240. Adversaries Abuse Enterprise Incident Response Tools

Hello everyone!

We already talked about abusing forensic and incident response tools. Let's look at a curious example of how adversaries leverage such software instead of Remote Access Tools (T1219).

According to Sophos report, an adversary leveraged Velociraptor, which was configured to communicate with C2 server velo[.]qaubctgg[.]workers[.]dev

Yes, you may even use Velociraptor in your environment, but it's unlikely be configured to communicate with workers[.]dev domains. And we can use it to build the query:

event_type: "dnsreqwin"

AND

dns_rname: "workers.dev"

AND

proc_file_path: "velociraptor.exe"

See you tomorrow!

Comments

Popular posts from this blog

033. Free Google Threat Intelligence Course

082. Huniting for Malicious Browser Extensions

001. The Zeltser Challenge