<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Syslog — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/syslog/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 03 Jan 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/syslog/feed.xml" rel="self" type="application/rss+xml"/><item><title>ESXi Syslog Configuration Changes via esxcli</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-esxi-syslog-config-change/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-esxi-syslog-config-change/</guid><description>Detection of ESXi syslog configuration changes via esxcli command, potentially indicating an attempt to disrupt logging and evade detection.</description><content:encoded><![CDATA[<p>This threat brief focuses on the detection of unauthorized or malicious changes to the syslog configuration of VMware ESXi hosts. Attackers may attempt to modify syslog settings to disable or redirect logging, thereby hindering incident response and forensic analysis. The specific technique involves using the <code>esxcli</code> command-line utility, a powerful tool for managing ESXi hosts. Successful modification of the syslog configuration allows attackers to operate with reduced visibility, potentially leading to prolonged compromise and data exfiltration. This activity can be an indicator of post-compromise activity, and has been observed in association with ransomware campaigns like Black Basta.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial access to the ESXi host is achieved via compromised credentials or exploitation of a vulnerability.</li>
<li>The attacker authenticates to the ESXi host, potentially escalating privileges if necessary.</li>
<li>The attacker uses <code>esxcli</code> to query the current syslog configuration to understand the existing setup.</li>
<li>The attacker uses <code>esxcli</code> to modify the syslog configuration, potentially changing the remote host, protocol, or port.</li>
<li>The attacker disables or redirects syslog forwarding to a malicious or attacker-controlled server.</li>
<li>The attacker verifies the syslog configuration changes using <code>esxcli</code> or by observing the absence of logs at the original destination.</li>
<li>The attacker proceeds with other malicious activities, such as lateral movement, data exfiltration, or ransomware deployment, with reduced risk of detection.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful modification of ESXi syslog configurations can severely impair an organization&rsquo;s ability to detect and respond to security incidents. This can lead to delayed detection of breaches, prolonged dwell time for attackers, and increased damage from ransomware or data theft. The consequences include significant financial losses, reputational damage, and regulatory penalties. The attack is observed being utilized post-compromise, to evade detection in ransomware campaigns like Black Basta.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable ESXi syslog forwarding to a centralized logging server and monitor for configuration changes as described in the overview.</li>
<li>Deploy the provided Sigma rule <code>ESXi Syslog Config Change</code> to detect unauthorized modifications to the syslog configuration (rule ID: <code>esxi_syslog_config_change</code>).</li>
<li>Implement strict access control policies for ESXi hosts and monitor for anomalous login activity to prevent initial access.</li>
<li>Review and harden ESXi host configurations according to VMware security best practices.</li>
<li>Ensure that the Splunk Technology Add-on for VMware ESXi Logs is properly configured to parse and ingest syslog data (see How To Implement).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>esxi</category><category>syslog</category><category>vmware</category><category>defense-evasion</category><category>t1562.003</category><category>t1690</category><category>black-basta</category></item><item><title>ESXi Download Error Detection</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-esxi-download-errors/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-esxi-download-errors/</guid><description>Detection of failed file download attempts on ESXi hosts, potentially indicating unauthorized or malicious activity such as installing or updating components, including VIBs or scripts.</description><content:encoded><![CDATA[<p>This detection focuses on identifying failed file download attempts on VMware ESXi hosts by analyzing system logs for specific error messages. The errors may stem from unauthorized or malicious attempts to install or update components, such as VIBs (vSphere Installation Bundles) or scripts, potentially leading to system compromise or disruption. This is important for defenders because successful exploitation could result in the installation of malicious software, unauthorized modifications to the ESXi host, or even complete system takeover. The detection leverages ESXi syslog data and is designed to be implemented within a Splunk environment using the appropriate technology add-on for VMware ESXi Logs.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to a system with the ability to interact with the ESXi host (e.g., through compromised credentials or a vulnerability).</li>
<li>The attacker attempts to download a malicious VIB or script onto the ESXi host.</li>
<li>The ESXi host attempts to download the file from a remote location.</li>
<li>The download fails due to network issues, file integrity checks, or access restrictions.</li>
<li>The ESXi host logs an error message indicating the failed download attempt. Messages include &ldquo;<em>Download failed</em>&rdquo;, &ldquo;<em>Failed to download file</em>&rdquo;, &ldquo;<em>File download error</em>&rdquo;, &ldquo;<em>Could not download</em>&rdquo;.</li>
