{"id":6162,"date":"2022-11-16T17:18:36","date_gmt":"2022-11-16T17:18:36","guid":{"rendered":"https:\/\/sajinshivdas.com\/security\/?p=6162"},"modified":"2023-03-27T08:33:45","modified_gmt":"2023-03-27T08:33:45","slug":"attackers-with-state-sponsorship-in-iran-break-into-us-government-network-and-release-cryptominer-and-password-stealer","status":"publish","type":"post","link":"https:\/\/sajinshivdas.com\/cybersecurity\/attackers-with-state-sponsorship-in-iran-break-into-us-government-network-and-release-cryptominer-and-password-stealer\/","title":{"rendered":"Attackers with State Sponsorship in Iran Break Into US Government Network and Release Cryptominer and Password Stealer"},"content":{"rendered":"[vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][vc_column_text]When CISA discovered what it believed to be advanced persistent threat (APT) activity at a Federal Civilian Executive Branch (FCEB) entity between the middle of June through the middle of July 2022, it launched an incident response engagement. Responding to an incident, CISA discovered that attackers had used a Log4Shell flaw in an unpatched VMware Horizon server to install crypto mining software, laterally moved to the domain controller (DC), compromised credentials, and implanted Ngrok reverse proxies on several hosts to maintain persistence. The FCEB network was hacked by Iranian government-backed APT actors, according to the Computer Security Industry Association (CISA) and the Federal Bureau of Investigation (FBI).[\/vc_column_text][vc_column_text]Cybersecurity Information Sharing and Analysis Center (CISAC) and Federal Bureau of Investigation (FBI) have released a Cybersecurity Advisory (CSA) detailing the tactics, techniques, and procedures (TTPs) and indicators of compromise (IOCs) of the Iranian government-sponsored actors, with the goal of assisting network defenders in detecting and preventing related compromises.[\/vc_column_text][vc_column_text]The Computer Security Industry Association (CISA) and the Federal Bureau of Investigation (FBI) advise that any company using vulnerable VMware systems that has not yet applied the necessary patches or workarounds should assume compromise and begin threat hunting immediately. Assume lateral movement by threat actors, investigate connected systems (including the DC), and conduct privileged account audits if suspected initial access or compromise is detected based on IOCs or TTPs described in this CSA, as recommended by CISA and the FBI. The Mitigations section of this CSA should be applied by all organizations to safeguard against similar malicious cyber activity, regardless of whether or not evidence of compromise has been found.[\/vc_column_text][vc_column_text]For more information on Iranian government-sponsored Iranian malicious cyber activity, see CISA\u2019s\u00a0<a href=\"https:\/\/www.cisa.gov\/uscert\/iran\">Iran Cyber Threat Overview and Advisories<\/a>\u00a0webpage and FBI\u2019s\u00a0<a href=\"https:\/\/www.fbi.gov\/investigate\/counterintelligence\/the-iran-threat\">Iran Threats<\/a>\u00a0webpage.[\/vc_column_text][divider line_type=&#8221;No Line&#8221; custom_height=&#8221;10&#8243;][\/vc_column][\/vc_row][vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][heading]\n<h2>Technical Details<\/h2>\n[\/heading][vc_column_text]Please take note that MITRE ATT&amp;CK for Enterprise, Version 11 is used in this advisory. Threat actors&#8217; actions are tabulated according to MITRE ATT&amp;CK\u00ae tactics and techniques, with mitigation and detection suggestions provided in the table provided in the MITRE ATT&amp;CK Tactics and Techniques section.[\/vc_column_text][vc_custom_heading text=&#8221;Overview&#8221; font_container=&#8221;tag:h4|text_align:left&#8221;][vc_column_text]CISA conducted a retrospective analysis in April 2022 using EINSTEIN, an FCEB-wide intrusion detection system (IDS) operated and monitored by CISA, and found evidence of possible APT activity on the network of an FCEB organization. CISA discovered two-way communication between the network and a malicious IP address linked to attacks on VMware Horizon servers using the Log4Shell vulnerability (CVE-2021-44228). Threat hunting incident response efforts were launched by CISA in collaboration with the FCEB organization; nevertheless, more suspected APT activity was spotted by CISA before the deployment of an incident response team. CISA saw traffic from the IP address 51.89.181[.]64 using HTTPS to access the VMware server. Trusted third-party reporting indicates that the LDAP server located at 51.89.181[.]64 is used by threat actors who exploit Log4Shell. CISA discovered a possible LDAP callback to this IP address on port 443 after HTTPS traffic. The victim server returned this Log4Shell LDAP callback to the actors&#8217; server, and CISA saw a DNS query for usnationny[.]cf resolve back to 51.89.181.64 during this time.[\/vc_column_text][vc_column_text]Based on the successful callback to the indicator, CISA concluded that this traffic indicated a confirmed compromise and reported its findings to the organization, which subsequently discovered indicators of compromise during an investigation. CISA suspected the threat actors had compromised the organization&#8217;s DC after receiving reports that linked activity on 51.89.181[. ]64&#8217;s Log4Shell server to lateral movement and the targeting of DCs.<\/p>\n<p>CISA conducted an onsite incident response engagement from the middle of June to the middle of July 2022, during which time it discovered that the company had been compromised as early as February 2022, most likely by APT actors sponsored by the Iranian government who installed XMRig crypto mining software. The attackers compromised credentials and implanted Ngrok reverse proxies before laterally spreading to the domain controller.[\/vc_column_text][vc_custom_heading text=&#8221;Threat Actor Activity&#8221; font_container=&#8221;tag:h4|text_align:left&#8221;][vc_column_text]Attackers gained access [TA0001] to an unpatched VMware Horizon server in the company in February 2022 by exploiting Log4Shell [T1190]. CISA discovered an initial exploit that involved a 17.6-second connection to the malicious IP address 182.54.217[. ]2.<\/p>\n<p>The following PowerShell command [T1059.001] was executed as part of the exploit payload, which added an exclusion tool to Windows Defender [T1562.001]:[\/vc_column_text][vc_column_text]\n<p>I am text block. Click edit button to change this text. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.<\/p>\n[\/vc_column_text][nectar_scrolling_text scroll_direction=&#8221;ltr&#8221; scroll_speed=&#8221;slower&#8221; style=&#8221;default&#8221; text_repeat_number=&#8221;2&#8243; text_repeat_divider=&#8221;none&#8221; overflow=&#8221;hidden&#8221; background_image_animation=&#8221;None&#8221;]powershell try{Add-MpPreference -ExclusionPath &#8216;C:\\&#8217;; Write-Host &#8216;added-exclusion&#8217;} catch {Write-Host &#8216;adding-exclusion-failed&#8217; }; powershell -enc &#8220;$BASE64 encoded payload to download next stage and execute it&#8221;[\/nectar_scrolling_text][vc_column_text]The exclusion tool allowlisted the entire\u00a0c:\\drive, enabling threat actors to download tools to the\u00a0c:\\drive\u00a0without virus scans. The exploit payload then downloaded\u00a0mdeploy.text\u00a0from\u00a0182.54.217[.]2\/mdepoy.txt\u00a0to\u00a0C:\\users\\public\\mde.ps1\u00a0[T1105]. When executed, mde.ps1 downloaded\u00a0file.zip\u00a0from\u00a0182.54.217[.]2\u00a0and removed\u00a0mde.ps1\u00a0from the disk [<a href=\"https:\/\/attack.mitre.org\/versions\/v11\/techniques\/T1070\/004\/\">T1070.004<\/a>].<\/p>\n<p>file.zip\u00a0contained XMRig cryptocurrency mining software and associated configuration files.<\/p>\n<ul>\n<li>WinRing0x64.sys\u00a0\u2013 XMRig Miner driver<\/li>\n<li>wuacltservice.exe\u00a0\u2013 XMRig Miner<\/li>\n<li>config.json\u00a0\u2013 XMRig miner configuration<\/li>\n<li>RuntimeBroker.exe\u00a0\u2013 Associated file. This file can create a local user account [T1136.001] and tests for internet connectivity by pinging\u00a08.8.8.8\u00a0[T1016.001]. The exploit payload created a Scheduled Task [T1053.005] that executed\u00a0RuntimeBroker.exe\u00a0daily as\u00a0SYSTEM. Note: By exploiting Log4Shell, the actors gained access to a VMware service account with administrator and system level access. The Scheduled Task was named\u00a0RuntimeBrokerService.exe\u00a0to masquerade as a legitimate Windows task.<\/li>\n<\/ul>\n<p>See MAR 10387061-1.v1 for additional information, including IOCs, on these four files.<\/p>\n<p>After obtaining initial access and installing XMRig on the VMWare Horizon server, the actors used RDP [T1021.001] and the built-in Windows user account\u00a0DefaultAccount\u00a0[T1078.001] to move laterally [TA0008] to a VMware VDI-KMS host. Once the threat actor established themselves on the VDI-KMS host, CISA observed the actors download around 30 megabytes of files from\u00a0transfer[.]sh\u00a0server associated with\u00a0144.76.136[.]153. The actors downloaded the following tools:<\/p>\n<ul>\n<li><a href=\"https:\/\/attack.mitre.org\/software\/S0029\/\">PsExec<\/a>\u00a0\u2013 a Microsoft signed tool for system administrators.<\/li>\n<li><a href=\"https:\/\/attack.mitre.org\/versions\/v11\/software\/S0002\/\">Mimikatz<\/a>\u00a0\u2013 a credential theft tool.<\/li>\n<li><a href=\"https:\/\/attack.mitre.org\/versions\/v11\/software\/S0508\/\">Ngrok<\/a>\u00a0\u2013 a reverse proxy tool for proxying an internal service out onto an Ngrok domain, which the user can then access at a randomly generated subdomain at\u00a0*.ngrok[.]io. CISA has observed this tool in use by some commercial products for benign purposes; however, this process bypasses typical firewall controls and may be a potentially unwanted application in production environments. Ngrok is known to be used for malicious purposes.[<a href=\"https:\/\/attack.mitre.org\/versions\/v11\/software\/S0508\/\">1<\/a>]<\/li>\n<\/ul>\n<p>The threat actors then executed Mimikatz on VDI-KMS to harvest credentials and created a rogue domain administrator account [T1136.002]. Using the newly created account, the actors leveraged RDP to propagate to several hosts within the network. Upon logging into each host, the actors manually disabled Windows Defender via the Graphical User Interface (GUI) and implanted Ngrok executables and configuration files. The threat actors were able to implant Ngrok on multiple hosts to ensure Ngrok\u2019s persistence should they lose access to a machine during a routine reboot. The actors were able to proxy [T1090] RDP sessions, which were only observable on the local network as outgoing HTTPS port 443 connections to\u00a0tunnel.us.ngrok[.]com\u00a0and\u00a0korgn.su.lennut[.]com\u00a0(the prior domain in reverse). It is possible, but was not observed, that the threat actors configured a custom domain, or used other Ngrok tunnel domains, wildcarded here as\u00a0*.ngrok[.]com,\u00a0*.ngrok[.]io,\u00a0ngrok.*.tunnel[.]com, or\u00a0korgn.*.lennut[.]com.<\/p>\n<p>Once the threat actors established a deep foothold in the network and moved laterally to the domain controller, they executed the following PowerShell command on the Active Directory to obtain a list of all machines attached to the domain [T1018]:<\/p>\n<p class=\"TechText\">Powershell.exe get-adcomputer -filter * -properties * | select name,operatingsystem,ipv4address &amp;gt;<\/p>\n<p>The threat actors also changed the password for the local administrator account [T1098] on several hosts as a backup should the rogue domain administrator account get detected and terminated. Additionally, the threat actor was observed attempting to dump the Local Security Authority Subsystem Service (LSASS) process [T1003.001] with task manager but this was stopped by additional anti-virus the FCEB organization had installed.