practices. The impact of a successful RDP attack ranges from several thousands to millions of dollars, depending on the size of the organization and the sensitivity of the compromised data.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the &ldquo;RDP (Remote Desktop Protocol) from the Internet&rdquo; Sigma rule to your SIEM to detect unauthorized RDP connections from outside the network.</li>
<li>Review firewall rules and network configurations to ensure RDP services are not exposed directly to the internet. Implement a VPN or RDP gateway for secure remote access.</li>
<li>Enable and monitor network traffic logs (category: <code>network_traffic</code>, product: <code>windows|linux|macos</code>) to provide data for the Sigma rule.</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on the source IP address and user accounts involved in the RDP connection.</li>
<li>Implement network segmentation to limit the blast radius of a potential RDP compromise.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>command-and-control</category><category>lateral-movement</category><category>initial-access</category><category>rdp</category></item><item><title>Kubelet API Connection Attempt to Internal IP</title><link>https://feed.craftedsignal.io/briefs/2024-01-kubelet-api-connection/</link><pubDate>Wed, 03 Jan 2024 14:30:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-kubelet-api-connection/</guid><description>The rule detects network connection attempts to the Kubernetes Kubelet API ports 10250 and 10255 on internal IP ranges from Linux hosts, indicating potential lateral movement within container and cluster environments.</description><content:encoded><![CDATA[<p>This detection rule identifies suspicious network connections to the Kubernetes Kubelet API, specifically targeting ports 10250 and 10255, from Linux hosts within internal network ranges. Attackers frequently exploit weak authentication or network controls to access the Kubelet API, potentially enabling them to enumerate pods, retrieve logs, and execute commands on nodes. This activity often originates from common scripting utilities like <code>curl</code>, <code>wget</code>, or interpreters like <code>python</code> and <code>node</code>, particularly when executed from world-writable directories such as <code>/tmp</code>, <code>/var/tmp</code>, or <code>/dev/shm</code>. This technique is often a component of container and cluster lateral movement, where the attacker seeks to expand their access within the Kubernetes environment. The rule is designed to detect these unauthorized attempts and alert security teams to investigate potential breaches.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a compromised container or host within the Kubernetes cluster, potentially through exploiting a vulnerability in a running application.</li>
<li>The attacker executes a reconnaissance command, such as <code>curl</code> or <code>wget</code>, from within the compromised container, targeting the Kubelet API on port 10250 or 10255.</li>
<li>The <code>curl</code> or <code>wget</code> command is executed from a temporary directory like <code>/tmp</code> or <code>/dev/shm</code> to avoid detection.</li>
<li>The attacker attempts to enumerate running pods and services by querying the <code>/pods</code> or <code>/runningpods</code> endpoints of the Kubelet API.</li>
<li>If successful, the attacker identifies a target pod within the cluster based on the enumerated information.</li>
<li>The attacker leverages the Kubelet API to execute commands within the target pod, potentially escalating privileges or accessing sensitive data.</li>
<li>The attacker attempts to move laterally to other nodes or containers within the Kubernetes cluster, repeating the reconnaissance and exploitation steps.</li>
<li>The ultimate goal is to gain control over the entire Kubernetes cluster, enabling data exfiltration, resource hijacking, or disruption of services.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of the Kubelet API can lead to a complete compromise of the Kubernetes cluster. Attackers can gain unauthorized access to sensitive data, escalate privileges, and disrupt critical services. While the number of victims may vary depending on the organization&rsquo;s security posture, a successful attack could impact all applications and data managed by the cluster. Organizations in any sector utilizing Kubernetes are potentially at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable syscall auditing and ensure that <code>event.category:network</code> events are generated for network connections, as outlined in the rule&rsquo;s setup guide.</li>
<li>Deploy the provided Sigma rule to your SIEM and tune it based on your environment to reduce false positives.</li>
<li>Restrict pod-to-node access to port 10250 using network policies or security groups to limit the attack surface, as noted in the rule&rsquo;s documentation.</li>
<li>Implement Kubernetes API audit logging to detect unauthorized access attempts and credential access, correlating with process argument telemetry as mentioned in the triage steps.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>kubernetes</category><category>lateral-movement</category><category>kubelet</category><category>linux</category><category>container</category></item><item><title>Detection of Azure Service Principal Creation</title><link>https://feed.craftedsignal.io/briefs/2024-01-azure-sp-creation/</link><pubDate>Wed, 03 Jan 2024 14:30:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-azure-sp-creation/</guid><description>Detects the creation of a service principal in Azure, which could indicate potential attacker activity for lateral movement or persistence.</description><content:encoded><![CDATA[<p>The creation of service principals in Azure can be a legitimate administrative task, but it can also be an indicator of malicious activity. Attackers may create service principals to establish persistence, move laterally within the Azure environment, or gain unauthorized access to resources. This activity is particularly concerning when performed by unfamiliar users or from unusual locations. Monitoring for unexpected service principal creation is crucial for detecting potential security breaches in Azure environments. This alert focuses on detecting the &ldquo;Add service principal&rdquo; message within Azure Activity Logs.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to an Azure account, possibly through compromised credentials or a vulnerable application.</li>
<li>The attacker authenticates to the Azure portal or uses Azure CLI with the compromised credentials.</li>
<li>The attacker executes commands to create a new service principal using tools like Azure CLI or PowerShell.</li>
<li>Azure Activity Logs record the &ldquo;Add service principal&rdquo; event.</li>
<li>The attacker assigns roles and permissions to the newly created service principal, granting it access to specific resources.</li>
<li>The attacker leverages the service principal for lateral movement, accessing resources or services within the Azure environment.</li>
<li>The service principal is used for persistence, allowing the attacker to maintain access even if the initial access method is revoked.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful creation and misuse of a service principal can lead to unauthorized access to sensitive data, resources, and services within the Azure environment. The impact can range from data breaches and service disruption to complete control over the Azure subscription, potentially affecting hundreds or thousands of resources and users. The attacker can leverage the compromised service principal to perform actions with the permissions assigned to it, leading to significant damage and financial loss.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Azure Service Principal Created&rdquo; to your SIEM and tune for your environment to detect suspicious service principal creations.</li>
<li>Investigate any alerts generated by the &ldquo;Azure Service Principal Created&rdquo; rule (logsource: azure) by verifying the user identity, user agent, and hostname associated with the event.</li>
<li>Review and audit existing service principals and their assigned permissions to identify any anomalies or overly permissive configurations.</li>
<li>Implement multi-factor authentication (MFA) for all user accounts to reduce the risk of credential compromise and unauthorized access.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>azure</category><category>cloud</category><category>service principal</category><category>persistence</category><category>lateral movement</category></item><item><title>Detecting RPC Traffic to the Internet</title><link>https://feed.craftedsignal.io/briefs/2024-01-rpc-internet-access/</link><pubDate>Wed, 03 Jan 2024 14:27:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-rpc-internet-access/</guid><description>This brief focuses on detecting Remote Procedure Call (RPC) traffic originating from internal networks and reaching the public internet, which is indicative of potential initial access or backdoor activity.</description><content:encoded><![CDATA[<p>The Remote Procedure Call (RPC) protocol, while essential for legitimate system administration tasks such as remote maintenance and resource sharing within internal networks, poses a significant security risk when exposed to the internet. Threat actors frequently target and exploit RPC services as an initial access vector or to establish backdoors within compromised systems. This exposure allows attackers to remotely execute commands, move laterally within the network, and potentially exfiltrate sensitive data. This brief provides detection strategies to identify such anomalous RPC traffic, enabling security teams to proactively mitigate potential threats. The detection focuses on identifying TCP traffic to port 135 from internal IP ranges to external IP addresses.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker compromises a host within the internal network, potentially through phishing or exploiting a vulnerability.</li>
<li>The compromised host initiates an RPC connection to an external IP address on TCP port 135.</li>
<li>The attacker uses the RPC connection to enumerate network resources and identify potential targets for lateral movement.</li>
<li>Using the RPC connection, the attacker attempts to authenticate to other systems within the network.</li>
<li>Upon successful authentication, the attacker remotely executes commands on the target system via RPC.</li>
<li>The attacker installs malware or a backdoor on the target system for persistence.</li>
<li>The attacker leverages the established foothold to further propagate within the network, compromising additional systems.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of RPC services exposed to the internet can lead to a complete compromise of the internal network. Attackers can gain initial access, move laterally, exfiltrate sensitive data, deploy ransomware, or disrupt critical business operations. A single exposed RPC service can serve as a gateway for widespread damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Implement the provided Sigma rule to detect RPC traffic from internal IP ranges to external destinations on TCP port 135, focusing on network traffic logs.</li>
<li>Investigate any alerts generated by the Sigma rule, prioritizing systems exhibiting suspicious RPC activity (Sigma rule, logsource: network_connection).</li>
<li>Ensure that RPC services are not directly exposed to the internet. Implement firewall rules to restrict access to authorized internal IP ranges only.</li>
<li>Continuously monitor network traffic for anomalous RPC activity and correlate with other security events (logsource: network_connection).</li>
<li>Review and update firewall configurations to block unauthorized outbound connections on port 135 (logsource: firewall).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>network-traffic</category><category>initial-access</category><category>lateral-movement</category><category>rpc</category></item><item><title>Remote Execution via File Shares</title><link>https://feed.craftedsignal.io/briefs/2024-01-remote-execution-via-file-shares/</link><pubDate>Wed, 03 Jan 2024 14:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-remote-execution-via-file-shares/</guid><description>This rule identifies the execution of a file that was created by the virtual system process, potentially indicating lateral movement via network file shares in Windows environments.</description><content:encoded><![CDATA[<p>This detection identifies lateral movement via network file shares by detecting the execution of a file that was recently created by the virtual system process (PID 4), commonly associated with file share operations. Adversaries may leverage network shares to distribute malicious payloads or tools across the network to compromise additional hosts. This technique allows attackers to execute code remotely, expanding their foothold within the environment. The rule focuses on Windows systems and monitors for newly created executable files (e.g., .exe, .scr, .pif, .com) that are then executed. Exceptions are made for known legitimate software vendors and specific file paths to reduce false positives.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a system within the network.</li>
<li>The attacker uploads a malicious executable (e.g., malware, custom tool) to a network file share. The file creation event is attributed to PID 4.</li>
<li>A user or automated process on a remote system accesses the file share.</li>
<li>The malicious executable is copied or accessed from the network share onto the remote system.</li>
<li>The user, either intentionally or through deception, executes the malicious executable.</li>
<li>The executed file initiates malicious activities on the remote system.</li>
<li>The attacker achieves code execution on the remote system.</li>
<li>The attacker uses this foothold for further lateral movement, data exfiltration, or other malicious objectives.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation through remote execution via file shares can lead to widespread compromise across the network. Attackers can gain unauthorized access to sensitive data, install backdoors, or deploy ransomware. The impact ranges from data breaches and financial losses to significant disruption of business operations. The severity of the impact depends on the attacker&rsquo;s objectives and the extent of their lateral movement within the environment.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule to your SIEM to detect suspicious executions of files created by PID 4 on Windows systems.</li>
<li>Review and restrict write access to network shares to minimize the risk of unauthorized file uploads.</li>
<li>Monitor file creation events (event.type in (&ldquo;creation&rdquo;, &ldquo;change&rdquo;)) on network shares for unusual activity using file integrity monitoring tools.</li>
<li>Investigate any alerts generated by the Sigma rule by examining the process execution chain and associated network connections.</li>
<li>Enrich process creation events (category: process_creation) with code signature information to validate the legitimacy of executed files.</li>
<li>Use osquery to retrieve the files&rsquo; SHA-256 hash values using the PowerShell <code>Get-FileHash</code> cmdlet and search for the existence and reputation of the hashes in resources like VirusTotal, Hybrid-Analysis, CISCO Talos, Any.run, etc.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>lateral-movement</category><category>file-share</category><category>windows</category></item><item><title>Remote Execution via File Shares</title><link>https://feed.craftedsignal.io/briefs/2024-01-remote-execution-file-shares/</link><pubDate>Wed, 03 Jan 2024 14:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-remote-execution-file-shares/</guid><description>The rule identifies the execution of a file created by the virtual system process, potentially indicating lateral movement via network file shares, by detecting a sequence of file creation/modification followed by process execution, excluding trusted vendors.</description><content:encoded><![CDATA[<p>This detection rule identifies a specific sequence of events that may indicate lateral movement within a Windows environment. The rule focuses on scenarios where a file is created or modified by the <code>System</code> process (PID 4), which is then subsequently executed. This behavior is often associated with attackers leveraging network file shares to distribute malicious tools or payloads across multiple systems. The rule aims to detect this activity while excluding legitimate software installations or updates by filtering out processes signed by trusted vendors such as Veeam, Elasticsearch, CrowdStrike, and Microsoft. This exclusion is designed to reduce false positives and focus on potentially malicious activity. The rule is designed for data generated by Elastic Defend.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a system within the network.</li>
<li>The attacker uploads a malicious executable (e.g., EXE, SCR, PIF, COM) to a network file share accessible to other systems. The file&rsquo;s header starts with <code>4d5a</code>.</li>
<li>The <code>System</code> process (PID 4) creates or modifies the malicious executable on the target system via the network share. This can happen through normal network file operations.</li>
<li>The attacker uses lateral movement techniques, such as exploiting SMB/Windows Admin Shares, to remotely trigger the execution of the malicious executable on the target system.</li>
<li>The malicious executable begins to execute, initiating attacker-controlled code on the target system.</li>
<li>The process attempts to establish command and control (C2) communication with an external server.</li>
<li>The attacker uses the compromised system to further propagate within the network, potentially deploying additional malicious tools or escalating privileges.</li>
