215. Another RMM in Scattered Spider's Arsenal
Hello everyone!
Scattered Spider keeps being very-very active, so it's important to track changes in their tactics, techniques and procedures.
The threat actors often use RMMs, which are not used by other adversaries very often. For example, Pulseway. The group leverages this tool to obtain redundant access to a compromised network.
To detect it, we, for example, can search for executables with "pulseway" in metadata:
event_type: "processcreatewin"
AND
proc_file_productname: "pulseway"
Also we can search for DNS queries related to its website:
event_type: "dnsreqwin"
AND
dns_rname: "pulseway.com"
See you tomorrow!
Comments
Post a Comment