[\/vc_column_text][heading]\n<h2>MITRE ATT&amp;CK TACTICS AND TECHNIQUES<\/h2>\n[\/heading][vc_column_text]\n<div style=\"direction: ltr;\">\n<table style=\"direction: ltr; border-collapse: collapse; border: 1pt solid #A3A3A3;\" title=\"\" border=\"1\" summary=\"\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td style=\"background-color: #595959; vertical-align: top; width: .9659in; padding: 4pt 4pt 4pt 4pt; border: 1pt solid #A3A3A3;\">\n<p lang=\"en-US\" style=\"margin: 0in; font-family: Arial; font-size: 10.0pt; color: #c1c1c1; text-align: center;\"><span style=\"font-weight: bold;\">Initial Access<\/span><\/p>\n<\/td>\n<td style=\"background-color: #595959; vertical-align: top; width: .6854in; padding: 4pt 4pt 4pt 4pt; border: 1pt solid #A3A3A3;\">\n<p lang=\"en-US\" style=\"margin: 0in; font-family: Calibri; font-size: 10.0pt;\">\n<\/td>\n<td style=\"background-color: #595959; vertical-align: top; width: 1.4756in; padding: 4pt 4pt 4pt 4pt; border: 1pt solid #A3A3A3;\">\n<p lang=\"en-US\" style=\"margin: 0in; font-family: Calibri; font-size: 10.0pt;\">\n<\/td>\n<td style=\"background-color: #595959; vertical-align: top; width: 1.859in; padding: 4pt 4pt 4pt 4pt; border: 1pt solid #A3A3A3;\">\n<p lang=\"en-US\" style=\"margin: 0in; font-family: Calibri; font-size: 10.0pt;\">\n<\/td>\n<\/tr>\n<tr>\n<td style=\"background-color: #a6a6a6; vertical-align: top; width: .968in; padding: 4pt 4pt 4pt 4pt; border: 1pt solid #A3A3A3;\">\n<p lang=\"en-US\" style=\"margin: 0in; font-family: Arial; font-size: 10.0pt; color: white; text-align: center;\"><span style=\"font-weight: bold;\">Technique Title<\/span><\/p>\n<\/td>\n<td style=\"background-color: #a6a6a6; vertical-align: top; width: .6854in; padding: 4pt 4pt 4pt 4pt; border: 1pt solid #A3A3A3;\">\n<p lang=\"en-US\" style=\"margin: 0in; font-family: Arial; font-size: 10.0pt; color: white; text-align: center;\"><span style=\"font-weight: bold;\">ID<\/span><\/p>\n<\/td>\n<td style=\"background-color: #a6a6a6; vertical-align: top; width: 1.4756in; padding: 4pt 4pt 4pt 4pt; border: 1pt solid #A3A3A3;\">\n<p lang=\"en-US\" style=\"margin: 0in; font-family: Arial; font-size: 10.0pt; color: white; text-align: center;\"><span style=\"font-weight: bold;\">Use<\/span><\/p>\n<\/td>\n<td style=\"background-color: #a6a6a6; vertical-align: top; width: 1.9701in; padding: 4pt 4pt 4pt 4pt; border: 1pt solid #A3A3A3;\">\n<p lang=\"en-US\" style=\"margin: 0in; font-family: Arial; font-size: 10.0pt; color: white; text-align: center;\"><span style=\"font-weight: bold;\">Recommendations<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"background-color: white; vertical-align: top; width: .9659in; padding: 4pt 4pt 4pt 4pt; border: 1pt solid #A3A3A3;\">\n<p lang=\"en-US\" style=\"margin-top: 0pt; margin-bottom: 6pt; font-family: Arial; font-size: 10.0pt; color: #292929;\">Exploit Public-Facing Application<\/p>\n<\/td>\n<td style=\"background-color: white; vertical-align: top; width: .6854in; padding: 4pt 4pt 4pt 4pt; border: 1pt solid #A3A3A3;\">\n<p lang=\"en-US\" style=\"margin-top: 0pt; margin-bottom: 6pt; font-size: 10.0pt;\"><a href=\"https:\/\/attack.mitre.org\/versions\/v11\/techniques\/T1190\/\"><span style=\"font-family: Arial;\">T1190<\/span><\/a><\/p>\n<\/td>\n<td style=\"background-color: white; vertical-align: top; width: 1.4756in; padding: 4pt 4pt 4pt 4pt; border: 1pt solid #A3A3A3;\">\n<p lang=\"en-US\" style=\"margin-top: 0pt; margin-bottom: 6pt; font-family: Arial; font-size: 10.0pt; color: #292929;\">The actors exploited Log4Shell for initial access to the organization\u2019s VMware Horizon server.<\/p>\n<\/td>\n<td style=\"background-color: white; vertical-align: top; width: 2.0687in; padding: 4pt 4pt 4pt 4pt; border: 1pt solid #A3A3A3;\">\n<p lang=\"en-US\" style=\"margin-top: 0pt; margin-bottom: 6pt; font-family: Arial; font-size: 10.0pt;\"><span style=\"font-weight: bold; color: #292929;\">Mitigation\/Detection:<\/span><span style=\"color: #292929;\">\u00a0Use a firewall or web-application firewall and enable logging to prevent and detect potential Log4Shell exploitation attempts [<\/span><a href=\"https:\/\/attack.mitre.org\/versions\/v11\/mitigations\/M1050\">M1050<\/a><span style=\"color: #292929;\">].<\/span><\/p>\n<p lang=\"en-US\" style=\"margin-top: 0pt; margin-bottom: 6pt; font-family: Arial; font-size: 10.0pt;\"><span style=\"font-weight: bold; color: #292929;\">Mitigation:<\/span><span style=\"color: #292929;\">\u00a0Perform regular vulnerability scanning to detect Log4J vulnerabilities and update Log4J software using vendor provided patches [<\/span><a href=\"https:\/\/attack.mitre.org\/versions\/v11\/mitigations\/M1016\">M1016<\/a><span style=\"color: #292929;\">],[<\/span><a href=\"https:\/\/attack.mitre.org\/versions\/v11\/mitigations\/M1051\">M1051<\/a><span style=\"color: #292929;\">].<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"background-color: #595959; vertical-align: top; width: .9659in; padding: 4pt 4pt 4pt 4pt; border: 1pt solid #A3A3A3;\">\n<p lang=\"en-US\" style=\"margin: 0in; font-family: Arial; font-size: 10.0pt; color: #c1c1c1; text-align: center;\"><span style=\"font-weight: bold;\">Execution<\/span><\/p>\n<\/td>\n<td style=\"background-color: #595959; vertical-align: top; width: .6854in; padding: 4pt 4pt 4pt 4pt; border: 1pt solid #A3A3A3;\">\n<p lang=\"en-US\" style=\"margin: 0in; font-family: Calibri; font-size: 10.0pt;\">\n<\/td>\n<td style=\"background-color: #595959; vertical-align: top; width: 1.4756in; padding: 4pt 4pt 4pt 4pt; border: 1pt solid #A3A3A3;\">\n<p lang=\"en-US\" style=\"margin: 0in; font-family: Calibri; font-size: 10.0pt;\">\n<\/td>\n<td style=\"background-color: #595959; vertical-align: top; width: 1.859in; padding: 4pt 4pt 4pt 4pt; border: 1pt solid #A3A3A3;\">\n<p lang=\"en-US\" style=\"margin: 0in; font-family: Calibri; font-size: 10.0pt;\">\n<\/td>\n<\/tr>\n<tr>\n<td style=\"background-color: #a6a6a6; vertical-align: top; width: .968in; padding: 4pt 4pt 4pt 4pt; border: 1pt solid #A3A3A3;\">\n<p lang=\"en-US\" style=\"margin: 0in; font-family: Arial; font-size: 10.0pt; color: white; text-align: center;\"><span style=\"font-weight: bold;\">Technique Title<\/span><\/p>\n<\/td>\n<td style=\"background-color: #a6a6a6; vertical-align: top; width: .6854in; padding: 4pt 4pt 4pt 4pt; border: 1pt solid #A3A3A3;\">\n<p lang=\"en-US\" style=\"margin: 0in; font-family: Arial; font-size: 10.0pt; color: white; text-align: center;\"><span style=\"font-weight: bold;\">ID<\/span><\/p>\n<\/td>\n<td style=\"background-color: #a6a6a6; vertical-align: top; width: 1.4756in; padding: 4pt 4pt 4pt 4pt; border: 1pt solid #A3A3A3;\">\n<p lang=\"en-US\" style=\"margin: 0in; font-family: Arial; font-size: 10.0pt; color: white; text-align: center;\"><span style=\"font-weight: bold;\">Use<\/span><\/p>\n<\/td>\n<td style=\"background-color: #a6a6a6; vertical-align: top; width: 1.9701in; padding: 4pt 4pt 4pt 4pt; border: 1pt solid #A3A3A3;\">\n<p lang=\"en-US\" style=\"margin: 0in; font-family: Arial; font-size: 10.0pt; color: white; text-align: center;\"><span style=\"font-weight: bold;\">Recommendation<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"background-color: white; vertical-align: top; width: .9659in; padding: 4pt 4pt 4pt 4pt; border: 1pt solid #A3A3A3;\">\n<p lang=\"en-US\" style=\"margin-top: 0pt; margin-bottom: 6pt; font-family: Arial; font-size: 10.0pt; color: #292929;\">Command and Scripting Interpreter: PowerShell<\/p>\n<\/td>\n<td style=\"background-color: white; vertical-align: top; width: .7048in; padding: 4pt 4pt 4pt 4pt; border: 1pt solid #A3A3A3;\">\n<p lang=\"en-US\" style=\"margin-top: 0pt; margin-bottom: 6pt; font-size: 10.0pt;\"><a href=\"https:\/\/attack.mitre.org\/versions\/v11\/techniques\/T1059\/001\/\"><span style=\"font-family: Arial;\">T1059.001<\/span><\/a><\/p>\n<\/td>\n<td style=\"background-color: white; vertical-align: top; width: 1.4798in; padding: 4pt 4pt 4pt 4pt; border: 1pt solid #A3A3A3;\">\n<p lang=\"en-US\" style=\"margin-top: 0pt; margin-bottom: 6pt; font-family: Arial; font-size: 10.0pt; color: #292929;\">The actors ran PowerShell commands that added an exclusion tool to Windows Defender.<\/p>\n<p lang=\"en-US\" style=\"margin-top: 0pt; margin-bottom: 6pt; font-family: Arial; font-size: 10.0pt; color: #292929;\">The actors executed PowerShell on the AD to obtain a list of machines on the domain.<\/p>\n<\/td>\n<td style=\"background-color: white; vertical-align: top; width: 2.0743in; padding: 4pt 4pt 4pt 4pt; border: 1pt solid #A3A3A3;\">\n<p lang=\"en-US\" style=\"margin-top: 0pt; margin-bottom: 6pt; font-family: Arial; font-size: 10.0pt;\"><span style=\"font-weight: bold; color: #292929;\">Mitigation:<\/span><span style=\"color: #292929;\">\u00a0Disable or remove PowerShell for non-administrative users [<\/span><a href=\"https:\/\/attack.mitre.org\/versions\/v11\/mitigations\/M1042\">M1042<\/a><span style=\"color: #292929;\">],[<\/span><a href=\"https:\/\/attack.mitre.org\/versions\/v11\/mitigations\/M1026\">M1026<\/a><span style=\"color: #292929;\">] or enable code-signing to execute only signed scripts [<\/span><a href=\"https:\/\/attack.mitre.org\/versions\/v11\/mitigations\/M1045\">M1045<\/a><span style=\"color: #292929;\">].<\/span><\/p>\n<p lang=\"en-US\" style=\"margin-top: 0pt; margin-bottom: 6pt; font-family: Arial; font-size: 10.0pt;\"><span style=\"font-weight: bold; color: #292929;\">Mitigation:<\/span><span style=\"color: #292929;\">\u00a0Employ anti-malware to automatically detect and quarantine malicious scripts [<\/span><a href=\"https:\/\/attack.mitre.org\/versions\/v11\/mitigations\/M1049\">M1049<\/a><span style=\"color: #292929;\">].<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"background-color: #595959; vertical-align: top; width: .9854in; padding: 4pt 4pt 4pt 4pt; border: 1pt solid #A3A3A3;\">\n<p lang=\"en-US\" style=\"margin: 0in; font-family: Arial; font-size: 10.0pt; color: #c1c1c1; text-align: center;\"><span style=\"font-weight: bold;\">Persistence<\/span><\/p>\n<\/td>\n<td style=\"background-color: #595959; vertical-align: top; width: .6854in; padding: 4pt 4pt 4pt 4pt; border: 1pt solid #A3A3A3;\">\n<p lang=\"en-US\" style=\"margin: 0in; font-family: Calibri; font-size: 10.0pt;\">\n<\/td>\n<td style=\"background-color: #595959; vertical-align: top; width: 1.4756in; padding: 4pt 4pt 4pt 4pt; border: 1pt solid #A3A3A3;\">\n<p lang=\"en-US\" style=\"margin: 0in; font-family: Calibri; font-size: 10.0pt;\">\n<\/td>\n<td style=\"background-color: #595959; vertical-align: top; width: 1.8395in; padding: 4pt 4pt 4pt 4pt; border: 1pt solid #A3A3A3;\">\n<p lang=\"en-US\" style=\"margin: 0in; font-family: Calibri; font-size: 10.0pt;\">\n<\/td>\n<\/tr>\n<tr>\n<td style=\"background-color: #a6a6a6; vertical-align: top; width: .968in; padding: 4pt 4pt 4pt 4pt; border: 1pt solid #A3A3A3;\">\n<p lang=\"en-US\" style=\"margin: 0in; font-family: Arial; font-size: 10.0pt; color: white; text-align: center;\"><span style=\"font-weight: bold;\">Technique Title<\/span><\/p>\n<\/td>\n<td style=\"background-color: #a6a6a6; vertical-align: top; width: .6854in; padding: 4pt 4pt 4pt 4pt; border: 1pt solid #A3A3A3;\">\n<p lang=\"en-US\" style=\"margin: 0in; font-family: Arial; font-size: 10.0pt; color: white; text-align: center;\"><span style=\"font-weight: bold;\">ID<\/span><\/p>\n<\/td>\n<td style=\"background-color: #a6a6a6; vertical-align: top; width: 1.4756in; padding: 4pt 4pt 4pt 4pt; border: 1pt solid #A3A3A3;\">\n<p lang=\"en-US\" style=\"margin: 0in; font-family: Arial; font-size: 10.0pt; color: white; text-align: center;\"><span style=\"font-weight: bold;\">Use<\/span><\/p>\n<\/td>\n<td style=\"background-color: #a6a6a6; vertical-align: top; width: 1.9701in; padding: 4pt 4pt 4pt 4pt; border: 1pt solid #A3A3A3;\">\n<p lang=\"en-US\" style=\"margin: 0in; font-family: Arial; font-size: 10.0pt; color: white; text-align: center;\"><span style=\"font-weight: bold;\">Recommendations<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"background-color: white; vertical-align: top; width: .9854in; padding: 4pt 4pt 4pt 4pt; border: 1pt solid #A3A3A3;\">\n<p lang=\"en-US\" style=\"margin-top: 0pt; margin-bottom: 6pt; font-family: Arial; font-size: 10.0pt; color: #292929;\">Account Manipulation<\/p>\n<\/td>\n<td style=\"background-color: white; vertical-align: top; width: .6854in; padding: 4pt 4pt 4pt 4pt; border: 1pt solid #A3A3A3;\">\n<p lang=\"en-US\" style=\"margin-top: 0pt; margin-bottom: 6pt; font-size: 10.0pt;\"><a href=\"https:\/\/attack.mitre.org\/versions\/v11\/techniques\/T1098\/\"><span style=\"font-family: Arial;\">T1098<\/span><\/a><\/p>\n<\/td>\n<td style=\"background-color: white; vertical-align: top; width: 1.4798in; padding: 4pt 4pt 4pt 4pt; border: 1pt solid #A3A3A3;\">\n<p lang=\"en-US\" style=\"margin-top: 0pt; margin-bottom: 6pt; font-family: Arial; font-size: 10.0pt; color: #292929;\">The actors changed the password for the local administrator account on several hosts.<\/p>\n<\/td>\n<td style=\"background-color: white; vertical-align: top; width: 2.0527in; padding: 4pt 4pt 4pt 4pt; border: 1pt solid #A3A3A3;\">\n<p lang=\"en-US\" style=\"margin-top: 0pt; margin-bottom: 6pt; font-family: Arial; font-size: 10.0pt;\"><span style=\"font-weight: bold; color: #292929;\">Mitigation:<\/span><span style=\"color: #292929;\">\u00a0Use multifactor authentication for user and privileged accounts [<\/span><a href=\"https:\/\/attack.mitre.org\/versions\/v11\/mitigations\/M1032\">M1032<\/a><span style=\"color: #292929;\">].