<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>N-Able — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/vendors/n-able/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 09 Jan 2024 10:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/vendors/n-able/feed.xml" rel="self" type="application/rss+xml"/><item><title>PowerShell Script Block Logging Disabled via Registry Modification</title><link>https://feed.craftedsignal.io/briefs/2024-01-09-disable-powershell-scriptblock-logging/</link><pubDate>Tue, 09 Jan 2024 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-09-disable-powershell-scriptblock-logging/</guid><description>Attackers may disable PowerShell Script Block Logging by modifying the registry to conceal their activities on the host and evade detection by setting the `EnableScriptBlockLogging` registry value to 0, impacting security monitoring and incident response capabilities.</description><content:encoded><![CDATA[<p>Attackers frequently disable PowerShell Script Block Logging to evade detection and hide malicious activities on compromised systems. By modifying the <code>EnableScriptBlockLogging</code> registry value to &lsquo;0&rsquo; or &lsquo;0x00000000&rsquo;, adversaries can significantly reduce the visibility into their PowerShell-based attacks. This technique is particularly effective when followed by script-driven activity, making it harder for security teams to identify and respond to threats. This behavior has been observed across multiple environments, including those utilizing endpoint detection and response solutions such as Elastic Defend, Microsoft Defender XDR, SentinelOne, and CrowdStrike. The rule was last updated on 2026-05-04 and is designed to detect these specific registry modifications.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Access:</strong> An attacker gains initial access to a Windows system, possibly through phishing or exploitation of a vulnerability.</li>
<li><strong>Privilege Escalation:</strong> The attacker may attempt to escalate privileges to gain necessary permissions to modify the registry.</li>
<li><strong>Defense Evasion:</strong> The attacker modifies the registry to disable PowerShell Script Block Logging by setting <code>HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\PowerShell\ScriptBlockLogging\EnableScriptBlockLogging</code> to 0 or 0x00000000 using <code>reg.exe</code> or PowerShell itself.</li>
<li><strong>Execution:</strong> The attacker executes malicious PowerShell scripts, leveraging the disabled logging to avoid detection. These scripts may be used for reconnaissance, lateral movement, or data exfiltration.</li>
<li><strong>Persistence:</strong> The attacker establishes persistence using various techniques, such as creating scheduled tasks or modifying registry keys to ensure continued access to the system.</li>
<li><strong>Command and Control:</strong> The attacker establishes a command and control channel to communicate with the compromised system and issue further instructions.</li>
<li><strong>Lateral Movement:</strong> The attacker moves laterally to other systems on the network, compromising additional assets.</li>
<li><strong>Impact:</strong> The attacker achieves their final objective, such as data theft, ransomware deployment, or disruption of services.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful disabling of PowerShell Script Block Logging can severely hinder incident response efforts, allowing attackers to operate undetected for extended periods. Organizations may experience data breaches, financial losses, and reputational damage. The impact can be widespread as attackers leverage compromised systems for lateral movement and further exploitation. The loss of PowerShell logging can blind security teams, making it difficult to reconstruct attacker actions and contain the breach.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>PowerShell_Script_Block_Logging_Disabled</code> to your SIEM to detect registry modifications that disable PowerShell Script Block Logging.</li>
<li>Monitor registry events for changes to the <code>EnableScriptBlockLogging</code> value, focusing on events with <code>registry.data.strings</code> set to &ldquo;0&rdquo; or &ldquo;0x00000000&rdquo; (see rule <code>PowerShell_Script_Block_Logging_Disabled</code>).</li>
<li>Enable Sysmon registry event logging to capture the necessary data for the Sigma rules to function effectively (see references).</li>
<li>Review and harden PowerShell execution policies to prevent unauthorized script execution (related to tactic TA0005).</li>
<li>Implement strict access controls to limit who can modify registry settings related to PowerShell logging (related to tactic TA0005).</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>powershell</category><category>registry</category></item><item><title>Suspicious DNS Queries to RMM Domains from Non-Browser Processes</title><link>https://feed.craftedsignal.io/briefs/2024-01-rmm-dns-non-browser/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-rmm-dns-non-browser/</guid><description>Detection of DNS queries to remote monitoring and management (RMM) domains from non-browser processes indicating potential misuse of legitimate remote access tools for command and control.</description><content:encoded><![CDATA[<p>This detection identifies DNS queries to commonly abused remote monitoring and management (RMM) or remote access software domains originating from processes that are not web browsers. This activity can indicate the use of legitimate RMM tools for malicious purposes, such as command and control, persistence, or lateral movement within a network. The detection aims to surface RMM clients, scripts, or other non-browser activities contacting these services without legitimate user interaction. Defenders should investigate processes making these queries to confirm expected behavior and validate the security posture of their managed assets. The rule is based on a list of known RMM domains and excludes common browser processes to reduce false positives.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Windows host through unspecified means.</li>
<li>The attacker deploys or leverages an existing RMM tool on the compromised host.</li>
<li>The RMM tool, running as a non-browser process, initiates a DNS query to resolve a command and control server associated with the RMM service (e.g., teamviewer.com).</li>
<li>The DNS query is made by a process other than a known web browser (chrome.exe, firefox.exe, etc.).</li>
<li>The compromised host establishes a connection to the resolved IP address associated with the RMM domain.</li>
<li>The attacker uses the RMM tool to execute commands, transfer files, or perform other malicious activities on the compromised host.</li>
<li>The attacker may use the RMM tool for lateral movement, pivoting to other systems within the network.</li>
<li>The attacker achieves their objective, which could include data exfiltration, ransomware deployment, or maintaining persistent access.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Compromise via abused RMM software can lead to full system compromise, data theft, or deployment of ransomware. While the number of affected victims is unknown, the sectors most likely to be impacted include any organization that relies on RMM tools for IT management. Successful exploitation allows attackers to bypass traditional security controls by using legitimate software, making detection more challenging.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;DNS Queries to Known RMM Domains from Non-Browser Processes&rdquo; to your SIEM and tune the RMM domain list for your environment.</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on identifying the process responsible for the DNS query and its parent process.</li>
<li>Implement application control policies to restrict the execution of unauthorized RMM tools.</li>
<li>Enable Sysmon DNS event logging to ensure the necessary data is available for the detection rule.</li>
<li>Correlate with other alerts to identify potential compromises.</li>
<li>Review process.code_signature for trusted RMM publishers and investigate any unsigned or unexpected signers.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>command-and-control</category><category>remote-access</category><category>windows</category></item></channel></rss>