<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Tampering — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/tampering/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 03 Jan 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/tampering/feed.xml" rel="self" type="application/rss+xml"/><item><title>Windows EventLog Security Descriptor Tampering</title><link>https://feed.craftedsignal.io/briefs/2024-01-eventlog-sd-tampering/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-eventlog-sd-tampering/</guid><description>This analytic detects suspicious modifications to the EventLog security descriptor registry value, specifically the 'CustomSD' value, within the registry path 'HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Eventlog\&lt;Channel&gt;\CustomSD', which can be used for defense evasion by attackers.</description><content:encoded><![CDATA[<p>Attackers may target the Windows EventLog service to evade detection by manipulating security descriptors and access permissions. By modifying the &lsquo;CustomSD&rsquo; value within the EventLog channel&rsquo;s registry key, adversaries can restrict access to event logs, preventing security products and administrators from collecting and analyzing crucial security data. This can effectively blind security tools, allowing attackers to operate undetected within the compromised environment. The tampering of the Security Descriptor Definition Language (SDDL) strings is a critical indicator of potential malicious activity that warrants immediate investigation. The detection focuses on changes to the &ldquo;CustomSD&rdquo; value within the &ldquo;HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Eventlog&lt;Channel&gt;\CustomSD&rdquo; path.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to the system through various means (e.g., phishing, exploiting a vulnerability).</li>
<li>The attacker escalates privileges to obtain necessary permissions to modify the registry.</li>
<li>The attacker navigates to the registry key <code>HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Eventlog\&lt;Channel&gt;</code>.</li>
<li>The attacker identifies the <code>CustomSD</code> value within the registry key.</li>
<li>The attacker modifies the <code>CustomSD</code> value, altering the security descriptor for the EventLog channel using tools like <code>reg.exe</code> or PowerShell.</li>
<li>The attacker restricts access to the EventLog channel by modifying the SDDL string.</li>
<li>Security products and administrators are now unable to collect or analyze event logs from the tampered channel.</li>
<li>The attacker performs malicious activities without being logged, achieving persistence and evading detection.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful manipulation of EventLog security descriptors can severely impair an organization&rsquo;s ability to detect and respond to security incidents. By restricting access to event logs, attackers can effectively blind security tools, allowing them to operate undetected. This can lead to prolonged compromises, data breaches, and other forms of significant damage. This form of tampering directly hinders incident response and forensic investigations, potentially affecting hundreds or thousands of systems depending on the scope of the attack.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect EventLog SDDL Tampering</code> to your SIEM to detect modifications to the EventLog security descriptor registry value.</li>
<li>Enable Sysmon Event ID 13 logging to capture registry modifications as required by the Sigma rule&rsquo;s log source.</li>
<li>Investigate any alerts generated by the <code>Detect EventLog SDDL Tampering</code> Sigma rule, focusing on the affected host and user.</li>
<li>Monitor for unexpected or unauthorized processes modifying the registry key <code>HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Eventlog\&lt;Channel&gt;\CustomSD</code>.</li>
<li>Implement the Sysmon TA to ensure proper data ingestion of Event ID 13 (registry modifications).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>defense-evasion</category><category>eventlog</category><category>registry</category><category>tampering</category></item><item><title>ESXi VIB Acceptance Level Tampering Detection</title><link>https://feed.craftedsignal.io/briefs/2024-01-esxi-vib-tampering/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-esxi-vib-tampering/</guid><description>This detection identifies changes to the VIB (vSphere Installation Bundle) acceptance level on an ESXi host, potentially allowing the installation of unsigned or unverified software and lowering the system's integrity enforcement.</description><content:encoded><![CDATA[<p>This threat brief focuses on detecting tampering with the vSphere Installation Bundle (VIB) acceptance level on ESXi hosts. Attackers may attempt to modify the VIB acceptance level, typically using the <code>esxcli software acceptance set</code> command, to bypass security controls and install malicious or unsigned software. The default acceptance levels ensure that only VMware-approved or trusted vendor-signed packages are installed, maintaining system integrity. By lowering this level, for example, to &ldquo;CommunitySupported&rdquo;, an attacker can introduce unsigned VIBs, potentially leading to persistent compromise, data exfiltration, or disruption of virtualized workloads. This activity is often observed post-compromise.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial access to the ESXi host is gained through an exploit or stolen credentials.</li>
<li>The attacker elevates privileges to execute commands with <code>shell</code> access.</li>
<li>The attacker uses the <code>esxcli software acceptance set</code> command to modify the VIB acceptance level, potentially setting it to <code>CommunitySupported</code> to allow unsigned VIBs.</li>
