358. Adversaries Abuse GoToHTTP for Redundant Access

Hello everyone!

It's time to look at another interesting RMM abused by threat actors for redundant access, and check if your detections cover it.

According to this report, the adversary dropped a renamed copy GotoHTTP to the compromised system. It's interesting that the threat actors just need to install this RMM on the system they want to control, and to manipulate it they need just a web-browser!

So, you can look for related network connections:

event_type: "dnsreqwin"

AND

dns_rname: "gotohttp.com"

And for binary itself, of course:

event_type: "processcreatewin"

AND

proc_file_productname: "gotohttp"

See you tomorrow!

Comments

Popular posts from this blog

033. Free Google Threat Intelligence Course

082. Huniting for Malicious Browser Extensions

001. The Zeltser Challenge