<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" version="2.0">
  <channel>
    <title>Netwitness Security LLC blog</title>
    <link>https://50269063.hs-sites.com/netwitness-security-llc-blog</link>
    <description />
    <language>en</language>
    <pubDate>Thu, 02 Apr 2026 13:17:13 GMT</pubDate>
    <dc:date>2026-04-02T13:17:13Z</dc:date>
    <dc:language>en</dc:language>
    <item>
      <title>Amazon Cloudwatch Event Source Log Configuration Guide</title>
      <link>https://50269063.hs-sites.com/netwitness-security-llc-blog/amazoncloudwatcheventsourcelogconfigurationguide</link>
      <description>&lt;p&gt;Amazon CloudWatch Event Source Log Configuration Guide provides the following information:&lt;/p&gt;</description>
      <content:encoded>&lt;p&gt;Amazon CloudWatch Event Source Log Configuration Guide provides the following information:&lt;/p&gt; 
&lt;ol&gt; 
 &lt;li&gt;Introduction about Amazon CloudWatch Logs Service&lt;/li&gt; 
 &lt;li&gt;Setting up AWS CloudWatch Logs&lt;/li&gt; 
 &lt;li&gt;Setting up Amazon Universal CloudWatch Plugin&lt;/li&gt; 
 &lt;li&gt;Amazon CloudWatch Collection Configuration Parameters&lt;/li&gt; 
&lt;/ol&gt; 
&lt;p&gt;For more information, refer the PDF available in the Attachments section.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=50269063&amp;amp;k=14&amp;amp;r=https%3A%2F%2F50269063.hs-sites.com%2Fnetwitness-security-llc-blog%2Famazoncloudwatcheventsourcelogconfigurationguide&amp;amp;bu=https%253A%252F%252F50269063.hs-sites.com%252Fnetwitness-security-llc-blog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <pubDate>Wed, 03 Dec 2025 05:00:00 GMT</pubDate>
      <guid>https://50269063.hs-sites.com/netwitness-security-llc-blog/amazoncloudwatcheventsourcelogconfigurationguide</guid>
      <dc:date>2025-12-03T05:00:00Z</dc:date>
      <dc:creator>Admin</dc:creator>
    </item>
    <item>
      <title>F5 Source Code Breach: Hunting UNC5221's BRICKSTORM with NetWitness</title>
      <link>https://50269063.hs-sites.com/netwitness-security-llc-blog/f5-source-code-breach-hunting-unc5221-s-brickstorm-with-netwitness</link>
      <description>&lt;h2&gt;F5 Source Code Breach: Hunting UNC5221's BRICKSTORM with NetWitness®&lt;/h2&gt; 
&lt;p&gt;Hey folks, Dave Glover here with some critical intel you need to act on right now. On October 15, 2025, F5 dropped a bombshell disclosure that's sending shockwaves through our industry—a nation-state threat actor, tracked as&amp;nbsp;&lt;b&gt;UNC5221 &lt;/b&gt;(China-nexus), maintained persistent access to F5's corporate network for &lt;b&gt;over 12 months&lt;/b&gt;, exfiltrating BIG-IP source code and undisclosed vulnerability intelligence. CISA immediately issued Emergency Directive ED-26-01, and for good reason—this isn't just another breach, it's a strategic supply chain compromise with massive downstream implications.&lt;/p&gt;</description>
      <content:encoded>&lt;h2&gt;F5 Source Code Breach: Hunting UNC5221's BRICKSTORM with NetWitness®&lt;/h2&gt; 
&lt;p&gt;Hey folks, Dave Glover here with some critical intel you need to act on right now. On October 15, 2025, F5 dropped a bombshell disclosure that's sending shockwaves through our industry—a nation-state threat actor, tracked as&amp;nbsp;&lt;b&gt;UNC5221 &lt;/b&gt;(China-nexus), maintained persistent access to F5's corporate network for &lt;b&gt;over 12 months&lt;/b&gt;, exfiltrating BIG-IP source code and undisclosed vulnerability intelligence. CISA immediately issued Emergency Directive ED-26-01, and for good reason—this isn't just another breach, it's a strategic supply chain compromise with massive downstream implications.&lt;/p&gt; 
&lt;p&gt;If you're running F5 BIG-IP appliances (and let's be honest, who isn't?), you need to be threat hunting &lt;b&gt;right now&lt;/b&gt;. This post will arm you with the knowledge and NetWitness queries to detect BRICKSTORM backdoor activity and related TTPs in your environment.&lt;/p&gt; 
&lt;h2&gt;The Breach: What Happened&lt;/h2&gt; 
&lt;p&gt;F5 discovered the intrusion on &lt;b&gt;August 9, 2025&lt;/b&gt;, but evidence suggests UNC5221 had been inside since at least &lt;b&gt;mid-2024&lt;/b&gt;.&lt;/p&gt; 
&lt;p&gt;The attackers exfiltrated:&lt;/p&gt; 
&lt;ul&gt; 
 &lt;li&gt;Portions of BIG-IP source code across multiple modules (all BIG-IP products affected)&lt;/li&gt; 
 &lt;li&gt;Information about undisclosed vulnerabilities&lt;/li&gt; 
 &lt;li&gt;Engineering knowledge management system data&lt;/li&gt; 
&lt;/ul&gt; 
&lt;p&gt;&lt;b&gt;&amp;nbsp;&lt;/b&gt;&lt;/p&gt; 
&lt;p&gt;The stolen source code dramatically increases the risk of rapid zero-day discovery and weaponization. F5 has since released patches for &lt;b&gt;over 20 vulnerabilities &lt;/b&gt;spanning BIG-IP (all modules), F5OS-A/C, and BIG-IP Next. Key CVEs include:&lt;/p&gt; 
&lt;ul&gt; 
 &lt;li&gt;&lt;b&gt;CVE-2025-53868 &lt;/b&gt;(BIG-IP all modules)&lt;/li&gt; 
 &lt;li&gt;&lt;b&gt;CVE-2025-61955 &lt;/b&gt;(F5OS-A; F5OS-C)&lt;/li&gt; 
 &lt;li&gt;&lt;b&gt;CVE-2025-60016 &lt;/b&gt;(BIG-IP all modules; BIG-IP Next SPK; BIG-IP Next CNF)&lt;/li&gt; 
 &lt;li&gt;...and 20+ more&lt;/li&gt; 
&lt;/ul&gt; 
&lt;p&gt;Full vulnerability list available at: &lt;a href="https://my.f5.com/manage/s/article/K000154696"&gt;https://my .f5.com/manage/s/article/K000154696&lt;/a&gt;&lt;/p&gt; 
&lt;div&gt; 
 &lt;h2&gt;Meet BRICKSTORM: The Appliance Whisperer&lt;/h2&gt; 
 &lt;p&gt;&lt;b&gt;&amp;nbsp;&lt;/b&gt;UNC5221's weapon of choice is &lt;b&gt;BRICKSTORM&lt;/b&gt;, a Go-based backdoor specifically engineered to compromise network appliances that don't support traditional EDR. Here's what makes it dangerous:&lt;/p&gt; 
 &lt;p&gt;&lt;b&gt;Technical&lt;/b&gt;&lt;b&gt; &lt;/b&gt;&lt;b&gt;Capabilities:&lt;/b&gt;&lt;/p&gt; 
 &lt;ul&gt; 
  &lt;li&gt;Statically-linked Go ELF binary&lt;b&gt; &lt;/b&gt;(linux/amd64)—completely self-contained, no dependencies&lt;/li&gt; 
  &lt;li&gt;HTTP/2 over TLS with WebSocket upgrade for persistent C2 tunnel&lt;/li&gt; 
  &lt;li&gt;Yamux multiplexing—multiple logical streams over a single socket (legacy SPDY-inspired tech from 2009)&lt;/li&gt; 
  &lt;li&gt;Built-in SOCKS proxy for TCP pivoting and lateral movement&lt;/li&gt; 
  &lt;li&gt;Multipart/form-data exfiltration&lt;b&gt; &lt;/b&gt;with base64/quoted-printable encoding and compression to blend with legitimate web traffic&lt;/li&gt; 
  &lt;li&gt;No hardcoded domains or credentials - all supplied at runtime&lt;/li&gt; 
 &lt;/ul&gt; 
 &lt;p&gt;&lt;b&gt;Operational Security:&lt;/b&gt;&lt;/p&gt; 
 &lt;ul&gt; 
  &lt;li&gt;Average dwell time: &lt;b&gt;393 days&lt;/b&gt;&lt;/li&gt; 
  &lt;li&gt;Minimal security telemetry generation&lt;/li&gt; 
  &lt;li&gt;C2 domains never reused across victims&lt;/li&gt; 
  &lt;li&gt;Masquerades as legitimate system processes (e.g., pg_update, vami-httpd, vmprotect)&lt;/li&gt; 
 &lt;/ul&gt; 
 &lt;h2&gt;Attack Lifecycle: How They Operate&lt;/h2&gt; 
 &lt;ol&gt; 
  &lt;li&gt;&lt;b&gt;Initial Access: &lt;/b&gt;Exploitation of internet-exposed BIG-IP management interfaces (likely zero-days)&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Establish Foothold: &lt;/b&gt;Deploy BRICKSTORM on appliances (F5 BIG-IP, VMware vCenter/ESXi, network edge devices)&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Persistence: &lt;/b&gt;Modify systemd, init.d, or rc.local to auto-start backdoor on reboot&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Credential Harvesting: &lt;/b&gt;Deploy BRICKSTEAL (Java Servlet filter) on vCenter to capture credentials; Clone VMs of Domain Controllers, password vaults, SSO providers&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Lateral Movement: &lt;/b&gt;SSH to appliances using stolen credentials; SOCKS proxy from appliance management IPs&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Complete Mission: &lt;/b&gt;Exfiltrate emails via Microsoft Entra ID Enterprise Applications; Download source code repositories as ZIP archives&lt;/li&gt; 
 &lt;/ol&gt; 
 &lt;h2&gt;NetWitness Detection: Sample Queries to Hunt BRICKSTORM&lt;/h2&gt; 
 &lt;p&gt;Alright, enough theory—let's get to the good stuff. Here are NetWitness queries you can run &lt;b&gt;right now &lt;/b&gt;to hunt for indicators of BRICKSTORM activity and UNC5221 TTPs in your environment.&lt;/p&gt; 
 &lt;ol&gt; 
  &lt;li&gt;&lt;b&gt;Hunt for Suspicious HTTP/2 + WebSocket Traffic from Appliances&lt;br&gt;&lt;/b&gt;BRICKSTORM uses HTTP/2 negotiation via ALPN and upgrades connections to WebSocket for persistent C2. Appliance management IPs should &lt;b&gt;rarely &lt;/b&gt;establish outbound HTTP/2 or WebSocket connections.&lt;br&gt;&lt;p&gt;# Detect HTTP/2 traffic from known appliance subnets &lt;br&gt;ip.src = '&amp;lt;&lt;em&gt;your_appliance_subnet&lt;/em&gt;&amp;gt;' &amp;amp;&amp;amp; http.version =&amp;nbsp;'2.0' &lt;br&gt;&lt;br&gt;# Detect WebSocket upgrade requests from appliances &lt;br&gt;ip.src = '&amp;lt;&lt;em&gt;your_appliance_subnet&lt;/em&gt;&amp;gt;' &amp;amp;&amp;amp; http.header&amp;nbsp;contains 'Upgrade: websocket' &lt;br&gt;&lt;br&gt;# Combine both for high-fidelity alert &lt;br&gt;ip.src = '&amp;lt;&lt;em&gt;your_appliance_subnet&lt;/em&gt;&amp;gt;' &amp;amp;&amp;amp;&amp;nbsp;(http.version = '2.0' || http.header contains 'Upgrade: websocket')&lt;/p&gt; &lt;p&gt;&lt;strong&gt;Pro Tip:&lt;/strong&gt; Create a meta key for your appliance management IPs (BIG-IP, vCenter, ESXi, VPN concentrators, firewalls) and substitute &lt;em&gt; &lt;/em&gt; with your actual ranges.&lt;/p&gt; &lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Detect Yamux Multiplexing Protocol Signatures&lt;br&gt;&lt;/b&gt;BRICKSTORM uses Yamux (SPDY-inspired multiplexing) over TLS. While Yamux traffic is encrypted, you can look for patterns in connection behavior and TLS characteristics.&lt;br&gt;&lt;p&gt;# Look for persistent long-duration TLS sessions from appliances &lt;br&gt;ip.src = '&amp;lt;&lt;em&gt;your_appliance_subnet&lt;/em&gt;&amp;gt;' &amp;amp;&amp;amp;&amp;nbsp;service = 443 &amp;amp;&amp;amp; session.duration &amp;gt; 3600 &amp;amp;&amp;amp; packets &amp;gt; 1000 &lt;br&gt;&lt;br&gt;# Detect TLS connections&amp;nbsp;with HTTP/2 ALPN from&amp;nbsp;appliances &lt;br&gt;ip.src = '&amp;lt;&lt;em&gt;your_appliance_subnet&lt;/em&gt;&amp;gt;' &amp;amp;&amp;amp; ssl.alpn = 'h2' &lt;br&gt;&lt;br&gt;# Hunt for TLS sessions to non-standard&amp;nbsp;ports (Yamux can run on any port) &lt;br&gt;ip.src = '&amp;lt;&lt;em&gt;your_appliance_subnet&lt;/em&gt;&amp;gt;' &amp;amp;&amp;amp; service != 443 &amp;amp;&amp;amp; (tls.version =&amp;nbsp;'1.2' || tls.version = '1.3')&lt;/p&gt; &lt;b&gt;&lt;/b&gt;&lt;b&gt;&lt;/b&gt;&lt;b&gt;&lt;br&gt;&lt;/b&gt;&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Identify Appliances Communicating with External IPs (Not Vendor Domains)&lt;br&gt;&lt;/b&gt;Appliances should only communicate with manufacturer domains for updates and telemetry. Any other outbound connections are highly suspicious.&lt;b&gt;&lt;br&gt;&lt;/b&gt; &lt;p&gt;# Detect outbound connections from appliances NOT to F5/VMware/known vendors &lt;br&gt;ip.src = '&amp;lt;&lt;em&gt;your_appliance_subnet&lt;/em&gt;&amp;gt;' &amp;amp;&amp;amp; direction = 'outbound' &amp;amp;&amp;amp; !(alias.host contains 'f5.com'&amp;nbsp;|| alias.host contains&amp;nbsp;'vmware.com' || alias.host contains '&amp;lt;&lt;em&gt;add_your_vendor_domains&lt;/em&gt;&amp;gt;') &lt;br&gt;&lt;br&gt;# Focus on HTTPS connections to unknown&amp;nbsp;destinations &lt;br&gt;ip.src = '&amp;lt;&lt;em&gt;your_appliance_subnet&lt;/em&gt;&amp;gt;' &amp;amp;&amp;amp; service = 443 &amp;amp;&amp;amp; !(alias.host&amp;nbsp;contains 'f5.com' ||&amp;nbsp;alias.host contains 'vmware.com')&lt;/p&gt; &lt;b&gt;&lt;br&gt;&lt;br&gt;&lt;/b&gt;&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Hunt for DNS over HTTPS (DoH) from Appliances&lt;br&gt;&lt;/b&gt;BRICKSTORM can use DNS over HTTPS (DoH) to evade detection. Appliances should never use DoH.&lt;b&gt;&lt;br&gt;&lt;/b&gt; &lt;p&gt;# Detect DoH queries (usually to public resolvers) &lt;br&gt;ip.src = '&amp;lt;&lt;em&gt;your_appliance_subnet&lt;/em&gt;&amp;gt;' &amp;amp;&amp;amp; (alias.host =&amp;nbsp;'dns.google' || alias.host = 'cloudflare-dns.com' || alias.host = 'dns.quad9.net' || url contains '/dns-query') &lt;br&gt;&lt;br&gt;#&amp;nbsp;Broader hunt for HTTPS to known DoH providers &lt;br&gt;ip.src =&amp;nbsp; &lt;em&gt; &lt;/em&gt;' &amp;amp;&amp;amp; (ip.dst = '8.8.8.8' || ip.dst = '1.1.1.1' || ip.dst = '9.9.9.9') &amp;amp;&amp;amp; service = 443&lt;/p&gt; &lt;b&gt;&lt;br&gt;&lt;br&gt;&lt;/b&gt;&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Detect Windows Logon Events Sourced from Appliances (Type 3 Network Logons)&lt;br&gt;&lt;/b&gt;UNC5221 uses compromised appliances to log into Windows systems via SMB/RDP. Appliances should rarely authenticate to Windows endpoints.&lt;b&gt;&lt;br&gt;&lt;/b&gt; &lt;p&gt;# Hunt for SMB traffic from appliances to Windows servers &lt;br&gt;ip.src = '&lt;em&gt; &lt;/em&gt;' &amp;amp;&amp;amp; service =&amp;nbsp;445 &amp;amp;&amp;amp; ip.dst =&amp;nbsp; '&lt;em&gt; &lt;/em&gt;' &lt;br&gt;&lt;br&gt;# Detect RDP sessions initiated from appliances &lt;br&gt;ip.src = '&lt;em&gt; &lt;/em&gt;' &amp;amp;&amp;amp; service = 3389 &lt;br&gt;&lt;br&gt;# Look for Kerberos/NTLM authentication from appliances &lt;br&gt;ip.src =&amp;nbsp;'&amp;lt;&lt;em&gt;your_appliance_subnet&lt;/em&gt;&amp;gt;' &amp;amp;&amp;amp; (service = 88 || service = 135 || service = 139)&lt;/p&gt; &lt;p&gt;&lt;b&gt;Windows Event Correlation: &lt;/b&gt;Enrich with Windows Event Logs (Event ID 4624 Type 3) where source IP matches appliance management IPs.&lt;/p&gt; &lt;b&gt;&lt;br&gt;&lt;/b&gt;&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Hunt for Multipart/Form-Data Exfiltration&lt;br&gt;&lt;/b&gt;BRICKSTORM&amp;nbsp;&amp;nbsp; exfiltrates&amp;nbsp; data&amp;nbsp;&amp;nbsp; using&amp;nbsp;&amp;nbsp; multipart/form-data&amp;nbsp;&amp;nbsp; POST&amp;nbsp;&amp;nbsp; requests&amp;nbsp; with base64/quoted-printable encoding and compression to mimic legitimate web traffic.&lt;b&gt;&lt;br&gt;&lt;/b&gt; &lt;p&gt;# Detect large multipart/form-data uploads from appliances &lt;br&gt;ip.src = '&amp;lt;&lt;em&gt;your_appliance_subnet&lt;/em&gt;&amp;gt;' &amp;amp;&amp;amp; http.method = 'POST' &amp;amp;&amp;amp; content.type = 'multipart/form-data' &amp;amp;&amp;amp; bytes.dst &amp;gt; 1048576 &lt;br&gt;&lt;br&gt;# Look for base64 patterns in POST bodies (may trigger on legitimate traffic) &lt;br&gt;ip.src = '&amp;lt;&lt;em&gt;your_appliance_subnet&lt;/em&gt;&amp;gt;' &amp;amp;&amp;amp; http.method = 'POST' &amp;amp;&amp;amp; payload contains 'base64'&lt;/p&gt; &lt;b&gt;&lt;br&gt;&lt;br&gt;&lt;/b&gt;&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Detect SSH Enablement and New Local Account Creation on vCenter/ESXi&lt;br&gt;&lt;/b&gt;UNC5221 frequently enables SSH on vSphere appliances and creates temporary local admin accounts.&lt;b&gt;&lt;br&gt;&lt;/b&gt; &lt;p&gt;# Hunt for SSH connections TO vCenter/ESXi management IPs &lt;br&gt;ip.dst = '&amp;lt;&lt;em&gt;vcenter_esxi_management_ips&lt;/em&gt;&amp;gt;' &amp;amp;&amp;amp; service = 22 &lt;br&gt;&lt;br&gt;# Look for SSH from unexpected internal sources &lt;br&gt;ip.dst = '&amp;lt;&lt;em&gt;vcenter_esxi_management_ips&lt;/em&gt;&amp;gt;' &amp;amp;&amp;amp; service = 22 &amp;amp;&amp;amp; !(ip.src = '&amp;lt;&lt;em&gt;authorized_jump_boxes&lt;/em&gt;&amp;gt;')&lt;/p&gt; &lt;p&gt;&lt;b&gt;Log Correlation: &lt;/b&gt;Check vCenter audit logs (/var/log/audit/sso-events/audit_events.log) for PrincipalManagement events creating/deleting local users and SystemConfiguration.BashShellAdministrators group modifications.&lt;b&gt;&lt;br&gt;&lt;/b&gt;&lt;/p&gt; &lt;br&gt;&lt;br&gt;&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Detect VM Cloning Activity on vCenter&lt;br&gt;&lt;/b&gt;UNC5221 clones sensitive VMs (Domain Controllers, password vaults) to extract credentials offline without triggering EDR.&lt;b&gt;&lt;br&gt;&lt;/b&gt; &lt;p&gt;# Hunt for SMB/vSphere API traffic patterns consistent with VM cloning &lt;br&gt;ip.src = '&amp;lt;&lt;em&gt;vcenter_management_ip&lt;/em&gt;&amp;gt;' &amp;amp;&amp;amp;&amp;nbsp;(service = 443 || service = 902) &amp;amp;&amp;amp; session.size &amp;gt; 10485760&lt;/p&gt; &lt;p&gt;&lt;b&gt;Log Collection: &lt;/b&gt;Search vCenter VPXD logs for vim.event.VmBeingClonedEvent, vim.event.VmClonedEvent, and vim.event.VmRemovedEvent, filtering for VSPHERE.LOCAL\Administrator account during 01:00-10:00 UTC.