<\/span><\/p>\n<p lang=\"en-US\" style=\"margin-top: 0pt; margin-bottom: 6pt; font-size: 10.0pt;\"><span style=\"font-weight: bold; font-family: Arial; color: #292929;\">Detection:<\/span><span style=\"font-family: Arial; color: #292929;\">\u00a0Monitor events for changes to account objects and\/or permissions on systems and the domain, such as event IDs\u00a0<\/span><span style=\"font-family: Consolas; color: #232323; background: #BFBFBF;\">4738<\/span><span style=\"font-family: Arial; color: #292929;\">,\u00a0<\/span><span style=\"font-family: Consolas; color: #232323; background: #BFBFBF;\">4728<\/span><span style=\"font-family: Arial; color: #292929;\">, and\u00a0<\/span><span style=\"font-family: Consolas; color: #232323; background: #BFBFBF;\">4670<\/span><span style=\"font-family: Arial; color: #292929;\">. Monitor for modification of accounts in correlation with other suspicious activity [<\/span><a href=\"https:\/\/attack.mitre.org\/versions\/v11\/datasources\/DS0002\"><span style=\"font-family: Arial;\">DS0002<\/span><\/a><span style=\"font-family: Arial; color: #292929;\">].<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"background-color: white; vertical-align: top; width: .9659in; padding: 4pt 4pt 4pt 4pt; border: 1pt solid #A3A3A3;\">\n<p lang=\"en-US\" style=\"margin-top: 0pt; margin-bottom: 6pt; font-family: Arial; font-size: 10.0pt; color: #292929;\">Create Account: Local Account<\/p>\n<\/td>\n<td style=\"background-color: white; vertical-align: top; width: .7048in; padding: 4pt 4pt 4pt 4pt; border: 1pt solid #A3A3A3;\">\n<p lang=\"en-US\" style=\"margin-top: 0pt; margin-bottom: 6pt; font-size: 10.0pt;\"><a href=\"https:\/\/attack.mitre.org\/techniques\/T1136\/001\/\"><span style=\"font-family: Arial;\">T1136.001<\/span><\/a><\/p>\n<\/td>\n<td style=\"background-color: white; vertical-align: top; width: 1.4951in; padding: 4pt 4pt 4pt 4pt; border: 1pt solid #A3A3A3;\">\n<p lang=\"en-US\" style=\"margin-top: 0pt; margin-bottom: 6pt; font-family: Arial; font-size: 10.0pt; color: #292929;\">The actors\u2019 malware can create local user accounts.<\/p>\n<\/td>\n<td style=\"background-color: white; vertical-align: top; width: 2.0743in; padding: 4pt 4pt 4pt 4pt; border: 1pt solid #A3A3A3;\">\n<p lang=\"en-US\" style=\"margin-top: 0pt; margin-bottom: 6pt; font-family: Arial; font-size: 10.0pt; color: #292929;\"><span style=\"font-weight: bold;\">Mitigation:<\/span>\u00a0Configure access controls and firewalls to limit access to domain controllers and systems used to create and manage accounts.<\/p>\n<p style=\"margin-top: 0pt; margin-bottom: 6pt; font-size: 10.0pt;\"><span lang=\"en-US\" style=\"font-weight: bold; font-family: Arial; color: #292929;\">Detection:<\/span><span lang=\"en-US\" style=\"font-family: Arial; color: #292929;\">\u00a0Monitor executed commands and arguments for actions that are associated with local account creation, such as\u00a0<\/span><span lang=\"en-US\" style=\"font-family: Consolas; color: #232323; background: #BFBFBF;\">net user \/add<\/span><span lang=\"en-AE\" style=\"font-family: Arial; color: #292929;\">\u00a0<\/span><span lang=\"en-US\" style=\"font-family: Arial; color: #292929;\">,\u00a0<\/span><span lang=\"en-US\" style=\"font-family: Consolas; color: #232323; background: #BFBFBF;\">useradd<\/span><span lang=\"en-US\" style=\"font-family: Arial; color: #292929;\">, and\u00a0<\/span><span lang=\"en-US\" style=\"font-family: Consolas; color: #232323; background: #BFBFBF;\">dscl -create<\/span><span lang=\"en-AE\" style=\"font-family: Arial; color: #292929;\">\u00a0<\/span><span lang=\"en-US\" style=\"font-family: Arial; color: #292929;\">[<\/span><a href=\"https:\/\/attack.mitre.org\/datasources\/DS0017\/#Command%20Execution\"><span lang=\"en-US\" style=\"font-family: Arial;\">DS0017<\/span><\/a><span lang=\"en-US\" style=\"font-family: Arial; color: #292929;\">].<\/span><\/p>\n<p lang=\"en-US\" style=\"margin-top: 0pt; margin-bottom: 6pt; font-family: Arial; font-size: 10.0pt;\"><span style=\"font-weight: bold; color: #292929;\">Detection:<\/span><span style=\"color: #292929;\">\u00a0Enable logging for new user creation [<\/span><a href=\"https:\/\/attack.mitre.org\/versions\/v11\/datasources\/DS0002\">DS0002<\/a><span style=\"color: #292929;\">].<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"background-color: white; vertical-align: top; width: .9659in; padding: 4pt 4pt 4pt 4pt; border: 1pt solid #A3A3A3;\">\n<p lang=\"en-US\" style=\"margin-top: 0pt; margin-bottom: 6pt; font-family: Arial; font-size: 10.0pt; color: #292929;\">Create Account: Domain Account<\/p>\n<\/td>\n<td style=\"background-color: white; vertical-align: top; width: .7048in; padding: 4pt 4pt 4pt 4pt; border: 1pt solid #A3A3A3;\">\n<p lang=\"en-US\" style=\"margin-top: 0pt; margin-bottom: 6pt; font-size: 10.0pt;\"><a href=\"https:\/\/attack.mitre.org\/versions\/v11\/techniques\/T1136\/002\/\"><span style=\"font-family: Arial;\">T1136.002<\/span><\/a><\/p>\n<\/td>\n<td style=\"background-color: white; vertical-align: top; width: 1.4756in; padding: 4pt 4pt 4pt 4pt; border: 1pt solid #A3A3A3;\">\n<p lang=\"en-US\" style=\"margin-top: 0pt; margin-bottom: 6pt; font-family: Arial; font-size: 10.0pt; color: #292929;\">The actors used Mimikatz to create a rogue domain administrator account.<\/p>\n<\/td>\n<td style=\"background-color: white; vertical-align: top; width: 2.0743in; padding: 4pt 4pt 4pt 4pt; border: 1pt solid #A3A3A3;\">\n<p lang=\"en-US\" style=\"margin-top: 0pt; margin-bottom: 6pt; font-family: Arial; font-size: 10.0pt; color: #292929;\"><span style=\"font-weight: bold;\">Mitigation:<\/span>\u00a0Configure access controls and firewalls to limit access to domain controllers and systems used to create and manage accounts.<\/p>\n<p lang=\"en-US\" style=\"margin-top: 0pt; margin-bottom: 6pt; font-family: Arial; font-size: 10.0pt;\"><span style=\"font-weight: bold; color: #292929;\">Detection:<\/span><span style=\"color: #292929;\">\u00a0Enable logging for new user creation, especially domain administrator accounts [<\/span><a href=\"https:\/\/attack.mitre.org\/versions\/v11\/datasources\/DS0002\">DS0002<\/a><span style=\"color: #292929;\">].<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"background-color: white; vertical-align: top; width: .9659in; padding: 4pt 4pt 4pt 4pt; border: 1pt solid #A3A3A3;\">\n<p lang=\"en-US\" style=\"margin-top: 0pt; margin-bottom: 6pt; font-family: Arial; font-size: 10.0pt; color: #292929;\">Scheduled Task\/Job: Scheduled Task<\/p>\n<\/td>\n<td style=\"background-color: white; vertical-align: top; width: .7048in; padding: 4pt 4pt 4pt 4pt; border: 1pt solid #A3A3A3;\">\n<p lang=\"en-US\" style=\"margin-top: 0pt; margin-bottom: 6pt; font-size: 10.0pt;\"><a href=\"https:\/\/attack.mitre.org\/versions\/v11\/techniques\/T1053\/005\/\"><span style=\"font-family: Arial;\">T1053.005<\/span><\/a><\/p>\n<\/td>\n<td style=\"background-color: white; vertical-align: top; width: 1.4951in; padding: 4pt 4pt 4pt 4pt; border: 1pt solid #A3A3A3;\">\n<p style=\"margin-top: 0pt; margin-bottom: 6pt; font-size: 10.0pt;\"><span lang=\"en-US\" style=\"font-family: Arial; color: #292929;\">The actors\u2019 exploit payload created Scheduled Task\u00a0<\/span><span lang=\"en-US\" style=\"font-family: Consolas; color: #232323; background: #BFBFBF;\">RuntimeBrokerService.exe<\/span><span lang=\"en-US\" style=\"font-family: Arial; color: #292929;\">, which executed\u00a0<\/span><span lang=\"en-US\" style=\"font-family: Consolas; color: #232323; background: #BFBFBF;\">RuntimeBroker.exe<\/span><span lang=\"en-AE\" style=\"font-family: Arial; color: #292929;\">\u00a0<\/span><span lang=\"en-US\" style=\"font-family: Arial; color: #292929;\">daily as\u00a0<\/span><span lang=\"en-US\" style=\"font-family: Consolas; color: #232323; background: #BFBFBF;\">SYSTEM<\/span><span lang=\"en-US\" style=\"font-family: Arial; color: #292929;\">.<\/span><\/p>\n<\/td>\n<td style=\"background-color: white; vertical-align: top; width: 2.0743in; padding: 4pt 4pt 4pt 4pt; border: 1pt solid #A3A3A3;\">\n<p style=\"margin-top: 0pt; margin-bottom: 6pt; font-size: 10.0pt;\"><span lang=\"en-US\" style=\"font-weight: bold; font-family: Arial; color: #292929;\">Mitigation:<\/span><span lang=\"en-US\" style=\"font-family: Arial; color: #292929;\">\u00a0Configure settings for scheduled tasks to force tasks to run under the context of the authenticated account instead of allowing them to run as\u00a0<\/span><span lang=\"en-US\" style=\"font-family: Consolas; color: #232323; background: #BFBFBF;\">SYSTEM<\/span><span lang=\"en-AE\" style=\"font-family: Arial; color: #292929;\">\u00a0<\/span><span lang=\"en-US\" style=\"font-family: Arial; color: #292929;\">[<\/span><a href=\"https:\/\/attack.mitre.org\/versions\/v11\/mitigations\/M1028\"><span lang=\"en-US\" style=\"font-family: Arial;\">M1028<\/span><\/a><span lang=\"en-US\" style=\"font-family: Arial; color: #292929;\">].<\/span><\/p>\n<p style=\"margin-top: 0pt; margin-bottom: 6pt; font-size: 10.0pt;\"><span lang=\"en-US\" style=\"font-weight: bold; font-family: Arial; color: #292929;\">Detection:<\/span><span lang=\"en-US\" style=\"font-family: Arial; color: #292929;\">\u00a0Monitor for newly constructed processes and\/or command-lines that execute from the\u00a0<\/span><span lang=\"en-US\" style=\"font-family: Consolas; color: #232323; background: #BFBFBF;\">svchost.exe<\/span><span lang=\"en-AE\" style=\"font-family: Arial; color: #292929;\">\u00a0<\/span><span lang=\"en-US\" style=\"font-family: Arial; color: #292929;\">in Windows 10 and the Windows Task Scheduler\u00a0<\/span><span lang=\"en-US\" style=\"font-family: Consolas; color: #232323; background: #BFBFBF;\">taskeng.exe<\/span><span lang=\"en-AE\" style=\"font-family: Arial; color: #292929;\">\u00a0<\/span><span lang=\"en-US\" style=\"font-family: Arial; color: #292929;\">for older versions of Windows [<\/span><a href=\"https:\/\/attack.mitre.org\/versions\/v11\/datasources\/DS0009\"><span lang=\"en-US\" style=\"font-family: Arial;\">DS0009<\/span><\/a><span lang=\"en-US\" style=\"font-family: Arial; color: #292929;\">]<\/span><\/p>\n<p style=\"margin-top: 0pt; margin-bottom: 6pt; font-size: 10.0pt;\"><span lang=\"en-US\" style=\"font-weight: bold; font-family: Arial; color: #292929;\">Detection:<\/span><span lang=\"en-US\" style=\"font-family: Arial; color: #292929;\">\u00a0Monitor for newly constructed scheduled jobs by enabling the\u00a0<\/span><span lang=\"en-US\" style=\"font-family: Consolas; color: #232323; background: #BFBFBF;\">Microsoft-Windows-TaskScheduler\/Operational<\/span><span lang=\"en-AE\" style=\"font-family: Arial; color: #292929;\">\u00a0<\/span><span lang=\"en-US\" style=\"font-family: Arial; color: #292929;\">setting within the event logging service [<\/span><a href=\"https:\/\/attack.mitre.org\/versions\/v11\/datasources\/DS0003\"><span lang=\"en-US\" style=\"font-family: Arial;\">DS0003<\/span><\/a><span lang=\"en-US\" style=\"font-family: Arial; color: #292929;\">].<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"background-color: white; vertical-align: top; width: .9659in; padding: 4pt 4pt 4pt 4pt; border: 1pt solid #A3A3A3;\">\n<p lang=\"en-US\" style=\"margin-top: 0pt; margin-bottom: 6pt; font-family: Arial; font-size: 10.0pt; color: #292929;\">Valid Accounts: Default Accounts<\/p>\n<\/td>\n<td style=\"background-color: white; vertical-align: top; width: .7048in; padding: 4pt 4pt 4pt 4pt; border: 1pt solid #A3A3A3;\">\n<p lang=\"en-US\" style=\"margin-top: 0pt; margin-bottom: 6pt; font-size: 10.0pt;\"><a href=\"https:\/\/attack.mitre.org\/versions\/v11\/techniques\/T1078\/001\/\"><span style=\"font-family: Arial;\">T1078.001<\/span><\/a><\/p>\n<\/td>\n<td style=\"background-color: white; vertical-align: top; width: 1.4951in; padding: 4pt 4pt 4pt 4pt; border: 1pt solid #A3A3A3;\">\n<p lang=\"en-US\" style=\"margin-top: 0pt; margin-bottom: 6pt; font-size: 10.0pt;\"><span style=\"font-family: Arial; color: #292929;\">The actors used built-in Windows user account\u00a0<\/span><span style=\"font-family: Consolas; color: #232323; background: #BFBFBF;\">DefaultAccount<\/span><span style=\"font-family: Arial; color: #292929;\">.<\/span><\/p>\n<\/td>\n<td style=\"background-color: white; vertical-align: top; width: 2.0743in; padding: 4pt 4pt 4pt 4pt; border: 1pt solid #A3A3A3;\">\n<p lang=\"en-US\" style=\"margin-top: 0pt; margin-bottom: 6pt; font-family: Arial; font-size: 10.0pt;\"><span style=\"font-weight: bold; color: #292929;\">Mitigation:<\/span><span style=\"color: #292929;\">\u00a0Change default usernames and passwords immediately after the installation and before deployment to a production environment [<\/span><a href=\"https:\/\/attack.mitre.org\/versions\/v11\/mitigations\/M1027\">M1027<\/a><span style=\"color: #292929;\">].