257. Adversaries Abuse ITarian for Command and Control

Hello everyone!

Adversaries keep experimenting with various RMM tools. So, today we'll look at another example of Remote Access Tools: Remote Desktop Software (T1219.002).

According to Red Canary report, this time threat actors abused ITarian. Despite the fact the installer dropped ITarian executable to legitimate location, I think it's better to focus on its metadata, for example, CompanyName, so we can hunt for renamed versions of this RMM as well:

event_type: "processcreatewin"

AND

proc_file_companyname: "itarian"

See you tomorrow!

Comments

Popular posts from this blog

033. Free Google Threat Intelligence Course

082. Huniting for Malicious Browser Extensions

001. The Zeltser Challenge