&lt;b&gt;&lt;br&gt;&lt;/b&gt;&lt;/p&gt; &lt;br&gt;&lt;br&gt;&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Hunt for Commercial VPN/Proxy Usage&lt;br&gt;&lt;/b&gt;UNC5221 uses commercial VPN services (PIA, NordVPN, Surfshark, VPN Unlimited, PrivadoVPN) and compromised SOHO routers for obfuscation.&lt;b&gt;&lt;br&gt;&lt;/b&gt; &lt;p&gt;# Detect connections to known commercial VPN provider IP ranges &lt;br&gt;(asn = '&amp;lt;&lt;em&gt;PIA_ASN&lt;/em&gt;&amp;gt;' ||&amp;nbsp;asn =&amp;nbsp;'&amp;lt;&lt;em&gt;NordVPN_ASN&lt;/em&gt;&amp;gt;' || asn = '&amp;lt;&lt;em&gt;Surfshark_ASN&lt;/em&gt;&amp;gt;') &amp;amp;&amp;amp; (ip.src = '&amp;lt;&lt;em&gt;your_internal_subnets&lt;/em&gt;&amp;gt;' || ip.dst =&amp;nbsp;'&amp;lt;&lt;em&gt;your_internal_subnets&lt;/em&gt;&amp;gt;') &lt;br&gt;&lt;br&gt;# Hunt for TLS connections to VPN provider domains &lt;br&gt;alias.host contains&amp;nbsp;'privateinternetaccess' || alias.host contains 'nordvpn' || alias.host contains 'surfshark' || alias.host contains&amp;nbsp;'vpnunlimitedapp' || alias.host contains 'privadovpn'&lt;/p&gt; &lt;b&gt;&lt;br&gt;&lt;br&gt;&lt;/b&gt;&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Detect Microsoft 365 Mailbox Access via Enterprise Applications&lt;br&gt;&lt;/b&gt;UNC5221&amp;nbsp;&amp;nbsp;&amp;nbsp; creates&amp;nbsp;&amp;nbsp;&amp;nbsp; Entra&amp;nbsp;&amp;nbsp;&amp;nbsp; ID&amp;nbsp;&amp;nbsp;&amp;nbsp; Enterprise&amp;nbsp;&amp;nbsp;&amp;nbsp; Applications&amp;nbsp;&amp;nbsp;&amp;nbsp; with&amp;nbsp;&amp;nbsp;&amp;nbsp; mail.read&amp;nbsp;&amp;nbsp;&amp;nbsp; or full_access_as_app scopes to exfiltrate executive emails.&lt;b&gt;&lt;br&gt;&lt;/b&gt; &lt;p&gt;# Hunt for unusual Graph API access patterns &lt;br&gt;alias.host = 'graph.microsoft.com' &amp;amp;&amp;amp; url contains '/mail' &amp;amp;&amp;amp;&amp;nbsp;http.method = 'GET' &lt;br&gt;&lt;br&gt;# Detect bulk email downloads &lt;br&gt;alias.host = 'graph.microsoft.com'&amp;nbsp;&amp;amp;&amp;amp; url contains '/messages'&amp;nbsp;&amp;amp;&amp;amp; session.size &amp;gt; 10485760&lt;/p&gt; &lt;p&gt;&lt;b&gt;Microsoft 365 Log Correlation: &lt;/b&gt;Query Unified Audit Log or Sentinel OfficeActivity table for MailItemsAccessed events with Enterprise Application ClientID, focusing on source IPs from commercial VPN ranges.&lt;b&gt;&lt;br&gt;&lt;/b&gt;&lt;/p&gt; &lt;br&gt;&lt;br&gt;&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Baseline and Anomaly Detection: Appliance Outbound Traffic&lt;br&gt;&lt;/b&gt;Create a baseline of normal appliance behavior and alert on deviations.&lt;b&gt;&lt;br&gt;&lt;/b&gt; &lt;p&gt;# Baseline query: Map all outbound destinations from appliances &lt;br&gt;ip.src = '&amp;lt;&lt;em&gt;your_appliance_subnet&lt;/em&gt;&amp;gt;' &amp;amp;&amp;amp;&amp;nbsp;direction = 'outbound' aggregation: alias.host, ip.dst, service &lt;br&gt;&lt;br&gt;# Anomaly detection:&amp;nbsp;Alert on NEW destinations&amp;nbsp;never seen before &lt;br&gt;ip.src = '&amp;lt;&lt;em&gt;your_appliance_subnet&lt;/em&gt;&amp;gt;' &amp;amp;&amp;amp; direction = 'outbound' &amp;amp;&amp;amp; ! (alias.host =&amp;nbsp;'&amp;lt;&lt;em&gt;whitelisted_vendor_domains&lt;/em&gt;&amp;gt;')&lt;/p&gt; &lt;p&gt;&lt;b&gt;Implementation:&lt;/b&gt; Run baseline weekly, export results, and create exclusion lists. Alert on any NEW connections.&lt;/p&gt; &lt;b&gt;&lt;br&gt;&lt;br&gt;&lt;/b&gt;&lt;b&gt;&lt;/b&gt;&lt;/li&gt; 
 &lt;/ol&gt; 
 &lt;h2&gt;Indicators of Compromise (IOCs)&lt;/h2&gt; 
 &lt;p&gt;&lt;strong&gt;BRICKSTORM File Hashes (SHA-256)&lt;/strong&gt;&lt;/p&gt; 
 &lt;ul&gt; 
  &lt;li&gt;&lt;b&gt;90b760ed1d0dcb3ef0f2b6d6195c9d852bcb65eca293578982a8c4b64f51b035 &lt;/b&gt;(Pg_update)&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;2388ed7aee0b6b392778e8f9e98871c06499f476c9e7eae6ca0916f827fe65df &lt;/b&gt;(Listener/spclisten)&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;aa688682d44f0c6b0ed7f30b981a609100107f2d414a3a6e5808671b112d1878 &lt;/b&gt;(Vmprotect/vmp)&lt;/li&gt; 
 &lt;/ul&gt; 
 &lt;p&gt;&lt;strong&gt;Note&lt;/strong&gt;: UNC5221 never reuses malware samples or C2 domains across victims. Hash-based detection alone is insufficient - focus on &lt;strong&gt;TTP-based hunting&lt;/strong&gt;.&lt;/p&gt; 
 &lt;h2&gt;Enablers of Compromise (EOCs): What Made this Possible&lt;/h2&gt; 
 &lt;p&gt;This is where I want to shift your thinking. Yes, we need to hunt for IOCs and detect active compromise, but let's talk about &lt;strong&gt;Enablers of Compromise&lt;/strong&gt; - the underlying weaknesses that gave UNC5221 a 12-month vacation in F5's network.&lt;/p&gt; 
 &lt;strong&gt;Key EOCs:&lt;/strong&gt; 
&lt;/div&gt; 
&lt;div&gt; 
 &lt;ol&gt; 
  &lt;li&gt;Internet-exposed appliance management interfaces (BIG-IP, vCenter, ESXi)&lt;/li&gt; 
  &lt;li&gt;Lack of centralized logging from appliances to SIEM&lt;/li&gt; 
  &lt;li&gt;No EDR capability on network appliances&lt;/li&gt; 
  &lt;li&gt;Poor appliance inventory management ("unknown unknowns")&lt;/li&gt; 
  &lt;li&gt;Weak network segmentation (appliances could reach Windows servers/internal apps)&lt;/li&gt; 
  &lt;li&gt;Insufficient monitoring of outbound traffic from management IPs&lt;/li&gt; 
  &lt;li&gt;Log log retention gaps (393-day average dwell time exceeded most log retention)&lt;/li&gt; 
 &lt;/ol&gt; 
 &lt;p&gt;&lt;strong&gt;Forward-Thinking Defense:&lt;/strong&gt;&lt;/p&gt; 
 &lt;ul&gt; 
  &lt;li&gt;Isolate management interfaces from the internet (VPN-only access)&lt;/li&gt; 
  &lt;li&gt;Implement zero-trust network segmentation (appliances should NOT freely access Windows/internal networks)&lt;/li&gt; 
  &lt;li&gt;Centralized appliance logs to NetWitness with extended retention&lt;/li&gt; 
  &lt;li&gt;Deploy decoy credentials and honeypot appliances to detect lateral movement&lt;/li&gt; 
  &lt;li&gt;Enforce Multi-Factor Authentication for all administrative access (including vCenter, ESXi, and BIG-IP)&lt;/li&gt; 
  &lt;li&gt;Enable vSphere Lockdown Mode and restrict SSH to authorized jump boxes&lt;/li&gt; 
 &lt;/ul&gt; 
 &lt;h2&gt;Immediate Actions: What You Need to Do Right Now&lt;/h2&gt; 
 &lt;ol&gt; 
  &lt;li&gt;Inventory ALL appliances (F5 BIG-IP, vCenter, ESXi, firewalls, and VPN concentrators) - if it doesn't support EDR, it needs to be on this list&lt;/li&gt; 
  &lt;li&gt;Patch F5 devices immediately to the latest fixed release&lt;/li&gt; 
  &lt;li&gt;Remove public exposure of F5 management interfaces or restric to specific IP ranges&lt;/li&gt; 
  &lt;li&gt;Run&amp;nbsp; the NetWitness queries in this post against 12+ months of captured data (if retention allows)&lt;/li&gt; 
  &lt;li&gt;Review vCenter/ESXi audit logs for unauthorized VM cloning, SSH enablement, and local account creation&lt;/li&gt; 
  &lt;li&gt;Audit Microsoft 365 Enterprise Applications for suspicious mail.read/full_access_as_app permissions&lt;/li&gt; 
  &lt;li&gt;Deploy YARA rules against appliance backups and filesystems&lt;/li&gt; 
  &lt;li&gt;Forward appliance logs (syslog, VAMI, VPXD, and audit logs) to NetWitness for continuous monitoring&lt;/li&gt; 
 &lt;/ol&gt; 
 &lt;h2&gt;The Bigger Picture: Supply Chain Risk&lt;/h2&gt; 
 &lt;p&gt;This breach isn't just about F5—it's a wake-up call about the fragility of our supply chain. When a security vendor gets compromised and their source code stolen, the downstream impact cascades to &lt;b&gt;every customer running those products&lt;/b&gt;. With over &lt;b&gt;600,000 internet-connected F5 devices &lt;/b&gt;globally, the attack surface is enormous.&lt;/p&gt; 
 &lt;p&gt;UNC5221's targeting of legal services, SaaS providers, BPOs, and technology companies suggests objectives beyond simple espionage:&lt;/p&gt; 
 &lt;ul&gt; 
  &lt;li&gt;IP theft to fuel zero-day development&lt;/li&gt; 
  &lt;li&gt;Access operations to establish pivot points into downstream customer environments&lt;/li&gt; 
  &lt;li&gt;Strategic intelligence collection aligned with PRC economic interests&lt;/li&gt; 
 &lt;/ul&gt; 
 &lt;p&gt;The fact they maintained access for &lt;strong&gt;over a year undetected&lt;/strong&gt; should give every CISO and security engineer pause. Traditional signature-based defenses failed. EDR didn't exist on the compromised appliances. This is why we need TTP-based hunting, behavioral analytics, and a relentless focus on &lt;strong&gt;Enablers of Compromise&lt;/strong&gt;.&lt;/p&gt; 
 &lt;h2&gt;Final Thoughts: Stay Vigilant&lt;/h2&gt; 
 &lt;p&gt;I know this is a heavy post, but the threat is real and active right now. UNC5221 is sophisticated, patient, and incredibly stealthy. They're not smash-and-grab criminals - they're nation-state operators playing the long game.&lt;/p&gt; 
 &lt;p&gt;Your job is to make their life harder. Run these queries. Patch your systems. Lock down your appliances. Build detections around the TTPS, not just the IOCs. And most importantly, think forward - what conditions in your environment would enable an attacker to persist for 393 days? Fix those.&lt;/p&gt; 
 &lt;p&gt;If you find something suspicious, don't hesitate to escalate and bring in forensics expertise. This is not the time for "wait and see".&lt;/p&gt; 
 &lt;p&gt;Stay safe out there and keep those logs flowing.&lt;/p&gt; 
 &lt;p&gt;Dave Glover&lt;/p&gt; 
 &lt;h2&gt;References&lt;/h2&gt; 
 &lt;ul&gt; 
  &lt;li&gt;&lt;a href="https://my.f5.com/manage/s/article/K000154696"&gt;F5 Security Incident K000154696&lt;/a&gt;&lt;/li&gt; 
  &lt;li&gt;&lt;a href="https://www.cisa.gov/news-events/directives/ed-26-01-mitigate-vulnerabilities-f5-devices"&gt;CISA Emergency Director ED-26-01&lt;/a&gt;&lt;/li&gt; 
  &lt;li&gt;&lt;a href="https://cloud.google.com/blog/topics/threat-intelligence/brickstorm-espionage-campaign"&gt;Google GTIG: BRICKSTORM Espionage Campaign&lt;/a&gt;&lt;/li&gt; 
  &lt;li&gt;&lt;a href="https://www.resecurity.com/blog/article/f5-big-ip-source-code-leak-tied-to-state-linked-campaigns-using-brickstorm-backdoor"&gt;Resecurity: F5 BIG_IP Source Code Leak&lt;/a&gt;&lt;/li&gt; 
  &lt;li&gt;&lt;a href="https://unit42.paloaltonetworks.com/nation-state-threat-actor-steals-f5-source-code/"&gt;Palo Alto Unit42: Nation-State Actor Steals F5 Source Code&lt;/a&gt;&lt;/li&gt; 
 &lt;/ul&gt; 
&lt;/div&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=50269063&amp;amp;k=14&amp;amp;r=https%3A%2F%2F50269063.hs-sites.com%2Fnetwitness-security-llc-blog%2Ff5-source-code-breach-hunting-unc5221-s-brickstorm-with-netwitness&amp;amp;bu=https%253A%252F%252F50269063.hs-sites.com%252Fnetwitness-security-llc-blog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <pubDate>Fri, 31 Oct 2025 04:00:00 GMT</pubDate>
      <guid>https://50269063.hs-sites.com/netwitness-security-llc-blog/f5-source-code-breach-hunting-unc5221-s-brickstorm-with-netwitness</guid>
      <dc:date>2025-10-31T04:00:00Z</dc:date>
      <dc:creator>Admin</dc:creator>
    </item>
    <item>
      <title>MSAzureGraph Universal Plugin for Microsoft Graph API</title>
      <link>https://50269063.hs-sites.com/netwitness-security-llc-blog/msazuregraphuniversalpluginformicrosoftgraphapi</link>
      <description>&lt;p&gt;&lt;strong&gt;Microsoft Graph&lt;/strong&gt;&amp;nbsp;is a&amp;nbsp;&lt;a href="https://docs.microsoft.com/en-us/graph/"&gt;Microsoft&lt;/a&gt;&lt;a href="https://docs.microsoft.com/en-us/graph/"&gt;&amp;nbsp;&lt;/a&gt;developer platform that enables integration with multiple services in Microsoft cloud.&amp;nbsp;It provides a unified programmability model that you can use to access the tremendous amount of data in Microsoft 365, Windows 10, and Enterprise Mobility + Security.&amp;nbsp;Microsoft Graph API is a RESTful web API that enables you to access Microsoft Cloud service resources.&lt;/p&gt;</description>
      <content:encoded>&lt;p&gt;&lt;strong&gt;Microsoft Graph&lt;/strong&gt;&amp;nbsp;is a&amp;nbsp;&lt;a href="https://docs.microsoft.com/en-us/graph/"&gt;Microsoft&lt;/a&gt;&lt;a href="https://docs.microsoft.com/en-us/graph/"&gt;&amp;nbsp;&lt;/a&gt;developer platform that enables integration with multiple services in Microsoft cloud.&amp;nbsp;It provides a unified programmability model that you can use to access the tremendous amount of data in Microsoft 365, Windows 10, and Enterprise Mobility + Security.&amp;nbsp;Microsoft Graph API is a RESTful web API that enables you to access Microsoft Cloud service resources.&lt;/p&gt; 
&lt;p&gt;&lt;strong&gt;In RSA NetWitness 11.5 or higher versions&lt;/strong&gt;, we integrated the Microsoft Graph API through the Plugin collection type. This integration helps our customers to collect various event types or alerts from Microsoft cloud services through Microsoft Graph API.&lt;/p&gt; 
&lt;p&gt;&lt;img src="https://50269063.hs-sites.com/hs-fs/hubfs/Imported_Blog_Media/408784i2EAD59E965093219.png?width=598&amp;amp;height=259&amp;amp;name=408784i2EAD59E965093219.png" width="598" height="259" title="DinoCherian_0-1635409549434.png" alt="DinoCherian_0-1635409549434.png"&gt;&lt;/p&gt; 
&lt;p&gt;Event types currently supported by NetWitness msazuregraph plugin are as given below. The latest&amp;nbsp;&lt;em&gt;&lt;strong&gt;azure&lt;/strong&gt;&lt;/em&gt;&amp;nbsp;log parser needs to be enabled in NetWitness Log decoder to parse these events.&amp;nbsp; Please refer official &lt;a href="https://community.netwitness.com/s/article/716791"&gt;RSA document&lt;/a&gt; for more information on configurations&lt;/p&gt; 
&lt;p&gt;&lt;u&gt;&lt;strong&gt;Microsoft Event types Supported via NetWitness msazuregraph Plugin&lt;/strong&gt;&lt;/u&gt;&lt;/p&gt; 
&lt;ul&gt; 
 &lt;li&gt;Directory Audit Logs&lt;/li&gt; 
 &lt;li&gt;SignIn Logs&lt;/li&gt; 
 &lt;li&gt;Security Alerts&lt;/li&gt; 
 &lt;li&gt;Risk Detection Logs&lt;/li&gt; 
 &lt;li&gt;Azure Sentinel incidents&lt;/li&gt; 
 &lt;li&gt;Microsoft Defender XDR incidents&lt;/li&gt; 
&lt;/ul&gt; 
&lt;p&gt;In addition to the above event types, customers can collect any other event types which are supported through Microsoft Graph API and route them to a custom parser created in NetWitness or get in touch with NetWitness customer support to add official support for fine parsing.&lt;/p&gt; 
&lt;p&gt;&lt;strong&gt;Note:&lt;/strong&gt; &lt;a href="https://community.netwitness.com/s/article/ConfigureAzureEventSources"&gt;Microsoft Azure: Admin Logs, Azure AD Audit/Sign-in (via native API)&lt;/a&gt;&amp;nbsp; and&amp;nbsp;Microsoft Azure Security Alerts Plugins &lt;strong&gt;&lt;em&gt;will be deprecated soon&lt;/em&gt;&lt;/strong&gt;&amp;nbsp;because native APIs used in former plugin were already deprecated from Microsoft. Also security alerts are supported in this plugin using the same API. It is recommended that customers start using &lt;a href="https://community.netwitness.com/s/article/716791"&gt;Microsoft Graph API Plugin&lt;/a&gt; &lt;em&gt;instead&lt;/em&gt;.&lt;/p&gt; 
&lt;p&gt;&lt;u&gt;&lt;strong&gt;Additional Resources&lt;/strong&gt;&lt;/u&gt;&lt;/p&gt; 
&lt;p&gt;&lt;a href="https://community.netwitness.com/s/article/MicrosoftAzureGraphEventSourceLogConfigurationGuide"&gt;&lt;em&gt;Netwitness MS Azure Graph API Plugin Configuration Guide&lt;/em&gt;&lt;/a&gt;&lt;/p&gt; 
&lt;p&gt;&lt;a href="https://docs.microsoft.com/en-us/graph/"&gt;&lt;em&gt;Microsoft Graph Documentation&lt;/em&gt;&lt;/a&gt;&lt;/p&gt; 
&lt;p&gt;&lt;a href="https://docs.microsoft.com/en-us/graph/use-the-api"&gt;&lt;i&gt;Microsoft Graph API Guide&lt;/i&gt;&lt;/a&gt;&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=50269063&amp;amp;k=14&amp;amp;r=https%3A%2F%2F50269063.hs-sites.com%2Fnetwitness-security-llc-blog%2Fmsazuregraphuniversalpluginformicrosoftgraphapi&amp;amp;bu=https%253A%252F%252F50269063.hs-sites.com%252Fnetwitness-security-llc-blog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <pubDate>Fri, 17 Oct 2025 04:00:00 GMT</pubDate>
      <guid>https://50269063.hs-sites.com/netwitness-security-llc-blog/msazuregraphuniversalpluginformicrosoftgraphapi</guid>
      <dc:date>2025-10-17T04:00:00Z</dc:date>
      <dc:creator>Admin</dc:creator>
    </item>
    <item>
      <title>Microsoft Azure NSG &amp; NetWitness Integration</title>
      <link>https://50269063.hs-sites.com/netwitness-security-llc-blog/microsoftazurensg-and-netwitnessintegration</link>