<\/span><\/p>\n<p lang=\"en-US\" style=\"margin-top: 0pt; margin-bottom: 6pt; font-family: Arial; font-size: 10.0pt;\"><span style=\"font-weight: bold; color: #292929;\">Detection:<\/span><span style=\"color: #292929;\">\u00a0Develop rules to monitor logon behavior across default accounts that have been activated or logged into [<\/span><a href=\"https:\/\/attack.mitre.org\/versions\/v11\/datasources\/DS0028\">DS0028<\/a><span style=\"color: #292929;\">].<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"background-color: #595959; vertical-align: top; width: .9659in; padding: 4pt 4pt 4pt 4pt; border: 1pt solid #A3A3A3;\">\n<p lang=\"en-US\" style=\"margin: 0in; font-family: Arial; font-size: 10.0pt; color: #c1c1c1; text-align: center;\"><span style=\"font-weight: bold;\">Defense Evasion<\/span><\/p>\n<\/td>\n<td style=\"background-color: #595959; vertical-align: top; width: .6854in; padding: 4pt 4pt 4pt 4pt; border: 1pt solid #A3A3A3;\">\n<p lang=\"en-US\" style=\"margin: 0in; font-family: Calibri; font-size: 10.0pt;\">\n<\/td>\n<td style=\"background-color: #595959; vertical-align: top; width: 1.4756in; padding: 4pt 4pt 4pt 4pt; border: 1pt solid #A3A3A3;\">\n<p lang=\"en-US\" style=\"margin: 0in; font-family: Calibri; font-size: 10.0pt;\">\n<\/td>\n<td style=\"background-color: #595959; vertical-align: top; width: 1.859in; padding: 4pt 4pt 4pt 4pt; border: 1pt solid #A3A3A3;\">\n<p lang=\"en-US\" style=\"margin: 0in; font-family: Calibri; font-size: 10.0pt;\">\n<\/td>\n<\/tr>\n<tr>\n<td style=\"background-color: #a6a6a6; vertical-align: top; width: .968in; padding: 4pt 4pt 4pt 4pt; border: 1pt solid #A3A3A3;\">\n<p lang=\"en-US\" style=\"margin: 0in; font-family: Arial; font-size: 10.0pt; color: white; text-align: center;\"><span style=\"font-weight: bold;\">Technique Title<\/span><\/p>\n<\/td>\n<td style=\"background-color: #a6a6a6; vertical-align: top; width: .6854in; padding: 4pt 4pt 4pt 4pt; border: 1pt solid #A3A3A3;\">\n<p lang=\"en-US\" style=\"margin: 0in; font-family: Arial; font-size: 10.0pt; color: white; text-align: center;\"><span style=\"font-weight: bold;\">ID<\/span><\/p>\n<\/td>\n<td style=\"background-color: #a6a6a6; vertical-align: top; width: 1.4756in; padding: 4pt 4pt 4pt 4pt; border: 1pt solid #A3A3A3;\">\n<p lang=\"en-US\" style=\"margin: 0in; font-family: Arial; font-size: 10.0pt; color: white; text-align: center;\"><span style=\"font-weight: bold;\">Use<\/span><\/p>\n<\/td>\n<td style=\"background-color: #a6a6a6; vertical-align: top; width: 1.9701in; padding: 4pt 4pt 4pt 4pt; border: 1pt solid #A3A3A3;\">\n<p lang=\"en-US\" style=\"margin: 0in; font-family: Arial; font-size: 10.0pt; color: white; text-align: center;\"><span style=\"font-weight: bold;\">Recommendations<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"background-color: white; vertical-align: top; width: .9854in; padding: 4pt 4pt 4pt 4pt; border: 1pt solid #A3A3A3;\">\n<p lang=\"en-US\" style=\"margin-top: 0pt; margin-bottom: 6pt; font-family: Arial; font-size: 10.0pt; color: #292929;\">Impair Defenses: Disable or Modify Tools<\/p>\n<p lang=\"en-US\" style=\"margin-top: 0pt; margin-bottom: 6pt; font-family: Arial; font-size: 10.0pt; color: #292929;\">\n<\/td>\n<td style=\"background-color: white; vertical-align: top; width: .7048in; padding: 4pt 4pt 4pt 4pt; border: 1pt solid #A3A3A3;\">\n<p lang=\"en-US\" style=\"margin-top: 0pt; margin-bottom: 6pt; font-size: 10.0pt;\"><a href=\"https:\/\/attack.mitre.org\/versions\/v11\/techniques\/T1562\/001\/\"><span style=\"font-family: Arial;\">T1562.001<\/span><\/a><\/p>\n<\/td>\n<td style=\"background-color: white; vertical-align: top; width: 1.4951in; padding: 4pt 4pt 4pt 4pt; border: 1pt solid #A3A3A3;\">\n<p lang=\"en-US\" style=\"margin-top: 0pt; margin-bottom: 6pt; font-size: 10.0pt;\"><span style=\"font-family: Arial; color: #292929;\">The actors added an exclusion tool to Windows Defender. The tool allowlisted the entire\u00a0<\/span><span style=\"font-family: Consolas; color: #232323; background: #BFBFBF;\">c:\\drive<\/span><span style=\"font-family: Arial; color: #292929;\">, enabling the actors to bypass virus scans for tools they downloaded to the\u00a0<\/span><span style=\"font-family: Consolas; color: #232323; background: #BFBFBF;\">c:\\drive<\/span><span style=\"font-family: Arial; color: #292929;\">.<\/span><\/p>\n<p lang=\"en-US\" style=\"margin-top: 0pt; margin-bottom: 6pt; font-family: Arial; font-size: 10.0pt; color: #292929;\">The actors manually disabled Windows Defender via the GUI.<\/p>\n<\/td>\n<td style=\"background-color: white; vertical-align: top; width: 2.0743in; padding: 4pt 4pt 4pt 4pt; border: 1pt solid #A3A3A3;\">\n<p lang=\"en-US\" style=\"margin-top: 0pt; margin-bottom: 6pt; font-family: Arial; font-size: 10.0pt;\"><span style=\"font-weight: bold; color: #292929;\">Mitigation:<\/span><span style=\"color: #292929;\">\u00a0Ensure proper user permissions are in place to prevent adversaries from disabling or interfering with security services. [<\/span><a href=\"https:\/\/attack.mitre.org\/versions\/v11\/mitigations\/M1018\">M1018<\/a><span style=\"color: #292929;\">].<\/span><\/p>\n<p style=\"margin-top: 0pt; margin-bottom: 6pt; font-size: 10.0pt;\"><span lang=\"en-US\" style=\"font-weight: bold; font-family: Arial; color: #292929;\">Detection:<\/span><span lang=\"en-US\" style=\"font-family: Arial; color: #292929;\">\u00a0Monitor for changes made to Windows Registry keys and\/or values related to services and startup programs that correspond to security tools such as\u00a0<\/span><span lang=\"en-US\" style=\"font-family: Consolas; color: #232323; background: #BFBFBF;\">HKLM:\\SOFTWARE\\Policies\\Microsoft\\Windows<\/span><span lang=\"en-AE\" style=\"font-family: Arial; color: #292929;\">\u00a0<\/span><span lang=\"en-US\" style=\"font-family: Arial; color: #292929;\">Defender [<\/span><a href=\"https:\/\/attack.mitre.org\/versions\/v11\/datasources\/DS0024\"><span lang=\"en-US\" style=\"font-family: Arial;\">DS0024<\/span><\/a><span lang=\"en-US\" style=\"font-family: Arial; color: #292929;\">].<\/span><\/p>\n<p lang=\"en-US\" style=\"margin-top: 0pt; margin-bottom: 6pt; font-family: Arial; font-size: 10.0pt;\"><span style=\"font-weight: bold; color: #292929;\">Detection:<\/span><span style=\"color: #292929;\">\u00a0Monitor for telemetry that provides context for modification or deletion of information related to security software processes or services such as Windows Defender definition files in Windows and System log files in Linux [<\/span><a href=\"https:\/\/attack.mitre.org\/versions\/v11\/datasources\/DS0013\">DS0013<\/a><span style=\"color: #292929;\">].<\/span><\/p>\n<p lang=\"en-US\" style=\"margin-top: 0pt; margin-bottom: 6pt; font-family: Arial; font-size: 10.0pt;\"><span style=\"font-weight: bold; color: #292929;\">Detection:<\/span><span style=\"color: #292929;\">\u00a0Monitor processes for unexpected termination related to security tools\/services [<\/span><a href=\"https:\/\/attack.mitre.org\/versions\/v11\/datasources\/DS0009\">DS0009<\/a><span style=\"color: #292929;\">].<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"background-color: white; vertical-align: top; width: .9659in; padding: 4pt 4pt 4pt 4pt; border: 1pt solid #A3A3A3;\">\n<p lang=\"en-US\" style=\"margin-top: 0pt; margin-bottom: 6pt; font-family: Arial; font-size: 10.0pt; color: #292929;\">Indicator Removal on Host: File Deletion<\/p>\n<\/td>\n<td style=\"background-color: white; vertical-align: top; width: .7048in; padding: 4pt 4pt 4pt 4pt; border: 1pt solid #A3A3A3;\">\n<p lang=\"en-US\" style=\"margin-top: 0pt; margin-bottom: 6pt; font-size: 10.0pt;\"><a href=\"https:\/\/attack.mitre.org\/versions\/v11\/techniques\/T1070\/004\/\"><span style=\"font-family: Arial;\">T1070.004<\/span><\/a><\/p>\n<\/td>\n<td style=\"background-color: white; vertical-align: top; width: 1.4951in; padding: 4pt 4pt 4pt 4pt; border: 1pt solid #A3A3A3;\">\n<p style=\"margin-top: 0pt; margin-bottom: 6pt; font-size: 10.0pt;\"><span lang=\"en-US\" style=\"font-family: Arial; color: #292929;\">The actors removed malicious file\u00a0<\/span><span lang=\"en-US\" style=\"font-family: Consolas; color: #232323; background: #BFBFBF;\">mde.ps1<\/span><span lang=\"en-AE\" style=\"font-family: Arial; color: #292929;\">\u00a0<\/span><span lang=\"en-US\" style=\"font-family: Arial; color: #292929;\">from the dis.<\/span><\/p>\n<\/td>\n<td style=\"background-color: white; vertical-align: top; width: 2.0375in; padding: 4pt 4pt 4pt 4pt; border: 1pt solid #A3A3A3;\">\n<p lang=\"en-US\" style=\"margin-top: 0pt; margin-bottom: 6pt; font-family: Arial; font-size: 10.0pt;\"><span style=\"font-weight: bold; color: #292929;\">Detection:<\/span><span style=\"color: #292929;\">\u00a0Monitor executed commands and arguments for actions that could be utilized to unlink, rename, or delete files [<\/span><a href=\"https:\/\/attack.mitre.org\/versions\/v11\/datasources\/DS0017\">DS0017<\/a><span style=\"color: #292929;\">].<\/span><\/p>\n<p lang=\"en-US\" style=\"margin-top: 0pt; margin-bottom: 6pt; font-family: Arial; font-size: 10.0pt;\"><span style=\"font-weight: bold; color: #292929;\">Detection:<\/span><span style=\"color: #292929;\">\u00a0Monitor for unexpected deletion of files from the system [<\/span><a href=\"https:\/\/attack.mitre.org\/versions\/v11\/datasources\/DS0022\">DS0022<\/a><span style=\"color: #292929;\">].<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"background-color: #595959; vertical-align: top; width: .9659in; padding: 4pt 4pt 4pt 4pt; border: 1pt solid #A3A3A3;\">\n<p lang=\"en-US\" style=\"margin: 0in; font-family: Arial; font-size: 10.0pt; color: #c1c1c1; text-align: center;\"><span style=\"font-weight: bold;\">Credential Access<\/span><\/p>\n<\/td>\n<td style=\"background-color: #595959; vertical-align: top; width: .6854in; padding: 4pt 4pt 4pt 4pt; border: 1pt solid #A3A3A3;\">\n<p lang=\"en-US\" style=\"margin: 0in; font-family: Calibri; font-size: 10.0pt;\">\n<\/td>\n<td style=\"background-color: #595959; vertical-align: top; width: 1.4756in; padding: 4pt 4pt 4pt 4pt; border: 1pt solid #A3A3A3;\">\n<p lang=\"en-US\" style=\"margin: 0in; font-family: Calibri; font-size: 10.0pt;\">\n<\/td>\n<td style=\"background-color: #595959; vertical-align: top; width: 1.859in; padding: 4pt 4pt 4pt 4pt; border: 1pt solid #A3A3A3;\">\n<p lang=\"en-US\" style=\"margin: 0in; font-family: Calibri; font-size: 10.0pt;\">\n<\/td>\n<\/tr>\n<tr>\n<td style=\"background-color: #a6a6a6; vertical-align: top; width: .9659in; padding: 4pt 4pt 4pt 4pt; border: 1pt solid #A3A3A3;\">\n<p lang=\"en-US\" style=\"margin: 0in; font-family: Arial; font-size: 10.0pt; color: white;\"><span style=\"font-weight: bold;\">Technique Title<\/span><\/p>\n<\/td>\n<td style=\"background-color: #a6a6a6; vertical-align: top; width: .6854in; padding: 4pt 4pt 4pt 4pt; border: 1pt solid #A3A3A3;\">\n<p lang=\"en-US\" style=\"margin: 0in; font-family: Arial; font-size: 10.0pt; color: white;\"><span style=\"font-weight: bold;\">ID<\/span><\/p>\n<\/td>\n<td style=\"background-color: #a6a6a6; vertical-align: top; width: 1.4756in; padding: 4pt 4pt 4pt 4pt; border: 1pt solid #A3A3A3;\">\n<p lang=\"en-US\" style=\"margin: 0in; font-family: Arial; font-size: 10.0pt; color: white; text-align: center;\"><span style=\"font-weight: bold;\">Use<\/span><\/p>\n<\/td>\n<td style=\"background-color: #a6a6a6; vertical-align: top; width: 1.9701in; padding: 4pt 4pt 4pt 4pt; border: 1pt solid #A3A3A3;\">\n<p lang=\"en-US\" style=\"margin: 0in; font-family: Arial; font-size: 10.0pt; color: white; text-align: center;\"><span style=\"font-weight: bold;\">Recommendations<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"background-color: white; vertical-align: top; width: .9659in; padding: 4pt 4pt 4pt 4pt; border: 1pt solid #A3A3A3;\">\n<p lang=\"en-US\" style=\"margin-top: 0pt; margin-bottom: 6pt; font-family: Arial; font-size: 10.0pt; color: #292929;\">OS Credential Dumping: LSASS Memory<\/p>\n<\/td>\n<td style=\"background-color: white; vertical-align: top; width: .7048in; padding: 4pt 4pt 4pt 4pt; border: 1pt solid #A3A3A3;\">\n<p lang=\"en-US\" style=\"margin-top: 0pt; margin-bottom: 6pt; font-size: 10.0pt;\"><a href=\"https:\/\/attack.mitre.org\/versions\/v11\/techniques\/T1003\/001\"><span style=\"font-family: Arial;\">T1003.001<\/span><\/a><\/p>\n<\/td>\n<td style=\"background-color: white; vertical-align: top; width: 1.4756in; padding: 4pt 4pt 4pt 4pt; border: 1pt solid #A3A3A3;\">\n<p lang=\"en-US\" style=\"margin-top: 0pt; margin-bottom: 6pt; font-family: Arial; font-size: 10.0pt; color: #292929;\">The actors were observed trying to dump LSASS process.