<li>The attacker installs a malicious VIB package onto the ESXi host.</li>
<li>The malicious VIB executes its payload, which could include installing a backdoor, modifying system configurations, or stealing data.</li>
<li>The attacker attempts to maintain persistence by hiding the malicious VIB or creating scheduled tasks.</li>
<li>The attacker leverages the compromised ESXi host to move laterally within the virtualized environment, targeting other virtual machines.</li>
<li>The attacker achieves their final objective, such as deploying ransomware or exfiltrating sensitive data from the virtualized environment.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful modification of the VIB acceptance level can lead to the installation of malicious software on ESXi hosts, resulting in the compromise of virtual machines and the entire virtualized infrastructure. This can lead to data breaches, system instability, and significant operational disruption. The Black Basta ransomware group has been known to target ESXi environments, highlighting the importance of detecting this type of activity.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable ESXi syslog forwarding to a central log management system to capture relevant events (data_source: &ldquo;VMWare ESXi Syslog&rdquo;).</li>
<li>Deploy the Sigma rule <code>ESXi VIB Acceptance Level Tampering</code> to detect changes to the VIB acceptance level (rule: &ldquo;ESXi VIB Acceptance Level Tampering&rdquo;).</li>
<li>Monitor ESXi hosts for unusual process execution and file modifications, especially related to VIB installation (rule: &ldquo;Suspicious ESXi VIB Installation&rdquo;).</li>
<li>Investigate any instances of the <code>esxcli software acceptance set</code> command being used (rule: &ldquo;ESXi VIB Acceptance Level Tampering&rdquo;).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>vmware</category><category>esxi</category><category>vib</category><category>tampering</category><category>post-compromise</category><category>ransomware</category></item><item><title>ESXi Loghost Configuration Tampering</title><link>https://feed.craftedsignal.io/briefs/2024-01-esxi-loghost-tampering/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-esxi-loghost-tampering/</guid><description>An attacker modifies the ESXi host's syslog configuration to disrupt log forwarding, potentially evading detection and hindering incident response.</description><content:encoded><![CDATA[<p>Attackers targeting VMware ESXi infrastructure may tamper with the syslog configuration to disable or redirect logging. This activity, often performed post-compromise, aims to hinder incident responders by preventing them from collecting crucial forensic data. This allows malicious actors to operate with less visibility, increasing the dwell time and impact of their attacks. This particular threat focuses on detecting modifications to <code>Syslog.global.logHost</code> and <code>Syslog.global.logdir</code>, key configuration parameters for syslog forwarding on ESXi hosts. The attack is detected using ESXi syslog data, typically ingested and processed using the Splunk Technology Add-on for VMware ESXi Logs. This can be part of ransomware campaigns like Black Basta.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial access to the ESXi host is achieved through exploitation of a vulnerability, stolen credentials, or other means.</li>
<li>The attacker escalates privileges to gain administrative access on the ESXi host.</li>
<li>The attacker modifies the ESXi syslog configuration using esxcli commands or direct manipulation of configuration files. Specifically, <code>Syslog.global.logHost</code> (the syslog server) and <code>Syslog.global.logdir</code> (the log directory) are targeted.</li>
<li>The attacker disables remote syslog forwarding by setting <code>Syslog.global.logHost</code> to an invalid or inaccessible address. Alternatively, they might redirect logs to a location they control.</li>
<li>The attacker modifies the log directory by altering the value of <code>Syslog.global.logdir</code>.</li>
<li>The attacker then proceeds with their primary objective, such as deploying ransomware or exfiltrating sensitive data, under reduced scrutiny.</li>
<li>Incident responders find difficulty in reconstructing the attack timeline due to missing or incomplete log data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful tampering with ESXi loghost configurations can significantly impair an organization&rsquo;s ability to detect and respond to security incidents. By disrupting log forwarding, attackers can effectively blind security teams, allowing them to operate undetected for extended periods. This can lead to delayed detection of ransomware deployments, data breaches, and other malicious activities, increasing the potential for financial loss, reputational damage, and operational disruption. ESXi Post Compromise can lead to Black Basta Ransomware deployment.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rules to your SIEM to detect ESXi loghost configuration tampering and tune them for your environment.</li>
<li>Configure your ESXi systems to forward syslog output to a centralized logging server and ingest using the Splunk Technology Add-on for VMware ESXi Logs as specified in the &ldquo;how_to_implement&rdquo; section.</li>
<li>Investigate any alerts generated by the Sigma rules, focusing on the source ESXi host (<code>dest</code>) and the modified loghost configuration values.</li>
<li>Monitor ESXi host configuration changes for unexpected modifications to the syslog settings.</li>
<li>Implement strict access controls and multi-factor authentication for ESXi hosts to prevent unauthorized configuration changes.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>esxi</category><category>syslog</category><category>loghost</category><category>tampering</category><category>defense-evasion</category></item></channel></rss>