271. Does an Adversary Need to Install an RMM?
Hello everyone!
Adveraries, especially ransomware gangs, often abuse legitimate RMMs. But do them need to bring such software with them? In some cases - they don't!
For example, this case covered by Barracuda. Akira ransomware affiliates got access to Datto RMM tool’s management console and used it to execute the attack.
So it's always a good idea to hunt for abnormal RMM-related behavior. To find Datto RMM, for example, you can look for accordingly signed files:
event_type: "processcreatewin"
AND
proc_file_sig: "datto"
Also, you can always look for Datto-related domain resolutions:
event_type: "dnsreqwin"
AND
dns_rname: "rmm.datto.com"
See you tomorrow!
Comments
Post a Comment