<\/p>\n<\/td>\n<td style=\"background-color: white; vertical-align: top; width: 2.0743in; padding: 4pt 4pt 4pt 4pt; border: 1pt solid #A3A3A3;\">\n<p lang=\"en-US\" style=\"margin-top: 0pt; margin-bottom: 6pt; font-family: Arial; font-size: 10.0pt;\"><span style=\"font-weight: bold; color: #292929;\">Mitigation:<\/span><span style=\"color: #292929;\">\u00a0With Windows 10, Microsoft implemented new protections called Credential Guard to protect the LSA secrets that can be used to obtain credentials through forms of credential dumping [<\/span><a href=\"https:\/\/attack.mitre.org\/versions\/v11\/mitigations\/M1043\">M1043<\/a><span style=\"color: #292929;\">]<\/span><\/p>\n<p lang=\"en-US\" style=\"margin-top: 0pt; margin-bottom: 6pt; font-family: Arial; font-size: 10.0pt;\"><span style=\"font-weight: bold; color: #292929;\">Mitigation:<\/span><span style=\"color: #292929;\">\u00a0On Windows 10, enable Attack Surface Reduction (ASR) rules to secure LSASS and prevent credential stealing [<\/span><a href=\"https:\/\/attack.mitre.org\/versions\/v11\/mitigations\/M1040\">M1040<\/a><span style=\"color: #292929;\">].<\/span><\/p>\n<p lang=\"en-US\" style=\"margin-top: 0pt; margin-bottom: 6pt; font-family: Arial; font-size: 10.0pt;\"><span style=\"font-weight: bold; color: #292929;\">Mitigation:<\/span><span style=\"color: #292929;\">\u00a0Ensure that local administrator accounts have complex, unique passwords across all systems on the network [<\/span><a href=\"https:\/\/attack.mitre.org\/versions\/v11\/mitigations\/M1027\">M1027<\/a><span style=\"color: #292929;\">].<\/span><\/p>\n<p style=\"margin-top: 0pt; margin-bottom: 6pt; font-size: 10.0pt;\"><span lang=\"en-US\" style=\"font-weight: bold; font-family: Arial; color: #292929;\">Detection:<\/span><span lang=\"en-US\" style=\"font-family: Arial; color: #292929;\">\u00a0Monitor for unexpected processes interacting with\u00a0<\/span><span lang=\"en-US\" style=\"font-family: Consolas; color: #232323; background: #BFBFBF;\">LSASS.exe<\/span><span lang=\"en-US\" style=\"font-family: Arial; color: #292929;\">.\u00a0Common credential dumpers such as Mimikatz access\u00a0<\/span><span lang=\"en-US\" style=\"font-family: Consolas; color: #232323; background: #BFBFBF;\">LSASS.exe<\/span><span lang=\"en-AE\" style=\"font-family: Arial; color: #292929;\">\u00a0<\/span><span lang=\"en-US\" style=\"font-family: Arial; color: #292929;\">by opening the process, locating the LSA secrets key, and decrypting the sections in memory where credential details are stored. [<\/span><a href=\"https:\/\/attack.mitre.org\/versions\/v11\/datasources\/DS0009\"><span lang=\"en-US\" style=\"font-family: Arial;\">DS0009<\/span><\/a><span lang=\"en-US\" style=\"font-family: Arial; color: #292929;\">].<\/span><\/p>\n<p lang=\"en-US\" style=\"margin-top: 0pt; margin-bottom: 6pt; font-family: Arial; font-size: 10.0pt;\"><span style=\"font-weight: bold; color: #292929;\">Detection:<\/span><span style=\"color: #292929;\">\u00a0Monitor executed commands and arguments that may attempt to access credential material stored in the process memory of the LSASS [<\/span><a href=\"https:\/\/attack.mitre.org\/versions\/v11\/datasources\/DS0017\">DS0017<\/a><span style=\"color: #292929;\">].<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"background-color: white; vertical-align: top; width: .9659in; padding: 4pt 4pt 4pt 4pt; border: 1pt solid #A3A3A3;\">\n<p lang=\"en-US\" style=\"margin-top: 0pt; margin-bottom: 6pt; font-family: Arial; font-size: 10.0pt; color: #292929;\">Credentials from Password Stores<\/p>\n<\/td>\n<td style=\"background-color: white; vertical-align: top; width: .6854in; padding: 4pt 4pt 4pt 4pt; border: 1pt solid #A3A3A3;\">\n<p lang=\"en-US\" style=\"margin-top: 0pt; margin-bottom: 6pt; font-size: 10.0pt;\"><a href=\"https:\/\/attack.mitre.org\/versions\/v11\/techniques\/T1555\/\"><span style=\"font-family: Arial;\">T1555<\/span><\/a><\/p>\n<\/td>\n<td style=\"background-color: white; vertical-align: top; width: 1.4756in; padding: 4pt 4pt 4pt 4pt; border: 1pt solid #A3A3A3;\">\n<p lang=\"en-US\" style=\"margin-top: 0pt; margin-bottom: 6pt; font-family: Arial; font-size: 10.0pt; color: #292929;\">The actors used Mimikatz to harvest credentials.<\/p>\n<\/td>\n<td style=\"background-color: white; vertical-align: top; width: 2.0743in; padding: 4pt 4pt 4pt 4pt; border: 1pt solid #A3A3A3;\">\n<p lang=\"en-US\" style=\"margin-top: 0pt; margin-bottom: 6pt; font-family: Arial; font-size: 10.0pt;\"><span style=\"font-weight: bold; color: #292929;\">Mitigation:<\/span><span style=\"color: #292929;\">\u00a0Organizations may consider weighing the risk of storing credentials in password stores and web browsers. If system, software, or web browser credential disclosure is a significant concern, technical controls, policy, and user training may be used to prevent storage of credentials in improper locations [<\/span><a href=\"https:\/\/attack.mitre.org\/versions\/v11\/mitigations\/M1027\">M1027<\/a><span style=\"color: #292929;\">].<\/span><\/p>\n<p lang=\"en-US\" style=\"margin-top: 0pt; margin-bottom: 6pt; font-family: Arial; font-size: 10.0pt;\"><span style=\"font-weight: bold; color: #292929;\">Detection:<\/span><span style=\"color: #292929;\">\u00a0Monitor for processes being accessed that may search for common password storage locations to obtain user credentials [<\/span><a href=\"https:\/\/attack.mitre.org\/versions\/v11\/datasources\/DS0009\">DS0009<\/a><span style=\"color: #292929;\">].<\/span><\/p>\n<p lang=\"en-US\" style=\"margin-top: 0pt; margin-bottom: 6pt; font-family: Arial; font-size: 10.0pt;\"><span style=\"font-weight: bold; color: #292929;\">Detection:<\/span><span style=\"color: #292929;\">\u00a0Monitor executed commands and arguments that may search for common password storage locations to obtain user credentials [<\/span><a href=\"https:\/\/attack.mitre.org\/versions\/v11\/datasources\/DS0017\">DS0017<\/a><span style=\"color: #292929;\">].<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"background-color: #595959; vertical-align: top; width: .9659in; padding: 4pt 4pt 4pt 4pt; border: 1pt solid #A3A3A3;\">\n<p lang=\"en-US\" style=\"margin: 0in; font-family: Arial; font-size: 10.0pt; color: #c1c1c1; text-align: center;\"><span style=\"font-weight: bold;\">Discovery<\/span><\/p>\n<\/td>\n<td style=\"background-color: #595959; vertical-align: top; width: .6854in; padding: 4pt 4pt 4pt 4pt; border: 1pt solid #A3A3A3;\">\n<p lang=\"en-US\" style=\"margin: 0in; font-family: Calibri; font-size: 10.0pt;\">\n<\/td>\n<td style=\"background-color: #595959; vertical-align: top; width: 1.4756in; padding: 4pt 4pt 4pt 4pt; border: 1pt solid #A3A3A3;\">\n<p lang=\"en-US\" style=\"margin: 0in; font-family: Calibri; font-size: 10.0pt;\">\n<\/td>\n<td style=\"background-color: #595959; vertical-align: top; width: 1.859in; padding: 4pt 4pt 4pt 4pt; border: 1pt solid #A3A3A3;\">\n<p lang=\"en-US\" style=\"margin: 0in; font-family: Calibri; font-size: 10.0pt;\">\n<\/td>\n<\/tr>\n<tr>\n<td style=\"background-color: #a6a6a6; vertical-align: top; width: .968in; padding: 4pt 4pt 4pt 4pt; border: 1pt solid #A3A3A3;\">\n<p lang=\"en-US\" style=\"margin: 0in; font-family: Arial; font-size: 10.0pt; color: white; text-align: center;\"><span style=\"font-weight: bold;\">Technique Title<\/span><\/p>\n<\/td>\n<td style=\"background-color: #a6a6a6; vertical-align: top; width: .6854in; padding: 4pt 4pt 4pt 4pt; border: 1pt solid #A3A3A3;\">\n<p lang=\"en-US\" style=\"margin: 0in; font-family: Arial; font-size: 10.0pt; color: white; text-align: center;\"><span style=\"font-weight: bold;\">ID<\/span><\/p>\n<\/td>\n<td style=\"background-color: #a6a6a6; vertical-align: top; width: 1.4756in; padding: 4pt 4pt 4pt 4pt; border: 1pt solid #A3A3A3;\">\n<p lang=\"en-US\" style=\"margin: 0in; font-family: Arial; font-size: 10.0pt; color: white; text-align: center;\"><span style=\"font-weight: bold;\">Use<\/span><\/p>\n<\/td>\n<td style=\"background-color: #a6a6a6; vertical-align: top; width: 1.9701in; padding: 4pt 4pt 4pt 4pt; border: 1pt solid #A3A3A3;\">\n<p lang=\"en-US\" style=\"margin: 0in; font-family: Arial; font-size: 10.0pt; color: white; text-align: center;\"><span style=\"font-weight: bold;\">Recommendations<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"background-color: white; vertical-align: top; width: .9659in; padding: 4pt 4pt 4pt 4pt; border: 1pt solid #A3A3A3;\">\n<p lang=\"en-US\" style=\"margin-top: 0pt; margin-bottom: 6pt; font-family: Arial; font-size: 10.0pt; color: #292929;\">Remote System Discovery<\/p>\n<\/td>\n<td style=\"background-color: white; vertical-align: top; width: .6854in; padding: 4pt 4pt 4pt 4pt; border: 1pt solid #A3A3A3;\">\n<p lang=\"en-US\" style=\"margin-top: 0pt; margin-bottom: 6pt; font-size: 10.0pt;\"><a href=\"https:\/\/attack.mitre.org\/versions\/v11\/techniques\/T1018\"><span style=\"font-family: Arial;\">T1018<\/span><\/a><\/p>\n<\/td>\n<td style=\"background-color: white; vertical-align: top; width: 1.4875in; padding: 4pt 4pt 4pt 4pt; border: 1pt solid #A3A3A3;\">\n<p lang=\"en-US\" style=\"margin-top: 0pt; margin-bottom: 6pt; font-family: Arial; font-size: 10.0pt; color: #292929;\">The actors executed a PowerShell command on the AD to obtain a list of all machines attached to the domain.<\/p>\n<\/td>\n<td style=\"background-color: white; vertical-align: top; width: 2.0743in; padding: 4pt 4pt 4pt 4pt; border: 1pt solid #A3A3A3;\">\n<p lang=\"en-US\" style=\"margin-top: 0pt; margin-bottom: 6pt; font-family: Arial; font-size: 10.0pt;\"><span style=\"font-weight: bold; color: #292929;\">Detection:<\/span><span style=\"color: #292929;\">\u00a0Monitor executed commands and arguments that may attempt to get a listing of other systems by IP address, hostname, or other logical identifier on a network that may be used for lateral movement [<\/span><a href=\"https:\/\/attack.mitre.org\/versions\/v11\/datasources\/DS0017\">DS0017<\/a><span style=\"color: #292929;\">].<\/span><\/p>\n<p lang=\"en-US\" style=\"margin-top: 0pt; margin-bottom: 6pt; font-family: Arial; font-size: 10.0pt;\"><span style=\"font-weight: bold; color: #292929;\">Detection:<\/span><span style=\"color: #292929;\">\u00a0Monitor for newly constructed network connections associated with pings\/scans that may attempt to get a listing of other systems by IP address, hostname, or other logical identifier on a network that may be used for lateral movement [<\/span><a href=\"https:\/\/attack.mitre.org\/versions\/v11\/datasources\/DS0029\">DS0029<\/a><span style=\"color: #292929;\">].<\/span><\/p>\n<p lang=\"en-US\" style=\"margin-top: 0pt; margin-bottom: 6pt; font-family: Arial; font-size: 10.0pt;\"><span style=\"font-weight: bold; color: #292929;\">Detection:<\/span><span style=\"color: #292929;\">\u00a0Monitor for newly executed processes that can be used to discover remote systems, such as ping.exe and tracert.exe, especially when executed in quick succession [<\/span><a href=\"https:\/\/attack.mitre.org\/versions\/v11\/datasources\/DS0009\">DS0009<\/a><span style=\"color: #292929;\">].<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"background-color: white; vertical-align: top; width: .9854in; padding: 4pt 4pt 4pt 4pt; border: 1pt solid #A3A3A3;\">\n<p lang=\"en-US\" style=\"margin: 0in; font-family: Arial; font-size: 10.0pt; color: #292929;\">System Network Configuration Discovery: Internet Connection Discovery<\/p>\n<\/td>\n<td style=\"background-color: white; vertical-align: top; width: .7048in; padding: 4pt 4pt 4pt 4pt; border: 1pt solid #A3A3A3;\">\n<p lang=\"en-US\" style=\"margin: 0in; font-size: 10.0pt;\"><a href=\"https:\/\/attack.mitre.org\/versions\/v11\/techniques\/T1016\/001\/\"><span style=\"font-family: Arial;\">T1016.001<\/span><\/a><\/p>\n<\/td>\n<td style=\"background-color: white; vertical-align: top; width: 1.4756in; padding: 4pt 4pt 4pt 4pt; border: 1pt solid #A3A3A3;\">\n<p lang=\"en-US\" style=\"margin: 0in; font-size: 10.0pt;\"><span style=\"font-family: Arial; color: #292929;\">The actors\u2019 malware tests for internet connectivity by pinging\u00a0<\/span><span style=\"font-family: Consolas; color: #232323; background: #BFBFBF;\">8.8.8.8<\/span><span style=\"font-family: Arial; color: #292929;\">.