      <description>&lt;p&gt;Microsoft Azure Network Security Group Flow Logs are&amp;nbsp;a feature of Azure Network Watcher that provide information about ingress and egress IP traffic through a configured Network Security Group. The NetWitness plugin built for Azure NSG can authenticate and pull flow logs from Azure storage in real time.&lt;/p&gt;</description>
      <content:encoded>&lt;p&gt;Microsoft Azure Network Security Group Flow Logs are&amp;nbsp;a feature of Azure Network Watcher that provide information about ingress and egress IP traffic through a configured Network Security Group. The NetWitness plugin built for Azure NSG can authenticate and pull flow logs from Azure storage in real time.&lt;/p&gt; 
&lt;p&gt;&amp;nbsp;&lt;/p&gt; 
&lt;p&gt;“While Virtual Network (VNET) is the cornerstone of Azure networking model and provides isolation and protection. Network Security Group (NSG) is the main tool you need to use to enforce and control network traffic rules at the networking level. Customers can control access by permitting or denying communication between the workloads within a virtual network, from systems on customer’s networks via cross-premises connectivity, or direct Internet communication. In the diagram below, both VNETs and NSGs reside in a specific layer in the Azure overall security stack, where NSGs, UDR, and network virtual appliances can be used to create security boundaries to protect the application deployments in the protected network.”&lt;/p&gt; 
&lt;p&gt;&amp;nbsp;&lt;/p&gt; 
&lt;p&gt;&lt;strong&gt;What is a Network Security Group (NSG)?&lt;/strong&gt;&lt;/p&gt; 
&lt;p&gt;&lt;a href="https://azure.microsoft.com/en-us/documentation/articles/virtual-networks-nsg"&gt;https://azure.microsoft.com/en-us/documentation/articles/virtual-networks-nsg&lt;/a&gt;&lt;/p&gt; 
&lt;p&gt;&amp;nbsp;&lt;/p&gt; 
&lt;p&gt;&amp;nbsp;&lt;/p&gt; 
&lt;p&gt;&lt;img src="https://50269063.hs-sites.com/hubfs/Imported_Blog_Media/27271i17662CBCDE2B388F.bmp" title="1.bmp" alt="1.bmp"&gt;&lt;/p&gt; 
&lt;p&gt;&amp;nbsp;&lt;/p&gt; 
&lt;p&gt;&amp;nbsp;&lt;/p&gt; 
&lt;p&gt;&lt;strong&gt;How does it work?&lt;/strong&gt;&lt;/p&gt; 
&lt;p&gt;These flow logs are written in JSON format and show outbound and inbound flows on a per rule basis.&lt;/p&gt; 
&lt;p&gt;&amp;nbsp;&lt;/p&gt; 
&lt;p&gt;It provides the following information:&amp;nbsp;&lt;/p&gt; 
&lt;ul&gt; 
 &lt;li&gt; MAC Address of the NIC, flow applies to&lt;/li&gt; 
 &lt;li&gt; 5-tuple information about the flow (Source IP, Destination IP, Source Port, Destination Port, Protocol),&lt;/li&gt; 
 &lt;li&gt; And if the traffic was allowed or denied.&lt;/li&gt; 
&lt;/ul&gt; 
&lt;p&gt;&amp;nbsp;&lt;/p&gt; 
&lt;p&gt;Flow logs are stored only within a storage account and follow the logging path as shown below:&lt;/p&gt; 
&lt;p&gt;&lt;a href="https://community.rsa.com/external-link.jspa?url=https%3A%2F%2F"&gt;https://&lt;/a&gt;{storageAccountName}.blob.core.windows.net/insights-logs-networksecuritygroupflowevent/resourceId%3D/subscriptions/{subscriptionId}/resourcegroups/{resourceGroupName}/providers/microsoft.network/networksecuritygroups/{nsgName}/{year}/{month}/{day}/{hour}/m=00/{macAddress}/PT1H.json&lt;/p&gt; 
&lt;p&gt;&amp;nbsp;&lt;/p&gt; 
&lt;p&gt;&lt;img src="https://50269063.hs-sites.com/hubfs/Imported_Blog_Media/27270i80D1697B9FFA87C3.png" title="pastedImage_11.png" alt="pastedImage_11.png"&gt;&lt;/p&gt; 
&lt;p&gt;Logs have a retention policy that can be set from 1 day to 365 days. If a retention policy is not set, the logs are maintained forever.&amp;nbsp;RSA Netwitness uses Shared Access Signature (SAS Token) to authenticate and pull flow logs from Azure storage in real time.&lt;/p&gt; 
&lt;h2&gt;&lt;strong&gt;Use Cases:&lt;/strong&gt;&lt;/h2&gt; 
&lt;p&gt;With the visibility into Network Flow traffic in the Azure framework, multiple use-cases can be built. For example:&amp;nbsp;&lt;/p&gt; 
&lt;p&gt;&amp;nbsp;&lt;/p&gt; 
&lt;ol&gt; 
 &lt;li&gt; See the overall stats of Allowed vs Denied Traffic in your network, and based on what’s normal, setup alerts if its above or below a certain threshold.&lt;/li&gt; 
 &lt;li&gt; Summary of Protocol usage in the environment, set alerts for abnormal protocol usage.&amp;nbsp;&lt;/li&gt; 
 &lt;li&gt; Top Destination Address Reached out to from your environment.&lt;/li&gt; 
 &lt;li&gt; Set Alerts against blacklisted IP Addresses&lt;/li&gt; 
 &lt;li&gt; Setup rules based on IP range to determine Inbound vs Outbound vs Lateral traffic and then build a dashboard to see the pattern.&lt;/li&gt; 
&lt;/ol&gt; 
&lt;p&gt;&amp;nbsp;&lt;/p&gt; 
&lt;p&gt;&lt;strong&gt;Downloads and Documentation:&lt;/strong&gt;&lt;/p&gt; 
&lt;p&gt;&amp;nbsp;&lt;/p&gt; 
&lt;p&gt;&lt;strong&gt;Configuration Guide:&lt;/strong&gt; &lt;a href="https://community.netwitness.com/s/article/MicrosoftAzureNSGEventSourceConfigurationGuide"&gt;Microsoft Azure NSG Event Source Configuration Guide&amp;nbsp;&lt;/a&gt;&lt;/p&gt; 
&lt;p&gt;&amp;nbsp;&lt;/p&gt; 
&lt;p&gt;&lt;strong&gt;Collector Package on RSA Live:&lt;/strong&gt;&amp;nbsp;"MS Azure NSG Flow Logs"&lt;/p&gt; 
&lt;p&gt;&amp;nbsp;&lt;/p&gt; 
&lt;p&gt;&lt;strong&gt;Parser on RSA Live:&lt;/strong&gt; CEF (device.type="msazurensg")&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=50269063&amp;amp;k=14&amp;amp;r=https%3A%2F%2F50269063.hs-sites.com%2Fnetwitness-security-llc-blog%2Fmicrosoftazurensg-and-netwitnessintegration&amp;amp;bu=https%253A%252F%252F50269063.hs-sites.com%252Fnetwitness-security-llc-blog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <pubDate>Wed, 03 Sep 2025 04:00:00 GMT</pubDate>
      <guid>https://50269063.hs-sites.com/netwitness-security-llc-blog/microsoftazurensg-and-netwitnessintegration</guid>
      <dc:date>2025-09-03T04:00:00Z</dc:date>
      <dc:creator>Admin</dc:creator>
    </item>
    <item>
      <title>Scattered Spider Report</title>
      <link>https://50269063.hs-sites.com/netwitness-security-llc-blog/scattered-spider-report</link>
      <description>&lt;div&gt; 
 &lt;p&gt;In July 2025, activity related to the Scattered Spider cybercrime group remained front and center for defenders despite a slight lull following several arrests in the United Kingdom. Law enforcement agencies in the U.S., U.K., Canada, and Australia updated their joint advisory on July 29, noting that Scattered Spider has added the DragonForce ransomware to its arsenal and continues to refine social-engineering techniques such as phishing, push-bombing, and SIM-swap attacks to steal credentials and deploy remote-access tools. &lt;a href="https://www.cisa.gov/sites/default/files/2025-07/aa23-320a-scattered-spider_1.pdf"&gt;cisa.gov&lt;/a&gt; Government partners warned that the group’s operators impersonate IT help-desk staff, tricking employees into password resets and multifactor authentication transfers, and then use legitimate remote-management tools like AnyDesk to maintain persistence. &lt;a href="https://therecord.media/scattered-spider-targeting-snowflake-access-data-exfiltration%22%20/l%20%22:~:text=The%20FBI%20and%20others%20said,or%20other%20access%20through%20devices"&gt;therecord.media&lt;/a&gt;&lt;/p&gt; 
&lt;/div&gt;</description>
      <content:encoded>&lt;div&gt; 
 &lt;p&gt;In July 2025, activity related to the Scattered Spider cybercrime group remained front and center for defenders despite a slight lull following several arrests in the United Kingdom. Law enforcement agencies in the U.S., U.K., Canada, and Australia updated their joint advisory on July 29, noting that Scattered Spider has added the DragonForce ransomware to its arsenal and continues to refine social-engineering techniques such as phishing, push-bombing, and SIM-swap attacks to steal credentials and deploy remote-access tools. &lt;a href="https://www.cisa.gov/sites/default/files/2025-07/aa23-320a-scattered-spider_1.pdf"&gt;cisa.gov&lt;/a&gt; Government partners warned that the group’s operators impersonate IT help-desk staff, tricking employees into password resets and multifactor authentication transfers, and then use legitimate remote-management tools like AnyDesk to maintain persistence. &lt;a href="https://therecord.media/scattered-spider-targeting-snowflake-access-data-exfiltration%22%20/l%20%22:~:text=The%20FBI%20and%20others%20said,or%20other%20access%20through%20devices"&gt;therecord.media&lt;/a&gt;&lt;/p&gt; 
&lt;/div&gt; 
&lt;div&gt; 
 &lt;br&gt; 
 &lt;br&gt; 
 &lt;p&gt;Several private-sector reports published during the month described how Scattered Spider widened its target set from retail and insurance to aviation and cloud-service providers. CrowdStrike observed attacks on VMware vCenter environments in which attackers created unmanaged virtual machines, attached domain controller disks to dump Active-Directory databases, and installed tunnelling tools such as Chisel, MobaXterm, ngrok, Pinggy, Rsocx, and Teleport to communicate with command-and-control servers.&amp;nbsp;&lt;a href="https://www.crowdstrike.com/en-us/blog/crowdstrike-services-observes-scattered-spider-escalate-attacks/#:~:text=,controlled%20S3%20buckets"&gt;crowdstrike.com&lt;/a&gt; ExtraHop’s mid-July report highlighted that the group relies heavily on typo-squatted domains impersonating corporate portals; domains such as “7-eleven-hr[.]com,” “citrix-okta[.]com” and “pfchangs-support[.]com” were among those identified. &lt;a href="https://www.extrahop.com/blog/scattered-spiders-relentless-campaign#:~:text=Domains%20attributed%20as%20IOCs%20to,but%20are%20not%20limited%20to"&gt;extrahop.com&lt;/a&gt; Picus Security added that Scattered Spider repurposes abandoned company domains like “twitter-okta[.]com” and uses dynamic-DNS subdomains (e.g., “klv1[.]it[.]com”) to host its phishing kits. &lt;a href="https://www.picussecurity.com/resource/blog/tracking-scattered-spider-through-identity-attacks-and-token-theft#:~:text=Associated%20with%20ALPHV%2FBlackCat%2C%20RansomHub%2C%20and,extortion%20model%20in%20some%20operations"&gt;picussecurity.com&lt;/a&gt;.&lt;/p&gt; 
&lt;/div&gt; 
&lt;div&gt; 
 &lt;br&gt; 
 &lt;br&gt; 
 &lt;p&gt;Researchers cautioned that copycat actors already adopt Scattered Spider’s playbook and that defenders should not become complacent. The Hacker News noted that, although Mandiant had not seen new intrusions directly attributable to the group since the arrests, other actors such as UNC6040 mimicked its social-engineering tactics.&amp;nbsp;&lt;a href="https://thehackernews.com/2025/07/scattered-spider-hacker-arrests-halt.html#:~:text=Google%20Cloud%27s%20Mandiant%20Consulting%20has,to%20shore%20up%20their%20defenses"&gt;thehackernews.com&lt;/a&gt; Accordingly, security teams are advised to ingest known indicators into their SIEMs, monitor for suspicious domain resolution, and pay close attention to help-desk interactions and MFA reset requests. Monitoring for remote-access tools (AnyDesk, TeamViewer, ScreenConnect, Teleport) and ransomware families (DragonForce, ALPHV/BlackCat, RansomHub) is also crucial. &lt;a href="https://www.rapid7.com/blog/post/scattered-spider-rapid7-insights-observations-and-recommendations/#:~:text=Once%20inside%20a%20network%20or,to%20ensure%20continued%20access"&gt;rapid7.com&lt;/a&gt; &lt;a href="https://www.controlrisks.com/our-thinking/insights/scattered-spider-attacks-mitigation-strategies-for-cyber-teams#:~:text="&gt;controlrisks.com&lt;/a&gt;&lt;/p&gt; 
&lt;/div&gt; 
&lt;div&gt; 
 &lt;br&gt; 
 &lt;br&gt; 
 &lt;p&gt;July's findings underscore that although Scattered Spider may experience temporary setbacks, it poses a significant risk across various industries. In response, NetWitness’s FirstWatch team has proactively integrated previously identified indicators of compromise from Scattered Spider into its Threat Feed to strengthen defenses.&lt;/p&gt; 
 &lt;br&gt; 
 &lt;br&gt; 
 &lt;h2&gt;Domain-based IoCs&lt;/h2&gt; 
&lt;/div&gt; 
&lt;div&gt; 
 &lt;table&gt; 
  &lt;thead&gt; 
   &lt;tr&gt; 
    &lt;th colspan="1" rowspan="1"&gt;IoC (Domain)&lt;/th&gt; 
    &lt;th colspan="1" rowspan="1"&gt;Source&lt;/th&gt; 
   &lt;/tr&gt; 
  &lt;/thead&gt; 
  &lt;tbody&gt; 
   &lt;tr&gt; 
    &lt;td colspan="1" rowspan="1"&gt;7elevenhr[.]com&lt;/td&gt; 
    &lt;td colspan="1" rowspan="1"&gt;ExtraHop &lt;a href="https://www.extrahop.com"&gt;extrahop.com&lt;/a&gt;&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td colspan="1" rowspan="1"&gt;activecampiagn[.]net&lt;/td&gt; 
    &lt;td colspan="1" rowspan="1"&gt;ExtraHop &lt;a href="https://www.extrahop.com"&gt;extrahop.com&lt;/a&gt;&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td colspan="1" rowspan="1"&gt;acwaapple[.]com&lt;/td&gt; 
    &lt;td colspan="1" rowspan="1"&gt;ExtraHop &lt;a href="https://www.extrahop.com"&gt;extrahop.com&lt;/a&gt;&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td colspan="1" rowspan="1"&gt;bbtplus[.]com&lt;/td&gt; 
    &lt;td colspan="1" rowspan="1"&gt;ExtraHop &lt;a href="https://www.extrahop.com"&gt;extrahop.com&lt;/a&gt;&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td colspan="1" rowspan="1"&gt;bellhr[.]com&lt;/td&gt; 
    &lt;td colspan="1" rowspan="1"&gt;ExtraHop &lt;a href="https://www.extrahop.com"&gt;extrahop.com&lt;/a&gt;&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td colspan="1" rowspan="1"&gt;bestbuycdn[.]com&lt;/td&gt; 
    &lt;td colspan="1" rowspan="1"&gt;ExtraHop &lt;a href="https://www.extrahop.com"&gt;extrahop.com&lt;/a&gt;&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td colspan="1" rowspan="1"&gt;birdsso[.]com&lt;/td&gt; 
    &lt;td colspan="1" rowspan="1"&gt;ExtraHop &lt;a href="https://www.extrahop.com"&gt;extrahop.com&lt;/a&gt;&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td colspan="1" rowspan="1"&gt;citrixokta[.]com&lt;/td&gt; 
    &lt;td colspan="1" rowspan="1"&gt;ExtraHop &lt;a href="https://www.extrahop.com"&gt;extrahop.com&lt;/a&gt;&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td colspan="1" rowspan="1"&gt;commonspiritcorpokta[.]com&lt;/td&gt; 
    &lt;td colspan="1" rowspan="1"&gt;ExtraHop &lt;a href="https://www.extrahop.com"&gt;extrahop.com&lt;/a&gt;&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td colspan="1" rowspan="1"&gt;consensysokta[.]com&lt;/td&gt; 
    &lt;td colspan="1" rowspan="1"&gt;ExtraHop &lt;a href="https://www.extrahop.com"&gt;extrahop.com&lt;/a&gt;&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td colspan="1" rowspan="1"&gt;corphubspot[.]com&lt;/td&gt; 
    &lt;td colspan="1" rowspan="1"&gt;ExtraHop &lt;a href="https://www.extrahop.com"&gt;extrahop.com&lt;/a&gt;&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td colspan="1" rowspan="1"&gt;ctscomcast[.]com&lt;/td&gt; 
    &lt;td colspan="1" rowspan="1"&gt;ExtraHop &lt;a href="https://www.extrahop.com"&gt;extrahop.com&lt;/a&gt;&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td colspan="1" rowspan="1"&gt;doordashsupport[.]com&lt;/td&gt; 
    &lt;td colspan="1" rowspan="1"&gt;ExtraHop &lt;a href="https://www.extrahop.com"&gt;extrahop.com&lt;/a&gt;&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td colspan="1" rowspan="1"&gt;duelbitscdn[.]com&lt;/td&gt; 
    &lt;td colspan="1" rowspan="1"&gt;ExtraHop &lt;a href="https://www.extrahop.com"&gt;extrahop.com&lt;/a&gt;&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td colspan="1" rowspan="1"&gt;freshworkshr[.]com&lt;/td&gt; 
    &lt;td colspan="1" rowspan="1"&gt;ExtraHop &lt;a href="https://www.extrahop.com"&gt;extrahop.com&lt;/a&gt;&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td colspan="1" rowspan="1"&gt;geminisso[.]com&lt;/td&gt; 
    &lt;td colspan="1" rowspan="1"&gt;ExtraHop &lt;a href="https://www.extrahop.com"&gt;extrahop.com&lt;/a&gt;&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td colspan="1" rowspan="1"&gt;guccicdn[.]com&lt;/td&gt; 
    &lt;td colspan="1" rowspan="1"&gt;ExtraHop &lt;a href="https://www.extrahop.com"&gt;extrahop.com&lt;/a&gt;&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td colspan="1" rowspan="1"&gt;itbitokta[.]com&lt;/td&gt; 
    &lt;td colspan="1" rowspan="1"&gt;ExtraHop &lt;a href="https://www.extrahop.com"&gt;extrahop.com&lt;/a&gt;&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td colspan="1" rowspan="1"&gt;iyft[.]net&lt;/td&gt; 
    &lt;td colspan="1" rowspan="1"&gt;ExtraHop &lt;a href="https://www.extrahop.com"&gt;extrahop.com&lt;/a&gt;&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td colspan="1" rowspan="1"&gt;klaviyohr[.]com&lt;/td&gt; 