<li>The attacker achieves their final objective, such as data exfiltration or ransomware deployment.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to widespread compromise of systems within the network. Attackers can leverage compromised systems for data theft, deployment of ransomware, or other malicious activities. The impact can range from business disruption and data loss to significant financial damage and reputational harm. Even with trusted vendor exclusions, a determined adversary could still bypass protections, potentially leading to the compromise of critical infrastructure.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule to your SIEM to detect remote execution via file shares, and tune exclusions for your specific environment.</li>
<li>Enable Elastic Defend to generate the necessary process and file events for the Sigma rule to function effectively (see <code>logs-endpoint.events.process-*</code>, <code>logs-endpoint.events.file-*</code> in <code>index</code>).</li>
<li>Review and restrict write access to network shares to minimize the risk of unauthorized file uploads (see &ldquo;Review the privileges needed to write to the network share&rdquo;).</li>
<li>Investigate any alerts triggered by the Sigma rule to determine the legitimacy of the activity and take appropriate remediation steps.</li>
<li>Implement file integrity monitoring (FIM) on network shares to detect unauthorized file modifications or additions.</li>
<li>Use threat intelligence platforms to enrich file hash values and identify known malicious files.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>lateral-movement</category><category>file-shares</category><category>windows</category></item><item><title>Kerberos Traffic from Unusual Process</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-kerberoasting-unusual-process/</link><pubDate>Wed, 03 Jan 2024 14:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-kerberoasting-unusual-process/</guid><description>Detects network connections to the standard Kerberos port from an unusual process other than lsass.exe, potentially indicating Kerberoasting or Pass-the-Ticket activity on Windows systems.</description><content:encoded><![CDATA[<p>This detection identifies unusual processes initiating network connections to the standard Kerberos port (88) on Windows systems. Typically, the <code>lsass.exe</code> process handles Kerberos traffic on domain-joined hosts. The rule aims to detect processes other than <code>lsass.exe</code> communicating with the Kerberos port, which could indicate malicious activity such as Kerberoasting (T1558.003) or Pass-the-Ticket (T1550.003). The detection is designed to work with data from Elastic Defend and SentinelOne Cloud Funnel. This can help security teams identify potential credential access attempts and lateral movement within the network.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker compromises a user account or system within the domain.</li>
<li>The attacker executes a malicious binary or script (e.g., PowerShell) on the compromised system.</li>
<li>The malicious process attempts to request Kerberos service tickets (TGS) for various services within the domain. This is done by connecting to the Kerberos port (88) on a domain controller.</li>
<li>The attacker uses tools like <code>Rubeus</code> or <code>Kerberoast.ps1</code> to enumerate and request TGS tickets.</li>
<li>The unusual process (not <code>lsass.exe</code>) sends Kerberos traffic to the domain controller.</li>
<li>The attacker extracts the Kerberos tickets from memory or network traffic.</li>
<li>The attacker cracks the offline TGS tickets to obtain service account passwords (Kerberoasting).</li>
<li>The attacker uses the compromised service account credentials to move laterally within the network or access sensitive data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful Kerberoasting or Pass-the-Ticket attack can lead to unauthorized access to sensitive resources and lateral movement within the network. Attackers can compromise service accounts with elevated privileges, potentially leading to domain-wide compromise. Detection of this behavior can prevent attackers from gaining access to critical assets. While the exact number of victims and sectors targeted are unknown, this technique is widely used by various threat actors in targeted attacks.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the &ldquo;Kerberos Traffic from Unusual Process&rdquo; Sigma rule to your SIEM and tune for your environment. Enable network connection logging to capture the necessary traffic.</li>
<li>Investigate any alerts triggered by the Sigma rule, focusing on the process execution chain and potential malicious binaries.</li>
<li>Review event ID 4769 for suspicious ticket requests as mentioned in the rule&rsquo;s documentation.</li>
<li>Examine host services for suspicious entries as outlined in the original Elastic detection rule using Osquery.</li>
<li>Monitor for processes connecting to port 88, filtering out legitimate Kerberos clients like <code>lsass.exe</code>, using the &ldquo;Detect Kerberos Traffic from Non-Standard Process&rdquo; Sigma rule.</li>
<li>Investigate processes identified by the rule and compare them to the list of legitimate processes to identify unauthorized connections to the Kerberos port.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">threat</category><category>kerberoasting</category><category>credential-access</category><category>lateral-movement</category><category>windows</category></item><item><title>Detecting Remote Windows Service Installation for Lateral Movement</title><link>https://feed.craftedsignal.io/briefs/2024-01-remote-service-install/</link><pubDate>Wed, 03 Jan 2024 14:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-remote-service-install/</guid><description>This rule detects a network logon followed by Windows service creation with the same LogonId on a Windows host, which could indicate lateral movement or persistence by adversaries.</description><content:encoded><![CDATA[<p>This detection rule identifies a potential lateral movement technique where an attacker establishes a network logon to a Windows system and subsequently installs a service using the same LogonId. This behavior is flagged as suspicious because it deviates from typical administrative practices and can indicate unauthorized access and persistence within the network. The rule is designed to filter out common legitimate services and administrative activities, focusing on anomalies that could signify malicious intent. This detection is crucial for defenders as it can uncover attackers attempting to move laterally and establish persistent access.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a network via compromised credentials or exploiting a vulnerability.</li>
<li>The attacker performs network reconnaissance to identify target systems for lateral movement.</li>
<li>Using valid credentials or pass-the-hash techniques, the attacker authenticates to a remote Windows host over the network (e.g., SMB).</li>
<li>The attacker attempts to install a new service on the remote host, potentially using tools like <code>sc.exe</code> or PowerShell.</li>
<li>The service installation event is logged with a specific LogonId that matches the earlier network logon event, indicating a relationship between the two activities.</li>
<li>The newly installed service is configured to execute a malicious payload or establish a reverse shell.</li>
<li>The attacker uses the service to execute commands or deploy further malicious tools on the compromised host.</li>
<li>The attacker achieves persistence and lateral movement within the network, enabling further compromise and data exfiltration.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack using this technique can lead to widespread compromise of systems within a network. Attackers can use the newly installed service to execute arbitrary code, install malware, or move laterally to other systems. This can result in data theft, system disruption, or ransomware deployment. The impact can be significant, potentially affecting numerous systems and causing substantial financial and reputational damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Windows Security Event Logs with necessary auditing policies, specifically Audit Logon and Audit Security System Extension, to capture relevant logon and service installation events.</li>
<li>Deploy the provided Sigma rules to your SIEM to detect suspicious remote service installations based on matching LogonIds from network logons.</li>
<li>Investigate any alerts generated by the Sigma rules, focusing on unusual service file paths and user accounts.</li>
<li>Review the list of excluded service file paths in the Sigma rules and customize them based on your environment&rsquo;s known legitimate services.</li>
<li>Monitor network connections for suspicious SMB activity, particularly connections originating from unusual or untrusted sources.</li>
<li>Implement multi-factor authentication (MFA) to reduce the risk of credential theft and unauthorized network access.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>lateral-movement</category><category>persistence</category><category>windows</category></item><item><title>WMI Incoming Lateral Movement</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-wmi-lateral-movement/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-wmi-lateral-movement/</guid><description>Detection of processes executed via Windows Management Instrumentation (WMI) on a remote host indicating potential adversary lateral movement.</description><content:encoded><![CDATA[<p>This threat brief focuses on the detection of lateral movement within a Windows environment via Windows Management Instrumentation (WMI). WMI, a core Windows feature, is often exploited by adversaries to remotely execute processes, bypassing traditional security measures. This activity is detected by monitoring network connections and process executions, while filtering out common false positives associated with legitimate administrative use, security tools, and system processes. The goal is to highlight potential threats indicative of unauthorized lateral movement.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a system within the network.</li>
<li>The attacker uses WMI to initiate a connection to a remote host on port 135.</li>
<li>The svchost.exe process on the target host accepts an incoming RPC connection from the attacker-controlled system.</li>
<li>WmiPrvSE.exe, the WMI provider host process, spawns a new process based on the attacker&rsquo;s WMI command.</li>
<li>The spawned process executes the attacker&rsquo;s payload or command on the remote host.</li>
<li>The attacker leverages the executed process for further actions, such as data exfiltration or establishing persistence.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation and lateral movement via WMI can lead to unauthorized access to sensitive data, compromise of critical systems, and propagation of malware throughout the network. While specific victim counts or sector targeting data are unavailable, the broad applicability of WMI across Windows environments makes this a relevant threat for a wide range of organizations.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Sysmon Event ID 1 (Process Creation) and Event ID 3 (Network Connection) logging to provide necessary data for the rules below.</li>
<li>Deploy the Sigma rules provided in this brief to your SIEM to detect suspicious WMI activity and tune them for your environment.</li>
<li>Review and create exceptions for known administrative accounts or specific IP addresses used by IT staff to reduce false positives, as mentioned in the overview.</li>
<li>Isolate any affected host from the network to prevent further lateral movement if suspicious WMI activity is detected.</li>
<li>Monitor network connections with destination port 135 for unusual activity.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>lateral-movement</category><category>wmi</category><category>windows</category></item><item><title>Windows Scheduled Tasks AT Command Enabled via Registry Modification</title><link>https://feed.craftedsignal.io/briefs/2024-01-at-command-enabled/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-at-command-enabled/</guid><description>Attackers may enable the deprecated Windows AT command via registry modification to achieve local persistence or lateral movement.</description><content:encoded><![CDATA[<p>The legacy Windows AT command allows scheduling tasks for execution. While deprecated since Windows 8 and Windows Server 2012, it remains present for backwards compatibility. Attackers may enable the AT command through registry modifications to achieve persistence or lateral movement within a network. This technique bypasses modern security controls and can be difficult to detect without specific monitoring. The detection rule monitors registry changes enabling this command, flagging potential misuse by checking specific registry paths and values indicative of enabling the AT command. The use of this command allows an attacker to execute commands with elevated privileges, potentially compromising the entire system.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a system, possibly through phishing or exploiting a vulnerability.</li>
<li>The attacker attempts to enable the AT command by modifying the registry.</li>
<li>The registry key <code>HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\Configuration\EnableAt</code> is modified to a value of &ldquo;1&rdquo; or &ldquo;0x00000001&rdquo;.</li>
<li>The attacker uses the AT command to schedule a malicious task.</li>
<li>The scheduled task executes a command or script, such as downloading and executing malware.</li>
<li>The malware establishes persistence on the system.</li>
<li>The attacker uses the compromised system as a pivot point for lateral movement.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Enabling the AT command can lead to unauthorized task scheduling, malware execution, persistence, and lateral movement within a network. Successful exploitation can compromise sensitive data, disrupt operations, and grant attackers persistent access to critical systems. The use of a deprecated command makes it harder to detect, increasing the impact.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor registry events for modifications to <code>HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\Configuration\EnableAt</code> as described in the rule overview.</li>
<li>Deploy the Sigma rule &ldquo;Scheduled Tasks AT Command Enabled&rdquo; to your SIEM and tune for your environment.</li>
<li>Enable Sysmon process creation and registry event logging to activate the rule.</li>
<li>Investigate any alerts triggered by the Sigma rule &ldquo;Scheduled Tasks AT Command Enabled&rdquo; for suspicious activity.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>persistence</category><category>lateral-movement</category><category>windows</category></item><item><title>Unusual Process Connecting to Docker or Containerd Socket</title><link>https://feed.craftedsignal.io/briefs/2024-01-unusual-container-socket-connection/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-unusual-container-socket-connection/</guid><description>An unusual process connecting to a container runtime Unix socket like Docker or Containerd can indicate an attacker attempting to bypass Kubernetes security measures for container manipulation.</description><content:encoded><![CDATA[<p>This threat involves unauthorized processes connecting directly to container runtime sockets (Docker or Containerd) on Linux systems. This bypasses Kubernetes API server restrictions, potentially allowing attackers to create, execute, or manipulate containers without proper authorization or logging. The risk lies in attackers circumventing RBAC, admission webhooks, and pod security standards. The attack can start when a compromised process attempts to connect to the Docker or Containerd socket, potentially leading to privilege escalation and lateral movement within the containerized environment. This attack is significant because it undermines core security controls within container orchestration platforms.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>A malicious or compromised process gains initial access to the host system.</li>
<li>The process attempts to connect to the container runtime socket (e.g., <code>/var/run/docker.sock</code> or <code>/run/containerd/containerd.sock</code>).</li>
<li>The process bypasses the Kubernetes API server and associated security controls.</li>
<li>The attacker exploits the direct socket connection to create a new container.</li>
<li>The attacker gains access to sensitive data or resources within the container.</li>
<li>The attacker escalates privileges within the compromised container.</li>
<li>The attacker uses the compromised container to move laterally to other containers or hosts within the environment.</li>
<li>The attacker achieves their objective, such as data exfiltration or system compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to bypass Kubernetes security measures, create unauthorized containers, and potentially gain control over the entire cluster. The observed impact includes privilege escalation, lateral movement, and data exfiltration. The severity of this attack depends on the level of access granted to the compromised container and the sensitivity of the data and resources within the cluster.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Auditd Manager to capture network and socket events, specifically monitoring for <code>connect</code> calls to Unix sockets as described in the <a href="https://docs.elastic.co/integrations/auditd_manager">Auditd Manager documentation</a>.</li>
<li>Deploy the Sigma rule &ldquo;Unusual Process Connecting to Docker or Containerd Socket&rdquo; to detect suspicious processes connecting to container runtime sockets, tuning <code>process.executable</code> and <code>user.name</code> for known legitimate processes.</li>