<\/span><\/p>\n<\/td>\n<td style=\"background-color: white; vertical-align: top; width: 1.9701in; padding: 4pt 4pt 4pt 4pt; border: 1pt solid #A3A3A3;\">\n<p style=\"margin-top: 0pt; margin-bottom: 6pt; font-size: 10.0pt;\"><span lang=\"en-US\" style=\"font-weight: bold; font-family: Arial; color: #292929;\">Mitigation:<\/span><span lang=\"en-US\" style=\"font-family: Arial; color: #292929;\">\u00a0Monitor executed commands, arguments [<\/span><a href=\"https:\/\/attack.mitre.org\/versions\/v11\/datasources\/DS0017\/#Command%20Execution\"><span lang=\"en-US\" style=\"font-family: Arial;\">DS0017<\/span><\/a><span lang=\"en-US\" style=\"font-family: Arial; color: #292929;\">] and executed processes (e.g.,\u00a0<\/span><span lang=\"en-US\" style=\"font-family: Consolas; color: #232323; background: #BFBFBF;\">tracert<\/span><span lang=\"en-AE\" style=\"font-family: Arial; color: #292929;\">\u00a0<\/span><span lang=\"en-US\" style=\"font-family: Arial; color: #292929;\">or\u00a0<\/span><span lang=\"en-US\" style=\"font-family: Consolas; color: #232323; background: #BFBFBF;\">ping<\/span><span lang=\"en-US\" style=\"font-family: Arial; color: #292929;\">) [<\/span><a href=\"https:\/\/attack.mitre.org\/versions\/v11\/datasources\/DS0009\/#Process%20Creation\"><span lang=\"en-US\" style=\"font-family: Arial;\">DS0009<\/span><\/a><span lang=\"en-US\" style=\"font-family: Arial; color: #292929;\">] that may check for internet connectivity on compromised systems.<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"background-color: #595959; vertical-align: top; width: .9659in; padding: 4pt 4pt 4pt 4pt; border: 1pt solid #A3A3A3;\">\n<p lang=\"en-US\" style=\"margin: 0in; font-family: Arial; font-size: 10.0pt; color: #c1c1c1; text-align: center;\"><span style=\"font-weight: bold;\">Lateral Movement<\/span><\/p>\n<\/td>\n<td style=\"background-color: #595959; vertical-align: top; width: .6854in; padding: 4pt 4pt 4pt 4pt; border: 1pt solid #A3A3A3;\">\n<p lang=\"en-US\" style=\"margin: 0in; font-family: Calibri; font-size: 10.0pt;\">\n<\/td>\n<td style=\"background-color: #595959; vertical-align: top; width: 1.4756in; padding: 4pt 4pt 4pt 4pt; border: 1pt solid #A3A3A3;\">\n<p lang=\"en-US\" style=\"margin: 0in; font-family: Calibri; font-size: 10.0pt;\">\n<\/td>\n<td style=\"background-color: #595959; vertical-align: top; width: 1.859in; padding: 4pt 4pt 4pt 4pt; border: 1pt solid #A3A3A3;\">\n<p lang=\"en-US\" style=\"margin: 0in; font-family: Calibri; font-size: 10.0pt;\">\n<\/td>\n<\/tr>\n<tr>\n<td style=\"background-color: #a6a6a6; vertical-align: top; width: .968in; padding: 4pt 4pt 4pt 4pt; border: 1pt solid #A3A3A3;\">\n<p lang=\"en-US\" style=\"margin: 0in; font-family: Arial; font-size: 10.0pt; color: white; text-align: center;\"><span style=\"font-weight: bold;\">Technique Title<\/span><\/p>\n<\/td>\n<td style=\"background-color: #a6a6a6; vertical-align: top; width: .6854in; padding: 4pt 4pt 4pt 4pt; border: 1pt solid #A3A3A3;\">\n<p lang=\"en-US\" style=\"margin: 0in; font-family: Arial; font-size: 10.0pt; color: white; text-align: center;\"><span style=\"font-weight: bold;\">ID<\/span><\/p>\n<\/td>\n<td style=\"background-color: #a6a6a6; vertical-align: top; width: 1.4756in; padding: 4pt 4pt 4pt 4pt; border: 1pt solid #A3A3A3;\">\n<p lang=\"en-US\" style=\"margin-top: 0pt; margin-bottom: 6pt; font-family: Arial; font-size: 10.0pt; color: white; text-align: center;\"><span style=\"font-weight: bold;\">Use<\/span><\/p>\n<\/td>\n<td style=\"background-color: #a6a6a6; vertical-align: top; width: 1.9701in; padding: 4pt 4pt 4pt 4pt; border: 1pt solid #A3A3A3;\">\n<p lang=\"en-US\" style=\"margin-top: 0pt; margin-bottom: 6pt; font-family: Arial; font-size: 10.0pt; color: white; text-align: center;\"><span style=\"font-weight: bold;\">Recommendations<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"background-color: white; vertical-align: top; width: .9659in; padding: 4pt 4pt 4pt 4pt; border: 1pt solid #A3A3A3;\">\n<p lang=\"en-US\" style=\"margin-top: 0pt; margin-bottom: 6pt; font-family: Arial; font-size: 10.0pt; color: #292929;\">Remote Services: Remote Desktop Protocol<\/p>\n<\/td>\n<td style=\"background-color: white; vertical-align: top; width: .7048in; padding: 4pt 4pt 4pt 4pt; border: 1pt solid #A3A3A3;\">\n<p lang=\"en-US\" style=\"margin-top: 0pt; margin-bottom: 6pt; font-size: 10.0pt;\"><a href=\"https:\/\/attack.mitre.org\/versions\/v11\/techniques\/T1021\/001\/\"><span style=\"font-family: Arial;\">T1021.001<\/span><\/a><\/p>\n<\/td>\n<td style=\"background-color: white; vertical-align: top; width: 1.4756in; padding: 4pt 4pt 4pt 4pt; border: 1pt solid #A3A3A3;\">\n<p lang=\"en-US\" style=\"margin-top: 0pt; margin-bottom: 6pt; font-family: Arial; font-size: 10.0pt; color: #292929;\">The actors used RDP to move laterally to multiple hosts on the network.<\/p>\n<\/td>\n<td style=\"background-color: white; vertical-align: top; width: 2.0743in; padding: 4pt 4pt 4pt 4pt; border: 1pt solid #A3A3A3;\">\n<p lang=\"en-US\" style=\"margin-top: 0pt; margin-bottom: 6pt; font-family: Arial; font-size: 10.0pt;\"><span style=\"font-weight: bold; color: #292929;\">Mitigation:<\/span><span style=\"color: #292929;\">\u00a0Use MFA for remote logins [<\/span><a href=\"https:\/\/attack.mitre.org\/versions\/v11\/mitigations\/M1032\">M1032<\/a><span style=\"color: #292929;\">].<\/span><\/p>\n<p lang=\"en-US\" style=\"margin-top: 0pt; margin-bottom: 6pt; font-family: Arial; font-size: 10.0pt;\"><span style=\"font-weight: bold; color: #292929;\">Mitigation:<\/span><span style=\"color: #292929;\">\u00a0Disable the RDP service if it is unnecessary [<\/span><a href=\"https:\/\/attack.mitre.org\/versions\/v11\/mitigations\/M1042\">M1042<\/a><span style=\"color: #292929;\">].<\/span><\/p>\n<p lang=\"en-US\" style=\"margin-top: 0pt; margin-bottom: 6pt; font-family: Arial; font-size: 10.0pt;\"><span style=\"font-weight: bold; color: #292929;\">Mitigation:<\/span><span style=\"color: #292929;\">\u00a0Do not leave RDP accessible from the internet. Enable firewall rules to block RDP traffic between network security zones within a network [<\/span><a href=\"https:\/\/attack.mitre.org\/versions\/v11\/mitigations\/M1030\">M1030<\/a><span style=\"color: #292929;\">].<\/span><\/p>\n<p lang=\"en-US\" style=\"margin-top: 0pt; margin-bottom: 6pt; font-family: Arial; font-size: 10.0pt;\"><span style=\"font-weight: bold; color: #292929;\">Mitigation:<\/span><span style=\"color: #292929;\">\u00a0Consider removing the local Administrators group from the list of groups allowed to log in through RDP [<\/span><a href=\"https:\/\/attack.mitre.org\/versions\/v11\/mitigations\/M1026\">M1026<\/a><span style=\"color: #292929;\">].<\/span><\/p>\n<p style=\"margin-top: 0pt; margin-bottom: 6pt; font-size: 10.0pt;\"><span lang=\"en-US\" style=\"font-weight: bold; font-family: Arial; color: #292929;\">Detection:<\/span><span lang=\"en-US\" style=\"font-family: Arial; color: #292929;\">\u00a0Monitor for user accounts logged into systems associated with RDP (ex: Windows EID\u00a0<\/span><span lang=\"en-US\" style=\"font-family: Consolas; color: #232323; background: #BFBFBF;\">4624<\/span><span lang=\"en-AE\" style=\"font-family: Arial; color: #292929;\">\u00a0<\/span><span lang=\"en-US\" style=\"font-family: Arial; color: #292929;\">Logon Type 10). Other factors, such as access patterns (ex: multiple systems over a relatively short period of time) and activity that occurs after a remote login, may indicate suspicious or malicious behavior with RDP [<\/span><a href=\"https:\/\/attack.mitre.org\/versions\/v11\/datasources\/DS0028\"><span lang=\"en-US\" style=\"font-family: Arial;\">DS0028<\/span><\/a><span lang=\"en-US\" style=\"font-family: Arial; color: #292929;\">].<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"background-color: #595959; vertical-align: top; width: .9854in; padding: 4pt 4pt 4pt 4pt; border: 1pt solid #A3A3A3;\">\n<p lang=\"en-US\" style=\"margin: 0in; font-family: Arial; font-size: 10.0pt; color: #c1c1c1; text-align: center;\"><span style=\"font-weight: bold;\">Command and Control<\/span><\/p>\n<\/td>\n<td style=\"background-color: #595959; vertical-align: top; width: .6854in; padding: 4pt 4pt 4pt 4pt; border: 1pt solid #A3A3A3;\">\n<p lang=\"en-US\" style=\"margin: 0in; font-family: Calibri; font-size: 10.0pt;\">\n<\/td>\n<td style=\"background-color: #595959; vertical-align: top; width: 1.4756in; padding: 4pt 4pt 4pt 4pt; border: 1pt solid #A3A3A3;\">\n<p lang=\"en-US\" style=\"margin: 0in; font-family: Calibri; font-size: 10.0pt;\">\n<\/td>\n<td style=\"background-color: #595959; vertical-align: top; width: 1.8395in; padding: 4pt 4pt 4pt 4pt; border: 1pt solid #A3A3A3;\">\n<p lang=\"en-US\" style=\"margin: 0in; font-family: Calibri; font-size: 10.0pt;\">\n<\/td>\n<\/tr>\n<tr>\n<td style=\"background-color: #a6a6a6; vertical-align: top; width: .968in; padding: 4pt 4pt 4pt 4pt; border: 1pt solid #A3A3A3;\">\n<p lang=\"en-US\" style=\"margin: 0in; font-family: Arial; font-size: 10.0pt; color: white; text-align: center;\"><span style=\"font-weight: bold;\">Technique Title<\/span><\/p>\n<\/td>\n<td style=\"background-color: #a6a6a6; vertical-align: top; width: .6854in; padding: 4pt 4pt 4pt 4pt; border: 1pt solid #A3A3A3;\">\n<p lang=\"en-US\" style=\"margin: 0in; font-family: Arial; font-size: 10.0pt; color: white; text-align: center;\"><span style=\"font-weight: bold;\">ID<\/span><\/p>\n<\/td>\n<td style=\"background-color: #a6a6a6; vertical-align: top; width: 1.4756in; padding: 4pt 4pt 4pt 4pt; border: 1pt solid #A3A3A3;\">\n<p lang=\"en-US\" style=\"margin: 0in; font-family: Arial; font-size: 10.0pt; color: white; text-align: center;\"><span style=\"font-weight: bold;\">Use<\/span><\/p>\n<\/td>\n<td style=\"background-color: #a6a6a6; vertical-align: top; width: 1.9701in; padding: 4pt 4pt 4pt 4pt; border: 1pt solid #A3A3A3;\">\n<p lang=\"en-US\" style=\"margin: 0in; font-family: Arial; font-size: 10.0pt; color: white; text-align: center;\"><span style=\"font-weight: bold;\">Recommendations<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"background-color: white; vertical-align: top; width: .9659in; padding: 4pt 4pt 4pt 4pt; border: 1pt solid #A3A3A3;\">\n<p lang=\"en-US\" style=\"margin-top: 0pt; margin-bottom: 6pt; font-family: Arial; font-size: 10.0pt; color: #292929;\">Proxy<\/p>\n<\/td>\n<td style=\"background-color: white; vertical-align: top; width: .6854in; padding: 4pt 4pt 4pt 4pt; border: 1pt solid #A3A3A3;\">\n<p lang=\"en-US\" style=\"margin-top: 0pt; margin-bottom: 6pt; font-size: 10.0pt;\"><a href=\"https:\/\/attack.mitre.org\/versions\/v11\/techniques\/T1090\/\"><span style=\"font-family: Arial;\">T1090<\/span><\/a><\/p>\n<\/td>\n<td style=\"background-color: white; vertical-align: top; width: 1.4756in; padding: 4pt 4pt 4pt 4pt; border: 1pt solid #A3A3A3;\">\n<p lang=\"en-US\" style=\"margin-top: 0pt; margin-bottom: 6pt; font-family: Arial; font-size: 10.0pt; color: #292929;\">The actors used Ngrok to proxy RDP connections and to perform command and control.<\/p>\n<\/td>\n<td style=\"background-color: white; vertical-align: top; width: 2.0743in; padding: 4pt 4pt 4pt 4pt; border: 1pt solid #A3A3A3;\">\n<p lang=\"en-US\" style=\"margin-top: 0pt; margin-bottom: 6pt; font-family: Arial; font-size: 10.0pt;\"><span style=\"font-weight: bold; color: #292929;\">Mitigation:<\/span><span style=\"color: #292929;\">\u00a0Traffic to known anonymity networks and C2 infrastructure can be blocked through the use of network allow and block lists [<\/span><a href=\"https:\/\/attack.mitre.org\/versions\/v11\/mitigations\/M1037\">M1037<\/a><span style=\"color: #292929;\">].<\/span><\/p>\n<p lang=\"en-US\" style=\"margin-top: 0pt; margin-bottom: 6pt; font-family: Arial; font-size: 10.0pt;\"><span style=\"font-weight: bold; color: #292929;\">Detection:<\/span><span style=\"color: #292929;\">\u00a0Monitor and analyze traffic patterns and packet inspection associated to protocol(s) that do not follow the expected protocol standards and traffic flows (e.g., extraneous packets that do not belong to established flows, gratuitous or anomalous traffic patterns, anomalous syntax, or structure) [<\/span><a href=\"https:\/\/attack.mitre.org\/versions\/v11\/datasources\/DS0029\">DS0029<\/a><span style=\"color: #292929;\">].<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"background-color: white; vertical-align: top; width: .9854in; padding: 4pt 4pt 4pt 4pt; border: 1pt solid #A3A3A3;\">\n<p lang=\"en-US\" style=\"margin-top: 0pt; margin-bottom: 6pt; font-family: Arial; font-size: 10.0pt; color: #292929;\">Ingress Tool Transfer<\/p>\n<\/td>\n<td style=\"background-color: white; vertical-align: top; width: .6854in; padding: 4pt 4pt 4pt 4pt; border: 1pt solid #A3A3A3;\">\n<p lang=\"en-US\" style=\"margin-top: 0pt; margin-bottom: 6pt; font-size: 10.0pt;\"><a href=\"https:\/\/attack.mitre.org\/versions\/v11\/techniques\/T1105\/\"><span style=\"font-family: Arial;\">T1105<\/span><\/a><\/p>\n<\/td>\n<td style=\"background-color: white; vertical-align: top; width: 1.4756in; padding: 4pt 4pt 4pt 4pt; border: 1pt solid #A3A3A3;\">\n<p lang=\"en-US\" style=\"margin-top: 0pt; margin-bottom: 6pt; font-family: Arial; font-size: 10.0pt; color: #292929;\">The actors downloaded malware and multiple tools to the network, including PsExec, Mimikatz, and Ngrok.