    &lt;td colspan="1" rowspan="1"&gt;ExtraHop &lt;a href="https://www.extrahop.com"&gt;extrahop.com&lt;/a&gt;&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td colspan="1" rowspan="1"&gt;login.freshworkshr[.]com&lt;/td&gt; 
    &lt;td colspan="1" rowspan="1"&gt;ExtraHop &lt;a href="https://www.extrahop.com"&gt;extrahop.com&lt;/a&gt;&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td colspan="1" rowspan="1"&gt;aplikacijeintercom[.]com&lt;/td&gt; 
    &lt;td colspan="1" rowspan="1"&gt;ExtraHop &lt;a href="https://www.extrahop.com"&gt;extrahop.com&lt;/a&gt;&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td colspan="1" rowspan="1"&gt;morningstarokta[.]com&lt;/td&gt; 
    &lt;td colspan="1" rowspan="1"&gt;ExtraHop &lt;a href="https://www.extrahop.com"&gt;extrahop.com&lt;/a&gt;&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td colspan="1" rowspan="1"&gt;mytsl[.]net&lt;/td&gt; 
    &lt;td colspan="1" rowspan="1"&gt;ExtraHop &lt;a href="https://www.extrahop.com"&gt;extrahop.com&lt;/a&gt;&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td colspan="1" rowspan="1"&gt;oktaziffdavis[.]com&lt;/td&gt; 
    &lt;td colspan="1" rowspan="1"&gt;ExtraHop &lt;a href="https://www.extrahop.com"&gt;extrahop.com&lt;/a&gt;&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td colspan="1" rowspan="1"&gt;pfchangssupport[.]com&lt;/td&gt; 
    &lt;td colspan="1" rowspan="1"&gt;ExtraHop &lt;a href="https://www.extrahop.com"&gt;extrahop.com&lt;/a&gt;&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td colspan="1" rowspan="1"&gt;prntsrc[.]net&lt;/td&gt; 
    &lt;td colspan="1" rowspan="1"&gt;ExtraHop &lt;a href="https://www.extrahop.com"&gt;extrahop.com&lt;/a&gt;&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td colspan="1" rowspan="1"&gt;pureokta[.]com&lt;/td&gt; 
    &lt;td colspan="1" rowspan="1"&gt;ExtraHop &lt;a href="https://www.extrahop.com"&gt;extrahop.com&lt;/a&gt;&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td colspan="1" rowspan="1"&gt;signinnydig[.]com&lt;/td&gt; 
    &lt;td colspan="1" rowspan="1"&gt;ExtraHop &lt;a href="https://www.extrahop.com"&gt;extrahop.com&lt;/a&gt;&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td colspan="1" rowspan="1"&gt;simpletextingcdn[.]com&lt;/td&gt; 
    &lt;td colspan="1" rowspan="1"&gt;ExtraHop &lt;a href="https://www.extrahop.com"&gt;extrahop.com&lt;/a&gt;&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td colspan="1" rowspan="1"&gt;squarespacehr[.]com&lt;/td&gt; 
    &lt;td colspan="1" rowspan="1"&gt;ExtraHop &lt;a href="https://www.extrahop.com"&gt;extrahop.com&lt;/a&gt;&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td colspan="1" rowspan="1"&gt;sytemstern[.]net&lt;/td&gt; 
    &lt;td colspan="1" rowspan="1"&gt;ExtraHop &lt;a href="https://www.extrahop.com"&gt;extrahop.com&lt;/a&gt;&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td colspan="1" rowspan="1"&gt;ssoinstacart[.]com&lt;/td&gt; 
    &lt;td colspan="1" rowspan="1"&gt;ExtraHop &lt;a href="https://www.extrahop.com"&gt;extrahop.com&lt;/a&gt;&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td colspan="1" rowspan="1"&gt;stsvodafone[.]com&lt;/td&gt; 
    &lt;td colspan="1" rowspan="1"&gt;ExtraHop &lt;a href="https://www.extrahop.com"&gt;extrahop.com&lt;/a&gt;&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td colspan="1" rowspan="1"&gt;twitterokta[.]com&lt;/td&gt; 
    &lt;td colspan="1" rowspan="1"&gt;Picus Security &lt;a href="https://www.picussecurity.com"&gt;picussecurity.com&lt;/a&gt;&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td colspan="1" rowspan="1"&gt;xngryscaleox0d[.]com&lt;/td&gt; 
    &lt;td colspan="1" rowspan="1"&gt;ExtraHop &lt;a href="https://www.extrahop.com"&gt;extrahop.com&lt;/a&gt;&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td colspan="1" rowspan="1"&gt;xsso[.]com&lt;/td&gt; 
    &lt;td colspan="1" rowspan="1"&gt;ExtraHop &lt;a href="https://www.extrahop.com"&gt;extrahop.com&lt;/a&gt;&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td colspan="1" rowspan="1"&gt;klv1[.]it[.]com&lt;/td&gt; 
    &lt;td colspan="1" rowspan="1"&gt;Picus Security &lt;a href="https://www.picussecurity.com"&gt;picussecurity.com&lt;/a&gt;&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td colspan="1" rowspan="1"&gt;trycloudflare[.]com&lt;/td&gt; 
    &lt;td colspan="1" rowspan="1"&gt;CrowdStrike &lt;a href="https://www.crowdstrike.com"&gt;crowdstrike.com&lt;/a&gt;&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td colspan="1" rowspan="1"&gt;googlemail[.]com&lt;/td&gt; 
    &lt;td colspan="1" rowspan="1"&gt;CrowdStrike &lt;a href="https://www.crowdstrike.com"&gt;crowdstrike.com&lt;/a&gt;&lt;/td&gt; 
   &lt;/tr&gt; 
  &lt;/tbody&gt; 
 &lt;/table&gt; 
 &lt;br&gt; 
 &lt;br&gt; 
 &lt;h2&gt;IoC (Tool/Malware)&lt;/h2&gt; 
 &lt;table&gt; 
  &lt;thead&gt; 
   &lt;tr&gt; 
    &lt;th colspan="1" rowspan="1"&gt;IoC (Tool/Malware)&lt;/th&gt; 
    &lt;th colspan="1" rowspan="1"&gt;Type&lt;/th&gt; 
    &lt;th colspan="1" rowspan="1"&gt;Source&lt;/th&gt; 
   &lt;/tr&gt; 
  &lt;/thead&gt; 
  &lt;tbody&gt; 
   &lt;tr&gt; 
    &lt;td colspan="1" rowspan="1"&gt;AnyDesk, TeamViewer, ScreenConnect (ConnectWise), Splashtop&lt;/td&gt; 
    &lt;td colspan="1" rowspan="1"&gt;Legitimate remote-access tools repurposed for persistent access&lt;/td&gt; 
    &lt;td colspan="1" rowspan="1"&gt;CISA, Rapid7 &amp;amp; Control Risks &lt;a href="https://www.rapid7.com"&gt;rapid7.com&lt;/a&gt; &lt;a href="https://www.controlrisks.com"&gt;controlrisks.com&lt;/a&gt;&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td colspan="1" rowspan="1"&gt;Teleport&lt;/td&gt; 
    &lt;td colspan="1" rowspan="1"&gt;Infrastructure-access tool installed on compromised servers for persistent C2 channels&lt;/td&gt; 
    &lt;td colspan="1" rowspan="1"&gt;Rapid7 &amp;amp; Rewterz &lt;a href="https://www.rapid7.com"&gt;rapid7.com&lt;/a&gt; &lt;a href="https://www.rewterz.com"&gt;rewterz.com&lt;/a&gt;&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td colspan="1" rowspan="1"&gt;FleetDeck&lt;/td&gt; 
    &lt;td colspan="1" rowspan="1"&gt;RMM platform abused for remote access&lt;/td&gt; 
    &lt;td colspan="1" rowspan="1"&gt;Rapid7 &lt;a href="https://www.rapid7.com"&gt;rapid7.com&lt;/a&gt;&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td colspan="1" rowspan="1"&gt;Chisel (communicates with trycloudflare subdomains)&lt;/td&gt; 
    &lt;td colspan="1" rowspan="1"&gt;Protocol tunnelling tool used inside VMware environments&lt;/td&gt; 
    &lt;td colspan="1" rowspan="1"&gt;CrowdStrike &lt;a href="https://www.crowdstrike.com"&gt;crowdstrike.com&lt;/a&gt;&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td colspan="1" rowspan="1"&gt;MobaXterm, ngrok, Pinggy, Rsocx&lt;/td&gt; 
    &lt;td colspan="1" rowspan="1"&gt;Proxy/tunnelling tools used for C2&lt;/td&gt; 
    &lt;td colspan="1" rowspan="1"&gt;CrowdStrike &lt;a href="https://www.crowdstrike.com"&gt;crowdstrike.com&lt;/a&gt;&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td colspan="1" rowspan="1"&gt;S3 Browser&lt;/td&gt; 
    &lt;td colspan="1" rowspan="1"&gt;Tool used to enumerate and exfiltrate AWS S3 buckets&lt;/td&gt; 
    &lt;td colspan="1" rowspan="1"&gt;CrowdStrike &lt;a href="https://www.crowdstrike.com"&gt;crowdstrike.com&lt;/a&gt;&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td colspan="1" rowspan="1"&gt;Evilginx / Evilginx2 phishing proxies&lt;/td&gt; 
    &lt;td colspan="1" rowspan="1"&gt;Adversary-in-the-middle kit capturing session cookies and MFA tokens&lt;/td&gt; 
    &lt;td colspan="1" rowspan="1"&gt;ExtraHop &lt;a href="https://www.extrahop.com"&gt;extrahop.com&lt;/a&gt;&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td colspan="1" rowspan="1"&gt;Spectre RAT&lt;/td&gt; 
    &lt;td colspan="1" rowspan="1"&gt;Custom remote-access trojan (malware-as-a-service) with enhanced obfuscation&lt;/td&gt; 
    &lt;td colspan="1" rowspan="1"&gt;Picus Security &lt;a href="https://www.picussecurity.com"&gt;picussecurity.com&lt;/a&gt;&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td colspan="1" rowspan="1"&gt;DragonForce ransomware&lt;/td&gt; 
    &lt;td colspan="1" rowspan="1"&gt;Ransomware family linked to Scattered Spider&lt;/td&gt; 
    &lt;td colspan="1" rowspan="1"&gt;CISA &amp;amp; multiple articles &lt;a href="https://www.cisa.gov"&gt;cisa.gov&lt;/a&gt;&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td colspan="1" rowspan="1"&gt;ALPHV/BlackCat, RansomHub, Qilin, Avaddon&lt;/td&gt; 
    &lt;td colspan="1" rowspan="1"&gt;Ransomware families associated with Scattered Spider or affiliates&lt;/td&gt; 
    &lt;td colspan="1" rowspan="1"&gt;Control Risks &lt;a href="https://www.controlrisks.com"&gt;controlrisks.com&lt;/a&gt;&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td colspan="1" rowspan="1"&gt;Ave Maria (Warzone RAT), Raccoon Stealer, Vidar Stealer, Ratty RAT&lt;/td&gt; 
    &lt;td colspan="1" rowspan="1"&gt;Data-stealing malware used in campaigns&lt;/td&gt; 
    &lt;td colspan="1" rowspan="1"&gt;The Hacker News &lt;a href="https://thehackernews.com"&gt;thehackernews.com&lt;/a&gt;&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td colspan="1" rowspan="1"&gt;STONESTOP/POORTRY&lt;/td&gt; 
    &lt;td colspan="1" rowspan="1"&gt;BYOVD toolset (malicious drivers) used to disable endpoint protection&lt;/td&gt; 
    &lt;td colspan="1" rowspan="1"&gt;Rapid7 &lt;a href="https://www.rapid7.com"&gt;rapid7.com&lt;/a&gt;&lt;/td&gt; 
   &lt;/tr&gt; 
  &lt;/tbody&gt; 
 &lt;/table&gt; 
&lt;/div&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=50269063&amp;amp;k=14&amp;amp;r=https%3A%2F%2F50269063.hs-sites.com%2Fnetwitness-security-llc-blog%2Fscattered-spider-report&amp;amp;bu=https%253A%252F%252F50269063.hs-sites.com%252Fnetwitness-security-llc-blog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <pubDate>Tue, 19 Aug 2025 04:00:00 GMT</pubDate>
      <guid>https://50269063.hs-sites.com/netwitness-security-llc-blog/scattered-spider-report</guid>
      <dc:date>2025-08-19T04:00:00Z</dc:date>
      <dc:creator>Admin</dc:creator>
    </item>
    <item>
      <title>Using RSA Logs and/or Packets to Send or Receive Data from/to LogStash – Putting it all together - Demonstration</title>
      <link>https://50269063.hs-sites.com/netwitness-security-llc-blog/572650</link>
      <description>&lt;p&gt;&lt;strong&gt;What is LogStash:&lt;/strong&gt;&lt;/p&gt;</description>
      <content:encoded>&lt;p&gt;&lt;strong&gt;What is LogStash:&lt;/strong&gt;&lt;/p&gt;  
&lt;p&gt;LogStash is an Elastic product that can collect, parse, and transform logs to be presented to some type of output such as an Elastic Stack or a RSA Decoder or Virtual Log Collector.&lt;/p&gt; 
&lt;p&gt;&lt;a href="https://www.elastic.co/downloads/logstash-oss"&gt;https://www.elastic.co/downloads/logstash-oss&lt;/a&gt;&lt;/p&gt; 
&lt;p&gt;&lt;strong&gt;Why LogStash:&lt;/strong&gt;&lt;/p&gt; 
&lt;p&gt;Depending on the environment, LogStash can act as an intermediary to process data from various sources and send it to a specified destination, called an output.&amp;nbsp; I can think of three simple examples for the RSA use case.&amp;nbsp; The first example is&amp;nbsp;sending data from the data lake to Netwitness. The second is sending data from Netwitness to other sources. Finally, it can also be configured to collect data from various sources and send that data to Netwitness or the data lake.&lt;/p&gt; 
&lt;p&gt;&lt;a href="https://en.wikipedia.org/wiki/Data_lake"&gt;https://en.wikipedia.org/wiki/Data_lake&lt;/a&gt;&lt;/p&gt; 
&lt;p&gt;&lt;strong&gt;RSA LogStash Components:&lt;/strong&gt;&lt;/p&gt; 
&lt;p&gt;As mentioned above there are several scenarios.&amp;nbsp; Depending on the configuration ether the Codec or Export Connector will be used.&lt;/p&gt; 
&lt;p&gt;&lt;em&gt;LogStash Codec:&lt;/em&gt;&lt;/p&gt; 
&lt;p&gt;&lt;a href="https://community.netwitness.com/s/article/InstallandConfiguretheNetWitnessCodec"&gt;https://community.netwitness.com/s/article/InstallandConfiguretheNetWitnessCodec&lt;/a&gt;&lt;/p&gt; 
&lt;p&gt;The Codec is used forward Logstash events to the NetWitness Platform&amp;nbsp; in RFC-5424 format, you need to install the NetWitness codec on your system and refer to it in your output plugin configuration.&lt;/p&gt; 
&lt;p&gt;Example:&lt;/p&gt; 
&lt;p&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;Data Lake/Warehouse, Syslog, etc --&amp;gt;&amp;nbsp;LogStash --&amp;gt;&amp;nbsp;RSA Decoder&lt;/p&gt; 
&lt;p&gt;&lt;em&gt;LogStatsh Export Connector:&lt;/em&gt;&lt;/p&gt; 
&lt;p&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;a href="https://community.netwitness.com/s/article/NetWitnessExportConnectorDeployment"&gt;https://community.netwitness.com/s/article/NetWitnessExportConnectorDeployment&lt;/a&gt;&lt;/p&gt; 
&lt;p&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;Logstash Output plugin to send the input events to a data warehouse destination.&lt;/p&gt; 
&lt;p&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;Example:&lt;/p&gt; 
&lt;p&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;RSA Decoder --&amp;gt; LogStash --&amp;gt;&amp;nbsp;Data Lake/Warehouse&lt;/p&gt; 
&lt;p&gt;&lt;strong&gt;Supporting Documentation:&lt;/strong&gt;&lt;a href="https://community.rsa.com/docs/DOC-113777"&gt;&lt;/a&gt;&amp;nbsp;&lt;/p&gt; 
&lt;p&gt;&lt;a href="https://community.netwitness.com/s/article/NetWitnessExportConnectorDeployment"&gt;Export Connector Install: Configure Logstash Output Plugin&lt;/a&gt;&lt;/p&gt; 
&lt;p&gt;&lt;a href="https://community.netwitness.com/s/article/InstallLogstash"&gt;Logstash:Install Logstash&lt;/a&gt;&amp;nbsp;&lt;/p&gt; 
&lt;p&gt;&lt;strong&gt;The Process: &lt;/strong&gt;&lt;/p&gt; 
&lt;p&gt;The process is fairly simple but LogStash is a product external to RSA and managed by Elastic.&amp;nbsp; Because of this, it will be necessary to download LogStash and create its own virtual machine.&amp;nbsp; This demonstration will provide a foundation to learn more about the process and how everything interacts.&lt;/p&gt; 
&lt;p&gt;&lt;strong&gt;Preparation for the demonstration:&lt;/strong&gt;&lt;/p&gt; 
&lt;p&gt;Download the CentOS 7 iso.&lt;/p&gt; 
&lt;p&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;a href="http://isoredirect.centos.org/centos/7/isos/x86_64/" title="http://isoredirect.centos.org/centos/7/isos/x86_64/"&gt;CentOS Mirrors List&lt;/a&gt;&amp;nbsp;&lt;/p&gt; 
&lt;p&gt;Download LogStash if you want to &lt;em&gt;manually&lt;/em&gt; install it.&amp;nbsp; This demo will pull it directly using the rpm –import method.&lt;/p&gt; 
&lt;p&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;a href="https://www.elastic.co/downloads/logstash-oss" title="https://www.elastic.co/downloads/logstash-oss"&gt;Download Logstash Free • Get Started Now | Elastic&lt;/a&gt;&amp;nbsp;&lt;/p&gt; 
&lt;p&gt;Once CentOS is installed, the following items are going to be required for the Demo.&amp;nbsp; The actual install, may be different, so please note this.&lt;/p&gt; 
&lt;p&gt;Minimal Install of Centos 7&lt;/p&gt; 
&lt;p&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; The minimal install is all that the demo requires&lt;/p&gt; 
&lt;p&gt;add jre for keytool&lt;/p&gt; 
&lt;p&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Keytool is required for the demo certificate process&lt;/p&gt; 
&lt;p&gt;yum install java-11-openjdk-devel&lt;/p&gt; 
&lt;p&gt;yum install mlocate&lt;/p&gt; 
&lt;p&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; mlocate is used to quickly search for files&lt;/p&gt; 
&lt;p&gt;&lt;em&gt;----&amp;gt; Begin initial setup&lt;/em&gt;&lt;/p&gt; 
&lt;p&gt;Demonstration&lt;/p&gt; 
&lt;div&gt; 
 &lt;div&gt;
  &amp;nbsp;
 &lt;/div&gt; 
 &lt;a href="https://community.netwitness.com/s/article/677956"&gt;(view in My Videos)&lt;/a&gt;
&lt;/div&gt; 
&lt;p&gt;Download and install the public signing key:Insert into logstash.repo&lt;/p&gt; 
&lt;pre&gt;&lt;code&gt;   rpm --import https://artifacts.elastic.co/GPG-KEY-elasticsearch‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍&lt;/code&gt;&lt;/pre&gt; 
&lt;pre&gt;&lt;code&gt;   vi /etc/yum.repos.d/logstash.repo‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍&lt;/code&gt;&lt;/pre&gt; 
&lt;p&gt;Copy and paste into the new file&lt;/p&gt; 
&lt;pre&gt;&lt;code&gt;[logstash-7.x]
