<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Reverse-Proxy — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/reverse-proxy/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 03 Jan 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/reverse-proxy/feed.xml" rel="self" type="application/rss+xml"/><item><title>Potential Cloudflared Network Tunnel Detection</title><link>https://feed.craftedsignal.io/briefs/2024-01-cloudflared-tunnel/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-cloudflared-tunnel/</guid><description>This brief detects network connection events associated with the Cloudflared tool, used to create tunnels via Cloudflare, potentially for unauthorized access or exfiltration, by establishing outbound connections to Cloudflare Edge Servers.</description><content:encoded><![CDATA[<p>Cloudflared is a tool that creates secure tunnels through Cloudflare&rsquo;s network, similar in function to ngrok. Attackers can abuse Cloudflared to establish stealthy connections to compromised systems, bypassing traditional network security controls. The tool creates an outbound connection over HTTPS (HTTP2/QUIC) to Cloudflare Edge Servers. The tunnel controller then makes services or private networks accessible, potentially enabling data exfiltration or remote access without direct exposure of the target system. This technique has been observed in the wild, where threat actors leverage Cloudflare tunnels to mask their activities. Detecting Cloudflared connections can be challenging due to the legitimate use of the tool, but monitoring network connections for specific patterns can help identify potentially malicious activity.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to a target system, potentially through phishing or exploitation of a vulnerability.</li>
<li>The attacker downloads and installs the Cloudflared tool on the compromised system.</li>
<li>The attacker configures Cloudflared to create a tunnel to a Cloudflare Edge Server, specifying a local service or port to forward.</li>
<li>Cloudflared establishes an outbound connection to Cloudflare over HTTPS (HTTP2/QUIC) on port 7844.</li>
<li>The attacker uses the Cloudflare tunnel to access internal resources or exfiltrate data from the compromised system, bypassing traditional network security controls.</li>
<li>The attacker maintains persistent access through the Cloudflare tunnel, enabling ongoing command and control.</li>
<li>The attacker may use the tunnel to proxy connections to other internal systems, further expanding their reach within the network.</li>
<li>The attacker achieves their objective, such as data theft, ransomware deployment, or disruption of services.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to unauthorized access to internal resources, data exfiltration, and potential compromise of sensitive information. The use of Cloudflare tunnels makes it difficult to trace the attacker&rsquo;s origin, hindering incident response efforts. Abuse of Cloudflared may lead to full system compromise, intellectual property theft, and reputational damage. While no specific victim counts or sector targeting is identified in this source, the increasing abuse of Cloudflare tunnels by hackers is noted by BleepingComputer.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the &ldquo;Detect Potential Cloudflared Network Tunnel&rdquo; Sigma rule to your SIEM and tune it for your environment, focusing on <code>Network_Traffic.All_Traffic</code> data model, dest_port 7844, and associated network connection details.</li>
<li>Implement Sysmon Event ID 3 (Network Connect) logging to provide the data necessary for the provided Sigma rule.</li>
<li>Filter alerts generated by the Sigma rule based on known and approved Cloudflared deployments within the organization to reduce false positives, as noted in the &ldquo;known_false_positives&rdquo; section.</li>
<li>Review network connection logs for outbound connections to Cloudflare Edge Servers on destination port 7844, as highlighted in the attack chain, to identify potential unauthorized Cloudflared usage.</li>
<li>Investigate endpoints exhibiting suspicious network connection behavior involving Cloudflared, focusing on process ancestry and command-line arguments.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>cloudflared</category><category>reverse-proxy</category><category>tunneling</category><category>network-tunnel</category></item><item><title>Potential Abuse of Cloudflare Tunnels via Cloudflared</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-cloudflared-tunnel-execution/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-cloudflared-tunnel-execution/</guid><description>Attackers are increasingly abusing Cloudflare tunnels, created via the cloudflared client, for establishing stealthy command and control channels and evading network defenses by proxying traffic through Cloudflare's infrastructure.</description><content:encoded><![CDATA[<p>Cloudflared is a legitimate tool used to create secure tunnels through the Cloudflare network, providing access to services or private networks behind a firewall without opening inbound ports. Attackers are abusing cloudflared in a similar fashion to ngrok, to establish reverse tunnels, creating stealthy command and control (C2) channels. By leveraging Cloudflare&rsquo;s infrastructure, attackers can effectively mask their malicious traffic, making it difficult to detect and block. This technique has been observed in the wild with increasing frequency, posing a significant challenge to traditional network security monitoring. Defenders should monitor for suspicious cloudflared command-line arguments and network activity.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to a compromised system, often through phishing or exploiting a vulnerability.</li>