<li>Monitor file permissions on the socket paths (<code>/var/run/docker.sock</code>, <code>/run/docker.sock</code>, <code>/var/run/containerd/containerd.sock</code>, <code>/run/containerd/containerd.sock</code>) and restrict access to trusted groups only.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>container</category><category>privilege-escalation</category><category>lateral-movement</category><category>linux</category></item><item><title>Suspicious Use of sc.exe for Remote Service Manipulation</title><link>https://feed.craftedsignal.io/briefs/2024-01-cmd-service-lateral-movement/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-cmd-service-lateral-movement/</guid><description>The rule identifies the use of sc.exe to create, modify, or start services on remote hosts, potentially indicating lateral movement by adversaries.</description><content:encoded><![CDATA[<p>This detection rule identifies the suspicious use of <code>sc.exe</code> (Service Control Manager) to create, modify, or start services on remote Windows hosts. While system administrators may legitimately use this tool, its use for lateral movement is a known technique used by attackers. This activity is often part of a larger attack campaign, where adversaries attempt to gain access to sensitive data or critical systems. The rule aims to detect unauthorized attempts to manipulate services on remote systems, differentiating between legitimate administrative tasks and malicious activities. The rule is designed for data generated by Elastic Defend, but also supports Sysmon data.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a compromised host within the network.</li>
<li>The attacker uses <code>sc.exe</code> with the <code>create</code> command to create a new service on a remote host, specifying a malicious executable as the <code>binPath</code>.</li>
<li>The attacker uses <code>sc.exe</code> with the <code>config</code> command to modify an existing service on a remote host, changing its <code>binPath</code> to point to a malicious executable.</li>
<li>The attacker uses <code>sc.exe</code> with the <code>failure</code> command to configure service failure options to execute a malicious command.</li>
<li>The attacker uses <code>sc.exe</code> with the <code>start</code> command to start a service on a remote host, triggering the execution of the malicious executable.</li>
<li>The malicious executable executes on the remote host, providing the attacker with a foothold for further actions.</li>
<li>The attacker leverages the newly established foothold to move laterally to other systems within the network, potentially escalating privileges and accessing sensitive data.</li>
<li>The attacker establishes persistence through the created or modified service, allowing continued access even after system reboots.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can allow attackers to move laterally within a network, gain unauthorized access to sensitive data, and establish persistence on compromised systems. While the source material doesn&rsquo;t provide specific victim counts or sectors targeted, the impact of successful lateral movement can be significant, potentially leading to data breaches, system disruption, and financial losses.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Service Command Lateral Movement&rdquo; to your SIEM and tune for your environment based on observed false positives from administrative activity.</li>
<li>Enable Sysmon Event ID 1 (Process Creation) and Event ID 3 (Network Connection) logging to enhance visibility into <code>sc.exe</code> activity.</li>
<li>Review and whitelist legitimate administrative scripts or tools that use <code>sc.exe</code> by their process names or paths to reduce false positives, as described in the rule&rsquo;s documentation.</li>
<li>Implement network segmentation to limit the ability of adversaries to move laterally across the network, mitigating the impact of successful exploitation.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>lateral-movement</category><category>windows</category><category>sc.exe</category></item><item><title>Suspicious SMB Connections via LOLBin or Untrusted Process</title><link>https://feed.craftedsignal.io/briefs/2024-01-suspicious-smb-connections/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-suspicious-smb-connections/</guid><description>This rule identifies potentially suspicious processes, excluding those signed by Microsoft, making Server Message Block (SMB) network connections over port 445, which could indicate lateral movement attempts.</description><content:encoded><![CDATA[<p>This detection rule, originally published by Elastic, identifies potentially suspicious processes making Server Message Block (SMB) network connections over port 445. Windows File Sharing is typically implemented over SMB, which communicates between hosts using port 445. Legitimate SMB connections are generally established by the kernel (PID 4). This rule focuses on detecting processes that are not trusted (not signed by Microsoft) or living-off-the-land binaries (LOLBins) initiating SMB connections. It helps to detect port scanners, exploits, or user-level processes attempting lateral movement within the network by leveraging SMB connections. The rule is designed for data generated by Elastic Defend.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Windows host through various means.</li>
<li>The attacker executes a binary that is not signed by Microsoft and not a known LOLBin.</li>
<li>This process attempts to establish a network connection to a remote host on port 445 (SMB).</li>
<li>The attacker may use this connection to enumerate shares.</li>
<li>The attacker attempts to authenticate to the remote SMB share.</li>
<li>Upon successful authentication, the attacker may copy malicious payloads to the remote share.</li>
<li>The attacker executes the copied payloads on the remote system, achieving lateral movement.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack can lead to lateral movement within the network, allowing the attacker to compromise additional systems and gain further access to sensitive data. The scope of the impact depends on the permissions of the compromised account and the level of access granted to the attacker on the target systems. This could result in data exfiltration, system disruption, or ransomware deployment.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect Outbound SMB Connection by Untrusted Process</code> to your SIEM and tune for your environment.</li>
<li>Investigate any alerts generated by this rule, focusing on the process execution chain and network connections.</li>
<li>Implement network segmentation to limit lateral movement possibilities.</li>
<li>Ensure that systems are patched against known SMB vulnerabilities.</li>
<li>Monitor process creation events for unusual processes that are not signed by Microsoft.</li>
<li>Enable network connection logging to monitor SMB traffic for suspicious activity.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>lateral-movement</category><category>smb</category><category>windows</category></item><item><title>Suspicious AWS STS GetSessionToken Usage</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-aws-sts-getsessiontoken-misuse/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-aws-sts-getsessiontoken-misuse/</guid><description>The AWS STS GetSessionToken API is being misused to create temporary tokens for lateral movement and privilege escalation within AWS environments by potentially compromised IAM users.</description><content:encoded><![CDATA[<p>The AWS Security Token Service (STS) GetSessionToken API allows IAM users to create temporary security credentials. Attackers can abuse this functionality by generating tokens with elevated privileges or for lateral movement within an AWS environment if an IAM user&rsquo;s credentials have been compromised. This activity can be difficult to detect as GetSessionToken is a legitimate function, but unusual patterns or IAM users generating tokens where it is not expected should be investigated. This activity is of particular concern because it bypasses normal IAM role assumption logging and creates a separate credential for an attacker to abuse, making access more difficult to track. The impact is significant, allowing attackers to perform actions as the compromised IAM user or escalate privileges.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to an AWS environment, potentially through compromised IAM user credentials.</li>
<li>The attacker authenticates to AWS using the compromised IAM user credentials.</li>
<li>The attacker calls the STS GetSessionToken API, specifying desired permissions or roles (if permitted by the IAM user&rsquo;s policies).</li>
<li>AWS STS generates a new set of temporary credentials (access key ID, secret access key, and session token).</li>
<li>The attacker configures their AWS CLI or SDK to use the newly acquired temporary credentials.</li>
<li>The attacker leverages these temporary credentials to perform actions within the AWS environment, potentially escalating privileges or moving laterally.</li>
<li>The attacker covers their tracks by deleting the CloudTrail logs.</li>
<li>The attacker exfiltrates sensitive data, deploys malware, or causes disruption within the AWS environment using the acquired privileges.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Compromised AWS environments can lead to data breaches, service disruptions, and financial losses. Successful exploitation via GetSessionToken misuse allows attackers to move laterally, escalate privileges, and perform unauthorized actions within the AWS infrastructure. The number of affected organizations is currently unknown, but any organization relying on AWS is potentially at risk. If successful, attackers can steal sensitive data, compromise critical systems, and disrupt business operations.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;AWS STS GetSessionToken Misuse&rdquo; to your SIEM to detect suspicious GetSessionToken API calls (see rules section).</li>
<li>Investigate GetSessionToken calls where <code>userIdentity.type</code> is <code>IAMUser</code> to determine if the request is legitimate.</li>
<li>Monitor CloudTrail logs for unusual patterns of GetSessionToken usage, particularly from unfamiliar user agents or hosts.</li>
<li>Implement strong IAM policies and MFA to minimize the risk of compromised IAM user credentials.</li>
<li>Review the false positives section of the Sigma rule to tune the rule for your specific environment.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>aws</category><category>cloud</category><category>lateral-movement</category><category>privilege-escalation</category><category>sts</category><category>GetSessionToken</category></item><item><title>Remote Scheduled Task Creation via RPC</title><link>https://feed.craftedsignal.io/briefs/2024-01-remote-task-creation/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-remote-task-creation/</guid><description>The creation of scheduled tasks from a remote source via RPC, where the RpcCallClientLocality and ClientProcessId are 0, indicates potential adversary lateral movement within a Windows environment.</description><content:encoded><![CDATA[<p>This detection identifies the creation of scheduled tasks on Windows systems originating from a remote source using Remote Procedure Call (RPC). The creation of scheduled tasks is a common technique used for persistence and execution. While administrators may legitimately use this functionality for remote management, adversaries also leverage it for lateral movement and executing malicious code on compromised systems. The rule specifically looks for RPC calls where the client locality and process ID are 0, suggesting the task was created remotely. Identifying this activity allows defenders to investigate potentially malicious lateral movement and unauthorized task execution. This activity has been observed across various Windows environments.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a network, potentially through phishing or exploiting a vulnerability.</li>
<li>The attacker identifies a target system within the network accessible via RPC.</li>
<li>The attacker establishes an RPC connection to the target system.</li>
<li>Using the RPC connection, the attacker creates a new scheduled task on the target system. The RpcCallClientLocality and ClientProcessId are set to 0 in the task creation event, indicating remote origin.</li>
<li>The scheduled task is configured to execute a malicious payload or command. This could involve running a script, executable, or PowerShell command.</li>
<li>The scheduled task is triggered based on a defined schedule or event.</li>
<li>The malicious payload executes on the target system, achieving the attacker&rsquo;s objective.</li>
<li>The attacker uses the compromised system to further pivot within the network, repeating the process on other targets.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to the establishment of persistence on the target system, allowing the attacker to maintain access even after reboots or credential changes. This can also facilitate lateral movement, enabling the attacker to compromise additional systems within the network. The impact could range from data theft and system disruption to full network compromise. Organizations may experience downtime, data loss, and reputational damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable &ldquo;Audit Other Object Access Events&rdquo; to generate the Windows Security Event Logs required for detection (reference: Setup section in content).</li>
<li>Deploy the provided Sigma rules to your SIEM to detect remote scheduled task creation events (reference: rules section).</li>
<li>Investigate any alerts generated by the Sigma rules to determine the legitimacy of the scheduled task creation.</li>
<li>Review and restrict permissions for creating scheduled tasks, especially from remote sources, to prevent unauthorized task creation.</li>
<li>Monitor the TaskContent value to investigate the configured action of scheduled tasks created remotely (reference: Triage and analysis section in content).</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>lateral-movement</category><category>execution</category><category>windows</category></item><item><title>Remote File Copy to a Hidden Share</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-remote-file-copy-hidden-share/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-remote-file-copy-hidden-share/</guid><description>This rule detects remote file copy attempts to hidden network shares, which may indicate lateral movement or data staging activity, by identifying suspicious file copy operations using command-line tools like cmd.exe and powershell.exe focused on hidden share patterns.</description><content:encoded><![CDATA[<p>This detection rule identifies attempts to copy files to hidden network shares in Windows environments, which can be indicative of lateral movement or data staging by malicious actors. Attackers may leverage hidden shares, typically used for legitimate administrative purposes, to move laterally within a network or to stage data for exfiltration without being easily detected. The rule focuses on detecting the use of command-line tools such as cmd.exe and powershell.exe with arguments that specify the copying of files to network paths that match a hidden share pattern (e.g., <code>\\\\*\\\\*$</code>). This activity helps identify suspicious file transfer operations that deviate from normal administrative or user behavior. The rule was last updated on 2026/05/04.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a compromised host within the network.</li>
<li>The attacker uses cmd.exe or powershell.exe to execute a file copy command.</li>
<li>The command line includes arguments to copy files to a hidden network share (e.g., <code>\\\\&lt;server&gt;\\&lt;hidden_share&gt;$</code>).</li>
<li>The <code>copy</code>, <code>move</code>, <code>cp</code>, or <code>mv</code> commands are used to transfer the file.</li>
<li>The target hidden share is accessed using the compromised account&rsquo;s credentials.</li>
<li>The file is successfully copied to the hidden share.</li>
<li>The attacker may then access the copied file from another compromised host.</li>
<li>The attacker proceeds to exfiltrate the staged data or uses the copied files for lateral movement.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack can lead to unauthorized access to sensitive data, lateral movement to other systems within the network, and potential data exfiltration. While the number of victims and specific sectors targeted are not specified, a successful compromise can significantly impact an organization&rsquo;s data security and overall network integrity. The impact includes potential data loss, reputational damage, and disruption of normal business operations.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the &ldquo;Detect Remote File Copy to Hidden Share&rdquo; Sigma rule to your SIEM and tune for your environment to detect suspicious file copy activities.</li>
<li>Enable Sysmon process-creation logging to capture the command-line arguments used in file copy operations, activating the rule above.</li>
<li>Review and restrict permissions on network shares, especially hidden shares, to ensure only authorized users have access, as described in the investigation guide.</li>
<li>Investigate any alerts generated by the Sigma rule by examining the process details (cmd.exe, powershell.exe) and the network share path, as outlined in the investigation guide.</li>
