366. Adversaries Started to Abuse Controlio

Hello everyone!

I promised you to keep posting and notify you on any interesting tactics, techniques and procedures. So, let's start the new year!

Harlan Carvey (I'm sure you've read his books!) shared that adversaries started to use Controlio - a cloud-based employee monitoring and productivity analytics platform. 

By the way, it's not the first time adversaries use similar tools. Another example is Rare Werewolf: the adversary leveraged Mipko Employee Monitor.

Look for suspicious communications for controlio[.]net:

event_type: "dnsreqwin"

AND

dns_rname: "controlio.net"

Look for suspicious executions of Controlio-related binaries:

event_type: "processcreatewin"

AND

proc_file_productname: "controlio"

Happy hunting!

Comments

Popular posts from this blog

033. Free Google Threat Intelligence Course

082. Huniting for Malicious Browser Extensions

068. Detecting RMMs from Ransomware Affiliate's Toolkit: MeshAgent