name=Elastic repository for 7.x packages
baseurl=https://artifacts.elastic.co/packages/7.x/yum
gpgcheck=1
gpgkey=https://artifacts.elastic.co/GPG-KEY-elasticsearch
enabled=1
autorefresh=1
type=rpm-md‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍&lt;/code&gt;&lt;/pre&gt; 
&lt;p&gt;&amp;nbsp;&lt;/p&gt; 
&lt;p&gt;The repository is ready for use. You can install it with:&lt;/p&gt; 
&lt;pre&gt;&lt;code&gt;yum install logstash
systemctl enable logstash.service #Adds to startup
reboot
‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍&lt;/code&gt;&lt;/pre&gt; 
&lt;p&gt;Check the LogStash status to make sure the LogStash service automatically starts after the reboot&lt;/p&gt; 
&lt;pre&gt;&lt;code&gt;systemctl status logstash‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍&lt;/code&gt;&lt;/pre&gt; 
&lt;p&gt;Download and copy the connector to tmp (WinSCP) - netwitness-export-connector-1.1.0.zip&lt;/p&gt; 
&lt;pre&gt;&lt;code&gt;systemctl stop logstash
cd /usr/share/logstash
bin/logstash-plugin install file:///tmp/netwitness-export-connector-1.1.0.zip
‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍&lt;/code&gt;&lt;/pre&gt; 
&lt;p&gt;Validate the connector is installed&lt;/p&gt; 
&lt;pre&gt;&lt;code&gt;bin/logstash-plugin list‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍&lt;/code&gt;&lt;/pre&gt; 
&lt;p&gt;Add the following to the&amp;nbsp;conf file (this initiates data pull via the decoder api on the decoder 50104)&lt;/p&gt; 
&lt;pre&gt;&lt;code&gt;vi /etc/logstash/conf.d/netwitness-192.168.2.121-input.conf‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍&lt;/code&gt;&lt;/pre&gt; 
&lt;pre&gt;&lt;code&gt;input {
netwitness_export_connector {
host =&amp;gt; "192.168.x.x" #Decoder IP Address
username =&amp;gt; "admin" #API username
password =&amp;gt; "your_password" #API password
decoder_type =&amp;gt; "decoder"
}
}‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍&lt;/code&gt;&lt;/pre&gt; 
&lt;p&gt;Clean up the input.conf to make sure there are no characters that cannot be seen&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/p&gt; 
&lt;pre&gt;&lt;code&gt;sed -i -e 's/\r$//' /etc/logstash/conf.d/netwitness-192.168.x.x-input.conf‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍&lt;/code&gt;&lt;/pre&gt; 
&lt;p&gt;Restart LogStash to load the input.conf&lt;/p&gt; 
&lt;pre&gt;&lt;code&gt;systemctl start logstash
tailf /var/log/logstash/logstash-plain.log... if you see regex errors check E.3 again
Look for a different sessionid
‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍&lt;/code&gt;&lt;/pre&gt; 
&lt;p&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;img src="https://50269063.hs-sites.com/hubfs/Imported_Blog_Media/221196iECA5CBBB585FE5B7.png" title="pic3.png" alt="pic3.png"&gt;&lt;/p&gt; 
&lt;p&gt;Test with TCPDump&lt;/p&gt; 
&lt;pre&gt;&lt;code&gt;cd /tmp
tcpdump -i eth0 -A -nvvv port 50004 -s 65535 -w logstashDump.txt
tcpdump -r logstashDump.txt‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍&lt;/code&gt;&lt;/pre&gt; 
&lt;p&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;img src="https://50269063.hs-sites.com/hubfs/Imported_Blog_Media/224528i1B5EF897D6CE3C69.png" title="pic2.png" alt="pic2.png"&gt;&lt;/p&gt; 
&lt;p&gt;Example History for the export connector&lt;/p&gt; 
&lt;pre&gt;&lt;code&gt;[root@localhost conf.d]# history
rpm --import https://artifacts.elastic.co/GPG-KEY-elasticsearch
vi /etc/yum.repos.d/
vi /etc/yum.repos.d/logstash.repo
yum install logstash
systemctl enable logstash.service
reboot
systemctl status logstash
systemctl stop logstash
cd /usr/share/logstash
bin/logstash-plugin install file:///tmp/netwitness-export-connector-1.1.0.zip
systemctl start logstash‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍&lt;/code&gt;&lt;/pre&gt; 
&lt;p&gt;&lt;em&gt;&amp;nbsp;&lt;/em&gt;&lt;/p&gt; 
&lt;p&gt;&lt;em&gt;----&amp;gt; Begin with the certificate section&amp;nbsp;&lt;/em&gt;&lt;/p&gt; 
&lt;p&gt;Demonstration: No Audio&lt;/p&gt; 
&lt;div&gt; 
 &lt;div&gt;
  &amp;nbsp;
 &lt;/div&gt; 
 &lt;a href="https://community.netwitness.com/s/article/677956"&gt;(view in My Videos)&lt;/a&gt;
&lt;/div&gt; 
&lt;p&gt;On the LogStash Server&lt;/p&gt; 
&lt;p&gt;If there is an existing certificate authority proceed to step 2. (Step 1) - The certificates can be called what ever fits the environment.&lt;/p&gt; 
&lt;pre&gt;&lt;code&gt;openssl genrsa -out CA-key.pem 2048 
openssl req -new -key CA-key.pem -x509 -days 2000 -out CA-cert.pem
‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍&lt;/code&gt;&lt;/pre&gt; 
&lt;p&gt;Resume Certificate Process (Step 2)&lt;/p&gt; 
&lt;pre&gt;&lt;code&gt;openssl genrsa -out server-key.pem 2048
openssl req -new -key server-key.pem -out signingReq.csr (set a password)
openssl x509 -req -days 1000 -in signingReq.csr -CA CA-cert.pem -CAkey CA-key.pem -CAcreateserial -out server-cert.pem
openssl pkcs12 -export -in server-cert.pem -inkey server-key.pem -certfile CA-cert.pem -out logstash-input-netwitness.p12 (set export password)
mkdir /etc/pki/logStashDecoder (on the logstash server)
‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍&lt;/code&gt;&lt;/pre&gt; 
&lt;p&gt;On the decoder&lt;/p&gt; 
&lt;pre&gt;&lt;code&gt;scp /etc/pki/nw/trust/truststore.pem root@192.168.x.x:/etc/pki/logStashDecoder‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍&lt;/code&gt;&lt;/pre&gt; 
&lt;p&gt;if known_host contains a key for this host you may want to delete it.&lt;/p&gt; 
&lt;pre&gt;&lt;code&gt;vi ~/.ssh/known_hosts‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍&lt;/code&gt;&lt;/pre&gt; 
&lt;p&gt;LogStash Server&lt;/p&gt; 
&lt;pre&gt;&lt;code&gt;keytool -importcert -keystore logstash-input-netwitness.p12 -trustcacerts -alias nw-inter -file /etc/pki/logStashDecoder/truststore.pem -storetype PKCS12 (enter password)
Trust this certificate: yes
‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍&lt;/code&gt;&lt;/pre&gt; 
&lt;pre&gt;&lt;code&gt;cp logstash-input-netwitness.p12 /etc/logstash
chown logstash:logstash /etc/logstash/logstash-input-netwitness.p12
‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍&lt;/code&gt;&lt;/pre&gt; 
&lt;p&gt;Curl to the Decoder API&lt;/p&gt; 
&lt;pre&gt;&lt;code&gt;curl -X POST -d server-cert.pem https://192.168.2.121:50104/sys/trustpeer
curl -X POST -d server-cert.pem https://192.168.2.121:50104/sys/caupload
‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍&lt;/code&gt;&lt;/pre&gt; 
&lt;p&gt;alternative to&amp;nbsp;the curl command above - If using the rest interface is preferred (trustpeer and caupload)&lt;/p&gt; 
&lt;p&gt;&lt;a href="https://192.168.x.x:50104/sys/trustpeer"&gt;https://192.168.x.x:50104/sys/trustpeer&lt;/a&gt;&lt;/p&gt; 
&lt;p&gt;&lt;a href="https://192.168.x.x:50104/sys/caupload"&gt;https://192.168.x.x:50104/sys/caupload&lt;/a&gt;&lt;/p&gt; 
&lt;p&gt;copy and paste the server-cert.pem&lt;/p&gt; 
&lt;p&gt;Check the certificate exists on the Decoder&lt;/p&gt; 
&lt;pre&gt;&lt;code&gt;cd /etc/netwitness/ng/decoder/trustpeers‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍&lt;/code&gt;&lt;/pre&gt; 
&lt;p&gt;Change the keystore password on logstash - current password is changeit&lt;/p&gt; 
&lt;pre&gt;&lt;code&gt;keytool -storepasswd -keystore /usr/lib/jvm/java-11-openjdk-11.0.9.11-0.el7_9.x86_64/lib/security/cacerts
Untrusted certificate from above (ex. your_password)
keytool -importcert -file /etc/pki/logStashDecoder/truststore.pem -keystore /usr/lib/jvm/java-11-openjdk-11.0.9.11-0.el7_9.x86_64/lib/security/cacerts -alias nw-core-cert -storepass your_password


‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍&lt;/code&gt;&lt;/pre&gt; 
&lt;pre&gt;&lt;code&gt;   systemctl restart logstash‍‍‍‍‍‍‍‍‍&lt;/code&gt;&lt;/pre&gt; 
&lt;pre&gt;&lt;code&gt;   tailf /var/log/logstash/logstash-plain.log‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍‍&lt;/code&gt;&lt;/pre&gt; 
&lt;p&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;img src="https://50269063.hs-sites.com/hubfs/Imported_Blog_Media/224542i6CE7B269CB9C2DD9.png" title="pic1.png" alt="pic1.png"&gt;&lt;/p&gt; 
&lt;p&gt;Please let me know your thoughts or suggestions, as this is a work in progress.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=50269063&amp;amp;k=14&amp;amp;r=https%3A%2F%2F50269063.hs-sites.com%2Fnetwitness-security-llc-blog%2F572650&amp;amp;bu=https%253A%252F%252F50269063.hs-sites.com%252Fnetwitness-security-llc-blog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <pubDate>Tue, 17 Jun 2025 04:00:00 GMT</pubDate>
      <guid>https://50269063.hs-sites.com/netwitness-security-llc-blog/572650</guid>
      <dc:date>2025-06-17T04:00:00Z</dc:date>
      <dc:creator>Admin</dc:creator>
    </item>
    <item>
      <title>Test 2 Blog from Composer Updated</title>
      <link>https://50269063.hs-sites.com/netwitness-security-llc-blog/test2blogfromcomposer-f</link>
      <description>&lt;p&gt;Second composer blog. Update immediately published! And then republished&lt;/p&gt;</description>
      <content:encoded>&lt;p&gt;Second composer blog. Update immediately published! And then republished&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=50269063&amp;amp;k=14&amp;amp;r=https%3A%2F%2F50269063.hs-sites.com%2Fnetwitness-security-llc-blog%2Ftest2blogfromcomposer-f&amp;amp;bu=https%253A%252F%252F50269063.hs-sites.com%252Fnetwitness-security-llc-blog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <pubDate>Fri, 21 Mar 2025 04:00:00 GMT</pubDate>
      <guid>https://50269063.hs-sites.com/netwitness-security-llc-blog/test2blogfromcomposer-f</guid>
      <dc:date>2025-03-21T04:00:00Z</dc:date>
      <dc:creator>Admin</dc:creator>
    </item>
    <item>
      <title>From Webshell to C2: The Evolution of Post-Exploitation and Covert Operations</title>
      <link>https://50269063.hs-sites.com/netwitness-security-llc-blog/from-webshell-to-c2-the-evolution-of-post-exploitation-and-covert-operations</link>
      <description>&lt;p style="margin: 0in 0in 6pt;text-align: justify;line-height: 107%;font-size: 11pt;font-family: Arial, sans-serif;"&gt;&lt;span style="font-size: 14.0pt;line-height: 107%;color: #4472c4;"&gt;From Webshell to C2: The Evolution of Post-Exploitation and Covert Operations&lt;/span&gt;&lt;/p&gt;</description>
      <content:encoded>&lt;p style="margin: 0in 0in 6pt;text-align: justify;line-height: 107%;font-size: 11pt;font-family: Arial, sans-serif;"&gt;&lt;span style="font-size: 14.0pt;line-height: 107%;color: #4472c4;"&gt;From Webshell to C2: The Evolution of Post-Exploitation and Covert Operations&lt;/span&gt;&lt;/p&gt; 
&lt;p style="margin: 0in 0in 6pt;text-align: justify;line-height: 107%;font-size: 11pt;font-family: Arial, sans-serif;"&gt;Authors:&lt;/p&gt; 
&lt;p style="margin: 0in 0in 6pt 1in;text-align: justify;line-height: 107%;font-size: 11pt;font-family: Arial, sans-serif;"&gt;&lt;em&gt;Mortada AboSteit, Senior Consultant Incident Response&lt;/em&gt;&lt;/p&gt; 
&lt;p style="margin: 0in 0in 6pt 1in;text-align: justify;line-height: 107%;font-size: 11pt;font-family: Arial, sans-serif;"&gt;&lt;em&gt;Mohamed Osama, Senior Consultant Incident Response&lt;/em&gt;&lt;/p&gt; 
&lt;p style="margin: 0in 0in 6pt 1in;text-align: justify;line-height: 107%;font-size: 11pt;font-family: Arial, sans-serif;"&gt;&lt;em&gt;Abdelrahman Bakry, Senior Analyst Incident Response&lt;/em&gt;&lt;/p&gt; 
&lt;h1&gt;&lt;span style="color: #2980b9;"&gt;Introduction&lt;/span&gt;&lt;/h1&gt; 
&lt;p style="margin: 0in 0in 6pt;text-align: justify;line-height: 107%;font-size: 11pt;font-family: Arial, sans-serif;"&gt;In the realm of advanced cyber threats, attackers often exploit overlooked vulnerabilities to establish an initial foothold within a compromised environment. Among these vulnerabilities, those related to insufficient input validation stand out as a prevalent and dangerous category. Examples include SQL injection, where malicious input manipulates database queries; cross-site scripting (XSS), which allows attackers to inject harmful scripts into web pages; and file inclusion vulnerabilities, such as Local File Inclusion (LFI), which can expose sensitive server files. These flaws provide attackers with numerous opportunities to bypass security measures. One specific instance is the absence of input validation in upload functionalities for a misconfigured website, which can serve as an ideal entry point for adversaries to maintain persistence and conduct targeted attacks.&lt;/p&gt; 
&lt;p style="margin: 0in 0in 6pt;text-align: justify;line-height: 107%;font-size: 11pt;font-family: Arial, sans-serif;"&gt;While these exploitation techniques are a common trait of several attackers, the post-exploitation activities differ from one actor to another.&lt;/p&gt; 
&lt;p style="margin: 0in 0in 6pt;text-align: justify;line-height: 107%;font-size: 11pt;font-family: Arial, sans-serif;"&gt;NetWitness Incident Response team recently investigated an attacker who, after exploiting a website’s weak posture uploaded a specific Web Shell to finally implant a Mythic &lt;a href="https://docs.mythic-c2.net"&gt;command-and-control (C2)&lt;/a&gt;.&lt;/p&gt; 
&lt;p style="margin: 0in 0in 6pt;text-align: justify;line-height: 107%;font-size: 11pt;font-family: Arial, sans-serif;"&gt;Mythic is a cross-platform, post-exploitation, red teaming framework built with GoLang, docker, docker-compose, and a web browser UI. It is often used by Red Teams to simulate real attacks, but in this case, a real actor adopted it with the goal of persisting in the victim network.&lt;/p&gt; 
&lt;p style="margin: 0in 0in 6pt;text-align: justify;line-height: 107%;font-size: 11pt;font-family: Arial, sans-serif;"&gt;Understanding the misuse of such tools, particularly when paired with insecure configurations, underscores the critical need for rigorous input validation, secure coding practices, and proactive monitoring to defend against persistent adversaries leveraging Mythic or similar post-exploitation frameworks.&lt;/p&gt; 
&lt;p style="margin: 0in 0in 6pt;text-align: justify;line-height: 107%;font-size: 11pt;font-family: Arial, sans-serif;"&gt;&amp;nbsp;&lt;/p&gt; 
&lt;p style="margin: 0in 0in 6pt;text-align: justify;line-height: 107%;font-size: 11pt;font-family: Arial, sans-serif;"&gt;&amp;nbsp;&lt;/p&gt; 
&lt;p style="text-align: center;margin: 0in 0in 6pt;line-height: 107%;font-size: 11pt;font-family: Arial, sans-serif;"&gt;&lt;img src="https://50269063.hs-sites.com/hubfs/Imported_Blog_Media/From-Webshell-to-C2-The-Evolution-of-Post-Exploitation-and-Covert-Operations-0-Mar-26-2026-06-31-24-5429-AM.jpg" style="width: 829px;height: 468px;visibility: visible;"&gt;&lt;/p&gt; 
&lt;p style="text-align: center;"&gt;&lt;strong&gt;Figure 1: Attack Overview&lt;/strong&gt;&lt;/p&gt; 
&lt;h1&gt;&lt;span style="color: #2980b9;"&gt;Tool&lt;/span&gt;&lt;/h1&gt; 
&lt;p style="margin: 0in 0in 6pt;text-align: justify;line-height: 107%;font-size: 11pt;font-family: Arial, sans-serif;"&gt;Initially developed for red team operations, Mythic has been co-opted by several Threat Actors for malicious purposes. Notably, its versatility and modular design have made it a favored tool for Advanced Persistent Threat Groups (APT) in intrusion campaigns.&lt;/p&gt; 
&lt;p style="margin: 0in 0in 6pt;text-align: justify;line-height: 107%;font-size: 11pt;font-family: Arial, sans-serif;"&gt;The &lt;a href="https://cyble.com/blog/threat-actor-deploys-mythics-athena-agent-to-target-russian-semiconductor-suppliers"&gt;Advanced Persistent Threat&lt;/a&gt; (APT) group known as Transparent Tribe, also referred to as APT36 or &lt;a href="https://brandefense.io/blog/apt-groups/mythic-leopard-apt-group"&gt;Mythic Leopard&lt;/a&gt;, has been observed utilizing the Mythic Command and Control (C2) framework in their &lt;a href="https://www.cyfirma.com/research/osint-investigation-hunting-malicious-infrastructure-linked-to-transparent-tribe/"&gt;cyber espionage&lt;/a&gt; operations. In addition to APT36, other state-sponsored APT groups have been observed utilizing the Mythic Command and Control (C2) framework in their &lt;a href="https://www.crowdstrike.com/en-us/blog/malicious-inauthentic-falcon-crash-reporter-installer-ciro-malware"&gt;cyber operations&lt;/a&gt;.&lt;/p&gt; 