<li>Correlate events with other logs or alerts from the same host or user to identify any additional suspicious activities, enhancing the detection capabilities.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>lateral-movement</category><category>data-staging</category><category>windows</category><category>hidden-share</category></item><item><title>RDP Enabled via Registry Modification</title><link>https://feed.craftedsignal.io/briefs/2024-01-rdp-registry-enabled/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-rdp-registry-enabled/</guid><description>An adversary may enable Remote Desktop Protocol (RDP) access by modifying the `fDenyTSConnections` registry key, potentially indicating lateral movement preparation or defense evasion.</description><content:encoded><![CDATA[<p>Attackers may enable Remote Desktop Protocol (RDP) to facilitate lateral movement within a compromised network. By modifying the <code>fDenyTSConnections</code> registry key to a value of <code>0</code>, attackers can enable remote desktop connections, allowing them to access systems remotely. This technique can be employed using remote registry manipulation or tools like PsExec. The modification of the registry key is a common tactic used by ransomware operators and other threat actors to gain unauthorized access to victim servers. This activity can be performed to enable remote access for initial access or to regain access after persistence mechanisms have failed.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a system via an exploit or compromised credentials.</li>
<li>The attacker uses a tool like PsExec or leverages remote registry modification capabilities.</li>
<li>The attacker modifies the <code>fDenyTSConnections</code> registry key, setting its value to <code>0</code>. This key is typically located in <code>HKLM\SYSTEM\CurrentControlSet\Control\Terminal Server</code>.</li>
<li>The system&rsquo;s RDP service is enabled or re-enabled as a result of the registry change.</li>
<li>The attacker attempts to connect to the now-enabled RDP service using valid or brute-forced credentials.</li>
<li>Upon successful authentication, the attacker gains interactive access to the system via RDP.</li>
<li>The attacker performs reconnaissance, elevates privileges, and moves laterally to other systems.</li>
<li>The attacker deploys ransomware, exfiltrates data, or achieves other objectives.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful modification of the <code>fDenyTSConnections</code> registry key allows unauthorized remote access to systems, potentially leading to lateral movement, data theft, or ransomware deployment. Organizations could suffer significant financial losses, reputational damage, and operational disruption. The scope of the impact depends on the attacker&rsquo;s objectives and the level of access they gain within the environment.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;RDP Enabled via Registry&rdquo; to detect modifications to the <code>fDenyTSConnections</code> registry key (rules).</li>
<li>Monitor process creation events for suspicious use of <code>reg.exe</code> or PowerShell to modify registry keys related to RDP (rules).</li>
<li>Implement network segmentation and firewall rules to restrict RDP traffic to authorized hosts (overview).</li>
<li>Review the privileges assigned to users and ensure the principle of least privilege is enforced (overview).</li>
<li>Enable Sysmon registry event logging to capture registry modifications (setup).</li>
<li>Investigate any alerts related to registry modifications on critical systems (overview).</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>lateral-movement</category><category>defense-evasion</category><category>rdp</category><category>registry-modification</category></item><item><title>PsExec Lateral Movement via Network Connection</title><link>https://feed.craftedsignal.io/briefs/2024-01-psexec-lateral-movement/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-psexec-lateral-movement/</guid><description>The rule identifies the use of PsExec.exe making a network connection, indicative of potential lateral movement by adversaries executing commands with SYSTEM privileges on Windows systems to disable defenses.</description><content:encoded><![CDATA[<p>This detection identifies the execution of PsExec, a dual-use tool commonly employed for both legitimate administration and malicious lateral movement. PsExec, part of the Sysinternals Suite, allows for remote command execution with elevated privileges, often abused by attackers to disable security controls and move laterally within a network. This rule specifically detects the creation of <code>PsExec.exe</code> followed by a network connection initiated by the process, which is a strong indicator of potential malicious activity. While PsExec has legitimate uses, its prevalence in attack scenarios necessitates careful monitoring. The rule is designed to work with data from Elastic Defend, SentinelOne Cloud Funnel, and Sysmon.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a system within the network (e.g., via phishing or exploiting a vulnerability).</li>
<li>The attacker uploads or transfers the PsExec tool (<code>PsExec.exe</code>) to the compromised host, potentially using SMB shares or other file transfer methods.</li>
<li>The attacker executes PsExec with the <code>-accepteula</code> flag, which suppresses the license dialog, potentially indicating a first-time execution on the machine.</li>
<li>PsExec establishes a network connection to a remote target system, leveraging SMB/Windows Admin Shares (T1021.002) to facilitate remote command execution.</li>
<li>The attacker uses PsExec to execute commands on the remote system, potentially with SYSTEM privileges, to install malware, gather credentials, or perform reconnaissance.</li>
<li>The attacker leverages the newly compromised system as a pivot point to move laterally to other systems within the network, repeating the process.</li>
<li>The attacker escalates privileges on multiple systems.</li>
<li>The attacker achieves their objective, such as data exfiltration or ransomware deployment.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to widespread compromise across the network. Attackers can leverage PsExec to gain control over critical systems, disable security controls, and exfiltrate sensitive data. Lateral movement facilitated by PsExec can enable attackers to rapidly expand their footprint within an organization, impacting numerous systems and services. While the rule&rsquo;s severity is low due to the dual-use nature of PsExec, the potential impact of unchecked lateral movement is significant.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>PsExec Network Connection</code> to your SIEM and tune the <code>process.executable</code> and <code>process.parent.executable</code> filters for your environment to reduce false positives.</li>
<li>Enable Sysmon Event ID 1 (Process Creation) and Event ID 3 (Network Connection) logging for enhanced visibility into PsExec activity.</li>
<li>Review and enforce the principle of least privilege to limit the accounts that can run PsExec and access sensitive systems.</li>
<li>Investigate any alerts generated by the <code>PsExec Network Connection</code> rule promptly to determine if the activity is legitimate or malicious.</li>
<li>Monitor network connections originating from systems where PsExec is executed using the <code>PsExec Outbound Network Connection</code> Sigma rule.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>psexec</category><category>lateral-movement</category><category>windows</category></item><item><title>Potential Lateral Tool Transfer via SMB Share</title><link>https://feed.craftedsignal.io/briefs/2024-01-lateral-tool-transfer-smb/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-lateral-tool-transfer-smb/</guid><description>The rule identifies the creation or change of a Windows executable file over network shares, indicating potential lateral tool transfer via SMB, which adversaries may use to move tools between systems in a compromised environment.</description><content:encoded><![CDATA[<p>This detection rule identifies the potential transfer of malicious tools within a Windows environment using SMB shares. Attackers commonly leverage SMB shares to propagate malware, tools, or scripts to compromised systems for lateral movement. The rule focuses on detecting the creation or modification of executable files (e.g., .exe, .dll, .ps1) on network shares, which is a strong indicator of malicious activity. The rule leverages Elastic Defend data to detect this activity and can be used to identify systems that may be compromised. This technique is used to deploy additional payloads, credential dumpers, or other malicious tools.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a system within the network.</li>
<li>The attacker identifies accessible SMB shares within the compromised environment.</li>
<li>The attacker uses the compromised system to connect to a target SMB share (port 445) on another system.</li>
<li>The attacker copies an executable file (e.g., malware, a credential dumping tool, or a PowerShell script) to the SMB share.</li>
<li>The target system detects a new file creation or change event on the SMB share.</li>
<li>A user or process on the target system executes the transferred file.</li>
<li>The executed file performs malicious actions on the target system, such as credential theft or lateral movement.</li>
<li>The attacker uses the newly compromised system to further expand their access within the network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to propagate malware or malicious tools throughout the network, leading to widespread compromise. Lateral movement enables attackers to access sensitive data, escalate privileges, and ultimately achieve their objectives, which may include data exfiltration, ransomware deployment, or system disruption. The rule aims to detect this activity early in the attack chain and mitigate potential damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rules to your SIEM to detect suspicious executable file creation/modification events on SMB shares.</li>
<li>Enable Elastic Defend on all Windows endpoints to provide the necessary data for the detection rule to function.</li>
<li>Investigate any alerts triggered by the Sigma rules, focusing on the process execution chain, file reputation, and user activity.</li>
<li>Review and restrict write access to network shares to minimize the risk of unauthorized file transfers.</li>
<li>Monitor network connections to port 445 (SMB) for suspicious activity, especially connections originating from unusual source IPs (Sigma rule, log source).</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">threat</category><category>lateral-movement</category><category>smb</category><category>file-transfer</category><category>windows</category></item><item><title>Potential Direct Kubelet Access via Process Arguments</title><link>https://feed.craftedsignal.io/briefs/2024-01-kubelet-access/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-kubelet-access/</guid><description>Detection of potential direct Kubelet access via process arguments in Linux containers, which could lead to enumeration, execution, or lateral movement within the Kubernetes cluster.</description><content:encoded><![CDATA[<p>This rule detects potential direct Kubelet access via process arguments within Linux containers. Attackers may target the Kubelet API to gain unauthorized access to the Kubernetes API server or other sensitive resources within the cluster. Observed requests are often used for reconnaissance, such as enumerating pods and cluster resources, or for executing commands directly on the API server. This activity indicates a potential attempt to move laterally within the Kubernetes environment. The activity is detected by monitoring process arguments for HTTP requests directed at the Kubelet API on ports 10250 or 10255. The detection leverages Elastic Defend for Containers, introduced in version 9.3.0.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a container within the Kubernetes cluster, potentially through exploiting a vulnerable application.</li>
<li>The attacker opens an interactive shell within the compromised container.</li>
<li>Using command-line tools such as <code>curl</code> or <code>wget</code>, the attacker crafts an HTTP request targeting the Kubelet API, typically on port 10250 or 10255.</li>
<li>The HTTP request is embedded within the process arguments, including specific Kubelet endpoints such as <code>/pods</code>, <code>/exec</code>, <code>/run</code>, or <code>/logs</code>.</li>
<li>The attacker attempts to enumerate pods and other cluster resources by querying the <code>/pods</code> endpoint.</li>
<li>The attacker attempts to execute commands within containers by leveraging the <code>/exec</code> or <code>/run</code> endpoints.</li>
<li>The attacker attempts to retrieve container logs using the <code>/logs</code> endpoint.</li>
<li>Successful exploitation allows the attacker to move laterally within the Kubernetes cluster, potentially gaining access to sensitive data or control over other resources.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of direct Kubelet access can lead to significant compromise within a Kubernetes cluster. Attackers can enumerate sensitive information, execute arbitrary commands within containers, and move laterally to other parts of the cluster. This can result in data exfiltration, denial of service, or complete cluster takeover. Due to the high level of access granted by Kubelet, a successful attack allows the attacker to take complete control over the target node.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rules to your SIEM and tune them for your environment. Enable Elastic Defend for Containers with a minimum version of 9.3.0 to generate the necessary logs for these detections.</li>
<li>Review network policies to restrict pod access to Kubelet ports (10250, 10255) except from approved node-local agents (references: <a href="https://www.cyberark.com/resources/threat-research-blog/using-kubelet-client-to-attack-the-kubernetes-cluster)">https://www.cyberark.com/resources/threat-research-blog/using-kubelet-client-to-attack-the-kubernetes-cluster)</a>.</li>
<li>Harden Kubelet authentication and authorization by disabling anonymous access and requiring webhook authorization (references: <a href="https://www.aquasec.com/blog/kubernetes-exposed-exploiting-the-kubelet-api/)">https://www.aquasec.com/blog/kubernetes-exposed-exploiting-the-kubelet-api/)</a>.</li>
<li>Enforce pod security policies to restrict privileged pods and host networking, reducing the attack surface for node API access.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>container</category><category>kubelet</category><category>kubernetes</category><category>lateral-movement</category><category>execution</category></item><item><title>Outbound SMB Traffic Detection</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-outbound-smb/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-outbound-smb/</guid><description>This analytic detects outbound SMB connections from internal hosts to external servers, potentially indicating lateral movement and credential theft attempts.</description><content:encoded><![CDATA[<p>This detection identifies outbound Server Message Block (SMB) traffic from internal hosts to external servers. The activity is identified by monitoring network traffic for SMB requests directed towards the Internet, an unusual occurrence in standard operations. This analytic is crucial for Security Operations Centers (SOCs) as it can signal an attacker&rsquo;s attempt to retrieve credential hashes via compromised internal systems, a critical step in lateral movement and privilege escalation. The source mentions specific relevance to &ldquo;Hidden Cobra Malware&rdquo;, &ldquo;DHS Report TA18-074A&rdquo;, and &ldquo;NOBELIUM Group&rdquo;, suggesting possible connections to these threat actors or campaigns.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An internal host is compromised through an initial access vector (e.g., phishing, exploit).</li>
<li>The attacker attempts to enumerate network resources accessible from the compromised host.</li>
<li>The attacker leverages SMB to connect to external servers, typically on ports 139 or 445.</li>
<li>The SMB connection attempts to authenticate or negotiate with the external server.</li>
<li>The attacker may attempt to exploit vulnerabilities in the SMB protocol or server.</li>
<li>The attacker captures or relays credential hashes transmitted over the SMB connection.</li>
<li>The attacker uses the captured credentials to move laterally to other systems or escalate privileges.</li>
<li>The attacker achieves their final objective, such as data exfiltration or system compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of outbound SMB traffic can lead to unauthorized access to sensitive data and full system compromise. Lateral movement and privilege escalation are key goals. Confirmed malicious SMB traffic could enable attackers to move through the network, potentially impacting numerous systems and leading to significant data breaches. While the number of victims isn&rsquo;t specified, the detection&rsquo;s relevance to known threat actors suggests potentially widespread impact.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Outbound SMB Traffic Detected</code> to your SIEM and tune it for your environment, using the provided positive and negative test cases to ensure accurate detection.</li>
<li>Investigate and block any detected outbound SMB connections that are not explicitly authorized by legitimate business needs (reference <code>detect_outbound_smb_traffic_filter</code> macro in the original search).</li>
<li>Implement network segmentation to restrict internal hosts from directly accessing external SMB services.</li>
<li>Enforce strong password policies and multi-factor authentication to mitigate the impact of credential theft.</li>
<li>Categorize internal CIDR blocks as <code>internal</code> in your asset management system to reduce false positives (reference &ldquo;known_false_positives&rdquo; section).</li>
