<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Shadowing — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/shadowing/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 12 May 2026 17:46:23 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/shadowing/feed.xml" rel="self" type="application/rss+xml"/><item><title>Potential Remote Desktop Shadowing Activity</title><link>https://feed.craftedsignal.io/briefs/2026-05-potential-rdp-shadowing/</link><pubDate>Tue, 12 May 2026 17:46:23 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-potential-rdp-shadowing/</guid><description>This brief detects potential remote desktop shadowing activity by identifying modifications to the RDP Shadow registry or the execution of processes indicative of an active RDP shadowing session, which adversaries may abuse to spy on or control other users' RDP sessions.</description><content:encoded><![CDATA[<p>This detection identifies the modification of the Remote Desktop Protocol (RDP) Shadow registry or the execution of processes indicative of an active RDP shadowing session. The rule aims to detect adversaries abusing the RDP Shadowing feature to monitor or control other users&rsquo; active RDP sessions. The rule leverages data from various sources including endpoint logs, Windows event logs (Sysmon), Elastic Endgame, Microsoft Defender XDR, and SentinelOne Cloud Funnel. RDP Shadowing can be abused to gain unauthorized access to sensitive information or perform malicious actions on behalf of the user.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a system via compromised credentials or other means.</li>
<li>The attacker modifies the RDP Shadow registry key to enable shadowing without user consent (e.g., setting the <code>Shadow</code> value to <code>2</code> or <code>4</code>).</li>
<li>The attacker uses <code>mstsc.exe</code> with the <code>/shadow</code> parameter to initiate a shadowing session of a target user&rsquo;s RDP session. The attacker may also use the <code>/control</code> or <code>/noConsentPrompt</code> to further stealth their activities.</li>
<li>Alternatively, the attacker may execute <code>RdpSaUacHelper.exe</code> or <code>RdpSaProxy.exe</code> processes, typically launched by <code>svchost.exe</code>, on the target system to facilitate the shadowing connection.</li>
<li>The system allows the attacker to view and potentially control the target user&rsquo;s session.</li>
<li>The attacker monitors user activity, steals credentials, or performs other malicious actions within the compromised session.</li>
<li>The attacker attempts to maintain persistence by ensuring that the modified registry settings remain in place.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful RDP shadowing can lead to unauthorized access to sensitive data, credential theft, and the ability to perform malicious actions on behalf of the compromised user. This can result in financial loss, data breaches, and reputational damage. The number of victims and sectors targeted depends on the scope of the attacker&rsquo;s initial access and the value of the targeted user&rsquo;s session.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor registry modifications related to the RDP Shadow key and alert on unexpected changes using the Sigma rule <code>Detect RDPSaUacHelper or RDPSaProxy Execution</code>.</li>
<li>Detect the execution of <code>mstsc.exe</code> with the <code>/shadow</code> parameter to identify potential shadowing attempts using the Sigma rule <code>Detect RDP Shadow Registry Modification</code>.</li>
<li>Enable Sysmon registry event logging and process creation logging to capture the necessary data for the Sigma rules above.</li>
<li>Investigate any alerts related to RDP shadowing promptly to determine if the activity is legitimate or malicious.</li>
<li>Review and restrict RDP shadow permissions to limit who can shadow sessions.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>rdp</category><category>shadowing</category><category>lateral-movement</category><category>windows</category></item></channel></rss>