<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Rtr — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/rtr/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 09 Jan 2024 10:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/rtr/feed.xml" rel="self" type="application/rss+xml"/><item><title>Crowdstrike RTR Script Execution via PowerShell</title><link>https://feed.craftedsignal.io/briefs/2024-01-crowdstrike-rtr-script-execution/</link><pubDate>Tue, 09 Jan 2024 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-crowdstrike-rtr-script-execution/</guid><description>Detection of PowerShell execution initiated via Crowdstrike Real Time Response (RTR) 'runscript' command, potentially indicating malicious actors leveraging compromised Crowdstrike Dashboard access to execute commands on remote hosts using encoded commands.</description><content:encoded><![CDATA[<p>This threat brief addresses the abuse of Crowdstrike Real Time Response (RTR) functionality to execute arbitrary commands on managed hosts. Attackers with access to a Crowdstrike Dashboard can use the &ldquo;runscript&rdquo; command to execute scripts, often PowerShell, on remote systems. This is particularly concerning because it allows attackers to leverage a trusted platform for malicious purposes, potentially bypassing traditional security controls. The encoded commands within PowerShell obfuscate the attacker&rsquo;s actions, making detection more challenging. This technique has been observed in past campaigns where threat actors target SaaS applications, highlighting the potential for significant impact on organizations relying on these services.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains unauthorized access to the Crowdstrike Dashboard.</li>
<li>Attacker uses the RTR &ldquo;runscript&rdquo; command to initiate a PowerShell script execution on a target host.</li>
<li>The RTR process spawns <code>dllhost.exe</code> to execute the script.</li>
<li><code>dllhost.exe</code> initiates <code>powershell.exe</code> with encoded command parameters (<code>-EncodedCommand</code>).</li>
<li>PowerShell executes the attacker-controlled, obfuscated script.</li>
<li>The script performs malicious activities such as reconnaissance, lateral movement, or data exfiltration.</li>
<li>Results of the script execution may be returned to the attacker via command and control channels.</li>
<li>Attacker achieves their final objective, such as data theft, system compromise, or ransomware deployment.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to complete compromise of targeted systems. An attacker with RTR access can use this technique to bypass normal endpoint security controls. This can result in data breaches, financial losses, and reputational damage. The impact is amplified by the trust relationship between Crowdstrike and its managed endpoints, making detection and prevention more difficult.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect Crowdstrike RTR PowerShell EncodedCommand Execution</code> to identify suspicious PowerShell executions originating from Crowdstrike RTR.</li>
<li>Monitor process creation events (Sysmon EventID 1) and filter for PowerShell processes with encoded commands (<code>-EncodedCommand</code>) where the parent process is <code>dllhost.exe</code>.</li>
<li>Review and restrict Crowdstrike Dashboard access to only authorized personnel to prevent unauthorized use of RTR.</li>
<li>Implement multi-factor authentication (MFA) for all Crowdstrike Dashboard accounts.</li>
<li>Implement the Sigma rule <code>Detect Crowdstrike RTR PowerShell EncodedCommand Execution - Alternate</code>.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>living-off-the-land</category><category>rtr</category><category>script-execution</category></item></channel></rss>