<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Level.io — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/vendors/level.io/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 02 Jan 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/vendors/level.io/feed.xml" rel="self" type="application/rss+xml"/><item><title>Detection of Level RMM Watchdog Task Creation</title><link>https://feed.craftedsignal.io/briefs/2024-01-level-watchdog-task/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-level-watchdog-task/</guid><description>The creation of the 'Level Watchdog' task, indicative of the Level remote management tool installation, is detected, highlighting the potential abuse of legitimate RMM tools for persistence and execution by threat actors on Windows systems.</description><content:encoded><![CDATA[<p>This brief focuses on the detection of the &lsquo;Level Watchdog&rsquo; scheduled task, a component of the Level remote management (RMM) tool. Level is a legitimate commercial tool that allows IT professionals and system administrators to remotely manage computer systems. However, threat actors may abuse RMM tools like Level to maintain persistence and execute malicious commands on compromised hosts. The creation of this specific task serves as an indicator of the presence of Level RMM on a system, which warrants further investigation due to the potential for misuse. This activity is detected via Windows Event Log ID 4698, specifically targeting task creation events for the &lsquo;\Level\Level Watchdog&rsquo; task. This detection aims to provide security teams with visibility into the potential misuse of RMM tools within their environment.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a target Windows system through various means (e.g., phishing, exploiting a vulnerability, or compromised credentials).</li>
<li>The attacker installs the Level RMM agent on the compromised system, potentially using administrative privileges.</li>
<li>The Level RMM agent installation process creates the scheduled task named &lsquo;\Level\Level Watchdog&rsquo;.</li>
<li>The &lsquo;Level Watchdog&rsquo; task is configured to run periodically, ensuring the Level RMM agent remains active.</li>
<li>The attacker uses the Level RMM agent to execute commands remotely on the compromised system.</li>
<li>The attacker uses the RMM tool to maintain persistence and control over the compromised system.</li>
<li>The attacker leverages the established RMM connection to perform lateral movement within the network.</li>
<li>The ultimate objective could include data exfiltration, ransomware deployment, or further compromise of critical systems.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation and misuse of RMM tools can lead to significant compromise, potentially affecting numerous systems within an organization. Attackers leveraging Level RMM could gain persistent access, enabling them to steal sensitive data, disrupt operations, deploy ransomware, or use compromised systems as a staging ground for further attacks. The scope of the impact depends on the attacker&rsquo;s objectives and the level of access gained through the RMM tool.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule to your SIEM to detect the creation of the &ldquo;Level Watchdog&rdquo; task (EventID 4698, TaskName &ldquo;\Level\Level Watchdog&rdquo;).</li>
<li>Investigate any systems where the &ldquo;Level Watchdog&rdquo; task is detected to determine if the RMM software is authorized and legitimate, as noted in the known false positives.</li>
<li>Monitor process execution and network connections originating from processes associated with Level RMM for suspicious activity.</li>
<li>Review and enforce policies regarding the use of RMM tools within the organization to prevent unauthorized installations.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>rmm</category><category>remote-access</category><category>persistence</category></item><item><title>Detection of Level RMM PowerShell Script Installer</title><link>https://feed.craftedsignal.io/briefs/2024-01-level-rmm-installer/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-level-rmm-installer/</guid><description>This brief details the detection of the Level remote management tool PowerShell installer on Windows endpoints, which can be exploited by threat actors for malicious purposes to maintain persistence and execute commands, although it's a legitimate IT tool.</description><content:encoded><![CDATA[<p>Level is a commercial remote management tool (RMM) developed by Level.io. While legitimate IT professionals use such tools for remote access and system administration, threat actors can abuse them for malicious activities. This involves maintaining persistence and executing commands on compromised hosts. The detection focuses on identifying the PowerShell installer for the Level RMM tool. This activity can be an indicator of potential misuse, especially if the installation is unauthorized or occurs on systems not typically managed by IT staff. Defenders need to be aware of the legitimate use of Level in their environment to avoid false positives. The CISA advisory AA23-320A highlights the risks associated with RMM software being abused.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a target system (details of initial access are not covered in the source).</li>
<li>The attacker downloads the Level RMM PowerShell installer script, <code>install_windows.ps1</code>, from <code>https://downloads.level.io/install_windows.ps1</code>.</li>
<li>The attacker executes the PowerShell script, potentially using <code>powershell.exe</code>.</li>
<li>The PowerShell script leverages the <code>$env:LEVEL_API_KEY</code> environment variable for authentication or configuration.</li>
<li>The Level RMM agent is installed on the system.</li>
<li>The agent establishes a connection to the Level.io infrastructure, granting the attacker remote access.</li>
<li>The attacker uses the Level RMM agent for persistence, maintaining access even after reboots.</li>
<li>The attacker can then execute arbitrary commands, deploy additional malware, or exfiltrate data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to maintain persistent remote access to the compromised system. This can lead to data theft, deployment of ransomware, disruption of services, or further lateral movement within the network. While the number of victims and sectors targeted are not specified in the source, the potential impact can be significant, especially if critical systems are compromised. The use of legitimate RMM tools by attackers can make detection challenging, as the activity may blend in with normal administrative tasks.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect Level RMM PowerShell Installer Download</code> to identify instances where the <code>install_windows.ps1</code> script is downloaded (see the rule below).</li>
<li>Deploy the Sigma rule <code>Detect Level RMM PowerShell Script Execution</code> to detect the execution of the Level RMM PowerShell installer script using the <code>$env:LEVEL_API_KEY</code> (see the rule below).</li>
<li>Monitor PowerShell script block logging (EventID 4104) for suspicious activity involving RMM tools.</li>
<li>Review and filter alerts generated by these detections for authorized use within managed environments, as indicated in the <code>known_false_positives</code> section.</li>
<li>Consult the CISA advisory AA23-320A for general guidance on securing against RMM software abuse.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>remote-management</category><category>powershell</category><category>rmm</category></item></channel></rss>