<li>Consider blocking external communications of all SMB versions and related protocols at the network boundary.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>network</category><category>smb</category><category>lateral-movement</category><category>privilege-escalation</category></item><item><title>NullSessionPipe Registry Modification for Lateral Movement</title><link>https://feed.craftedsignal.io/briefs/2024-01-nullsessionpipe-modification/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-nullsessionpipe-modification/</guid><description>Attackers modify the NullSessionPipe registry setting in Windows to enable anonymous access to named pipes, potentially facilitating lateral movement and unauthorized access to network resources.</description><content:encoded><![CDATA[<p>This detection rule identifies modifications to the <code>NullSessionPipe</code> registry setting in Windows. This setting defines named pipes that can be accessed without authentication, facilitating anonymous connections. Adversaries may exploit this by modifying the registry to enable lateral movement, allowing unauthorized access to network resources. By adding specific pipes to the <code>NullSessionPipes</code> registry key, an attacker can make services accessible without requiring authentication. This rule focuses on flagging modifications that introduce new accessible pipes, which could indicate malicious intent. The targeted configuration is located under <code>HKLM\SYSTEM\CurrentControlSet\Services\LanmanServer\Parameters</code>. The registry key <code>NullSessionPipes</code> is of particular interest when its values change.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial compromise of a system within the network.</li>
<li>The attacker gains elevated privileges on the compromised system.</li>
<li>The attacker modifies the Windows Registry, specifically the <code>HKLM\SYSTEM\CurrentControlSet\Services\LanmanServer\Parameters\NullSessionPipes</code> key. They add a new pipe name to this key, which will allow unauthenticated access to that named pipe.</li>
<li>The attacker uses <code>reg.exe</code> or PowerShell to modify the registry, potentially using commands like <code>reg add</code> or <code>Set-ItemProperty</code>.</li>
<li>A remote system attempts to connect to the newly accessible named pipe on the compromised system without authenticating.</li>
<li>The attacker exploits the now-accessible service or application associated with the named pipe to execute commands or transfer data.</li>
<li>The attacker leverages this access to move laterally within the network, compromising additional systems.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful modification of the <code>NullSessionPipes</code> registry setting can lead to unauthorized access to sensitive resources and lateral movement within the network. By enabling anonymous access to named pipes, attackers can potentially bypass authentication mechanisms and gain control over critical systems. While the direct number of victims is not specified, the impact can be significant, particularly in organizations where shared resources and services rely on secure authentication protocols.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Windows Registry auditing to capture changes to the <code>NullSessionPipes</code> registry key. This will allow you to detect unauthorized modifications as described in the overview.</li>
<li>Deploy the Sigma rule &ldquo;NullSessionPipe Registry Modification&rdquo; to your SIEM and tune for your environment to identify malicious activity related to named pipe modifications.</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on the specific named pipes being added or modified in the registry event details, as detailed in the rule&rsquo;s description.</li>
<li>Regularly review and validate the legitimacy of existing entries in the <code>NullSessionPipes</code> registry key to identify and remove any unauthorized pipes.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>lateral-movement</category><category>defense-evasion</category><category>registry-modification</category></item><item><title>Incoming Execution via WinRM Remote Shell</title><link>https://feed.craftedsignal.io/briefs/2024-01-winrm-lateral-movement/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-winrm-lateral-movement/</guid><description>This rule detects incoming execution via Windows Remote Management (WinRM) remote shell on a target host, which could be an indication of lateral movement by monitoring network traffic on ports 5985 or 5986 and processes initiated by WinRM.</description><content:encoded><![CDATA[<p>Windows Remote Management (WinRM) is a protocol that allows for remote management and execution of commands on Windows machines. While beneficial for legitimate administrative tasks, adversaries can exploit WinRM for lateral movement by executing commands remotely. This detection rule identifies suspicious activity by monitoring network traffic on specific ports and processes initiated by WinRM (winrshost.exe), flagging potential unauthorized remote executions. The rule is designed for data generated by Elastic Defend, but also supports SentinelOne Cloud Funnel and Sysmon event logs. This detection can help identify attackers moving laterally within a Windows environment.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to a machine within the network (e.g., via phishing or exploiting a vulnerability).</li>
<li>The attacker uses this compromised machine to scan the network for potential targets with WinRM enabled.</li>
<li>The attacker attempts to authenticate to a target machine using stolen credentials or by exploiting a vulnerability in WinRM.</li>
<li>Upon successful authentication, the attacker establishes a WinRM session to the target machine over ports 5985 (HTTP) or 5986 (HTTPS).</li>
<li>The attacker executes malicious commands on the target machine using the WinRM remote shell, often leveraging <code>winrshost.exe</code>.</li>
<li>The executed commands may include reconnaissance activities (e.g., <code>whoami</code>, <code>net user</code>), privilege escalation attempts, or malware deployment.</li>
<li>The attacker may use the compromised target to pivot to other systems, repeating the process and expanding their foothold.</li>
<li>The final objective is typically data exfiltration, system compromise, or deployment of ransomware.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation via WinRM can lead to unauthorized access to sensitive data, system compromise, and lateral movement within the network. Attackers can leverage WinRM to execute arbitrary commands, deploy malware, and ultimately achieve their objectives, such as data theft or ransomware deployment. The impact can range from individual system compromise to widespread network breaches, depending on the attacker&rsquo;s goals and the organization&rsquo;s security posture.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Sysmon process creation (Event ID 1) and network connection (Event ID 3) logging to provide the necessary data for the Sigma rules.</li>
<li>Deploy the Sigma rule <code>Detect Incoming WinRM Remote Shell Execution via Network Connection</code> to identify suspicious network connections on ports 5985 and 5986.</li>
<li>Deploy the Sigma rule <code>Detect Suspicious WinRM Processes</code> to detect suspicious processes spawned by <code>winrshost.exe</code>.</li>
<li>Review and whitelist known administrative IP addresses or users to reduce false positives as noted in the rule documentation.</li>
<li>Implement network segmentation to limit the ability of threats to move laterally across the network as described in the remediation steps.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>lateral-movement</category><category>windows</category><category>winrm</category><category>remote-execution</category></item><item><title>GPO Scheduled Task Abuse for Privilege Escalation and Lateral Movement</title><link>https://feed.craftedsignal.io/briefs/2024-01-gpo-scheduled-task-abuse/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-gpo-scheduled-task-abuse/</guid><description>Attackers abuse Group Policy Objects by modifying scheduled task attributes to execute malicious commands across objects controlled by the GPO, potentially leading to privilege escalation and lateral movement.</description><content:encoded><![CDATA[<p>Attackers can abuse Group Policy Objects (GPOs) to execute scheduled tasks at scale, compromising objects controlled by a given GPO. This involves modifying the contents of the <code>&lt;GPOPath&gt;\\Machine\\Preferences\\ScheduledTasks\\ScheduledTasks.xml</code> file. By altering the XML file to include malicious commands, attackers can achieve privilege escalation or lateral movement within the domain. This technique leverages a legitimate Active Directory mechanism, making it essential to differentiate between authorized administrative actions and malicious activities. The modification can be identified through changes to <code>gPCMachineExtensionNames</code> or <code>gPCUserExtensionNames</code> attributes within Active Directory.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains initial access to a system with permissions to modify GPOs.</li>
<li>Attacker modifies the <code>ScheduledTasks.xml</code> file within the SYSVOL share of a targeted GPO (<code>\\\\*\\SYSVOL</code>).</li>
<li>The attacker changes the contents of the XML file to include a malicious <code>&lt;Command&gt;</code> and <code>&lt;Arguments&gt;</code> tag.</li>
<li>The modified GPO is replicated to domain controllers.</li>
<li>Target systems receive the updated GPO during regular group policy refresh cycles.</li>
<li>The scheduled task defined in the modified <code>ScheduledTasks.xml</code> is executed on the target systems.</li>
<li>The malicious command executes, potentially escalating privileges or facilitating lateral movement.</li>
<li>Attacker achieves desired objective, such as installing malware, creating new accounts, or exfiltrating data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to execute arbitrary code on systems managed by the modified GPO. The scope of impact depends on the targeted GPO and the permissions of the scheduled task. This can lead to widespread compromise, affecting numerous systems and users within the domain. The modification of GPOs can be difficult to detect without proper monitoring, potentially allowing attackers to maintain persistence and control over the environment.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable and monitor Windows audit policies for &ldquo;Audit Directory Service Changes&rdquo; and &ldquo;Audit Detailed File Share&rdquo; to detect modifications to GPOs and file share access, as outlined in the <a href="#setup">setup</a> section.</li>
<li>Deploy the Sigma rule &ldquo;Scheduled Task Execution via GPO Attribute Modification&rdquo; to detect modifications to the <code>gPCMachineExtensionNames</code> or <code>gPCUserExtensionNames</code> attributes (rule: <code>Scheduled Task Execution via GPO Attribute Modification</code>).</li>
<li>Deploy the Sigma rule &ldquo;Scheduled Task XML File Modification in SYSVOL&rdquo; to detect modifications to the ScheduledTasks.xml file in SYSVOL shares (rule: <code>Scheduled Task XML File Modification in SYSVOL</code>).</li>
<li>Review and validate any changes to GPOs, specifically those related to scheduled tasks, to ensure they are authorized and legitimate.</li>
<li>Monitor for the execution of unexpected or malicious commands originating from scheduled tasks created or modified via GPOs.</li>
<li>Regularly audit and review GPO configurations to identify any potential weaknesses or misconfigurations that could be exploited.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>group-policy</category><category>scheduled-task</category><category>privilege-escalation</category><category>lateral-movement</category></item><item><title>AWS STS GetFederationToken with AdministratorAccess in Request</title><link>https://feed.craftedsignal.io/briefs/2024-01-aws-sts-admin-access/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-aws-sts-admin-access/</guid><description>Detection of AWS STS GetFederationToken calls with AdministratorAccess in the request parameters, indicating potential privilege escalation or dangerous automation via broadly privileged temporary credentials.</description><content:encoded><![CDATA[<p>The AWS Security Token Service (STS) GetFederationToken API allows for the creation of temporary security credentials for federated users. These credentials inherit permissions from the calling IAM user and any session policy included in the request. This detection focuses on instances where the request parameters of GetFederationToken reference AdministratorAccess, either directly or through an equivalent string. The inclusion of AdministratorAccess within the session policy grants overly broad privileges to the temporary credentials, potentially leading to privilege escalation or abuse. This scenario is often indicative of legacy systems, misconfigured tooling, or malicious intent, posing a significant risk to the security posture of AWS environments. Defenders should prioritize identifying and mitigating instances of this behavior to enforce least privilege principles and prevent unauthorized access.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to an AWS account, potentially through compromised IAM user credentials or an exploited vulnerability.</li>
<li>The attacker identifies an IAM user with the necessary permissions to call the STS GetFederationToken API.</li>
<li>The attacker crafts a GetFederationToken API request, including a session policy that directly references &ldquo;AdministratorAccess&rdquo; or includes a policy ARN that grants administrator privileges.</li>
<li>The GetFederationToken API call is successfully executed, generating temporary security credentials with broad administrator permissions.</li>
<li>The attacker uses the temporary credentials to perform privileged actions within the AWS environment, such as modifying IAM policies, accessing sensitive data, or deploying malicious resources.</li>
<li>The attacker may attempt to laterally move within the AWS environment by leveraging the newly acquired administrator privileges to compromise other resources or accounts.</li>
<li>The attacker could establish persistence by creating new IAM users or roles with elevated permissions, ensuring continued access even after the temporary credentials expire.</li>
<li>The attacker achieves their final objective, which could include data exfiltration, service disruption, or financial gain.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to complete compromise of the AWS environment. An attacker with temporary administrator credentials can modify security configurations, access sensitive data, and disrupt critical services. While no specific victim counts or sectors are mentioned, the broad permissions granted by AdministratorAccess make any AWS environment vulnerable to significant damage. The risk score of 73 highlights the potential for severe impact.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;AWS STS GetFederationToken with AdministratorAccess in Request&rdquo; to your SIEM to detect instances of this activity (rule title).</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on the <code>aws.cloudtrail.request_parameters</code> to identify the specific policy being used (rule title).</li>
<li>Revoke or rotate the IAM user access keys involved in the GetFederationToken call and enforce least privilege on the user (rule description).</li>
<li>Monitor CloudTrail logs for subsequent events using <code>response_elements.credentials.accessKeyId</code> from the same response to identify actions taken with the temporary credentials (rule description).</li>
<li>Review and update IAM policies to ensure that session policies used with GetFederationToken adhere to the principle of least privilege (rule description).</li>
<li>Implement automated checks to prevent the creation or modification of IAM policies that grant AdministratorAccess except in explicitly approved scenarios (rule description).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>aws</category><category>privilege-escalation</category><category>lateral-movement</category><category>sts</category><category>getfederationtoken</category></item><item><title>AWS EC2 Instance Profile Associated with Running Instance</title><link>https://feed.craftedsignal.io/briefs/2024-01-aws-ec2-instance-profile-association/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-aws-ec2-instance-profile-association/</guid><description>An attacker may escalate privileges by associating a compromised EC2 instance with a more privileged IAM instance profile.</description><content:encoded><![CDATA[<p>This threat brief focuses on the potential for privilege escalation and lateral movement within Amazon Web Services (AWS) environments by abusing the ability to associate or replace IAM instance profiles on running EC2 instances. An attacker with the necessary permissions (<code>ec2:AssociateIamInstanceProfile</code> or <code>ec2:ReplaceIamInstanceProfile</code> and typically <code>iam:PassRole</code>) can elevate the privileges of a compromised EC2 instance. This is achieved by attaching a more privileged IAM role to the instance, granting the attacker access to resources and permissions beyond their initial scope. The event is logged in AWS CloudTrail, providing a critical detection opportunity for security teams.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to an AWS account, potentially through compromised credentials or a vulnerable application.</li>
<li>The attacker identifies a running EC2 instance with limited privileges.</li>
<li>The attacker identifies or creates a more privileged IAM role that grants broader access to AWS resources.</li>
<li>The attacker uses the <code>AssociateIamInstanceProfile</code> or <code>ReplaceIamInstanceProfile</code> API calls to associate the privileged IAM role with the target EC2 instance. This requires appropriate IAM permissions.</li>
<li>The EC2 instance&rsquo;s metadata service now provides credentials for the newly associated IAM role.</li>
<li>The attacker leverages the elevated privileges to access sensitive data or resources, potentially including other EC2 instances, databases, or storage buckets.</li>
<li>The attacker moves laterally within the AWS environment, compromising additional resources and escalating their access.</li>