<li>The system logs are forwarded to a SIEM such as Splunk for analysis.</li>
<li>A detection rule identifies the error message in the logs and triggers an alert.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation following a failed download attempt could lead to the installation of malicious software, unauthorized modification of the ESXi host configuration, or denial of service. While the detection identifies <em>failed</em> download attempts, repeated failures or unusual patterns of failed downloads can indicate a persistent and potentially sophisticated attack. The impact could range from system instability to full compromise, depending on the attacker&rsquo;s objectives and the vulnerabilities exploited.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Configure ESXi hosts to forward syslog output to your Splunk deployment to collect the necessary log data.</li>
<li>Install and configure the Splunk Technology Add-on for VMware ESXi Logs to ensure proper field extraction and CIM compatibility.</li>
<li>Deploy the provided Splunk search query to identify ESXi download errors in your environment.</li>
<li>Tune the detection logic and filter list (<code>esxi_download_errors_filter</code>) to reduce false positives based on your environment&rsquo;s specific characteristics.</li>
<li>Investigate alerts generated by the detection to determine the root cause of the failed download attempts.</li>
<li>Use the drilldown searches to view detection results and risk events associated with the identified hosts.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>esxi</category><category>vmware</category><category>syslog</category><category>anomaly</category><category>T1601.001</category><category>T1685</category><category>ESXi Post Compromise</category><category>Black Basta Ransomware</category><category>Infrastructure</category><category>endpoint</category></item><item><title>ESXi Loghost Configuration Tampering</title><link>https://feed.craftedsignal.io/briefs/2024-01-esxi-loghost-tampering/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-esxi-loghost-tampering/</guid><description>An attacker modifies the ESXi host's syslog configuration to disrupt log forwarding, potentially evading detection and hindering incident response.</description><content:encoded><![CDATA[<p>Attackers targeting VMware ESXi infrastructure may tamper with the syslog configuration to disable or redirect logging. This activity, often performed post-compromise, aims to hinder incident responders by preventing them from collecting crucial forensic data. This allows malicious actors to operate with less visibility, increasing the dwell time and impact of their attacks. This particular threat focuses on detecting modifications to <code>Syslog.global.logHost</code> and <code>Syslog.global.logdir</code>, key configuration parameters for syslog forwarding on ESXi hosts. The attack is detected using ESXi syslog data, typically ingested and processed using the Splunk Technology Add-on for VMware ESXi Logs. This can be part of ransomware campaigns like Black Basta.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial access to the ESXi host is achieved through exploitation of a vulnerability, stolen credentials, or other means.</li>
<li>The attacker escalates privileges to gain administrative access on the ESXi host.</li>
<li>The attacker modifies the ESXi syslog configuration using esxcli commands or direct manipulation of configuration files. Specifically, <code>Syslog.global.logHost</code> (the syslog server) and <code>Syslog.global.logdir</code> (the log directory) are targeted.</li>
<li>The attacker disables remote syslog forwarding by setting <code>Syslog.global.logHost</code> to an invalid or inaccessible address. Alternatively, they might redirect logs to a location they control.</li>
<li>The attacker modifies the log directory by altering the value of <code>Syslog.global.logdir</code>.</li>
<li>The attacker then proceeds with their primary objective, such as deploying ransomware or exfiltrating sensitive data, under reduced scrutiny.</li>
<li>Incident responders find difficulty in reconstructing the attack timeline due to missing or incomplete log data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful tampering with ESXi loghost configurations can significantly impair an organization&rsquo;s ability to detect and respond to security incidents. By disrupting log forwarding, attackers can effectively blind security teams, allowing them to operate undetected for extended periods. This can lead to delayed detection of ransomware deployments, data breaches, and other malicious activities, increasing the potential for financial loss, reputational damage, and operational disruption. ESXi Post Compromise can lead to Black Basta Ransomware deployment.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rules to your SIEM to detect ESXi loghost configuration tampering and tune them for your environment.</li>
<li>Configure your ESXi systems to forward syslog output to a centralized logging server and ingest using the Splunk Technology Add-on for VMware ESXi Logs as specified in the &ldquo;how_to_implement&rdquo; section.</li>
<li>Investigate any alerts generated by the Sigma rules, focusing on the source ESXi host (<code>dest</code>) and the modified loghost configuration values.</li>
<li>Monitor ESXi host configuration changes for unexpected modifications to the syslog settings.</li>
<li>Implement strict access controls and multi-factor authentication for ESXi hosts to prevent unauthorized configuration changes.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>esxi</category><category>syslog</category><category>loghost</category><category>tampering</category><category>defense-evasion</category></item></channel></rss>