381. In Some Cases, Attackers Can Simply Export Your Passwords
Hello everyone!
Today we’ll once again talk about the Windows Registry and look at an example of the Unsecured Credentials: Credentials in Registry (T1552.002) technique.
While reading an investigation report on the CL-UNK-1068 attacks in South, Southeast, and East Asia, I once again noticed that attackers actively abused reg.exe. In particular, they frequently used the export parameter, for example:
reg export "HKEY_USERS\[%SID%]\SOFTWARE\TightVNC\Server"
reg export HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\TightVNC\Server
reg export HKEY_LOCAL_MACHINE\SOFTWARE\TightVNC\Server
In this case, the attacker exports the TightVNC configuration from the registry in order to obtain credentials. For detection, we can either use specific registry keys that contain sensitive data or proactively search for suspicious export events:
event_type: "processcreatewin"
AND
proc_file_path: "reg.exe"
AND
cmdline: "export"
See you soon!

Comments
Post a Comment