<li>The attacker achieves their objective, such as exfiltrating data, deploying malicious code, or disrupting services.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to elevate privileges within the AWS environment, potentially leading to unauthorized access to sensitive data, lateral movement to other systems, and disruption of critical services. The impact could range from data breaches and financial losses to reputational damage and regulatory fines. Identifying and responding to these events quickly is crucial to minimizing potential damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;AWS EC2 Instance Profile Associated with Running Instance&rdquo; to your SIEM using AWS CloudTrail logs to detect suspicious activity.</li>
<li>Review and harden IAM permissions related to <code>ec2:AssociateIamInstanceProfile</code> and <code>ec2:ReplaceIamInstanceProfile</code> to limit who can modify instance profiles.</li>
<li>Enable CloudTrail logging for all regions in your AWS account to ensure comprehensive audit coverage.</li>
<li>Implement least privilege principles for IAM roles assigned to EC2 instances to minimize the impact of potential privilege escalation.</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on the source IP address, user identity, and the IAM role associated with the instance profile.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>aws</category><category>privilege-escalation</category><category>lateral-movement</category></item><item><title>Suspicious Process Execution via Renamed PsExec Executable</title><link>https://feed.craftedsignal.io/briefs/2024-01-renamed-psexec/</link><pubDate>Wed, 03 Jan 2024 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-renamed-psexec/</guid><description>Detects suspicious PsExec activity where the PsExec service component is executed using a custom name, indicating an attempt to evade detections that look for the default PsExec service component name.</description><content:encoded><![CDATA[<p>PsExec is a legitimate remote administration tool developed by Microsoft as part of the Sysinternals Suite, enabling the execution of commands with both regular and SYSTEM privileges on Windows systems. It functions by executing a service component, <code>Psexecsvc.exe</code>, on a remote system, which then runs a specified process and returns the results to the local system. While commonly used by administrators, adversaries frequently abuse PsExec for lateral movement and to execute commands as SYSTEM, effectively disabling defenses and bypassing security protections. This detection identifies instances where the PsExec service component is executed using a custom name, a tactic employed to evade security controls or detections targeting the default PsExec service component name. The rule was last updated on 2026-05-04 and covers Elastic Defend, Windows, M365 Defender, and Crowdstrike data sources.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a system within the network (e.g., via phishing or exploiting a public-facing application).</li>
<li>The attacker uploads a renamed version of <code>psexesvc.exe</code> to a compromised host.</li>
<li>The attacker uses a tool like the standard <code>PsExec.exe</code> to initiate a remote connection to a target system.</li>
<li>PsExec attempts to copy the renamed <code>psexesvc.exe</code> to the ADMIN$ share on the target system.</li>
<li>The renamed <code>psexesvc.exe</code> is executed as a service on the remote host.</li>
<li>The renamed service executes commands specified by the attacker with SYSTEM privileges.</li>
<li>The results of the commands are returned to the originating system.</li>
<li>The attacker leverages the command execution for lateral movement, data exfiltration, or further compromise of the environment.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack can lead to complete compromise of the target system and potentially the entire network. By executing commands with SYSTEM privileges, attackers can disable security controls, install malware, steal sensitive data, or move laterally to other critical systems. The use of a renamed PsExec executable demonstrates an attempt to evade detection, increasing the likelihood of a successful breach.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Suspicious Process Execution via Renamed PsExec Executable&rdquo; to your SIEM and tune for your environment to detect the execution of renamed <code>psexesvc.exe</code> executables.</li>
<li>Enable Sysmon process creation logging (Event ID 1) to capture the necessary process execution details for the Sigma rule.</li>
<li>Investigate any alerts generated by this rule promptly, focusing on the commands executed and the target systems involved.</li>
<li>Review and enforce the principle of least privilege to minimize the potential impact of compromised accounts.</li>
<li>Monitor network traffic for SMB connections originating from unusual or untrusted systems, which could indicate PsExec usage.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>psexec</category><category>lateral-movement</category><category>execution</category><category>defense-evasion</category><category>windows</category></item><item><title>Suspicious Outbound Scheduled Task Activity via PowerShell</title><link>https://feed.craftedsignal.io/briefs/2024-01-scheduled-task-powershell/</link><pubDate>Wed, 03 Jan 2024 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-scheduled-task-powershell/</guid><description>This rule detects PowerShell loading the Task Scheduler COM DLL followed by an outbound RPC network connection, potentially indicating lateral movement or remote discovery via scheduled tasks.</description><content:encoded><![CDATA[<p>The detection rule identifies suspicious PowerShell activity related to scheduled tasks. Adversaries exploit Task Scheduler to execute malicious scripts, facilitating lateral movement or remote discovery. The rule monitors for the Task Scheduler DLL load within PowerShell processes (powershell.exe, pwsh.exe, powershell_ise.exe) followed by outbound RPC connections, signaling potential misuse. This activity may be indicative of attackers leveraging scheduled tasks for remote execution or reconnaissance within a compromised network. The detection logic focuses on the sequence of loading <code>taskschd.dll</code> and initiating an RPC connection to port 135, a common port for Distributed Component Object Model (DCOM) communication.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Windows system through various means.</li>
<li>The attacker uses PowerShell to interact with the Task Scheduler service.</li>
<li>PowerShell process (powershell.exe, pwsh.exe, or powershell_ise.exe) loads the <code>taskschd.dll</code> library.</li>
<li>The attacker creates or modifies a scheduled task using PowerShell commands.</li>
<li>The scheduled task is configured to execute a malicious payload.</li>
<li>PowerShell initiates an outbound RPC connection on port 135.</li>
<li>The malicious payload executes, potentially leading to lateral movement or remote discovery.</li>
<li>The attacker achieves their objective, such as gaining control of additional systems or gathering sensitive information.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to unauthorized remote code execution, lateral movement within the network, and the potential compromise of sensitive data. The creation or modification of scheduled tasks can provide persistence for attackers, allowing them to maintain access to compromised systems even after reboots. The impact includes potential data breaches, system compromise, and disruption of services.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Sysmon Event ID 7 (Image Loaded) and Event ID 3 (Network Connection) logging to detect the specific activity described in the attack chain.</li>
<li>Deploy the Sigma rule &ldquo;Outbound Scheduled Task Activity via PowerShell&rdquo; to your SIEM and tune the <code>maxspan</code> value based on your environment&rsquo;s typical activity patterns.</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on identifying the specific PowerShell commands used and the scheduled tasks created or modified.</li>
<li>Monitor network connections to port 135 originating from PowerShell processes, and correlate with other security events to identify suspicious patterns.</li>
<li>Implement stricter controls on the creation and modification of scheduled tasks, limiting access to authorized personnel only.</li>
<li>Review and clean up any unauthorized scheduled tasks on systems to prevent persistent malicious activity.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>execution</category><category>lateral-movement</category><category>windows</category></item><item><title>Detecting Remote Scheduled Task Creation for Lateral Movement</title><link>https://feed.craftedsignal.io/briefs/2024-01-remote-scheduled-task-creation/</link><pubDate>Wed, 03 Jan 2024 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-remote-scheduled-task-creation/</guid><description>This rule identifies remote scheduled task creations on a target Windows host, potentially indicating lateral movement by adversaries, by monitoring network connections and registry modifications related to task scheduling.</description><content:encoded><![CDATA[<p>This detection identifies remote scheduled task creations on a target host, which can be indicative of lateral movement. Adversaries often leverage scheduled tasks to execute malicious commands, maintain persistence, or escalate privileges. This technique is particularly effective as it uses native Windows functionality, making it harder to distinguish from legitimate administrative actions. This rule is designed for data generated by Elastic Defend and also supports third-party data sources such as SentinelOne Cloud Funnel and Sysmon. Understanding when and how scheduled tasks are created remotely is crucial for detecting and responding to potential intrusions. The rule focuses on network connections from svchost.exe and registry modifications related to task actions.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to a system, potentially through phishing or exploiting a vulnerability.</li>
<li>The attacker uses the compromised system to scan the network for potential targets.</li>
<li>The attacker attempts to authenticate to a target Windows host using stolen credentials or by exploiting a vulnerability in a network service.</li>
<li>The attacker establishes a network connection to the target host&rsquo;s Task Scheduler service, typically using ports in the dynamic port range (49152+). This connection originates from svchost.exe.</li>
<li>The attacker creates a new scheduled task on the target system using the Task Scheduler service.</li>
<li>This creation involves modifying the registry key <code>HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\{TaskID}\Actions</code> to define the task&rsquo;s actions. The &lsquo;Actions&rsquo; value is often base64 encoded.</li>
<li>The scheduled task executes a malicious payload, granting the attacker further access or control over the target system.</li>
<li>The attacker uses the newly gained access for lateral movement, data exfiltration, or other malicious objectives.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to unauthorized access to sensitive systems, data breaches, and further lateral movement within the network. The rule is designed to catch this activity, reducing the dwell time of attackers and minimizing potential damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rules to your SIEM and tune for your environment to detect malicious scheduled task creation.</li>
<li>Enable Sysmon Event ID 3 (Network Connection) and Sysmon Registry Events to enhance visibility into network connections and registry modifications (see Setup instructions).</li>
<li>Review the base64 encoded tasks actions registry value to investigate the task configured action (see rule description).</li>
<li>Investigate any alerts generated by the Sigma rule to determine the legitimacy of the scheduled task creation and the intent behind the configured action.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>lateral-movement</category><category>execution</category><category>windows</category><category>scheduled-task</category></item><item><title>Suspicious Remote Registry Access via SeBackupPrivilege</title><link>https://feed.craftedsignal.io/briefs/2024-01-sebackup-winreg-access/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-sebackup-winreg-access/</guid><description>Detection of remote registry access by an account with SeBackupPrivilege, potentially indicating credential exfiltration attempts via SAM registry hive dumping.</description><content:encoded><![CDATA[<p>This detection identifies suspicious activity related to credential access on Windows systems. Specifically, it focuses on scenarios where an account with the SeBackupPrivilege (typically associated with the Backup Operators group) remotely accesses the Windows Registry. Attackers can leverage this privilege to bypass access controls and dump the Security Account Manager (SAM) registry hive, which stores password hashes. This activity often precedes credential access and privilege escalation attempts, where the attacker aims to extract sensitive information from the dumped SAM hive to gain unauthorized access to other systems or elevate their privileges within the network. The detection logic looks for a sequence of events: first, a special logon event indicating the use of SeBackupPrivilege, followed by a network share access event targeting the &ldquo;winreg&rdquo; share.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Access:</strong> The attacker gains initial access to a system, potentially through phishing, exploiting a vulnerability, or using stolen credentials.</li>
<li><strong>Privilege Escalation:</strong> The attacker attempts to escalate privileges on the compromised system. If the initial access does not grant SeBackupPrivilege, they may exploit vulnerabilities or misconfigurations to gain membership in the Backup Operators group or otherwise acquire the necessary privilege.</li>
<li><strong>Special Logon:</strong> The attacker logs in using an account with the SeBackupPrivilege. This triggers a &ldquo;logged-in-special&rdquo; event (Event ID 4672) with the SeBackupPrivilege listed.</li>
<li><strong>Remote Registry Access:</strong> The attacker uses remote administration tools or scripts to access the registry of a target system remotely, specifically targeting the &ldquo;winreg&rdquo; share. This triggers a file share access event (Event ID 5145).</li>
<li><strong>SAM Hive Dump:</strong> The attacker uses the SeBackupPrivilege to bypass access controls and copies the SAM registry hive (or portions thereof) to a location accessible to them.</li>
<li><strong>Credential Extraction:</strong> The attacker extracts password hashes from the dumped SAM hive using tools like Mimikatz or other offline password cracking utilities.</li>
<li><strong>Lateral Movement:</strong> The attacker uses the extracted credentials to move laterally to other systems within the network, gaining access to additional resources and expanding their foothold.</li>
<li><strong>Goal Completion:</strong> The attacker achieves their final objective, such as data exfiltration, ransomware deployment, or disruption of services.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to the compromise of domain credentials and widespread lateral movement within the network. This could enable attackers to access sensitive data, disrupt critical services, or deploy ransomware, resulting in significant financial losses and reputational damage. Given the sensitivity of the SAM hive, even a single successful compromise can have far-reaching consequences. The impact is especially high in environments with a large number of systems sharing the same domain, as the attacker can potentially compromise a significant portion of the infrastructure.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable both &ldquo;Audit Detailed File Share&rdquo; and &ldquo;Audit Special Logon&rdquo; Windows audit policies to generate the necessary events for detection, as mentioned in the setup section of the original rule.</li>
<li>Deploy the provided Sigma rules to your SIEM to detect suspicious remote registry access attempts utilizing SeBackupPrivilege, and tune them for your environment.</li>
<li>Review and restrict the use of SeBackupPrivilege to only those accounts that absolutely require it for legitimate backup operations, minimizing the potential attack surface.</li>
<li>Investigate any alerts generated by these detections promptly to determine the scope of the compromise and take appropriate remediation steps.</li>
<li>Monitor for Event ID 5145 with RelativeTargetName containing &ldquo;winreg&rdquo; along with Event ID 4672 with SeBackupPrivilege to identify potential credential access attempts (see the original rule&rsquo;s <code>query</code> field).</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>credential-access</category><category>lateral-movement</category><category>windows</category></item><item><title>Suspicious RDP Client Image Load</title><link>https://feed.craftedsignal.io/briefs/2024-01-suspicious-rdp-client-imageload/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-suspicious-rdp-client-imageload/</guid><description>The rule detects suspicious loading of the Remote Desktop Services ActiveX Client (mstscax.dll) from unusual locations, potentially indicating RDP lateral movement on Windows systems.</description><content:encoded><![CDATA[<p>This detection identifies suspicious instances of the Remote Desktop Services ActiveX Client (mstscax.dll) being loaded from unusual or unauthorized locations on Windows systems. Attackers may leverage RDP lateral movement techniques by loading this DLL in unauthorized contexts to gain access and control over other systems within the network. The rule focuses on detecting anomalous loading patterns of mstscax.dll outside typical system paths, which can be indicative of malicious lateral movement attempts. This detection is applicable to environments using Elastic Defend and Sysmon.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker compromises a system within the network.</li>