<\/p>\n<\/td>\n<td style=\"background-color: white; vertical-align: top; width: 2.0743in; padding: 4pt 4pt 4pt 4pt; border: 1pt solid #A3A3A3;\">\n<p lang=\"en-US\" style=\"margin-top: 0pt; margin-bottom: 6pt; font-family: Arial; font-size: 10.0pt;\"><span style=\"font-weight: bold; color: #292929;\">Mitigation:<\/span><span style=\"color: #292929;\">\u00a0Employ anti-malware to automatically detect and quarantine malicious scripts [<\/span><a href=\"https:\/\/attack.mitre.org\/versions\/v11\/mitigations\/M1049\">M1049<\/a><span style=\"color: #292929;\">].<\/span><\/p>\n<p style=\"margin-top: 0pt; margin-bottom: 6pt; font-family: 'Source Sans Pro'; font-size: 10.0pt; color: #292929;\">\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n[\/vc_column_text][vc_column_text]Source: CISA, <em>Cyber Threat Actors ATT&amp;CK Techniques for Enterprise<\/em>[\/vc_column_text][divider line_type=&#8221;No Line&#8221; custom_height=&#8221;10&#8243;][heading]\n<h2>INCIDENT RESPONSE<\/h2>\n[\/heading][vc_column_text]If indicators of compromise (IOCs) or techniques of compromise (TTPs) in this CSA lead to a suspicion of initial access or compromise, CISA recommends that organizations investigate connected systems and the DC as a first line of defense against further lateral movement by threat actors.[\/vc_column_text][vc_column_text]\n<ol>\n<li>Immediately isolate affected systems.<\/li>\n<li>Collect and review relevant logs, data, and artifacts. Take a memory capture of the device(s) and a forensic image capture for detailed analysis.<\/li>\n<li>Consider soliciting support from a third-party incident response organization that can provide subject matter expertise to ensure the actor is eradicated from the network and to avoid residual issues that could enable follow-on exploitation.<\/li>\n<\/ol>\n[\/vc_column_text][vc_column_text]\n<p>I am text block. Click edit button to change this text. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.<\/p>\n[\/vc_column_text][divider line_type=&#8221;No Line&#8221; custom_height=&#8221;10&#8243;][divider line_type=&#8221;No Line&#8221; custom_height=&#8221;10&#8243;][heading]\n<h2>Mitigations<\/h2>\n[\/heading][vc_column_text]\n<ul>\n<li><strong>Install updated builds to ensure affected VMware Horizon and UAG systems are updated to the latest version<\/strong>.\n<ul>\n<li>If updates or workarounds were not promptly applied following VMware\u2019s\u00a0<a class=\"ext\" href=\"https:\/\/www.vmware.com\/security\/advisories\/VMSA-2021-0028.html\" data-extlink=\"\">release of updates for Log4Shell in December 2021<\/a>, treat those VMware Horizon systems as compromised. Follow the pro-active incident response procedures outlined above prior to applying updates. If no compromise is detected, apply these updates as soon as possible.\n<ul>\n<li>See VMware Security Advisory\u00a0<a class=\"ext\" href=\"https:\/\/www.vmware.com\/security\/advisories\/VMSA-2021-0028.html\" data-extlink=\"\">VMSA-2021-0028.13<\/a>\u00a0and\u00a0<a class=\"ext\" href=\"https:\/\/kb.vmware.com\/s\/article\/87073\" data-extlink=\"\">VMware Knowledge Base (KB) 87073<\/a>\u00a0to determine which VMware Horizon components are vulnerable.<\/li>\n<li>Note: Until the update is fully implemented, consider removing vulnerable components from the internet to limit the scope of traffic. While installing the updates, ensure network perimeter access controls are as restrictive as possible.<\/li>\n<li>If upgrading is not immediately feasible, see\u00a0<a class=\"ext\" href=\"https:\/\/kb.vmware.com\/s\/article\/87073\" data-extlink=\"\">KB87073<\/a>\u00a0and\u00a0<a class=\"ext\" href=\"https:\/\/kb.vmware.com\/s\/article\/87092\" data-extlink=\"\">KB87092<\/a>\u00a0for vendor-provided temporary workarounds. Implement temporary solutions using an account with administrative privileges. Note that these temporary solutions should not be treated as permanent fixes; vulnerable components should be upgraded to the latest build as soon as possible.<\/li>\n<li>Prior to implementing any temporary solution, ensure appropriate backups have been completed.<\/li>\n<li>Verify successful implementation of mitigations by executing the vendor supplied script\u00a0Horizon_Windows_Log4j_Mitigations.zip\u00a0without parameters to ensure that no vulnerabilities remain. See\u00a0<a class=\"ext\" href=\"https:\/\/kb.vmware.com\/s\/article\/87073\" data-extlink=\"\">KB87073<\/a>\u00a0for details.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<li><strong>Keep all software up to date<\/strong>\u00a0and prioritize patching\u00a0<a href=\"https:\/\/www.cisa.gov\/known-exploited-vulnerabilities-catalog\">known exploited vulnerabilities (KEVs)<\/a>.<\/li>\n<li><strong>Minimize the internet-facing attack surface<\/strong>\u00a0by hosting essential services on a segregated DMZ, ensuring strict network perimeter access controls, and not hosting internet-facing services that are not essential to business operations. Where possible, implement regularly updated web application firewalls (WAF) in front of public-facing services. WAFs can protect against web-based exploitation using signatures and heuristics that are likely to block or alert on malicious traffic.<\/li>\n<li><strong>Use best practices for identity and access management (IAM)<\/strong>\u00a0by implementing\u00a0<a href=\"https:\/\/cisa.gov\/sites\/default\/files\/publications\/fact-sheet-implementing-phishing-resistant-mfa-508c.pdf\">phishing resistant multifactor authentication (MFA)<\/a>, enforcing use of strong passwords, regularly auditing administrator accounts and permissions, and limiting user access through the principle of least privilege. Disable inactive accounts uniformly across the AD, MFA systems, etc.\n<ul>\n<li>If using Windows 10 version 1607 or Windows Server 2016 or later, monitor or disable Windows\u00a0DefaultAccount, also known as the Default System Managed Account (DSMA).<\/li>\n<\/ul>\n<\/li>\n<li><strong>Audit domain controllers to log<\/strong>\u00a0successful Kerberos Ticket Granting Service (TGS) requests and ensure the events are monitored for anomalous activity.\n<ul>\n<li>Secure accounts.<\/li>\n<li>Enforce the principle of least privilege. Administrator accounts should have the minimum permission necessary to complete their tasks.<\/li>\n<li>Ensure there are unique and distinct administrative accounts for each set of administrative tasks.<\/li>\n<li>Create non-privileged accounts for privileged users and ensure they use the non-privileged accounts for all non-privileged access (e.g., web browsing, email access).<\/li>\n<\/ul>\n<\/li>\n<li><strong>Create a deny list of known compromised credentials<\/strong>\u00a0and prevent users from using known-compromised passwords.<\/li>\n<li><strong>Secure credentials by restricting where accounts and credentials can be used<\/strong>\u00a0and by using local device credential protection features.\n<ul>\n<li>Use virtualizing solutions on modern hardware and software to ensure credentials are securely stored.<\/li>\n<li>Ensure storage of clear text passwords in LSASS memory is disabled. Note: For Windows 8, this is enabled by default. For more information see Microsoft Security Advisory\u00a0<a class=\"ext\" href=\"https:\/\/support.microsoft.com\/en-us\/topic\/microsoft-security-advisory-update-to-improve-credentials-protection-and-management-may-13-2014-93434251-04ac-b7f3-52aa-9f951c14b649\" data-extlink=\"\">Update to Improve Credentials Protection and Management<\/a>.<\/li>\n<li>Consider disabling or limiting NTLM and WDigest Authentication.<\/li>\n<li>Implement Credential Guard for Windows 10 and Server 2016 (refer to Microsoft: Manage Windows Defender Credential Guard for more information). For Windows Server 2012R2, enable Protected Process Light for Local Security Authority (LSA).<\/li>\n<li>Minimize the AD attack surface to reduce malicious ticket-granting activity. Malicious activity such as \u201cKerberoasting\u201d takes advantage of Kerberos\u2019 TGS and can be used to obtain hashed credentials that threat actors attempt to crack.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n[\/vc_column_text][divider line_type=&#8221;No Line&#8221; custom_height=&#8221;15&#8243;][vc_column_text]The CSA includes a malware analysis report (MAR),\u00a0<a href=\"https:\/\/www.cisa.gov\/uscert\/ncas\/analysis-reports\/ar22-320a\">MAR-10387061-1-v1 XMRig Cryptocurrency Mining Software<\/a>, on the mining software that the APT actors used against the compromised FCEB network. The CSA also provides tactics, techniques, and procedures (TTPs) and indicators of compromise (IOCs) obtained from the incident response as well as recommended mitigations.[\/vc_column_text][\/vc_column][\/vc_row]\n","protected":false},"excerpt":{"rendered":"<p>[vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221;&#8230;<\/p>\n","protected":false},"author":1,"featured_media":6167,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[23,24,33,6],"tags":[35,34,57,74],"class_list":{"0":"post-6162","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-attack","8":"category-data-breaches","9":"category-malware","10":"category-vulnerability-assessment","11":"tag-cyber-attack","12":"tag-data-breach","13":"tag-malware","14":"tag-vulnerability"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Attackers with State Sponsorship in Iran Break Into US Government Network and Release Cryptominer and Password Stealer - Sajin Shivdas | Cybersecurity<\/title>\n<meta name=\"description\" content=\"When CISA discovered what it believed to be advanced persistent threat (APT) activity at a Federal Civilian Executive Branch (FCEB) entity between the\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sajinshivdas.com\/cybersecurity\/attackers-with-state-sponsorship-in-iran-break-into-us-government-network-and-release-cryptominer-and-password-stealer\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Attackers with State Sponsorship in Iran Break Into US Government Network and Release Cryptominer and Password Stealer - Sajin Shivdas | Cybersecurity\" \/>\n<meta property=\"og:description\" content=\"When CISA discovered what it believed to be advanced persistent threat (APT) activity at a Federal Civilian Executive Branch (FCEB) entity between the\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sajinshivdas.com\/cybersecurity\/attackers-with-state-sponsorship-in-iran-break-into-us-government-network-and-release-cryptominer-and-password-stealer\/\" \/>\n<meta property=\"og:site_name\" content=\"Sajin Shivdas | Cybersecurity\" \/>\n<meta property=\"article:published_time\" content=\"2022-11-16T17:18:36+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-03-27T08:33:45+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2022\/11\/shield-icon-cyber-security-digital-data-network-protection-future-technology-digital-data-network-connection.