Common Information
Type Value
Value
External Remote Services - T1133
Category Attack-Pattern
Type Mitre-Enterprise-Attack-Attack-Pattern
Misp Type Cluster
Description Remote services such as VPNs, Citrix, and other access mechanisms allow users to connect to internal enterprise network resources from external locations. There are often remote service gateways that manage connections and credential authentication for these services. Services such as Windows Remote Management can also be used externally. Adversaries may use remote services to access and persist within a network. (Citation: Volexity Virtual Private Keylogging) Access to Valid Accounts to use the service is often a requirement, which could be obtained through credential pharming or by obtaining the credentials from users after compromising the enterprise network. Access to remote services may be used as part of Redundant Access during an operation. Detection: Follow best practices for detecting adversary use of Valid Accounts for authenticating to remote services. Collect authentication logs and analyze for unusual access patterns, windows of activity, and access outside of normal business hours. Platforms: Windows Data Sources: Authentication logs Permissions Required: User Contributors: Daniel Oakley, Travis Smith, Tripwire
Details Published Attributes CTI Title
Details Website 2021-06-22 7 How Falcon Complete Disrupts eCrime Operators (WIZARD SPIDER)
Details Website 2021-06-15 53 Handy guide to a new Fivehands ransomware variant
Details Website 2021-05-14 58 DarkSide Ransomware Victims Sold Short | McAfee Blog
Details Website 2021-05-11 11 DarkSide Ransomware: Best Practices for Preventing Business Disruption from Ransomware Attacks | CISA
Details Website 2021-05-10 95
Details Website 2021-04-22 33 CISA Identifies SUPERNOVA Malware During Incident Response | CISA
Details Website 2021-04-21 36 Monitoring Pulse Connect Secure With Splunk (CISA Emergency Directive 21-03)
Details Website 2021-04-20 102 Authentication Bypass Techniques and Pulse Secure Zero-Day
Details Website 2021-03-30 57 APT10: sophisticated multi-layered loader Ecipekac discovered in A41APT campaign
Details Website 2021-02-25 190 So Unchill: Melting UNC2198 ICEDID to Ransomware Operations | Mandiant
Details Website 2021-01-12 216 Abusing cloud services to fly under the radar
Details Website 2021-01-12 215 Abusing cloud services to fly under the radar
Details Website 2020-12-17 91 Advanced Persistent Threat Compromise of Government Agencies, Critical Infrastructure, and Private Sector Organizations | CISA
Details Website 2020-11-02 39 Live off the Land? How About Bringing Your Own Island? An Overview of UNC1945 | Mandiant
Details Website 2020-10-12 7 KELA’s 100 Over 100: September 2020 in Network Access Sales - Kela
Details Website 2020-09-23 26 Your best defense against ransomware: Find the early warning signs - Help Net Security
Details Website 2020-08-05 21
Details Website 2020-08-04 15
Details Website 2020-07-22 51 Enter the Maze: Demystifying an Affiliate Involved in Maze (SNOW) - SentinelLabs
Details Website 2020-03-25 78 APT41 Initiates Intrusion Campaign Using Multiple Exploits
Details Website 2019-12-17 11 It’s time to disconnect RDP from the internet | WeLiveSecurity
Details Website 2010-09-23 16 Attacking MSSQL Servers, Pt. II | Huntress