<li>The attacker downloads the cloudflared client onto the compromised system. This can be achieved through various methods, including PowerShell or command-line execution.</li>
<li>The attacker executes the cloudflared client with specific command-line arguments to establish a tunnel. This includes specifying a run token, a URL pointing to a local service (localhost), or a pre-configured tunnel configuration.</li>
<li>Cloudflared establishes an outbound connection to Cloudflare&rsquo;s edge servers over HTTPS (HTTP2/QUIC), creating a tunnel controller.</li>
<li>The attacker proxies traffic through the Cloudflare tunnel to a command and control (C2) server, masking the origin of the traffic.</li>
<li>The attacker uses the established tunnel for various malicious activities, such as data exfiltration, lateral movement, or deploying ransomware.</li>
<li>The attacker maintains persistence by configuring cloudflared to run automatically on system startup or through scheduled tasks.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to establish persistent, stealthy command and control channels, bypassing traditional network security controls. This can lead to data exfiltration, ransomware deployment, and other malicious activities. The abuse of Cloudflare tunnels makes it difficult to trace the origin of the attack, hindering incident response efforts. Without proper detection, organizations may be unaware of the presence of malicious actors within their network.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor process creation events (Sysmon EventID 1, Windows Event Log Security 4688) for command-line arguments associated with cloudflared execution, specifically looking for &ldquo;tunnel&rdquo;, &ldquo;run&rdquo;, &ldquo;token&rdquo;, &ldquo;&ndash;url&rdquo;, and &ldquo;localhost&rdquo; (see the provided Splunk search query).</li>
<li>Implement the provided Sigma rules to detect suspicious cloudflared tunnel execution based on command-line arguments.</li>
<li>Review and filter alerts generated by the Sigma rules based on approved usage and trusted users to reduce false positives, as legitimate DevOps or IT teams may use Cloudflared.</li>
<li>Inspect network connections for outbound traffic to Cloudflare&rsquo;s infrastructure originating from unusual or unauthorized processes to identify potential tunnel abuse.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cloudflare</category><category>reverse-proxy</category><category>tunnel</category><category>command-and-control</category></item><item><title>Microsoft Devtunnels Execution for Covert Communication</title><link>https://feed.craftedsignal.io/briefs/2024-01-devtunnels-execution/</link><pubDate>Wed, 03 Jan 2024 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-devtunnels-execution/</guid><description>The execution of Microsoft devtunnels.exe can be abused by attackers to expose compromised systems to the internet, establish covert communication channels, and bypass network security measures, facilitating data exfiltration or command-and-control.</description><content:encoded><![CDATA[<p>Microsoft Devtunnels, a feature within Visual Studio, enables developers to expose local development environments to the internet via secure tunnels. While designed for legitimate testing and debugging, attackers can abuse this functionality to establish covert communication channels from compromised systems. By executing <code>devtunnel.exe</code> or loading <code>devtunnel.dll</code>, an attacker can bypass network security measures and blend malicious activity with legitimate development traffic. This allows for remote access, data exfiltration, or command-and-control communications, making detection more challenging. This technique could be used to expose internal services or systems without proper authentication to the outside world, potentially leading to further compromise.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial compromise of a system via typical methods (e.g., phishing, exploit).</li>
<li>Attacker gains a foothold and establishes persistence on the compromised system.</li>
<li>Attacker executes <code>devtunnel.exe</code> or loads <code>devtunnel.dll</code>.</li>
<li>The Dev Tunnels feature is configured to expose a service or the entire system to the internet.</li>
<li>A secure, temporary tunnel is established, bypassing normal network security measures.</li>
<li>The attacker uses the tunnel to remotely access the compromised system.</li>
<li>Data exfiltration or command-and-control activities are performed through the tunnel.</li>
