215. Another RMM in Scattered Spider's Arsenal

Hello everyone!

Scattered Spider keeps being very-very active, so it's important to track changes in their tactics, techniques and procedures.

The threat actors often use RMMs, which are not used by other adversaries very often. For example, Pulseway. The group leverages this tool to obtain redundant access to a compromised network.

To detect it, we, for example, can search for executables with "pulseway" in metadata:

event_type: "processcreatewin"

AND

proc_file_productname: "pulseway"

Also we can search for DNS queries related to its website:

event_type: "dnsreqwin"

AND

dns_rname: "pulseway.com"

See you tomorrow!

Comments

Popular posts from this blog

033. Free Google Threat Intelligence Course

082. Huniting for Malicious Browser Extensions

001. The Zeltser Challenge