358. Adversaries Abuse GoToHTTP for Redundant Access
Hello everyone!
It's time to look at another interesting RMM abused by threat actors for redundant access, and check if your detections cover it.
According to this report, the adversary dropped a renamed copy GotoHTTP to the compromised system. It's interesting that the threat actors just need to install this RMM on the system they want to control, and to manipulate it they need just a web-browser!
So, you can look for related network connections:
event_type: "dnsreqwin"
AND
dns_rname: "gotohttp.com"
And for binary itself, of course:
event_type: "processcreatewin"
AND
proc_file_productname: "gotohttp"
See you tomorrow!

Comments
Post a Comment