219. That's How Ransomware Gangs Obtain Credentials for Backup Servers

Hello everyone!

Backups. One of the main targets of any ransomware gang. The can use it to inhibit recovery or to obtain sensitive data. But before it, they need to obtain access to this part of infrastructure.

The DFIR Report shared details on Akira ransomware intrusion. To obtain credentials from Veeam server, the adversary used the PostgreSQL interactive terminal to dump credentials from the Veeam PostgreSQL database:

psql.exe -U postgres --csv -d VeeamBackup -w -c "SELECT user_name,password,description,change_time_utc FROM credentials"

For example, we can hunt for attempts to access credentials table:

event_type: "processcreatewin"

AND

proc_file_productname: "postgresql"

AND

cmdline: "credentials"

See you tomorrow!

Comments

Popular posts from this blog

033. Free Google Threat Intelligence Course

082. Huniting for Malicious Browser Extensions

001. The Zeltser Challenge