<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Network-Traffic — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/network-traffic/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 02 May 2024 10:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/network-traffic/feed.xml" rel="self" type="application/rss+xml"/><item><title>Potential Data Exfiltration to Unusual Geographic Region via Machine Learning</title><link>https://feed.craftedsignal.io/briefs/2024-05-data-exfiltration-unusual-region/</link><pubDate>Thu, 02 May 2024 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-05-data-exfiltration-unusual-region/</guid><description>A machine learning job has detected potential data exfiltration activity to an unusual geographical region, specifically by region name, indicating exfiltration over command and control channels.</description><content:encoded><![CDATA[<p>This alert is triggered by a machine learning job, <code>ded_high_sent_bytes_destination_region_name_ea</code>, that detects data exfiltration to unusual geographical regions based on network traffic patterns. The Data Exfiltration Detection integration, including Elastic Defend and Network Packet Capture, is required for this detection to function. This integration analyzes network and file events to identify abnormalities in data transfer volumes to different geographical locations, specifically by region name. Anomalous traffic patterns, particularly those involving high volumes of data being sent to regions outside the organization&rsquo;s typical network activity, could indicate malicious actors attempting to exfiltrate sensitive data via command and control channels. This detection provides defenders with an early warning of potential data breaches. Version requirements: Elastic Stack version 9.4.0 or later is required to leverage the Entity Analytics (EA) fields.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial Access: An attacker gains initial access to a system within the network through various means, such as exploiting a vulnerability or using compromised credentials.</li>
<li>Command and Control: The attacker establishes a command and control (C2) channel to communicate with the compromised system.</li>
<li>Data Collection: The attacker identifies and collects sensitive data from various sources within the network.</li>
<li>Staging: The collected data is staged in a temporary location, compressed, and potentially encrypted for exfiltration.</li>
<li>Exfiltration: The attacker uses the C2 channel to transfer the staged data to an external location in an unusual geographic region.</li>
<li>Evasion: The attacker may attempt to obfuscate the data transfer by using techniques such as tunneling or encryption to avoid detection.</li>
<li>Cleanup: The attacker may attempt to remove traces of their activity, such as deleting logs or files, to hinder investigation.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful data exfiltration attack can result in the loss of sensitive information, including intellectual property, customer data, and financial records. The risk score for this rule is 21, which indicates a moderate level of risk. Detection of this activity allows security teams to quickly respond and mitigate the potential damage. Early detection helps prevent large-scale data breaches and minimizes the impact on the organization.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Ensure that the Data Exfiltration Detection integration assets are installed and properly configured, including Elastic Defend and Network Packet Capture (see Setup instructions in content).</li>
<li>Review the geo-location details flagged by the alert to determine if the region is indeed unusual for the organization&rsquo;s typical network traffic patterns (see Triage and Analysis in content).</li>
<li>Analyze the network traffic logs associated with the alert to identify the volume and type of data being transferred to the unusual region (see Triage and Analysis in content).</li>
<li>Implement geo-blocking measures to restrict data transfers to the identified unusual region, ensuring that only approved regions can communicate with the network (see Response and Remediation in content).</li>
<li>Deploy the Sigma rule below to detect processes initiating network connections to unusual regions based on the <code>DestinationGeoRegion</code> field.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>data-exfiltration</category><category>machine-learning</category><category>network-traffic</category></item><item><title>Detecting RPC Traffic to the Internet</title><link>https://feed.craftedsignal.io/briefs/2024-01-rpc-internet-access/</link><pubDate>Wed, 03 Jan 2024 14:27:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-rpc-internet-access/</guid><description>This brief focuses on detecting Remote Procedure Call (RPC) traffic originating from internal networks and reaching the public internet, which is indicative of potential initial access or backdoor activity.</description><content:encoded><![CDATA[<p>The Remote Procedure Call (RPC) protocol, while essential for legitimate system administration tasks such as remote maintenance and resource sharing within internal networks, poses a significant security risk when exposed to the internet. Threat actors frequently target and exploit RPC services as an initial access vector or to establish backdoors within compromised systems. This exposure allows attackers to remotely execute commands, move laterally within the network, and potentially exfiltrate sensitive data. This brief provides detection strategies to identify such anomalous RPC traffic, enabling security teams to proactively mitigate potential threats. The detection focuses on identifying TCP traffic to port 135 from internal IP ranges to external IP addresses.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker compromises a host within the internal network, potentially through phishing or exploiting a vulnerability.</li>
<li>The compromised host initiates an RPC connection to an external IP address on TCP port 135.</li>
<li>The attacker uses the RPC connection to enumerate network resources and identify potential targets for lateral movement.</li>
<li>Using the RPC connection, the attacker attempts to authenticate to other systems within the network.</li>
<li>Upon successful authentication, the attacker remotely executes commands on the target system via RPC.</li>
<li>The attacker installs malware or a backdoor on the target system for persistence.</li>
<li>The attacker leverages the established foothold to further propagate within the network, compromising additional systems.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of RPC services exposed to the internet can lead to a complete compromise of the internal network. Attackers can gain initial access, move laterally, exfiltrate sensitive data, deploy ransomware, or disrupt critical business operations. A single exposed RPC service can serve as a gateway for widespread damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Implement the provided Sigma rule to detect RPC traffic from internal IP ranges to external destinations on TCP port 135, focusing on network traffic logs.</li>