<li>The attacker attempts to move laterally using RDP.</li>
<li>To facilitate the RDP connection, the attacker executes a process that loads the mstscax.dll.</li>
<li>The mstscax.dll is loaded from a location outside the standard system paths (e.g., not from C:\Windows\System32).</li>
<li>The system logs the image load event, capturing the process and the location from which mstscax.dll was loaded.</li>
<li>The detection rule identifies the unusual loading of mstscax.dll based on the configured criteria.</li>
<li>The attacker establishes a remote desktop session to a target system.</li>
<li>The attacker gains control over the target system, enabling further malicious activities.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack can allow unauthorized access to sensitive systems and data, leading to potential data breaches, financial losses, and reputational damage. Lateral movement via RDP can allow attackers to expand their control within the network, compromising additional systems and escalating the impact of the attack. Early detection of suspicious mstscax.dll loading can prevent further propagation of the attack.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Suspicious RDP Client Image Load</code> to your SIEM and tune the <code>process.executable</code> exclusions for your environment to reduce false positives.</li>
<li>Enable Sysmon Event ID 7 (Image Loaded) to capture the necessary data for the Sigma rule <code>Suspicious RDP Client Image Load</code> to function.</li>
<li>Review the process executable path in alerts to determine if <code>mstscax.dll</code> was loaded from an unusual or unauthorized location.</li>
<li>Investigate the network connections associated with the process to identify any suspicious remote connections or lateral movement attempts as described in the Overview.</li>
<li>Implement network segmentation to limit the ability of adversaries to move laterally within the network as described in the Overview.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>lateral-movement</category><category>threat-detection</category><category>windows</category></item><item><title>Spike in Remote File Transfers via Lateral Movement</title><link>https://feed.craftedsignal.io/briefs/2024-01-spike-remote-file-transfers/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-spike-remote-file-transfers/</guid><description>A machine learning job detects an abnormal volume of remote file transfers, potentially indicating lateral movement by attackers attempting to blend in with normal network egress activity.</description><content:encoded><![CDATA[<p>The &ldquo;Spike in Remote File Transfers&rdquo; detection identifies potential lateral movement activity within a network by monitoring for unusual volumes of remote file transfers. Attackers often aim to locate and exfiltrate valuable information after gaining initial access. To evade detection, they may attempt to mimic normal egress activity through numerous small transfers. This detection leverages machine learning to establish a baseline of normal transfer activity and identify deviations that may indicate malicious behavior. The rule requires the Lateral Movement Detection integration assets to be installed. For Elastic Defend events on versions 8.18 and above, <code>host.ip</code> collection must be enabled.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial Access: An attacker gains initial access to a host within the network through an exploit or compromised credentials.</li>
<li>Internal Reconnaissance: The attacker performs internal reconnaissance to identify valuable data and potential target systems.</li>
<li>Lateral Movement: The attacker uses stolen credentials or exploits remote services (T1210) to gain access to other systems on the network.</li>
<li>Tool Transfer: The attacker transfers malicious tools or scripts (T1570) to the compromised systems to facilitate further actions.</li>
<li>Data Collection: The attacker gathers sensitive data from the compromised systems.</li>
<li>Egress Activity: The attacker initiates numerous small remote file transfers, attempting to blend in with normal network traffic.</li>
<li>Data Exfiltration: The attacker exfiltrates the stolen data to an external location.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful lateral movement attack involving anomalous file transfers can lead to data exfiltration, intellectual property theft, and reputational damage. Even though the severity is low, undetected lateral movement can escalate quickly into high severity incidents like ransomware or data breaches. This detection focuses on the early stages of lateral movement, allowing security teams to respond before significant damage occurs.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Ensure host IP collection is enabled in Elastic Defend configurations, following the steps in the <a href="https://www.elastic.co/docs/solutions/security/configure-elastic-defend/configure-data-volume-for-elastic-endpoint#host-fields">helper guide</a>.</li>
<li>Install the Lateral Movement Detection integration assets as described in the setup instructions in the rule documentation.</li>
<li>Investigate alerts generated by the &ldquo;Spike in Remote File Transfers&rdquo; rule, paying close attention to the source and destination of the file transfers.</li>
<li>Review authentication logs for signs of compromised accounts, such as unusual login times or locations, as described in the rule&rsquo;s triage notes.</li>
<li>Tune the machine learning job&rsquo;s anomaly threshold based on your environment&rsquo;s baseline activity and false positive analysis.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>lateral-movement</category><category>machine-learning</category></item><item><title>SMB Registry Hive Exfiltration</title><link>https://feed.craftedsignal.io/briefs/2024-01-smb-registry-exfiltration/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-smb-registry-exfiltration/</guid><description>Detection of medium-sized registry hive files being created or modified on Server Message Block (SMB) shares, potentially indicating exfiltration of Security Account Manager (SAM) data for credential extraction.</description><content:encoded><![CDATA[<p>This threat brief addresses the potential exfiltration of Windows registry hives via SMB shares, a tactic often employed after credential dumping. Attackers target sensitive hives like the Security Account Manager (SAM) to extract cached credentials. By copying these hives to an attacker-controlled system, they evade local host-based detection and facilitate offline credential decryption. The Elastic detection rule <code>a4c7473a-5cb4-4bc1-9d06-e4a75adbc494</code> identifies the creation or modification of registry hive files (identified by the &ldquo;regf&rdquo; header) exceeding 30KB on SMB shares, specifically when performed by the SYSTEM process (PID 4) under a user context associated with system accounts (S-1-5-21 or S-1-12-1). This behavior raises suspicion, particularly when observed outside expected file paths. Defenders should monitor for this activity as it often precedes lateral movement and further compromise.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains initial access to a Windows system.</li>
<li>The attacker elevates privileges to SYSTEM or a similar high-privilege account.</li>
<li>The attacker executes a credential dumping tool (e.g., <code>reg save HKLM\SAM sam.hive</code>) to extract the SAM registry hive.</li>
<li>The attacker executes <code>reg save HKLM\SYSTEM system.hive</code> to extract the SYSTEM registry hive, enabling decryption of SAM secrets.</li>
<li>The attacker connects to a remote SMB share (e.g., <code>\\attacker.example.com\share</code>) from the compromised host.</li>
<li>The SYSTEM process (PID 4) creates or modifies a file on the SMB share, identified as a registry hive by its header (&ldquo;regf&rdquo;).</li>
<li>The exfiltrated registry hive file is larger than 30KB, bypassing size-based filtering.</li>
<li>The attacker utilizes the exfiltrated SAM and SYSTEM hives to extract user credentials offline, facilitating lateral movement or further malicious activities.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exfiltration of registry hives can lead to widespread credential compromise, enabling attackers to move laterally within the network, access sensitive data, and potentially achieve domain dominance. The impact includes unauthorized access to critical systems, data breaches, and significant disruption of business operations. The number of affected systems directly correlates with the scope of credential access achieved by the attacker.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Elastic detection rule <code>a4c7473a-5cb4-4bc1-9d06-e4a75adbc494</code> or the Sigma rules provided in this brief to your SIEM and tune for your environment to detect registry hive exfiltration attempts.</li>
<li>Enable file creation and modification logging on SMB shares, specifically focusing on events associated with the SYSTEM process and registry hive file signatures, to increase visibility.</li>
<li>Review and harden SMB share permissions to restrict unauthorized access and prevent credential dumping from remote systems.</li>
<li>Investigate any alerts generated by these rules promptly, focusing on identifying the source host, the user account involved, and the destination SMB share.</li>
<li>Implement multi-factor authentication (MFA) for all user accounts to mitigate the impact of credential theft.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>credential-access</category><category>lateral-movement</category><category>exfiltration</category><category>windows</category></item><item><title>Remote Registry Lateral Movement via RPC Firewall</title><link>https://feed.craftedsignal.io/briefs/2024-01-remote-registry-lateral-movement/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-remote-registry-lateral-movement/</guid><description>This brief details detection of lateral movement attempts using remote RPC calls to modify the registry, potentially leading to code execution, detected via RPC Firewall logs.</description><content:encoded><![CDATA[<p>This threat brief focuses on detecting lateral movement attempts that leverage remote procedure calls (RPC) to modify registry keys on target systems. The technique abuses the remote registry protocol to achieve persistence or execute arbitrary code. Defenders can use RPC Firewall logs to identify and block this activity, specifically by monitoring for calls to the Registry Remote Protocol (MS-RRP) interface with specific operation numbers indicative of registry manipulation. This activity is often associated with post-exploitation phases, where attackers attempt to gain a foothold and expand their control within a network. The RPC Firewall detailed in this brief allows for monitoring and blocking of this behavior.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to a system within the network (e.g., through phishing or exploiting a vulnerability).</li>
<li>The attacker discovers accessible target systems on the network.</li>
<li>The attacker attempts to connect to the target system&rsquo;s RPC endpoint for the Remote Registry service (UUID 338cd001-2244-31f1-aaaa-900038001003).</li>
<li>The attacker uses RPC calls with operation numbers 6, 7, 8, 13, 18, 19, 21, 22, 23, or 35 to interact with the registry remotely.</li>
<li>The attacker modifies registry keys related to startup programs or services.</li>
<li>The attacker triggers the execution of malicious code through the modified registry keys, achieving persistence.</li>
<li>The malicious code executes, allowing the attacker to perform actions such as data exfiltration or further lateral movement.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to achieve persistence, escalate privileges, and move laterally within the network. This can lead to data theft, system compromise, and disruption of services. If lateral movement succeeds, attackers can gain control over critical assets, leading to significant financial and reputational damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Install and configure RPC Firewall on all critical systems, auditing RPC calls to the Registry Remote Protocol interface (UUID 338cd001-2244-31f1-aaaa-900038001003) as described in the <code>definition</code> within the <code>logsource</code> section.</li>
<li>Deploy the provided Sigma rule to your SIEM to detect anomalous RPC calls related to registry modification as outlined in the <code>detection</code> section.</li>
<li>Investigate and block any identified malicious RPC connections using RPC Firewall based on the logs generated and reviewed from the deployed Sigma rule.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>lateral-movement</category><category>defense-impairment</category><category>persistence</category><category>rpc</category></item><item><title>Netsh Used to Enable Remote Desktop Protocol (RDP) in Windows Firewall</title><link>https://feed.craftedsignal.io/briefs/2024-01-netsh-rdp-enable/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-netsh-rdp-enable/</guid><description>Adversaries may use the `netsh.exe` utility to enable inbound Remote Desktop Protocol (RDP) connections in the Windows Firewall, potentially allowing unauthorized remote access to compromised systems.</description><content:encoded><![CDATA[<p>Attackers can leverage the native Windows command-line tool <code>netsh.exe</code> to modify Windows Firewall rules and enable inbound Remote Desktop Protocol (RDP) connections. This can be used as a defense evasion technique to bypass existing firewall restrictions, allowing them to establish remote access to a compromised host. Ransomware operators and other malicious actors frequently utilize RDP to access victim servers, often using privileged accounts, to further their objectives. This activity can be conducted post-compromise to facilitate lateral movement and the deployment of malicious payloads. The behavior was observed being detected by Elastic Defend, Microsoft Defender XDR, SentinelOne Cloud Funnel, and Crowdstrike.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker compromises a Windows host through initial access methods (e.g., phishing, exploitation of a vulnerability).</li>
<li>The attacker gains a foothold on the system and escalates privileges as needed.</li>
<li>The attacker executes <code>netsh.exe</code> with specific arguments to modify the Windows Firewall configuration.</li>
<li>The <code>netsh</code> command creates or modifies an inbound rule to allow RDP traffic (TCP port 3389).</li>
<li>The attacker establishes an RDP connection to the compromised host.</li>
<li>The attacker uses the RDP session to perform reconnaissance, move laterally, or deploy malware.</li>
<li>The attacker may attempt to disable or modify security tools to further evade detection.</li>
<li>The attacker achieves their objective, such as data exfiltration or ransomware deployment.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this technique can lead to unauthorized remote access to systems, enabling lateral movement, data theft, and ransomware deployment. If RDP is enabled on a large number of systems, the attacker can move laterally through the environment. The impact can range from data breaches to complete operational disruption.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor process creation events for <code>netsh.exe</code> executing with arguments related to enabling inbound RDP traffic using the &ldquo;Remote Desktop Enabled in Windows Firewall by Netsh&rdquo; rule.</li>
<li>Implement the Sigma rule provided below to detect instances of <code>netsh.exe</code> being used to modify firewall rules related to RDP.</li>
<li>Enforce the principle of least privilege and restrict the use of <code>netsh.exe</code> to authorized personnel only.</li>
<li>Review existing firewall rules and remove any unnecessary or overly permissive rules.</li>
<li>Enable Sysmon process creation logging for enhanced visibility into process execution events.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>lateral-movement</category><category>windows</category><category>netsh</category><category>rdp</category></item><item><title>Mounting of Hidden or WebDav Remote Shares via Net Utility</title><link>https://feed.craftedsignal.io/briefs/2024-01-02-mount-remote-shares/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-02-mount-remote-shares/</guid><description>Adversaries may leverage the `net.exe` utility to mount WebDav or hidden remote shares, potentially indicating lateral movement, data exfiltration preparation, or initial access via discovery of accessible shares.</description><content:encoded><![CDATA[<p>The threat involves the abuse of the legitimate Windows <code>net.exe</code> utility to mount remote shares, including hidden (e.g., administrative shares) and WebDav shares. This activity may signal lateral movement within a network, preparation for data exfiltration, or initial access through reconnaissance of available network resources. The detection focuses on identifying specific command-line patterns used with <code>net.exe</code> to mount these shares. While the primary data source for the detection rule is Elastic Defend, it also supports data from CrowdStrike, Microsoft Defender XDR, SentinelOne Cloud Funnel, Sysmon, and Windows Security Event Logs. This activity can be masked within normal administrative functions, so tuning and baselining are important.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a compromised system through various means (e.g., phishing, exploiting a vulnerability).</li>
<li>The attacker executes <code>net.exe</code> or <code>net1.exe</code> to discover available network shares, identifying potential targets for lateral movement or data exfiltration.</li>