&lt;p style="margin: 0in 0in 6pt;text-align: justify;line-height: 107%;font-size: 11pt;font-family: Arial, sans-serif;"&gt;It is designed to provide a collaborative and user-friendly interface for operators and managers, as well as leverage it throughout the red teaming activities. The tool allows attackers to stealthily manage compromised systems, execute payloads, escalate privileges, and exfiltrate data while evading detection.&lt;/p&gt; 
&lt;p style="margin: 0in 0in 6pt;text-align: justify;line-height: 107%;font-size: 11pt;font-family: Arial, sans-serif;"&gt;The increasing number of cases where the tool has been used by these actors started the idea about developing a blog to delve into detecting Mythic’s activity within a network, particularly for Mythic C2 Agent adopted to execute privilege escalations and lateral movements toward a Domain Controller.&lt;/p&gt; 
&lt;p style="margin: 0in 0in 6pt;text-align: justify;line-height: 107%;font-size: 11pt;font-family: Arial, sans-serif;"&gt;In alignment with our traditional approach, based on the three main investigative dimensions of Network, Endpoint, and Logs, we explore, in this blog, the detection of Mythic based on NetWitness Network (NDR) and Netwitness Endpoint (EDR) platforms, complemented by open-source digital forensics tools. The resulting synergy is able to enhance detection and investigation capabilities.&lt;/p&gt; 
&lt;p style="margin: 0in 0in 6pt;text-align: justify;line-height: 107%;font-size: 11pt;font-family: Arial, sans-serif;"&gt;&amp;nbsp;&lt;/p&gt; 
&lt;div&gt; 
 &lt;h1&gt;&lt;span style="color: #2980b9;"&gt;The Attack&lt;/span&gt;&lt;/h1&gt; 
 &lt;p style="margin: 0in 0in 6pt;text-align: justify;line-height: 107%;font-size: 11pt;font-family: Arial, sans-serif;"&gt;The case we present involved an attack where the Threat Actor was closely adhering to the seven steps of the &lt;a href="https://www.lockheedmartin.com/en-us/capabilities/cyber/cyber-kill-chain.html"&gt;Cyber Kill Chain&lt;/a&gt;.&lt;/p&gt; 
 &lt;p style="margin: 0in 0in 6pt;text-align: justify;line-height: 107%;font-size: 11pt;font-family: Arial, sans-serif;"&gt;The attacker started with the &lt;span style="font-family: 'Courier New';"&gt;&lt;span style="font-size: 10.0pt;line-height: 107%;"&gt;Reconnaissance&lt;/span&gt;&lt;/span&gt; phase, during which he identified that the victim’s website was vulnerable to Unrestricted &lt;a href="https://owasp.org/www-community/vulnerabilities/Unrestricted_File_Upload"&gt;File Upload&lt;/a&gt;. This was followed by exploiting this weakness during the &lt;span style="font-family: 'Courier New';"&gt;&lt;span style="font-size: 10.0pt;line-height: 107%;"&gt;Weaponization&lt;/span&gt;&lt;/span&gt; phase, where the Threat Actor prepared a &lt;a href="https://www.f5.com/labs/learning-center/web-shells-understanding-attackers-tools-and-techniques"&gt;WebShell&lt;/a&gt; to be directly uploaded to the Web Server.&lt;/p&gt; 
 &lt;p style="margin: 0in 0in 6pt;text-align: justify;line-height: 107%;font-size: 11pt;font-family: Arial, sans-serif;"&gt;Subsequently, the Threat Actor leveraged the WebShell's upload functionality as the &lt;span style="font-family: 'Courier New';"&gt;&lt;span style="font-size: 10.0pt;line-height: 107%;"&gt;Delivery&lt;/span&gt;&lt;/span&gt; method.&lt;/p&gt; 
 &lt;p style="margin: 0in 0in 6pt;text-align: justify;line-height: 107%;font-size: 11pt;font-family: Arial, sans-serif;"&gt;&amp;nbsp;&lt;/p&gt; 
 &lt;p style="margin: 0in 0in 6pt;line-height: 107%;font-size: 11pt;font-family: Arial, sans-serif;"&gt;&lt;img src="https://50269063.hs-sites.com/hubfs/Imported_Blog_Media/From-Webshell-to-C2-The-Evolution-of-Post-Exploitation-and-Covert-Operations-1-Mar-26-2026-06-31-26-9307-AM.jpg" style="display: block;margin-left: auto;margin-right: auto;"&gt;&lt;/p&gt; 
&lt;/div&gt; 
&lt;p style="text-align: center;"&gt;&lt;strong&gt;Figure 2: Cyber Kill Chain&lt;/strong&gt;&lt;strong&gt;&lt;/strong&gt;&lt;strong&gt;&lt;/strong&gt;&lt;/p&gt; 
&lt;p style="text-align: center;"&gt;&amp;nbsp;&lt;/p&gt; 
&lt;p style="margin: 0in 0in 6pt;text-align: justify;line-height: 107%;font-size: 11pt;font-family: Arial, sans-serif;"&gt;During the &lt;span style="font-family: 'Courier New';"&gt;&lt;span style="font-size: 10.0pt;line-height: 107%;"&gt;Exploitation&lt;/span&gt;&lt;/span&gt; Phase, the Threat Actor performed local discovery and enumeration on the webserver leveraging Windows native commands such as &lt;span style="font-family: 'Courier New';"&gt;Whoami&lt;/span&gt;, &lt;span style="font-family: 'Courier New';"&gt;IPConfig&lt;/span&gt;, and &lt;span style="font-family: 'Courier New';"&gt;Netstat&lt;/span&gt; to gather critical information about the compromised machine. This activity was conducted stealthily, evading detection by the SOC team.&lt;/p&gt; 
&lt;p style="margin: 0in 0in 6pt;text-align: justify;line-height: 107%;font-size: 11pt;font-family: Arial, sans-serif;"&gt;&amp;nbsp;&lt;/p&gt; 
&lt;p style="margin: 0in 0in 6pt;line-height: 107%;font-size: 11pt;font-family: Arial, sans-serif;"&gt;&lt;img src="https://50269063.hs-sites.com/hubfs/Imported_Blog_Media/From-Webshell-to-C2-The-Evolution-of-Post-Exploitation-and-Covert-Operations-2-Mar-26-2026-06-31-28-5027-AM.jpg" style="display: block;margin-left: auto;margin-right: auto;"&gt;&lt;/p&gt; 
&lt;p style="text-align: center;"&gt;&lt;strong&gt;Figure 3: Whoami executed on the WebServer&lt;/strong&gt;&lt;strong&gt;&lt;/strong&gt;&lt;/p&gt; 
&lt;p style="text-align: center;"&gt;&amp;nbsp;&lt;/p&gt; 
&lt;p style="margin: 0in 0in 6pt 1in;line-height: 107%;font-size: 11pt;font-family: Arial, sans-serif;text-align: center;"&gt;&lt;img src="https://50269063.hs-sites.com/hs-fs/hubfs/Imported_Blog_Media/From-Webshell-to-C2-The-Evolution-of-Post-Exploitation-and-Covert-Operations-3-Mar-26-2026-06-31-29-9556-AM.jpg?width=1092&amp;amp;height=160&amp;amp;name=From-Webshell-to-C2-The-Evolution-of-Post-Exploitation-and-Covert-Operations-3-Mar-26-2026-06-31-29-9556-AM.jpg" width="1092" height="160"&gt;&lt;/p&gt; 
&lt;p style="margin: 0in 0in 6pt 1in;line-height: 107%;font-size: 11pt;font-family: Arial, sans-serif;text-align: center;"&gt;&lt;span style="font-size: 13px;"&gt;&lt;strong&gt;Figure 4: IPConfig executed on the WebServer&lt;/strong&gt;&lt;/span&gt;&lt;/p&gt; 
&lt;p style="margin: 0in 0in 6pt 1in;line-height: 107%;font-size: 11pt;font-family: Arial, sans-serif;text-align: center;"&gt;&amp;nbsp;&lt;/p&gt; 
&lt;p style="margin: 0in 0in 6pt 1in;line-height: 107%;font-size: 11pt;font-family: Arial, sans-serif;text-align: center;"&gt;&lt;img src="https://50269063.hs-sites.com/hs-fs/hubfs/Imported_Blog_Media/From-Webshell-to-C2-The-Evolution-of-Post-Exploitation-and-Covert-Operations-4-Mar-26-2026-06-31-31-8754-AM.jpg?width=1087&amp;amp;height=194&amp;amp;name=From-Webshell-to-C2-The-Evolution-of-Post-Exploitation-and-Covert-Operations-4-Mar-26-2026-06-31-31-8754-AM.jpg" width="1087" height="194"&gt;&lt;/p&gt; 
&lt;p style="margin: 0in 0in 6pt 1in;line-height: 107%;font-size: 11pt;font-family: Arial, sans-serif;text-align: center;"&gt;&lt;strong&gt;&amp;nbsp;&lt;/strong&gt;&lt;/p&gt; 
&lt;p style="margin: 0in 0in 6pt 1in;line-height: 107%;font-size: 11pt;font-family: Arial, sans-serif;text-align: center;"&gt;&lt;strong&gt;Figure 5: Netstat executed on the WebServer&lt;/strong&gt;&lt;/p&gt; 
&lt;p style="margin: 0in 0in 6pt;text-align: justify;line-height: 107%;font-size: 11pt;font-family: Arial, sans-serif;"&gt;&amp;nbsp;&lt;/p&gt; 
&lt;p style="margin: 0in 0in 6pt;text-align: justify;line-height: 107%;font-size: 11pt;font-family: Arial, sans-serif;"&gt;During the&amp;nbsp;&lt;span style="font-family: 'Courier New';"&gt;&lt;span style="font-size: 10.0pt;line-height: 107%;"&gt;Installation&lt;/span&gt;&lt;/span&gt; stage, the Threat Actor managed to upload and install the C2 implant, masquerading it as a legitimate &lt;span style="font-family: 'Courier New';"&gt;Notepad++.exe&lt;/span&gt; file to have an active callback within the Mythic C2 Server.&lt;/p&gt; 
&lt;p style="margin: 0in 0in 6pt;text-align: justify;line-height: 107%;font-size: 11pt;font-family: Arial, sans-serif;"&gt;&amp;nbsp;&lt;/p&gt; 
&lt;p style="margin: 0in 0in 6pt;line-height: 107%;font-size: 11pt;font-family: Arial, sans-serif;text-align: center;"&gt;&lt;img src="https://50269063.hs-sites.com/hubfs/Imported_Blog_Media/From-Webshell-to-C2-The-Evolution-of-Post-Exploitation-and-Covert-Operations-5-Mar-26-2026-06-31-33-4374-AM.jpg"&gt;&lt;/p&gt; 
&lt;p style="margin: 0in 0in 6pt;line-height: 107%;font-size: 11pt;font-family: Arial, sans-serif;text-align: center;"&gt;&lt;strong&gt;Figure 6: Upload and execute C2 Agent&lt;/strong&gt;&lt;/p&gt; 
&lt;p style="margin: 0in 0in 6pt;text-align: justify;line-height: 107%;font-size: 11pt;font-family: Arial, sans-serif;"&gt;&amp;nbsp;&lt;/p&gt; 
&lt;p style="margin: 0in 0in 6pt;text-align: justify;line-height: 107%;font-size: 11pt;font-family: Arial, sans-serif;"&gt;From the Mythic C2 server, an active callback originated from the infected web server, granting the Threat Actor entrenched access. The C2 agent was noticed running with the privilege of the default web engine “Microsoft IIS” user account “&lt;span style="font-family: 'Courier New';"&gt;&lt;span style="font-size: 10.0pt;line-height: 107%;"&gt;IIS APPPOOL\DefaultAppPool&lt;/span&gt;&lt;/span&gt;”.&lt;/p&gt; 
&lt;p style="margin: 0in 0in 6pt;text-align: justify;line-height: 107%;font-size: 11pt;font-family: Arial, sans-serif;"&gt;&amp;nbsp;&lt;/p&gt; 
&lt;p style="margin: 0in 0in 6pt;line-height: 107%;font-size: 11pt;font-family: Arial, sans-serif;text-align: center;"&gt;&lt;img src="https://50269063.hs-sites.com/hubfs/Imported_Blog_Media/From-Webshell-to-C2-The-Evolution-of-Post-Exploitation-and-Covert-Operations-6-Mar-26-2026-06-31-35-2968-AM.jpg"&gt;&lt;/p&gt; 
&lt;p style="margin: 0in 0in 6pt;line-height: 107%;font-size: 11pt;font-family: Arial, sans-serif;text-align: center;"&gt;&lt;strong&gt;Figure 7: Active Callback Channel from the C2 Agent on WebServer&lt;/strong&gt;&lt;/p&gt; 
&lt;p style="margin: 0in 0in 6pt;line-height: 107%;font-size: 11pt;font-family: Arial, sans-serif;text-align: center;"&gt;&amp;nbsp;&lt;/p&gt; 
&lt;p style="break-after: avoid;margin: 0in 0in 6pt;text-align: justify;line-height: 107%;font-size: 11pt;font-family: Arial, sans-serif;"&gt;During the &lt;span style="font-family: 'Courier New';"&gt;&lt;span style="font-size: 10.0pt;line-height: 107%;"&gt;Command &amp;amp; Control&lt;/span&gt;&lt;/span&gt; phase, the Threat Actor executed multiple enumeration commands to gather detailed information about the compromised environment and also to evaluate the inherited granted access of web user “&lt;span style="font-family: 'Courier New';"&gt;&lt;span style="font-size: 10.0pt;line-height: 107%;"&gt;IIS APPPOOL\DefaultAppPool&lt;/span&gt;&lt;/span&gt;”.&lt;/p&gt; 
&lt;p style="break-after: avoid;margin: 0in 0in 6pt;text-align: justify;line-height: 107%;font-size: 11pt;font-family: Arial, sans-serif;"&gt;These enumeration attempts were purposed to move laterally in the network, and actively work to escalate privileges to a domain administrator account while targeting access to the Domain Controller.&lt;/p&gt; 
&lt;p style="break-after: avoid;margin: 0in 0in 6pt;text-align: justify;line-height: 107%;font-size: 11pt;font-family: Arial, sans-serif;"&gt;For enumerating the Domain Controller, the Threat Actor executed &lt;span style="font-family: 'Courier New';"&gt;“dc_list”&lt;/span&gt; followed by &lt;span style="font-family: 'Courier New';"&gt;“net_shares”&lt;/span&gt; to list open shares on the Domain Controller. This was a successful attempt as the Threat Actor was able to identify the presence of the &lt;span style="font-family: 'Courier New';"&gt;ADMIN$&lt;/span&gt; share, which can surely be used to land on the Domain Controller.&lt;/p&gt; 
&lt;p style="break-after: avoid;margin: 0in 0in 6pt;text-align: justify;line-height: 107%;font-size: 11pt;font-family: Arial, sans-serif;"&gt;&amp;nbsp;&lt;/p&gt; 
&lt;p style="break-after: avoid;margin: 0in 0in 6pt;line-height: 107%;font-size: 11pt;font-family: Arial, sans-serif;text-align: center;"&gt;&lt;img src="https://50269063.hs-sites.com/hubfs/Imported_Blog_Media/From-Webshell-to-C2-The-Evolution-of-Post-Exploitation-and-Covert-Operations-7-Mar-26-2026-06-31-37-3441-AM.jpg"&gt;&lt;/p&gt; 
&lt;p style="margin: 0in 0in 6pt;line-height: 107%;font-size: 11pt;font-family: Arial, sans-serif;text-align: center;"&gt;&lt;strong&gt;Figure 8: Domain Controller Enumeration&lt;/strong&gt;&lt;/p&gt; 
&lt;p style="margin: 0in 0in 6pt;line-height: 107%;font-size: 11pt;font-family: Arial, sans-serif;text-align: center;"&gt;&amp;nbsp;&lt;/p&gt; 
&lt;p style="margin: 0in 0in 6pt;text-align: justify;line-height: 107%;font-size: 11pt;font-family: Arial, sans-serif;"&gt;Directly afterward, the Threat Actor adopted a batch script to execute a &lt;a href="https://en.wikipedia.org/wiki/Dictionary_attack"&gt;dictionary attack&lt;/a&gt; to crack the domain administrator’s password by leveraging a &lt;a href="https://www.tutorialspoint.com/batch_script/index.htm"&gt;batch script&lt;/a&gt; , and a customized word list which led to successful login to the Domain Controller with a privileged account.&lt;/p&gt; 
&lt;p style="margin: 0in 0in 6pt;text-align: justify;line-height: 107%;font-size: 11pt;font-family: Arial, sans-serif;"&gt;&amp;nbsp;&lt;/p&gt; 
&lt;p style="margin: 0in 0in 6pt;line-height: 107%;font-size: 11pt;font-family: Arial, sans-serif;text-align: center;"&gt;&lt;img src="https://50269063.hs-sites.com/hubfs/Imported_Blog_Media/From-Webshell-to-C2-The-Evolution-of-Post-Exploitation-and-Covert-Operations-8-Mar-26-2026-06-31-39-8116-AM.jpg"&gt;&lt;/p&gt; 
&lt;p style="margin: 0in 0in 6pt;line-height: 107%;font-size: 11pt;font-family: Arial, sans-serif;text-align: center;"&gt;&lt;strong&gt;Figure 9: Password Cracking of the Domain Admin Password&lt;/strong&gt;&lt;/p&gt; 
&lt;p style="margin: 0in 0in 6pt;line-height: 107%;font-size: 11pt;font-family: Arial, sans-serif;text-align: center;"&gt;&amp;nbsp;&lt;/p&gt; 
&lt;p style="margin: 0in 0in 6pt;text-align: justify;line-height: 107%;font-size: 11pt;font-family: Arial, sans-serif;"&gt;After successfully compromising the domain administrator's password, the Threat Actor leveraged &lt;a href="https://attack.mitre.org/techniques/T1047"&gt;Windows Management Instrumentation&lt;/a&gt; (WMI) to execute a PowerShell command designed to download and execute the Command and Control (C2) implant on the Domain Controller.&lt;/p&gt; 
&lt;p style="margin: 0in 0in 6pt;text-align: justify;line-height: 107%;font-size: 11pt;font-family: Arial, sans-serif;"&gt;The implant was retrieved from a malicious public domain over a non-standard web traffic port, with the payload deceptively disguised as a legitimate &lt;span style="font-family: 'Courier New';"&gt;OneDrive.exe&lt;/span&gt; file to evade detection.&lt;/p&gt; 
&lt;p style="margin: 0in 0in 6pt;text-align: justify;line-height: 107%;font-size: 11pt;font-family: Arial, sans-serif;"&gt;&amp;nbsp;&lt;/p&gt; 
&lt;p style="margin: 0in 0in 6pt;line-height: 107%;font-size: 11pt;font-family: Arial, sans-serif;text-align: center;"&gt;&lt;img src="https://50269063.hs-sites.com/hubfs/Imported_Blog_Media/From-Webshell-to-C2-The-Evolution-of-Post-Exploitation-and-Covert-Operations-9-Mar-26-2026-06-31-41-8006-AM.jpg"&gt;&lt;/p&gt; 
&lt;p style="margin: 0in 0in 6pt;line-height: 107%;font-size: 11pt;font-family: Arial, sans-serif;text-align: center;"&gt;&lt;strong&gt;Figure 10: Abusing WMI to download and execute the C2 Implant on the DC&lt;/strong&gt;&lt;/p&gt; 
&lt;p style="margin: 0in 0in 6pt;line-height: 107%;font-size: 11pt;font-family: Arial, sans-serif;text-align: center;"&gt;&amp;nbsp;&lt;/p&gt; 
&lt;p style="margin: 0in 0in 6pt;text-align: justify;line-height: 107%;font-size: 11pt;font-family: Arial, sans-serif;"&gt;Now, the Threat Actor has two active callback channels, from the public internet-faced WebServer and the Domain Controller with the user accounts &lt;span style="font-family: 'Courier New';"&gt;IIS APPPOOL\DefaultAppPool &lt;/span&gt;and &lt;span style="font-family: 'Courier New';"&gt;Domain&lt;/span&gt; &lt;span style="font-family: 'Courier New';"&gt;Administrator&lt;/span&gt; respectively.&lt;/p&gt; 
&lt;p style="margin: 0in 0in 6pt;text-align: justify;line-height: 107%;font-size: 11pt;font-family: Arial, sans-serif;"&gt;&amp;nbsp;&lt;/p&gt; 