<li>Investigate any alerts generated by the Sigma rule, prioritizing systems exhibiting suspicious RPC activity (Sigma rule, logsource: network_connection).</li>
<li>Ensure that RPC services are not directly exposed to the internet. Implement firewall rules to restrict access to authorized internal IP ranges only.</li>
<li>Continuously monitor network traffic for anomalous RPC activity and correlate with other security events (logsource: network_connection).</li>
<li>Review and update firewall configurations to block unauthorized outbound connections on port 135 (logsource: firewall).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>network-traffic</category><category>initial-access</category><category>lateral-movement</category><category>rpc</category></item><item><title>Suspicious SMTP Activity on Port 26/TCP</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-smtp-port-26/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-smtp-port-26/</guid><description>This rule detects SMTP traffic on TCP port 26, an alternative to the standard port 25 that the BadPatch malware family has used for command and control of Windows systems.</description><content:encoded><![CDATA[<p>This detection rule identifies suspicious SMTP activity occurring over TCP port 26. While standard SMTP traffic typically uses port 25, port 26 is sometimes used as an alternative to avoid conflicts or restrictions. The BadPatch malware family has been known to leverage port 26 for command and control (C2) communications with compromised Windows systems. This activity is considered suspicious because legitimate uses of SMTP on port 26 are less common and can indicate malicious activity, such as covert C2 channels used by malware like BadPatch. The rule analyzes network traffic to detect SMTP communication occurring on this non-standard port, helping to identify potential infections or unauthorized network activity.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial infection occurs via an unspecified method (e.g., phishing, exploit).</li>
<li>Malware establishes a foothold on the compromised system.</li>
<li>Malware configures itself to use SMTP on port 26 for C2 communications.</li>
<li>The infected host initiates a TCP connection to a remote server on port 26.</li>
<li>The malware sends commands to the infected host over the SMTP connection on port 26.</li>
<li>The infected host executes the received commands.</li>
<li>The malware may exfiltrate data to the remote server over the SMTP connection on port 26.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Compromised systems may be remotely controlled by attackers, leading to data theft, malware propagation, or further malicious activities. The use of non-standard ports like 26 can help attackers evade detection. If successful, an attacker can maintain persistence and control over the compromised system.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect SMTP Traffic on TCP Port 26</code> to your SIEM and tune for your environment to detect potential command and control activity.</li>
<li>Investigate any network connections on TCP port 26 to identify potentially malicious SMTP traffic.</li>
<li>Review network traffic logs focusing on <code>network_traffic.flow</code> or <code>zeek.smtp</code> events to detect unusual patterns associated with TCP port 26.</li>
<li>Implement firewall rules to block unauthorized SMTP traffic on port 26.</li>
<li>Examine source and destination IP addresses of traffic on port 26, and correlate with threat intelligence sources to identify known malicious actors as per the references.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">threat</category><category>command-and-control</category><category>exfiltration</category><category>network-traffic</category></item><item><title>Large ICMP Traffic Detection</title><link>https://feed.craftedsignal.io/briefs/2024-01-large-icmp-traffic/</link><pubDate>Tue, 02 Jan 2024 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-large-icmp-traffic/</guid><description>This analytic identifies excessive ICMP traffic to external IP addresses exceeding 1,000 bytes, potentially indicating command and control activity, data exfiltration, or covert communication channels.</description><content:encoded><![CDATA[<p>This detection focuses on identifying anomalous ICMP (Internet Control Message Protocol) traffic indicative of malicious activity. ICMP is typically used for network diagnostics but can be abused for covert communication, data exfiltration, or command-and-control (C2) by threat actors. This analytic identifies ICMP traffic exceeding 1,000 bytes directed toward external IP addresses, filtering out internal networks. The detection logic leverages the Network_Traffic data model. Validated malicious instances may signal ICMP tunneling, unauthorized data transfer, or compromised endpoints. The data sources for this analytic include Palo Alto Network Traffic and Cisco Secure Access Firewall logs.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker compromises a host within the network.</li>
<li>The compromised host initiates ICMP traffic to an external IP address.</li>
<li>The ICMP traffic exceeds 1000 bytes, evading default network monitoring thresholds.</li>
<li>The attacker uses ICMP to tunnel data, bypassing normal data transfer protocols.</li>
<li>The compromised host uses ICMP for command and control, receiving instructions from the external attacker.</li>
<li>The attacker establishes a covert communication channel using ICMP, masking their activity within normal network traffic.</li>
<li>Sensitive data is exfiltrated via ICMP packets to the attacker-controlled external server.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation through large ICMP traffic can lead to data breaches, unauthorized access to internal resources, and the establishment of persistent command and control within the network. ICMP tunneling can bypass traditional security measures, allowing attackers to operate undetected. The impact of successful exploitation includes the potential compromise of sensitive data, disruption of network services, and financial loss.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect Large ICMP Traffic</code> to your SIEM and tune the byte threshold (currently 1000 bytes) based on your network baseline to minimize false positives.</li>
<li>Investigate any alerts generated by the <code>Detect Large ICMP Traffic</code> rule, focusing on the source and destination IPs involved.</li>
<li>Examine network traffic logs for patterns indicative of ICMP tunneling or covert communication channels, using the provided data sources.</li>
<li>Utilize the provided search <code>View the detection results</code> to review related events and potential lateral movement.</li>
<li>Implement the provided search <code>View risk events</code> to look at risk factors for the involved assets.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>network-traffic</category><category>command-and-control</category><category>data-exfiltration</category></item></channel></rss>