<li>The attacker maintains persistent access and control over the compromised system, blending their activities with legitimate development traffic.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to create covert communication channels, bypass network security measures, and exfiltrate sensitive data. The use of Dev Tunnels can make it difficult to detect malicious activity, as it blends in with legitimate development traffic. This can lead to prolonged access to compromised systems and significant data breaches. Lateral movement may be easier if internal services are exposed through the tunnel. The number of victims and the extent of the damage depend on the specific targets and the attacker&rsquo;s objectives.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Implement the Sigma rules provided in this brief to detect the execution of <code>devtunnel.exe</code> and the loading of <code>devtunnel.dll</code> within your environment.</li>
<li>Monitor process creation events (Sysmon EventID 1, Windows Event Log Security 4688, CrowdStrike ProcessRollup2) for the execution of <code>devtunnel.exe</code>.</li>
<li>Investigate any instances of <code>devtunnel.exe</code> execution, especially those originating from unusual locations or user accounts.</li>
<li>Filter alerts (as mentioned in the known_false_positives) for approved development environments and users to reduce false positives.</li>
<li>Enable Sysmon process-creation logging to ensure the effectiveness of the provided Sigma rules.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>devtunnels</category><category>reverse-proxy</category><category>command-and-control</category><category>defense-evasion</category><category>windows</category></item><item><title>Microsoft Devtunnels Image Load Detection</title><link>https://feed.craftedsignal.io/briefs/2024-01-02-devtunnels-image-load/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-02-devtunnels-image-load/</guid><description>This detection identifies potential misuse of Microsoft Devtunnels within Visual Studio by detecting image load events, indicating that an attacker could expose a compromised system or service to the internet for covert communication and data exfiltration.</description><content:encoded><![CDATA[<p>Microsoft Devtunnels, a feature within Visual Studio, allows developers to expose their local development environment to the internet through secure, temporary tunnels. While intended for legitimate purposes like testing webhooks and APIs, attackers can abuse this functionality. By exploiting Devtunnels, a malicious actor could expose a compromised system to the internet, establishing a covert communication channel that circumvents traditional network security measures. This unauthorized access enables data exfiltration, command-and-control (C2) communications, and further compromise of the environment while blending the malicious activity with legitimate development traffic. Defenders should monitor for anomalous image loads associated with Devtunnels to identify potential misuse.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker compromises a system within the target network.</li>
<li>Attacker installs or leverages an existing Visual Studio installation on the compromised system.</li>
<li>The attacker configures Microsoft Devtunnels to expose the compromised system to the internet. This may involve creating a new tunnel or hijacking an existing one.</li>
<li>A malicious DLL (devtunnel.dll) is loaded from the temp directory (<code>*\\AppData\\Local\\Temp\\.net\\devtunnel\\*</code>) to establish the tunnel.</li>
<li>The attacker uses the established Devtunnel to create a reverse proxy to bypass network security measures.</li>
<li>The attacker uses the Devtunnel for command and control, sending commands and receiving responses from the compromised system.</li>
<li>The attacker exfiltrates sensitive data from the compromised system through the Devtunnel.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of Microsoft Devtunnels can lead to significant security breaches. Attackers can establish persistent covert communication channels, exfiltrate sensitive data, and maintain long-term control over compromised systems. This can result in financial losses, reputational damage, and legal liabilities. The use of Devtunnels can bypass existing network security measures, making detection challenging and increasing the dwell time of attackers within the network.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Sysmon EventID 7 to monitor image load events, which is the data source for the provided detection rule.</li>
<li>Deploy the Sigma rule <code>Detect Devtunnels Image Load</code> to your SIEM and tune the filter <code>windows_devtunnels_image_loaded_filter</code> for your environment to reduce false positives from legitimate developer activity.</li>
<li>Monitor network traffic for connections associated with Devtunnels to identify potential covert communication channels.</li>
<li>Investigate any alerts triggered by the <code>Detect Devtunnels Image Load</code> rule, focusing on systems with development tools installed.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>devtunnels</category><category>reverse-proxy</category><category>command-and-control</category><category>data-exfiltration</category><category>windows</category></item></channel></rss>