271. Does an Adversary Need to Install an RMM?

Hello everyone!

Adveraries, especially ransomware gangs, often abuse legitimate RMMs. But do them need to bring such software with them? In some cases - they don't!

For example, this case covered by Barracuda. Akira ransomware affiliates got access to Datto RMM tool’s management console and used it to execute the attack.

So it's always a good idea to hunt for abnormal RMM-related behavior. To find Datto RMM, for example, you can look for accordingly signed files:

event_type: "processcreatewin"

AND

proc_file_sig: "datto"

Also, you can always look for Datto-related domain resolutions:

event_type: "dnsreqwin"

AND

dns_rname: "rmm.datto.com"

See you tomorrow!

Comments

Popular posts from this blog

033. Free Google Threat Intelligence Course

082. Huniting for Malicious Browser Extensions

001. The Zeltser Challenge