<li>The attacker uses <code>net.exe</code> to attempt to mount a hidden or WebDav share, often using stolen credentials or exploiting existing permissions. The command includes <code>use</code> and specifies a share path like <code>\\\\&lt;server&gt;\&lt;share&gt;</code> or <code>http(s)://&lt;server&gt;/&lt;share&gt;</code>.</li>
<li>If successful, the attacker gains access to the remote share, potentially browsing its contents to identify valuable data or resources.</li>
<li>The attacker copies sensitive data from the remote share to the compromised system.</li>
<li>The attacker stages the exfiltrated data on the compromised system, preparing it for transfer to an external location.</li>
<li>The attacker uses another tool or protocol (e.g., FTP, SCP, web upload) to exfiltrate the data to a destination controlled by the attacker.</li>
<li>The attacker cleans up any traces of their activity on the compromised system and the remote share, attempting to avoid detection.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation could lead to unauthorized access to sensitive data, lateral movement to other systems, and ultimately, data exfiltration. The mounting of hidden shares gives the attacker the ability to move laterally and escalate their privileges. Depending on the data stored on the shares, data breaches and financial losses are possible. Targeted sectors are broad, as <code>net.exe</code> is a standard Windows utility.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the &ldquo;Mounting Hidden or WebDav Remote Shares&rdquo; rule to your SIEM, tuning it for your environment to minimize false positives and detect suspicious activity.</li>
<li>Enable Sysmon process creation logging (Event ID 1) to capture detailed information about process executions, including <code>net.exe</code> and its command-line arguments as outlined in the rule description.</li>
<li>Investigate and validate any alerts generated by the &ldquo;Mounting Hidden or WebDav Remote Shares&rdquo; rule, focusing on the process details, arguments, and associated user accounts, as suggested in the rule&rsquo;s triage and analysis section.</li>
<li>Implement network segmentation to limit lateral movement possibilities, mitigating the potential impact of successful share mounting as mentioned in the response and remediation steps.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>lateral-movement</category><category>data-exfiltration</category><category>windows</category></item><item><title>Kubeletctl Execution Inside Container Detected</title><link>https://feed.craftedsignal.io/briefs/2024-01-kubeletctl-container-execution/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-kubeletctl-container-execution/</guid><description>This rule detects the execution of kubeletctl inside a container, which can be used to enumerate the Kubelet API or other resources inside the container, potentially indicating lateral movement attempts within the pod.</description><content:encoded><![CDATA[<p>This rule detects the execution of <code>kubeletctl</code> inside a container. Kubeletctl is a command-line tool that interacts with the Kubelet API directly, making the often undocumented API more accessible. Attackers may use it to enumerate the Kubelet API or other resources within the container, potentially indicating lateral movement within the pod. The detection is based on the &ldquo;Defend for Containers&rdquo; integration (version 9.3.0 and later) within the Elastic stack. This activity is significant because <code>kubeletctl</code> can expose pod and node details, enabling actions that facilitate discovery and lateral movement from a compromised container.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a container, possibly through a vulnerability in the containerized application or a misconfigured Kubernetes environment.</li>
<li>The attacker executes <code>kubeletctl</code> inside the compromised container. This could be facilitated by the tool being present in the container image or downloaded post-compromise.</li>
<li>The attacker uses <code>kubeletctl scan</code> to discover Kubelet endpoints within the Kubernetes cluster.</li>
<li>The attacker leverages <code>kubeletctl pods</code> or <code>kubeletctl runningpods</code> to enumerate running pods and their details.</li>
<li>The attacker uses the discovered pod information to identify potential targets for lateral movement.</li>
<li>The attacker attempts to use <code>kubeletctl exec</code> or <code>kubeletctl attach</code> to gain access to other pods within the cluster.</li>
<li>The attacker attempts to port forward using <code>kubeletctl portForward</code> to establish connections to services running in other pods.</li>
<li>Upon successful lateral movement, the attacker performs further reconnaissance or deploys malicious payloads to achieve their objectives, such as data exfiltration or denial-of-service.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful execution of <code>kubeletctl</code> within a container can lead to the exposure of sensitive information about the Kubernetes cluster, including pod details and internal network configurations. This can enable attackers to move laterally within the cluster, potentially compromising other applications and data. The impact could range from data breaches and service disruptions to full cluster compromise depending on the attacker&rsquo;s objectives and the scope of the compromised container&rsquo;s access.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule to your SIEM to detect the execution of <code>kubeletctl</code> within containers based on process name and arguments.</li>
<li>Monitor container network activity for connections to node addresses on Kubelet ports (commonly 10250/10255) and investigate any suspicious patterns.</li>
<li>Implement network policies to restrict pod-to-node access to the Kubelet API.</li>
<li>Harden container images by removing unnecessary tools like <code>kubeletctl</code> and enforce least privilege principles.</li>
<li>Enable and review Kubernetes audit logs to identify the source of interactive sessions into containers, correlating with timestamps of <code>kubeletctl</code> execution.</li>
<li>Enforce Pod Security Standards to restrict privileged pods and limit node API exposure.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>container</category><category>kubeletctl</category><category>lateral-movement</category><category>execution</category></item><item><title>Impossible Travel Detection in Azure AD</title><link>https://feed.craftedsignal.io/briefs/2024-01-impossible-travel/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-impossible-travel/</guid><description>This brief describes the detection of 'impossible travel' events in Azure AD, where a user appears to log in from geographically distant locations within an implausibly short time frame, potentially indicating account compromise.</description><content:encoded><![CDATA[<p>This rule detects &ldquo;impossible travel&rdquo; events within Azure Active Directory (Azure AD), a common indicator of account compromise. The scenario involves a user account exhibiting login activity from two geographically distant locations in a timeframe that makes physical travel between them impossible. This anomalous behavior often signifies that an attacker has gained unauthorized access to the account and is operating from a different location than the legitimate user. The rule leverages Azure AD Identity Protection&rsquo;s risk detection capabilities to identify such instances. This detection is crucial for defenders as it highlights potential breaches and enables swift remediation actions to prevent further damage.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a user&rsquo;s credentials, potentially through phishing (T1566), credential stuffing, or malware.</li>
<li>The attacker authenticates to Azure AD from a geographic location different from the legitimate user&rsquo;s typical location.</li>
<li>Shortly after the initial authentication, the legitimate user authenticates to Azure AD from their usual location.</li>
<li>Azure AD Identity Protection flags the activity as &ldquo;impossible travel&rdquo; due to the conflicting geographic locations and the short timeframe between the authentications.</li>
<li>The &ldquo;impossibleTravel&rdquo; risk event is logged within Azure AD&rsquo;s risk detection logs.</li>
<li>The attacker may attempt to escalate privileges within the compromised account (T1068) to gain broader access to resources.</li>
<li>The attacker may move laterally within the organization (T1021) to access sensitive data or systems.</li>
<li>The attacker&rsquo;s ultimate goal could be data exfiltration, financial theft, or disruption of services, depending on the organization&rsquo;s profile.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful &ldquo;impossible travel&rdquo; attack can lead to a full compromise of the user&rsquo;s account, granting the attacker access to sensitive data, internal systems, and other resources accessible to the user. Depending on the user&rsquo;s role and permissions, the impact could range from data breaches to financial losses and significant reputational damage. Organizations in all sectors are vulnerable, with a higher risk for those handling sensitive data or operating critical infrastructure. The number of affected users depends on the attacker&rsquo;s ability to move laterally and escalate privileges after compromising the initial account.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule to your SIEM to detect &ldquo;impossible travel&rdquo; events flagged by Azure AD Identity Protection, focusing on the <code>riskEventType: 'impossibleTravel'</code> (logsource: azure, service: riskdetection).</li>
<li>Investigate any triggered alerts promptly, focusing on the user account involved and the geographic locations of the login attempts (logsource: azure, service: riskdetection).</li>
<li>Review and enhance user training programs to educate employees on the risks of phishing and credential compromise (T1566).</li>
<li>Implement multi-factor authentication (MFA) for all users to mitigate the risk of unauthorized access even if credentials are compromised (T1110).</li>
<li>Review and adjust the sensitivity of Azure AD Identity Protection&rsquo;s risk detection policies to align with your organization&rsquo;s risk tolerance.</li>
<li>Consider implementing conditional access policies that restrict access based on geographic location or require MFA for logins from unfamiliar locations.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>azuread</category><category>identity-protection</category><category>impossible-travel</category><category>account-compromise</category><category>lateral-movement</category></item><item><title>Remote Execution of Windows Services via RPC</title><link>https://feed.craftedsignal.io/briefs/2024-01-remote-service-execution/</link><pubDate>Tue, 02 Jan 2024 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-remote-service-execution/</guid><description>Detection of remote execution of Windows services over RPC by correlating `services.exe` network connections and spawned child processes, potentially indicating lateral movement.</description><content:encoded><![CDATA[<p>This detection rule identifies the remote execution of Windows services over Remote Procedure Call (RPC), a technique often employed for lateral movement within a network. The rule focuses on correlating network connections initiated by <code>services.exe</code> with subsequent child process creation events. While this activity can be a legitimate function of administrators using remote management tools, it also represents a potential attack vector. The rule aims to strike a balance between detecting malicious activity and minimizing false positives arising from routine administrative tasks. The detection logic is based on identifying network connections to <code>services.exe</code> followed by the creation of child processes that are not commonly associated with legitimate service management. The rule requires the use of Elastic Defend or Sysmon for adequate logging coverage.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a system within the network.</li>
<li>The attacker attempts to move laterally to other systems.</li>
<li>The attacker establishes a connection to the target system&rsquo;s <code>services.exe</code> process over RPC using a high port (&gt;= 49152).</li>
<li>The attacker uses the established RPC connection to create or start a new service on the remote system.</li>
<li>The <code>services.exe</code> process on the remote system spawns a child process related to the newly created or started service.</li>
<li>This new process executes the attacker&rsquo;s payload, potentially granting further access or executing malicious commands.</li>
<li>The attacker leverages the newly executed service for persistent access or further lateral movement.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack could result in unauthorized access to sensitive data, disruption of critical services, or the deployment of ransomware. Lateral movement allows attackers to compromise multiple systems within the network, escalating the impact of the initial breach. Due to the nature of the technique, it can be challenging to distinguish between legitimate administrative activity and malicious actions, leading to delayed detection and increased dwell time for attackers.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rules to your SIEM and tune the filters for known-good executables in your environment to reduce false positives.</li>
<li>Enable Sysmon process-creation (Event ID 1) and network connection (Event ID 3) logging to ensure the required data for the Sigma rules is available.</li>
<li>Investigate any alerts triggered by these rules, focusing on the parent process and network connection details associated with the spawned child process.</li>
<li>Consider excluding known remote management tools from triggering the detection by adding exceptions based on <code>process.executable</code> or <code>process.args</code> in the Sigma rules.</li>
<li>Monitor the network for unusual RPC activity, especially connections to <code>services.exe</code> from unexpected source IPs.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>lateral-movement</category><category>execution</category><category>windows</category></item><item><title>High Variance in RDP Session Duration Detected via Machine Learning</title><link>https://feed.craftedsignal.io/briefs/2024-01-high-rdp-variance/</link><pubDate>Tue, 02 Jan 2024 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-high-rdp-variance/</guid><description>A machine learning job has detected unusually high variance of RDP session duration, potentially indicating lateral movement and session persistence by threat actors.</description><content:encoded><![CDATA[<p>This threat brief addresses the detection of high variance in Remote Desktop Protocol (RDP) session durations using machine learning. The detection, implemented in Elastic Security&rsquo;s Lateral Movement Detection integration, aims to identify anomalous RDP usage patterns that may indicate malicious activity. Adversaries might establish long RDP sessions to maintain persistence and move laterally within a network. The prebuilt Elastic ML job &ldquo;lmd_high_var_rdp_session_duration_ea&rdquo; analyzes RDP session data to identify unusual deviations in session lengths, which could signify unauthorized access or malicious exploitation of compromised systems. The rule is triggered when the anomaly score exceeds a threshold of 70. Defenders should investigate any alerts generated by this rule to determine if the RDP sessions are legitimate or indicative of malicious activity.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial Access: An attacker gains initial access to a system via phishing or exploiting a vulnerability (not detailed in the source).</li>
<li>RDP Enabled: The attacker enables RDP on the compromised host or utilizes existing RDP configurations.</li>
<li>Credential Theft: The attacker steals credentials from the initially compromised system (not detailed in the source).</li>
<li>Lateral Movement: Using the stolen credentials, the attacker establishes an RDP session to another host within the network.</li>
<li>Session Persistence: The attacker maintains a long and variable RDP session to the target host, potentially evading detection mechanisms.</li>
<li>Privilege Escalation: The attacker attempts to escalate privileges on the target host to gain further control (not detailed in the source).</li>
<li>Data Exfiltration/Malware Deployment: The attacker uses the established RDP session to exfiltrate sensitive data or deploy malware to other systems (not detailed in the source).</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to unauthorized access to sensitive data, lateral movement within the network, and potential deployment of malware or ransomware. While the exact number of potential victims is unknown, organizations that heavily rely on RDP for remote access are particularly vulnerable. This can disrupt business operations, lead to data breaches, and cause significant financial losses. The low severity of this rule reflects its nature as an anomaly detection rather than a signature-based detection of confirmed malicious activity.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Ensure <code>host.ip</code> field is populated for Elastic Defend events by following the <a href="https://www.elastic.co/docs/solutions/security/configure-elastic-defend/configure-data-volume-for-elastic-endpoint#host-fields">helper guide</a>.</li>
<li>Install the Lateral Movement Detection integration assets as described in the setup section of the rule.</li>
<li>Review and tune the anomaly threshold in the &ldquo;High Variance in RDP Session Duration&rdquo; rule in Elastic to minimize false positives based on your environment.</li>
<li>Investigate any alerts generated by the &ldquo;High Variance in RDP Session Duration&rdquo; rule by following the triage steps outlined in the rule&rsquo;s note section.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>lateral-movement</category><category>threat-detection</category><category>windows</category></item></channel></rss>