blueteamblog Profile picture
Cybersecurity Analyst. Check out my blog - https://t.co/qa2sTk68xY Support my site - https://t.co/9YbuoGMDb2

May 12, 2021, 16 tweets

LONG THREAD.

Here are some detections / preventions in response to the DarkSide findings.

INITIAL COMPROMISE

Password attacks on perimeter. 2FA everything. Set lockout thresholds on logins. Ingest logs to SIEM and monitor for brute force attempts and impossible travel.
1/14

ItAlso as mentioned the attackers potentially accessed the VPN to disable MFA. Onboard your network devices to SIEM and monitor change events.

Malicious emails. Read this tweet - .

2/14

ESTABLISH FOOTHOLD.

BEACON - Hunting Tips, detections and IOCs - github.com/MichaelKoczwar…

MAINTAIN PERSISTENCE

TeamViewer / Anydesk. Create a SIEM rule and / or run threat hunt for ports in below thread. Try to pick one remote access for your organisation, block the rest.

3/14

Then alert on blocked installs / connections to any other remote access tools.

Legitimate credentials - Difficult to detect. Try prevent -

Sign up for Domain Monitoring on haveibeenpwned.com/DomainSearch. Ensure users use unique, lengthy password for each system. MFA as above.

4/14

ESCALATE PRIVILEGES.

Mimikatz -

Mimikatz SIGMA rules

github.com/SigmaHQ/sigma/…

github.com/SigmaHQ/sigma/…

Mimikatz Further Reading -

medium.com/@levurge/detec…

neil-fox.github.io/Mimikatz-usage…

LSASS Memory Dumps

Detections and reading - redcanary.com/threat-detecti…

5/14

Sigma Rule - github.com/SigmaHQ/sigma/…

MOVE LATERALLY.

RDP

Follow mitigations attack.mitre.org/techniques/T10…

Look in logs for -

User making multiple connections to different destinations in a short period of time.
User accessing devices via RDP that it doesn’t usually access.

6/14

For RDP, pLink etc it is worth also using this Sigma rule to look for netsh being used for port forwarding - github.com/SigmaHQ/sigma/…

INTERNAL RECON.

Powerview / Bloodhound. These relate to performing various recon on a Windows environment.

7/14

Find the weaknesses in your environment before the bad guys do, follow this post - blueteamblog.com/active-directo…

Built in Windows Utilities.

This is an old link but still rings true blogs.jpcert.or.jp/en/2016/01/win…. Look for an account running many of these commands in a short period.

8/14

This may need to be ran as a threat hunt, or a rule improved over time with adding known expected users.

Also this rule github.com/SigmaHQ/sigma/…

Advanced IP Scanner.

It doesn’t matter what scanner an attacker uses, SIEM rules should monitor suspicious network behaviour.

9/14

I wrote (badly, I need to update it) about some basic use cases to do this a year ago - blueteamblog.com/8-ways-to-dete…

Keep sure you can detect internal port scans of different types, spikes in traffic from a host OR port (Anomaly detection) based on either count or byte volume.

10/14

If you have an IDPS, it should do this for you out of the box.

COMPLETE MISSION.

PSExec.

How to detect PSExec - praetorian.com/blog/threat-hu…

How to detect it and it’s clones - redcanary.com/blog/threat-hu…

11/14

OTHER THOUGHTS.

Patch. I know this can be easier said than do at times, but it can be the difference between being breached, and not.

Test your defences - Once you have defences in place, test them. Are things really being blocked? Do alerts really trigger in your SIEM?

12/14

Test your responses. If shit does have the fan - do you have an IR team? Do you have one on retainer? Have you played out scenarios and went through the how, who and why you will respond to a real event?

13/14

I’m sorry this was so long and unstructured, but I hope it helps someone. 😀

14/14

Turned this into a blog post -

Reminder that I turned this into a blog post that is much easier to read - blueteamblog.com/darkside-ranso…

Share this Scrolly Tale with your friends.

A Scrolly Tale is a new way to read Twitter threads with a more visually immersive experience.
Discover more beautiful Scrolly Tales like this.

Keep scrolling