&lt;p style="margin: 0in 0in 6pt;line-height: 107%;font-size: 11pt;font-family: Arial, sans-serif;text-align: center;"&gt;&lt;img src="https://50269063.hs-sites.com/hubfs/Imported_Blog_Media/From-Webshell-to-C2-The-Evolution-of-Post-Exploitation-and-Covert-Operations-10-Mar-26-2026-06-31-43-6086-AM.jpg"&gt;&lt;/p&gt; 
&lt;p style="margin: 0in 0in 6pt;line-height: 107%;font-size: 11pt;font-family: Arial, sans-serif;text-align: center;"&gt;&lt;strong&gt;Figure 11: Two Active callback Channels from the C2 Web Interface&lt;/strong&gt;&lt;/p&gt; 
&lt;p style="margin: 0in 0in 6pt;line-height: 107%;font-size: 11pt;font-family: Arial, sans-serif;text-align: left;"&gt;&amp;nbsp;&lt;/p&gt; 
&lt;p style="margin: 0in 0in 6pt;line-height: 107%;font-size: 11pt;font-family: Arial, sans-serif;text-align: center;"&gt;&lt;strong&gt;&lt;img src="https://50269063.hs-sites.com/hubfs/Imported_Blog_Media/From-Webshell-to-C2-The-Evolution-of-Post-Exploitation-and-Covert-Operations-11-Mar-26-2026-06-31-46-2513-AM.jpg"&gt;&lt;/strong&gt;&lt;/p&gt; 
&lt;p style="margin: 0in 0in 6pt;line-height: 107%;font-size: 11pt;font-family: Arial, sans-serif;text-align: center;"&gt;&lt;strong&gt;Figure 12: DC local enumeration&amp;nbsp;&lt;/strong&gt;&lt;/p&gt; 
&lt;p style="margin: 0in 0in 6pt;line-height: 107%;font-size: 11pt;font-family: Arial, sans-serif;text-align: left;"&gt;&amp;nbsp;&lt;/p&gt; 
&lt;p style="margin: 0in 0in 6pt;text-align: justify;line-height: 107%;font-size: 11pt;font-family: Arial, sans-serif;"&gt;In the final phase, &lt;span style="font-family: 'Courier New';"&gt;&lt;span style="font-size: 10.0pt;line-height: 107%;"&gt;Action on Objectives&lt;/span&gt;&lt;/span&gt;, the Threat Actor employed &lt;a href="https://attack.mitre.org/tactics/TA0003"&gt;persistent tactics&lt;/a&gt; to maintain access to compromised Domain Controller despite potential disruptions such as system restarts, credential changes, or other actions that could terminate their foothold. The chosen persistence mechanism was the creation of a &lt;a href="https://attack.mitre.org/techniques/T1053"&gt;&lt;span style="font-family: 'Courier New';"&gt;Scheduled Task&lt;/span&gt;&lt;/a&gt;, ensuring continued access and control over the infected environment, enabling sustained access to critical systems, particularly the Domain Controller.&lt;/p&gt; 
&lt;p style="margin: 0in 0in 6pt;text-align: justify;line-height: 107%;font-size: 11pt;font-family: Arial, sans-serif;"&gt;This approach facilitated the achievement of the ultimate objective, setting a persistent foothold on the organization’s primary Domain Controller.&lt;/p&gt; 
&lt;p style="margin: 0in 0in 6pt;text-align: justify;line-height: 107%;font-size: 11pt;font-family: Arial, sans-serif;"&gt;&amp;nbsp;&lt;/p&gt; 
&lt;p style="margin: 0in 0in 6pt;line-height: 107%;font-size: 11pt;font-family: Arial, sans-serif;"&gt;&lt;img src="https://50269063.hs-sites.com/hubfs/Imported_Blog_Media/From-Webshell-to-C2-The-Evolution-of-Post-Exploitation-and-Covert-Operations-12-Mar-26-2026-06-31-48-0995-AM.jpg" style="display: block;margin-left: auto;margin-right: auto;"&gt;&lt;/p&gt; 
&lt;p style="margin: 0in 0in 6pt;line-height: 107%;font-size: 11pt;font-family: Arial, sans-serif;text-align: center;"&gt;&lt;strong&gt;Figure 13: Persistence applied to the DC with a Scheduled Task&lt;/strong&gt;&lt;/p&gt; 
&lt;p style="margin: 0in 0in 6pt;line-height: 107%;font-size: 11pt;font-family: Arial, sans-serif;text-align: left;"&gt;&amp;nbsp;&lt;/p&gt; 
&lt;h1 style="margin: 0in 0in 6pt;line-height: 107%;font-size: 11pt;font-family: Arial, sans-serif;text-align: left;"&gt;&lt;span style="background-color: #ffffff;color: #2980b9;font-size: 26px;"&gt;&lt;strong&gt;Incident Triggered by NetWitness Respond Module&lt;/strong&gt;&lt;/span&gt;&lt;span style="background-color: #ffffff;color: #2980b9;font-size: 26px;"&gt;&lt;strong&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/h1&gt; 
&lt;p style="margin: 0in 0in 6pt;text-align: justify;line-height: 107%;font-size: 11pt;font-family: Arial, sans-serif;"&gt;&amp;nbsp;&lt;/p&gt; 
&lt;p style="margin: 0in 0in 6pt;text-align: justify;line-height: 107%;font-size: 11pt;font-family: Arial, sans-serif;"&gt;On the Netwitness Respond page, the Analyst was prompted by an incident that triggered for the infected Web Server, which pointed to possible lateral movement due to creating Net Utility on the Web Server while remotely attempting to access &lt;span style="font-family: 'Courier New';"&gt;ADMIN$&lt;/span&gt; share on the Domain Controller.&lt;/p&gt; 
&lt;p style="margin: 0in 0in 6pt;text-align: justify;line-height: 107%;font-size: 11pt;font-family: Arial, sans-serif;"&gt;&amp;nbsp;&lt;/p&gt; 
&lt;p style="margin: 0in 0in 6pt;line-height: 107%;font-size: 11pt;font-family: Arial, sans-serif;text-align: center;"&gt;&lt;img src="https://50269063.hs-sites.com/hubfs/Imported_Blog_Media/From-Webshell-to-C2-The-Evolution-of-Post-Exploitation-and-Covert-Operations-13-Mar-26-2026-06-31-50-7966-AM.jpg"&gt;&lt;/p&gt; 
&lt;p style="margin: 0in 0in 6pt;line-height: 107%;font-size: 11pt;font-family: Arial, sans-serif;text-align: center;"&gt;&lt;strong&gt;Figure 14: Incident and Alerts on NW Respond&lt;/strong&gt;&lt;/p&gt; 
&lt;p style="margin: 0in 0in 6pt;line-height: 107%;font-size: 11pt;font-family: Arial, sans-serif;text-align: left;"&gt;&amp;nbsp;&lt;/p&gt; 
&lt;h1 style="margin: 0in 0in 6pt;line-height: 107%;font-size: 11pt;font-family: Arial, sans-serif;text-align: left;"&gt;&lt;span style="font-size: 26px;color: #2980b9;"&gt;&lt;strong&gt;Detection using NetWitness Network Threat Detection and Response Solution&lt;/strong&gt;&lt;/span&gt;&lt;span style="font-size: 26px;color: #2980b9;"&gt;&lt;strong&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/h1&gt; 
&lt;p style="text-align: left;margin: 0in 0in 6pt;line-height: 107%;font-size: 11pt;font-family: Arial, sans-serif;"&gt;&amp;nbsp;&lt;/p&gt; 
&lt;p style="text-align: left;margin: 0in 0in 6pt;line-height: 107%;font-size: 11pt;font-family: Arial, sans-serif;"&gt;Netwitness NDR recorded several suspicious &lt;a href="https://en.wikipedia.org/wiki/POST_(HTTP)"&gt;HTTP POST&lt;/a&gt; connections. These connections coincided with the upload of files bearing suspicious names. Additionally, such anomalous communication aligned with alarming techniques and tactics outlined in the MITRE ATT&amp;amp;CK framework.&lt;/p&gt; 
&lt;p style="text-align: left;margin: 0in 0in 6pt;line-height: 107%;font-size: 11pt;font-family: Arial, sans-serif;"&gt;&amp;nbsp;&lt;/p&gt; 
&lt;p style="margin: 0in 0in 6pt;line-height: 107%;font-size: 11pt;font-family: Arial, sans-serif;text-align: center;"&gt;&lt;img src="https://50269063.hs-sites.com/hubfs/Imported_Blog_Media/From-Webshell-to-C2-The-Evolution-of-Post-Exploitation-and-Covert-Operations-14-Mar-26-2026-06-31-52-9506-AM.jpg"&gt;&lt;strong&gt;&lt;/strong&gt;&lt;/p&gt; 
&lt;p style="margin: 0in 0in 6pt;line-height: 107%;font-size: 11pt;font-family: Arial, sans-serif;text-align: center;"&gt;&lt;strong&gt;Figure 15: Suspicious Files uploaded to the Web Server&lt;/strong&gt;&lt;/p&gt; 
&lt;p style="margin: 0in 0in 6pt;line-height: 107%;font-size: 11pt;font-family: Arial, sans-serif;text-align: center;"&gt;&amp;nbsp;&lt;/p&gt; 
&lt;p style="margin: 0in 0in 6pt;text-align: justify;line-height: 107%;font-size: 11pt;font-family: Arial, sans-serif;"&gt;Based on the above detection,&amp;nbsp; the Analyst focused the investigations on the suspicious file name &lt;span style="font-family: 'Courier New';"&gt;login.aspx&lt;/span&gt;&lt;span style="font-family: Arial, sans-serif;color: #404040;font-style: italic;"&gt; &lt;/span&gt;and&lt;span style="font-family: Arial, sans-serif;color: #404040;font-style: italic;"&gt; &lt;/span&gt;was able to analyze the raw packets related to the same HTTP Post request.&lt;/p&gt; 
&lt;p style="margin: 0in 0in 6pt;text-align: justify;line-height: 107%;font-size: 11pt;font-family: Arial, sans-serif;"&gt;&amp;nbsp;&lt;/p&gt; 
&lt;p style="margin: 0in 0in 6pt;line-height: 107%;font-size: 11pt;font-family: Arial, sans-serif;text-align: center;"&gt;&lt;img src="https://50269063.hs-sites.com/hubfs/Imported_Blog_Media/From-Webshell-to-C2-The-Evolution-of-Post-Exploitation-and-Covert-Operations-15-Mar-26-2026-06-31-55-7697-AM.jpg"&gt;&lt;/p&gt; 
&lt;p style="margin: 0in 0in 6pt;line-height: 107%;font-size: 11pt;font-family: Arial, sans-serif;text-align: center;"&gt;&lt;strong&gt;Figure 16: Post Request placing web shell on the Web Server&lt;/strong&gt;&lt;/p&gt; 
&lt;p style="margin: 0in 0in 6pt;line-height: 107%;font-size: 11pt;font-family: Arial, sans-serif;text-align: center;"&gt;&amp;nbsp;&lt;/p&gt; 
&lt;p style="margin: 0in 0in 6pt;text-align: justify;line-height: 107%;font-size: 11pt;font-family: Arial, sans-serif;"&gt;Leveraging the advanced capabilities of NetWitness NDR, particularly the Packet Reconstruction feature, the Analyst conducted an in-depth investigation of an HTTP POST request. This analysis enabled the full reconstruction of a file, &lt;span style="font-family: Arial, sans-serif;color: #404040;font-style: italic;"&gt;login.aspx&lt;/span&gt;, uploaded during the same HTTP session. The file was identified as a web shell, equipped with upload and execution functionalities.&lt;/p&gt; 
&lt;p style="margin: 0in 0in 6pt;text-align: justify;line-height: 107%;font-size: 11pt;font-family: Arial, sans-serif;"&gt;&amp;nbsp;&lt;/p&gt; 
&lt;p style="margin: 0in 0in 6pt;line-height: 107%;font-size: 11pt;font-family: Arial, sans-serif;text-align: center;"&gt;&lt;img src="https://50269063.hs-sites.com/hubfs/Imported_Blog_Media/From-Webshell-to-C2-The-Evolution-of-Post-Exploitation-and-Covert-Operations-16-Mar-26-2026-06-31-57-8605-AM.jpg"&gt;&lt;/p&gt; 
&lt;p style="margin: 0in 0in 6pt;line-height: 107%;font-size: 11pt;font-family: Arial, sans-serif;text-align: center;"&gt;&lt;strong&gt;Figure 17: Reconstructed Webshell reconstructed by NW NDR&lt;/strong&gt;&lt;/p&gt; 
&lt;p style="margin: 0in 0in 6pt;line-height: 107%;font-size: 11pt;font-family: Arial, sans-serif;text-align: center;"&gt;&amp;nbsp;&lt;/p&gt; 
&lt;p style="margin: 0in 0in 6pt;text-align: justify;line-height: 107%;font-size: 11pt;font-family: Arial, sans-serif;"&gt;Through the reconstruction of subsequent sessions associated with the same HTTP POST request, the Analyst uncovered the commands executed by the Threat Actor, along with the corresponding outputs for each command.&lt;/p&gt; 
&lt;p style="margin: 0in 0in 6pt;text-align: justify;line-height: 107%;font-size: 11pt;font-family: Arial, sans-serif;"&gt;&amp;nbsp;&lt;/p&gt; 
&lt;p style="margin: 0in 0in 6pt;line-height: 107%;font-size: 11pt;font-family: Arial, sans-serif;text-align: center;"&gt;&lt;img src="https://50269063.hs-sites.com/hubfs/Imported_Blog_Media/From-Webshell-to-C2-The-Evolution-of-Post-Exploitation-and-Covert-Operations-17-Mar-26-2026-06-31-59-5548-AM.jpg"&gt;&lt;/p&gt; 
&lt;p style="margin: 0in 0in 6pt;line-height: 107%;font-size: 11pt;font-family: Arial, sans-serif;text-align: center;"&gt;&lt;strong&gt;Figure 18: Reconstruction to Whoami Cmnd&lt;/strong&gt;&lt;/p&gt; 
&lt;p style="margin: 0in 0in 6pt;line-height: 107%;font-size: 11pt;font-family: Arial, sans-serif;text-align: left;"&gt;&amp;nbsp;&lt;/p&gt; 
&lt;p style="margin: 0in 0in 6pt;line-height: 107%;font-size: 11pt;font-family: Arial, sans-serif;text-align: left;"&gt;&amp;nbsp;&lt;/p&gt; 
&lt;p style="margin: 0in 0in 6pt;line-height: 107%;font-size: 11pt;font-family: Arial, sans-serif;text-align: center;"&gt;&lt;strong&gt;&lt;img src="https://50269063.hs-sites.com/hubfs/Imported_Blog_Media/From-Webshell-to-C2-The-Evolution-of-Post-Exploitation-and-Covert-Operations-18-Mar-26-2026-06-32-01-3075-AM.jpg"&gt;&lt;/strong&gt;&lt;/p&gt; 
&lt;p style="margin: 0in 0in 6pt;line-height: 107%;font-size: 11pt;font-family: Arial, sans-serif;text-align: center;"&gt;&lt;strong&gt;Figure 19: Reconstruction to IPConfig Cmnd&lt;/strong&gt;&lt;/p&gt; 
&lt;p style="margin: 0in 0in 6pt;line-height: 107%;font-size: 11pt;font-family: Arial, sans-serif;text-align: center;"&gt;&amp;nbsp;&lt;/p&gt; 
&lt;p style="margin: 0in 0in 6pt;line-height: 107%;font-size: 11pt;font-family: Arial, sans-serif;text-align: center;"&gt;&lt;strong&gt;&lt;img src="https://50269063.hs-sites.com/hubfs/Imported_Blog_Media/From-Webshell-to-C2-The-Evolution-of-Post-Exploitation-and-Covert-Operations-19-Mar-26-2026-06-32-03-1636-AM.jpg"&gt;&lt;/strong&gt;&lt;/p&gt; 
&lt;p style="margin: 0in 0in 6pt;line-height: 107%;font-size: 11pt;font-family: Arial, sans-serif;text-align: center;"&gt;&lt;strong&gt;Figure 20: Reconstruction to Netstat Cmnd&lt;/strong&gt;&lt;/p&gt; 
&lt;p style="margin: 0in 0in 6pt;line-height: 107%;font-size: 11pt;font-family: Arial, sans-serif;text-align: center;"&gt;&amp;nbsp;&lt;/p&gt; 
&lt;p style="break-after: avoid;margin: 0in 0in 6pt;text-align: justify;line-height: 107%;font-size: 11pt;font-family: Arial, sans-serif;"&gt;To deepen the investigation, the&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=50269063&amp;amp;k=14&amp;amp;r=https%3A%2F%2F50269063.hs-sites.com%2Fnetwitness-security-llc-blog%2Ffrom-webshell-to-c2-the-evolution-of-post-exploitation-and-covert-operations&amp;amp;bu=https%253A%252F%252F50269063.hs-sites.com%252Fnetwitness-security-llc-blog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <pubDate>Sun, 23 Feb 2025 05:00:00 GMT</pubDate>
      <guid>https://50269063.hs-sites.com/netwitness-security-llc-blog/from-webshell-to-c2-the-evolution-of-post-exploitation-and-covert-operations</guid>
      <dc:date>2025-02-23T05:00:00Z</dc:date>
      <dc:creator>Admin</dc:creator>
    </item>
    <item>
      <title>Using NetWitness to Detect Phishing reCAPTCHA Campaign</title>
      <link>https://50269063.hs-sites.com/netwitness-security-llc-blog/usingnetwitnesstodetectphishingrecaptchacampaign</link>
      <description>&lt;h2&gt;&lt;strong&gt;Using NetWitness to Detect Phishing reCAPTCHA Campaign&lt;/strong&gt;&lt;/h2&gt; 
&lt;p&gt;&lt;em&gt;Author: Mohamed Osama, Senior Consultant Incident Response, NetWitness&lt;/em&gt;&lt;/p&gt;</description>
      <content:encoded>&lt;h2&gt;&lt;strong&gt;Using NetWitness to Detect Phishing reCAPTCHA Campaign&lt;/strong&gt;&lt;/h2&gt; 
&lt;p&gt;&lt;em&gt;Author: Mohamed Osama, Senior Consultant Incident Response, NetWitness&lt;/em&gt;&lt;/p&gt; 
&lt;h2&gt;&amp;nbsp;&lt;/h2&gt; 
&lt;h2&gt;Introduction&lt;/h2&gt; 
&lt;p&gt;Recently, a sophisticated phishing campaign mimicking reCAPTCHA technology, which stands for &lt;strong&gt;Completely Automated Public Turing test to tell Computers and Humans Apart&lt;/strong&gt;, has been targeting unsuspecting employees across various sectors.&lt;/p&gt; 
&lt;p&gt;The campaign capitalizes on social engineering techniques, tricking victims into bypassing security measures by convincing them to paste malicious code into their systems. Using the familiar and trusted reCAPTCHA interface, attackers can lure employees into believing that they are merely verifying their identity to access legitimate websites or services, while in reality, they are inadvertently initiating a harmful process that compromises their machine.&lt;/p&gt; 
&lt;p&gt;Once the malicious code is executed, it installs an infostealer malware designed to siphon sensitive information from the infected device. This malware also establishes a backdoor, allowing attackers to remotely control the system through a Command-and-Control (C2) server. The lack of cybersecurity awareness among many employees has made this campaign particularly effective, as the phishing webpage appears authentic and exploits the perceived security of reCAPTCHA. This attack highlights the critical need for enhanced employee training and awareness to defend against evolving cyber threats.&lt;/p&gt; 
&lt;p&gt;The current campaign is leveraging multiple redirections over different websites, which finally ends with the reCAPTCHA web page. It usually consists of a landing HTML page with embedded encoded &lt;a href="https://answers.microsoft.com/en-us/windows/forum/all/mshtaexe/b0ee8970-b60b-4311-a5cb-307e0fab3376"&gt;&lt;strong&gt;mshta&lt;/strong&gt;&lt;/a&gt; or PowerShell command line arguments for downloading and invoking the malicious code respectively. In addition, it has been observed that &lt;strong&gt;mshta&lt;/strong&gt;, a Windows-native binary designed to execute Microsoft HTML Application (HTA) files, was also abused for downloading compressed ZIP files that eventually decompress and execute the infostealers on the compromised machine.&lt;/p&gt; 