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1500\" \/>\n\t<meta property=\"og:image:height\" content=\"844\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Sajin Shivdas\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Sajin Shivdas\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"20 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":[\"Article\",\"BlogPosting\"],\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/attackers-with-state-sponsorship-in-iran-break-into-us-government-network-and-release-cryptominer-and-password-stealer\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/attackers-with-state-sponsorship-in-iran-break-into-us-government-network-and-release-cryptominer-and-password-stealer\\\/\"},\"author\":{\"name\":\"Sajin Shivdas\",\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/#\\\/schema\\\/person\\\/af1d121cbedd3ce64369f21a359ff2e6\"},\"headline\":\"Attackers with State Sponsorship in Iran Break Into US Government Network and Release Cryptominer and Password Stealer\",\"datePublished\":\"2022-11-16T17:18:36+00:00\",\"dateModified\":\"2023-03-27T08:33:45+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/attackers-with-state-sponsorship-in-iran-break-into-us-government-network-and-release-cryptominer-and-password-stealer\\\/\"},\"wordCount\":3991,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/#\\\/schema\\\/person\\\/af1d121cbedd3ce64369f21a359ff2e6\"},\"image\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/attackers-with-state-sponsorship-in-iran-break-into-us-government-network-and-release-cryptominer-and-password-stealer\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/wp-content\\\/uploads\\\/2022\\\/11\\\/shield-icon-cyber-security-digital-data-network-protection-future-technology-digital-data-network-connection.jpg\",\"keywords\":[\"Cyber Attack\",\"Data Breach\",\"Malware\",\"Vulnerability\"],\"articleSection\":[\"Cyber Attack\",\"Data Breaches\",\"Malware\",\"Vulnerability\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/attackers-with-state-sponsorship-in-iran-break-into-us-government-network-and-release-cryptominer-and-password-stealer\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/attackers-with-state-sponsorship-in-iran-break-into-us-government-network-and-release-cryptominer-and-password-stealer\\\/\",\"url\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/attackers-with-state-sponsorship-in-iran-break-into-us-government-network-and-release-cryptominer-and-password-stealer\\\/\",\"name\":\"Attackers with State Sponsorship in Iran Break Into US Government Network and Release Cryptominer and Password Stealer - Sajin Shivdas | Cybersecurity\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/attackers-with-state-sponsorship-in-iran-break-into-us-government-network-and-release-cryptominer-and-password-stealer\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/attackers-with-state-sponsorship-in-iran-break-into-us-government-network-and-release-cryptominer-and-password-stealer\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/wp-content\\\/uploads\\\/2022\\\/11\\\/shield-icon-cyber-security-digital-data-network-protection-future-technology-digital-data-network-connection.jpg\",\"datePublished\":\"2022-11-16T17:18:36+00:00\",\"dateModified\":\"2023-03-27T08:33:45+00:00\",\"description\":\"When CISA discovered what it believed to be advanced persistent threat (APT) activity at a Federal Civilian Executive Branch (FCEB) entity between the\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/attackers-with-state-sponsorship-in-iran-break-into-us-government-network-and-release-cryptominer-and-password-stealer\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/attackers-with-state-sponsorship-in-iran-break-into-us-government-network-and-release-cryptominer-and-password-stealer\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/attackers-with-state-sponsorship-in-iran-break-into-us-government-network-and-release-cryptominer-and-password-stealer\\\/#primaryimage\",\"url\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/wp-content\\\/uploads\\\/2022\\\/11\\\/shield-icon-cyber-security-digital-data-network-protection-future-technology-digital-data-network-connection.jpg\",\"contentUrl\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/wp-content\\\/uploads\\\/2022\\\/11\\\/shield-icon-cyber-security-digital-data-network-protection-future-technology-digital-data-network-connection.jpg\",\"width\":1500,\"height\":844},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/attackers-with-state-sponsorship-in-iran-break-into-us-government-network-and-release-cryptominer-and-password-stealer\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Attackers with State Sponsorship in Iran Break Into US Government Network and Release Cryptominer and Password Stealer\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/#website\",\"url\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/\",\"name\":\"sajinshivdas.com\",\"description\":\"Cybersecurity - Information security Resources, Articles and Latest News\",\"publisher\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/#\\\/schema\\\/person\\\/af1d121cbedd3ce64369f21a359ff2e6\"},\"alternateName\":\"Sajin Shivdas\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/#\\\/schema\\\/person\\\/af1d121cbedd3ce64369f21a359ff2e6\",\"name\":\"Sajin Shivdas\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/5dbd4f42-9550-4c99-82e9-34f3c99a2253.png\",\"url\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/5dbd4f42-9550-4c99-82e9-34f3c99a2253.png\",\"contentUrl\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/5dbd4f42-9550-4c99-82e9-34f3c99a2253.png\",\"width\":1000,\"height\":500,\"caption\":\"Sajin Shivdas\"},\"logo\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/5dbd4f42-9550-4c99-82e9-34f3c99a2253.png\"},\"sameAs\":[\"http:\\\/\\\/sajinshivdas.com\\\/security\",\"www.linkedin.com\\\/in\\\/sajin-shivdas\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Attackers with State Sponsorship in Iran Break Into US Government Network and Release Cryptominer and Password Stealer - Sajin Shivdas | Cybersecurity","description":"When CISA discovered what it believed to be advanced persistent threat (APT) activity at a Federal Civilian Executive Branch (FCEB) entity between the","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sajinshivdas.com\/cybersecurity\/attackers-with-state-sponsorship-in-iran-break-into-us-government-network-and-release-cryptominer-and-password-stealer\/","og_locale":"en_US","og_type":"article","og_title":"Attackers with State Sponsorship in Iran Break Into US Government Network and Release Cryptominer and Password Stealer - Sajin Shivdas | Cybersecurity","og_description":"When CISA discovered what it believed to be advanced persistent threat (APT) activity at a Federal Civilian Executive Branch (FCEB) entity between the","og_url":"https:\/\/sajinshivdas.com\/cybersecurity\/attackers-with-state-sponsorship-in-iran-break-into-us-government-network-and-release-cryptominer-and-password-stealer\/","og_site_name":"Sajin Shivdas | Cybersecurity","article_published_time":"2022-11-16T17:18:36+00:00","article_modified_time":"2023-03-27T08:33:45+00:00","og_image":[{"width":1500,"height":844,"url":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2022\/11\/shield-icon-cyber-security-digital-data-network-protection-future-technology-digital-data-network-connection.jpg","type":"image\/jpeg"}],"author":"Sajin Shivdas","twitter_misc":{"Written by":"Sajin Shivdas","Est. reading time":"20 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":["Article","BlogPosting"],"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/attackers-with-state-sponsorship-in-iran-break-into-us-government-network-and-release-cryptominer-and-password-stealer\/#article","isPartOf":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/attackers-with-state-sponsorship-in-iran-break-into-us-government-network-and-release-cryptominer-and-password-stealer\/"},"author":{"name":"Sajin Shivdas","@id":"https:\/\/sajinshivdas.com\/cybersecurity\/#\/schema\/person\/af1d121cbedd3ce64369f21a359ff2e6"},"headline":"Attackers with State Sponsorship in Iran Break Into US Government Network and Release Cryptominer and Password Stealer","datePublished":"2022-11-16T17:18:36+00:00","dateModified":"2023-03-27T08:33:45+00:00","mainEntityOfPage":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/attackers-with-state-sponsorship-in-iran-break-into-us-government-network-and-release-cryptominer-and-password-stealer\/"},"wordCount":3991,"commentCount":0,"publisher":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/#\/schema\/person\/af1d121cbedd3ce64369f21a359ff2e6"},"image":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/attackers-with-state-sponsorship-in-iran-break-into-us-government-network-and-release-cryptominer-and-password-stealer\/#primaryimage"},"thumbnailUrl":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2022\/11\/shield-icon-cyber-security-digital-data-network-protection-future-technology-digital-data-network-connection.jpg","keywords":["Cyber Attack","Data Breach","Malware","Vulnerability"],"articleSection":["Cyber Attack","Data Breaches","Malware","Vulnerability"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/sajinshivdas.com\/cybersecurity\/attackers-with-state-sponsorship-in-iran-break-into-us-government-network-and-release-cryptominer-and-password-stealer\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/sajinshivdas.com\/cybersecurity\/attackers-with-state-sponsorship-in-iran-break-into-us-government-network-and-release-cryptominer-and-password-stealer\/","url":"https:\/\/sajinshivdas.com\/cybersecurity\/attackers-with-state-sponsorship-in-iran-break-into-us-government-network-and-release-cryptominer-and-password-stealer\/","name":"Attackers with State Sponsorship in Iran Break Into US Government Network and Release Cryptominer and Password Stealer - Sajin Shivdas | Cybersecurity","isPartOf":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/attackers-with-state-sponsorship-in-iran-break-into-us-government-network-and-release-cryptominer-and-password-stealer\/#primaryimage"},"image":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/attackers-with-state-sponsorship-in-iran-break-into-us-government-network-and-release-cryptominer-and-password-stealer\/#primaryimage"},"thumbnailUrl":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2022\/11\/shield-icon-cyber-security-digital-data-network-protection-future-technology-digital-data-network-connection.jpg","datePublished":"2022-11-16T17:18:36+00:00","dateModified":"2023-03-27T08:33:45+00:00","description":"When CISA discovered what it believed to be advanced persistent threat (APT) activity at a Federal Civilian Executive Branch (FCEB) entity between the","breadcrumb":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/attackers-with-state-sponsorship-in-iran-break-into-us-government-network-and-release-cryptominer-and-password-stealer\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sajinshivdas.com\/cybersecurity\/attackers-with-state-sponsorship-in-iran-break-into-us-government-network-and-release-cryptominer-and-password-stealer\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sajinshivdas.com\/cybersecurity\/attackers-with-state-sponsorship-in-iran-break-into-us-government-network-and-release-cryptominer-and-password-stealer\/#primaryimage","url":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2022\/11\/shield-icon-cyber-security-digital-data-network-protection-future-technology-digital-data-network-connection.jpg","contentUrl":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2022\/11\/shield-icon-cyber-security-digital-data-network-protection-future-technology-digital-data-network-connection.jpg","width":1500,"height":844},{"@type":"BreadcrumbList","@id":"https:\/\/sajinshivdas.com\/cybersecurity\/attackers-with-state-sponsorship-in-iran-break-into-us-government-network-and-release-cryptominer-and-password-stealer\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sajinshivdas.com\/cybersecurity\/"},{"@type":"ListItem","position":2,"name":"Attackers with State Sponsorship in Iran Break Into US Government Network and Release Cryptominer and Password Stealer"}]},{"@type":"WebSite","@id":"https:\/\/sajinshivdas.com\/cybersecurity\/#website","url":"https:\/\/sajinshivdas.com\/cybersecurity\/","name":"sajinshivdas.com","description":"Cybersecurity - Information security Resources, Articles and Latest News","publisher":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/#\/schema\/person\/af1d121cbedd3ce64369f21a359ff2e6"},"alternateName":"Sajin Shivdas","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sajinshivdas.com\/cybersecurity\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":["Person","Organization"],"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/#\/schema\/person\/af1d121cbedd3ce64369f21a359ff2e6","name":"Sajin Shivdas","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2023\/01\/5dbd4f42-9550-4c99-82e9-34f3c99a2253.png","url":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2023\/01\/5dbd4f42-9550-4c99-82e9-34f3c99a2253.png","contentUrl":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2023\/01\/5dbd4f42-9550-4c99-82e9-34f3c99a2253.png","width":1000,"height":500,"caption":"Sajin Shivdas"},"logo":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2023\/01\/5dbd4f42-9550-4c99-82e9-34f3c99a2253.png"},"sameAs":["http:\/\/sajinshivdas.com\/security","www.linkedin.com\/in\/sajin-shivdas"]}]}},"_links":{"self":[{"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/posts\/6162","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/comments?post=6162"}],"version-history":[{"count":0,"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/posts\/6162\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/media\/6167"}],"wp:attachment":[{"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/media?parent=6162"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/categories?post=6162"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/tags?post=6162"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}