310. Adversaries Keep Abuse Uncommon RMMs
Hello everyone!
Adversaries keep experimenting with various remote management platforms, so today we'll look at another example of Remote Access Tools: Remote Desktop Software (T1219.002).
Let's look at UNK_SmudgedSerpent. The adversary leveraged phishing emails for credential harvesting as well as to deliver archives with MSI files those loaded RMM payloads.
In most cases the threat actors used PDQConnect Remote Monitoring & Management software.
If you don't use it in your environment, it may be a good target for hunting:
event_type: "processcreatewin"
AND
proc_file_productname: "PDQConnectAgent"
You can also hunt for related domains:
event_type: "dnsreqwin"
AND
dns_rname: "app.pdq.com"
See you tomorrow!

Comments
Post a Comment