Themabewertung:
  • 0 Bewertungen - 0 im Durchschnitt
  • 1
  • 2
  • 3
  • 4
  • 5
How to start a hunt for possible infiltration avoidance into the system
08-13-2024, 04:12 AM,
#1
How to start a hunt for possible infiltration avoidance into the system
When we begin with a hunt, it's common to develop a hypothesis. We assume that attackers can use these technologies, specifically RMM security software, to obtain unauthorized access, stay persistent, and/or move laterally within the network. Because these technologies are implicitly trusted, an attacker can carry out malicious activities without raising red flags right away. To maintain persistence in the environment for an extended period, attackers can install RMM software on the systems, which we have observed several times in our incident response engagements.
Let's Look for It Together.
Various aspects can be monitored based on an organization's hunting capabilities. Monitoring the system's installed software could be the first step. Furthermore, it is advantageous to have an expanded perspective by searching for files, such as log files, that might have been created when using RMM software. More consideration and focus should be placed on program files for portable versions of software, which are sometimes referred to as non-installing versions. Furthermore, keeping an eye on network behavior for remote URLs connected to RMM providers is a smart strategy.
To accomplish the objectives of a hunt, a company needs determine which data is available and can be leveraged. There may be fewer or more hits depending on the hunt; therefore, the results must be refined and verified to weed out any potential false positives. In general, it is important to confirm whether the RMM tools and PSA software are expected in the given environment.

Also Read: How To Lower Ram Usage?


Gehe zu:


Benutzer, die gerade dieses Thema anschauen: 1 Gast/Gäste

Impressum | Kontakt | Reliquia Website | Nach oben | Zum Inhalt | Archiv-Modus | RSS-Synchronisation