142. Detecting RMMs from Ransomware Affiliate's Toolkit: Syncro Live Agent
Hello everyone!
If you looked through the report I shared yesterday, you should have spotted another interesting legitimate tool abused by threat actors. This time it's an RMM called Syncro Live Agent.
It's interesting that, according to the report, the agent was never used by the adversary. But it doesn't mean we shouldn't detect it!
We can use a very simple query to hunt for the tool, for example:
event_type: "processcreatewin"
AND
proc_file_productname: "syncrolive"
Yes, that easy!
See you tomorrow!
Comments
Post a Comment