&lt;p&gt;This campaign has been tracked by NetWitness Incident Response team, among other vendors as well. It is known to install infostealer malware, specifically &lt;a href="https://malpedia.caad.fkie.fraunhofer.de/details/win.lumma#:~:text=Lumma%20Stealer%20primarily%20targets%20cryptocurrency,information%20from%20the%20victim's%20machine."&gt;Lumma Stealer&lt;/a&gt; however, in this blog post, I will leverage a stealthier file-less approach that directly leads to Command-and-Control (C2) and a complete takeover of the compromised machine by the threat actor.&lt;/p&gt; 
&lt;p&gt;&lt;img src="https://50269063.hs-sites.com/hubfs/Imported_Blog_Media/431654i424ADB2FA8287664.png" title="MohamedOsama_2-1728465994284.png" alt="MohamedOsama_2-1728465994284.png"&gt;&lt;/p&gt; 
&lt;p&gt;Figure 1: Attack Diagram&lt;/p&gt; 
&lt;h2&gt;Tool&lt;/h2&gt; 
&lt;p&gt;The fake reCAPTCHA code has been publicly available on GitHub for many years as of the time of this blog. I used a publicly available &lt;a href="https://github.com/JohnHammond/recaptcha-phish"&gt;reCAPTCHA GitHub repository&lt;/a&gt; where the available code leverages an &lt;strong&gt;index.html&lt;/strong&gt; landing web page that mimics the reCAPTCHA format, with additional instructions to paste a specific line, which looks innocent enough to lure the user into completing the verification process.&lt;/p&gt; 
&lt;p&gt;&lt;img src="https://50269063.hs-sites.com/hubfs/Imported_Blog_Media/431653iCA543AA7F1037C06.png" title="MohamedOsama_3-1728465994287.png" alt="MohamedOsama_3-1728465994287.png"&gt;&lt;/p&gt; 
&lt;p&gt;Figure 2: Full view of fake reCAPTCHA web page&lt;/p&gt; 
&lt;p&gt;The available reCAPTCHA code, totally created for PoC purposes, is analyzed as per below.&lt;/p&gt; 
&lt;p&gt;&lt;img src="https://50269063.hs-sites.com/hubfs/Imported_Blog_Media/431655i10BDC477E9067B23.png" title="MohamedOsama_4-1728465994292.png" alt="MohamedOsama_4-1728465994292.png"&gt;&lt;/p&gt; 
&lt;p&gt;Figure 3: Analysis of index.html&lt;/p&gt; 
&lt;p&gt;&lt;img src="https://50269063.hs-sites.com/hubfs/Imported_Blog_Media/431656i9BACD6581204012D.png" title="MohamedOsama_5-1728465994298.png" alt="MohamedOsama_5-1728465994298.png"&gt;&lt;/p&gt; 
&lt;p&gt;Figure 4: Analysis of recaptcha-verify.html&lt;/p&gt; 
&lt;p&gt;In this blog, I will only leverage the landing page, &lt;strong&gt;index.html&lt;/strong&gt;, to execute a PowerShell command for downloading and invoking a malicious C2 Stager into a hidden spawned PowerShell process. The C2 chosen is &lt;a href="https://community.netwitness.com/t5/netwitness-community-blog/using-netwitness-to-detect-command-and-control-silenttrinity-c2/ba-p/701981"&gt;SilentTrinity&lt;/a&gt;, which was covered in detail in another blog post. This is just another PoC where a fileless technique can be leveraged to directly initiate a C2 communication with the threat actor, evading the detection of multiple EPP (Endpoint Protection Platform) and EDR (Endpoint Detection and Response) solutions.&lt;/p&gt; 
&lt;h2&gt;The Attack&lt;/h2&gt; 
&lt;p&gt;The attack unfolds as per below cyber kill chain.&lt;/p&gt; 
&lt;p&gt;&lt;img src="https://50269063.hs-sites.com/hubfs/Imported_Blog_Media/431657i0B61B2DD8CB77297.png" title="MohamedOsama_6-1728465994302.png" alt="MohamedOsama_6-1728465994302.png"&gt;&lt;/p&gt; 
&lt;p&gt;Figure 5: Cyber kill chain&lt;/p&gt; 
&lt;p&gt;The weaponization stage includes the attacker crafting a fake reCAPTCHA &lt;strong&gt;index.html&lt;/strong&gt; code through hardcoding a Base64 encoded PowerShell command, which downloads the SilentTrinity C2 &lt;strong&gt;stager.ps1&lt;/strong&gt; script and injects it in the memory of a hidden spawned PowerShell running process. Afterwards, the attacker creates suspicious websites redirecting to the malicious reCAPTCHA landing web page.&lt;/p&gt; 
&lt;p&gt;&lt;img src="https://50269063.hs-sites.com/hubfs/Imported_Blog_Media/431658i16F494A746BC7723.png" title="MohamedOsama_7-1728465994321.png" alt="MohamedOsama_7-1728465994321.png"&gt;&lt;/p&gt; 
&lt;p&gt;Figure 6: Customized index.html&lt;/p&gt; 
&lt;p&gt;The delivery method is favored by the attacker to be a phishing email tricking the user into clicking an inserted hyperlink towards the suspicious websites, thus assuring that the user will be prompted with the fake reCAPTCHA page.&lt;/p&gt; 
&lt;p&gt;The reCAPTCHA web page will appear normal to untrained eyes where it will instruct the user to paste some content into the Run prompt of the machine. We can also notice that the entered phrase looks typical to the one in the instructions.&lt;/p&gt; 
&lt;p&gt;&lt;img src="https://50269063.hs-sites.com/hubfs/Imported_Blog_Media/431659i162E1598EFC35B9C.png" title="MohamedOsama_8-1728465994327.png" alt="MohamedOsama_8-1728465994327.png"&gt;&lt;/p&gt; 
&lt;p&gt;Figure 7: reCAPTCHA verification steps&lt;/p&gt; 
&lt;p&gt;&amp;nbsp;&lt;/p&gt; 
&lt;p&gt;&lt;img src="https://50269063.hs-sites.com/hubfs/Imported_Blog_Media/431660iFF85ADCA91BEF2DF.png" title="MohamedOsama_9-1728465994331.png" alt="MohamedOsama_9-1728465994331.png"&gt;&lt;/p&gt; 
&lt;p&gt;Figure 8: Run prompt with reCAPTCHA lure message&lt;/p&gt; 
&lt;p&gt;&amp;nbsp;&lt;/p&gt; 
&lt;p&gt;However, scrolling backwards in the entered phrase shows the actual command preceding the lure verification message.&lt;/p&gt; 
&lt;p&gt;&lt;img src="https://50269063.hs-sites.com/hubfs/Imported_Blog_Media/431661i687FDD10411FA2DC.png" title="MohamedOsama_10-1728465994338.png" alt="MohamedOsama_10-1728465994338.png"&gt;&lt;/p&gt; 
&lt;p&gt;Figure 9: Hidden command preceding lure message&lt;/p&gt; 
&lt;p&gt;Once the user clicks OK, the C2 implant will be loaded and initiates a stealthy communication and beaconing with the C2 server.&lt;/p&gt; 
&lt;p&gt;&lt;img src="https://50269063.hs-sites.com/hubfs/Imported_Blog_Media/431663i4B58FC7F6BBC3F3E.png" title="MohamedOsama_11-1728465994350.png" alt="MohamedOsama_11-1728465994350.png"&gt;&lt;/p&gt; 
&lt;p&gt;Figure 10: C2 stager pulled from C2 attack server&lt;/p&gt; 
&lt;p&gt;&lt;img src="https://50269063.hs-sites.com/hubfs/Imported_Blog_Media/431662iD36A4BA1CD9B8A65.png" title="MohamedOsama_12-1728465994352.png" alt="MohamedOsama_12-1728465994352.png"&gt;&lt;/p&gt; 
&lt;p&gt;Figure 11: PowerShell checking in with C2 attack server&lt;/p&gt; 
&lt;p&gt;At this point, the threat actor acquired full remote control over this compromised machine, where some local system enumeration commands are fired however, the attack’s magnitude can vary depending on the level damage and impact the threat actor can induce on such compromised machine and corresponding corporate network.&lt;/p&gt; 
&lt;p&gt;&lt;img src="https://50269063.hs-sites.com/hubfs/Imported_Blog_Media/431664i0ACF1FFF52DB9B9E.png" title="MohamedOsama_13-1728465994386.png" alt="MohamedOsama_13-1728465994386.png"&gt;&lt;/p&gt; 
&lt;p&gt;Figure 12: System enumeration commands executed&lt;/p&gt; 
&lt;p&gt;&amp;nbsp;&lt;/p&gt; 
&lt;h2&gt;The&amp;nbsp;Detection&amp;nbsp;Using&amp;nbsp;Endpoint Telemetry Data&lt;/h2&gt; 
&lt;p&gt;From NetWitness Endpoint perspective and during frequent hunting activities, the analyst observed multiple behaviors of compromise (BOC) generated pointing to peculiar PowerShell executed.&lt;/p&gt; 
&lt;p&gt;&lt;img src="https://50269063.hs-sites.com/hubfs/Imported_Blog_Media/431666iFA0B873E237A534F.png" title="MohamedOsama_14-1728465994395.png" alt="MohamedOsama_14-1728465994395.png"&gt;&lt;/p&gt; 
&lt;p&gt;Figure 13: NetWitness Investigate page highlighting anomalous PowerShell activity&lt;/p&gt; 
&lt;p&gt;The analyst thoroughly checked the command line arguments and discovered multiple attempts to execute a PowerShell process with encoded command leveraging the below flags:&lt;/p&gt; 
&lt;ul&gt; 
 &lt;li&gt;&lt;strong&gt;-nop&lt;/strong&gt;: Does not load the Windows PowerShell profile&lt;/li&gt; 
 &lt;li&gt;&lt;strong&gt;-w hidden&lt;/strong&gt;: WindowStyle set to be hidden&lt;/li&gt; 
 &lt;li&gt;&lt;strong&gt;-ep bypass&lt;/strong&gt;: Temporarily bypass the execution policy and run scripts in a single PowerShell session&lt;/li&gt; 
 &lt;li&gt;&lt;strong&gt;-ec&lt;/strong&gt;: Accepts a base-64-encoded string version of a command.&lt;/li&gt; 
&lt;/ul&gt; 
&lt;p&gt;The analyst also notices a reCAPTCHA verification message following the executed commands.&lt;/p&gt; 
&lt;p&gt;&lt;img src="https://50269063.hs-sites.com/hubfs/Imported_Blog_Media/431665iB1ED4C30B1F4AFE4.png" title="MohamedOsama_15-1728465994404.png" alt="MohamedOsama_15-1728465994404.png"&gt;&lt;/p&gt; 
&lt;p&gt;Figure 14: Command line arguments executed by PowerShell&lt;/p&gt; 
&lt;p&gt;Focusing the analysis on spawned PowerShell processes leads to the discovery of multiple generated MITRE ATT&amp;amp;CK and NetWitness alerts.&lt;/p&gt; 
&lt;p&gt;&lt;img src="https://50269063.hs-sites.com/hubfs/Imported_Blog_Media/431667i5A5E5C16CF7597EA.png" title="MohamedOsama_16-1728465994418.png" alt="MohamedOsama_16-1728465994418.png"&gt;&lt;/p&gt; 
&lt;p&gt;Figure 15: MITRE ATT&amp;amp;CK and NetWitness alerts generated&lt;/p&gt; 
&lt;p&gt;The analysis continues to uncover PowerShell process map, where its parent process is identified to be &lt;strong&gt;explorer.exe&lt;/strong&gt;, a native Microsoft Windows corresponding to Windows GUI shell. NetWitness process map points out multiple child processes spawned by PowerShell, such as &lt;strong&gt;whoami&lt;/strong&gt; and &lt;strong&gt;netstat&lt;/strong&gt;.&lt;/p&gt; 
&lt;p&gt;&lt;img src="https://50269063.hs-sites.com/hubfs/Imported_Blog_Media/431668iD35C61B1E1FD002D.png" title="MohamedOsama_17-1728465994425.png" alt="MohamedOsama_17-1728465994425.png"&gt;&lt;/p&gt; 
&lt;p&gt;Figure 16: PowerShell process map&lt;/p&gt; 
&lt;h2&gt;Note&lt;/h2&gt; 
&lt;p&gt;As I did not utilize the second web page (reCAPTCHA-verify) of the used PoC in this attack scenario, it is not highlighted in the previous detection section. However, leveraging another web page or even &lt;strong&gt;mshta&lt;/strong&gt; to download malicious content on the victimized machine would be easily detected through the following Behavior of Compromise (BOC) populated values.&lt;/p&gt; 
&lt;p&gt;&lt;strong&gt;&lt;em&gt;boc = ‘lolbas initiates network connections’,’mshta runs powershell’&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt; 
&lt;p&gt;&lt;img src="https://50269063.hs-sites.com/hubfs/Imported_Blog_Media/431669iD2C630F85BC7F629.png" title="MohamedOsama_18-1728465994437.png" alt="MohamedOsama_18-1728465994437.png"&gt;&lt;/p&gt; 
&lt;p&gt;Figure 17: Suspicious mshta activity&lt;/p&gt; 
&lt;p&gt;&lt;img src="https://50269063.hs-sites.com/hubfs/Imported_Blog_Media/431670i26921208AC7D30D2.png" title="MohamedOsama_19-1728465994453.png" alt="MohamedOsama_19-1728465994453.png"&gt;&lt;/p&gt; 
&lt;p&gt;Figure 18: Command line argument executed by mshta&lt;/p&gt; 
&lt;p&gt;&lt;img src="https://50269063.hs-sites.com/hubfs/Imported_Blog_Media/431673iAA0C532E2F328CDB.png" title="MohamedOsama_20-1728465994460.png" alt="MohamedOsama_20-1728465994460.png"&gt;&lt;/p&gt; 
&lt;p&gt;Figure 19: Generated BOCs for mshta running PowerShell&lt;/p&gt; 
&lt;p&gt;&amp;nbsp;&lt;/p&gt; 
&lt;h2&gt;The&amp;nbsp;Detection&amp;nbsp;Using&amp;nbsp;Packet Data&lt;/h2&gt; 
&lt;p&gt;As the analysis continues, the analyst shifts the investigation towards the packet perspective, where the analyst discovers multiple anomalous HTTP protocol characteristics populating values under meta key &lt;strong&gt;analysis.service&lt;/strong&gt;. This is coupled with alarming MITRE ATT&amp;amp;CK techniques and tactics, along with non-standard TCP ports used in the communication.&lt;/p&gt; 
&lt;p&gt;&lt;img src="https://50269063.hs-sites.com/hubfs/Imported_Blog_Media/431671i43E9CB948E674B02.png" title="MohamedOsama_21-1728465994478.png" alt="MohamedOsama_21-1728465994478.png"&gt;&lt;/p&gt; 
&lt;p&gt;Figure 20: Peculiar HTTP communication over non-standard ports&lt;/p&gt; 
&lt;p&gt;The analyst took a deeper dive inside this communication, where hardcoded PowerShell command is discovered within an HTML file representing the server’s response.&lt;/p&gt; 
&lt;p&gt;&lt;img src="https://50269063.hs-sites.com/hubfs/Imported_Blog_Media/431672i1E8325085994B8E9.png" title="MohamedOsama_22-1728465994495.png" alt="MohamedOsama_22-1728465994495.png"&gt;&lt;/p&gt; 
&lt;p&gt;Figure 21: Raw packet analysis showing encoded PowerShell command&lt;/p&gt; 
&lt;p&gt;The analyst reconstructed the raw packet in its original form, a web page, and it was clearly a loaded reCAPTCHA page holding some strange instructions to follow.&lt;/p&gt; 
&lt;p&gt;&lt;img src="https://50269063.hs-sites.com/hubfs/Imported_Blog_Media/431674iBED9058B648851D7.png" title="MohamedOsama_23-1728465994504.png" alt="MohamedOsama_23-1728465994504.png"&gt;&lt;/p&gt; 
&lt;p&gt;Figure 22: reCAPTCHA web page reconstructed by NetWitness&lt;/p&gt; 
&lt;p&gt;Following the logical investigation stream, the analyst focused the analysis on all the communication between the possibly compromised machine and the anomalous web server simulating a reCAPTCHA web page. Accordingly, other indicators are surfaced leading to the discovery of SilentTrinity C2 as in below.&lt;/p&gt; 
&lt;p&gt;&lt;img src="https://50269063.hs-sites.com/hubfs/Imported_Blog_Media/431675i9DCA588A9C64DDAF.png" title="MohamedOsama_24-1728465994520.png" alt="MohamedOsama_24-1728465994520.png"&gt;&lt;/p&gt; 
&lt;p&gt;Figure 23: SilentTrinity IOCs generated by NetWitness&lt;/p&gt; 
&lt;p&gt;&lt;img src="https://50269063.hs-sites.com/hubfs/Imported_Blog_Media/431676iE467B2FE3A366B01.png" title="MohamedOsama_25-1728465994529.png" alt="MohamedOsama_25-1728465994529.png"&gt;&lt;/p&gt; 
&lt;p&gt;Figure 24: C2 stager GET request by the victim machine&lt;/p&gt; 
&lt;p&gt;&lt;img src="https://50269063.hs-sites.com/hubfs/Imported_Blog_Media/431678i0BCC2E07D8955A48.png" title="MohamedOsama_26-1728465994545.png" alt="MohamedOsama_26-1728465994545.png"&gt;&lt;/p&gt; 
&lt;p&gt;Figure 25: C2 Beaconing and Communication&lt;/p&gt; 
&lt;h2&gt;Note&lt;/h2&gt; 
&lt;p&gt;For building up a detection rule to trigger upon the discovery of plaintext keywords within a raw packet (ex: HTML page), NetWitness &lt;a href="https://community.netwitness.com/s/article/ManageSearchPatternRules"&gt;Search Pattern&lt;/a&gt; rule can be easily leveraged. However, if NetWitness Packets is on version 12.3 or earlier, then a possible workaround is to leverage the built-in native SEARCH parser, which can be enabled from NetWitness Decoder config page, it loads its configuration from &lt;strong&gt;search.ini&lt;/strong&gt; file under the same config page of the decoder.&lt;/p&gt; 
&lt;p&gt;&lt;img src="https://50269063.hs-sites.com/hubfs/Imported_Blog_Media/431677i357BD929B190CB3D.png" title="MohamedOsama_27-1728465994547.png" alt="MohamedOsama_27-1728465994547.png"&gt;&lt;/p&gt; 
&lt;p&gt;Figure 26: Native SEARCH parser&lt;/p&gt; 
&lt;p&gt;The below lines can be added to &lt;strong&gt;search.ini&lt;/strong&gt; file as in below.&lt;/p&gt; 
&lt;p&gt;&lt;strong&gt;&lt;em&gt;[reCAPTCHA_Detected]&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt; 
&lt;p&gt;&lt;strong&gt;&lt;em&gt;Services=80;8080;8000&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt; 
&lt;p&gt;&lt;strong&gt;&lt;em&gt;Keywords= reCAPTCHA ;Captcha ;textToCopy ;copy ;commandToRun ;powershell&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt; 
&lt;p&gt;&lt;strong&gt;&lt;em&gt;Case=0&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt; 
&lt;p&gt;&lt;strong&gt;&lt;em&gt;[execCommand_JavaScript_Method_Detected]&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt; 
&lt;p&gt;&lt;strong&gt;&lt;em&gt;Services=80;8080;8000&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt; 
&lt;p&gt;&lt;strong&gt;&lt;em&gt;Keywords= document.execCommand&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt; 
&lt;p&gt;&lt;strong&gt;&lt;em&gt;Case=0&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt; 
&lt;p&gt;&lt;img src="https://50269063.hs-sites.com/hubfs/Imported_Blog_Media/431679iB590EA5C25615256.png" title="MohamedOsama_28-1728465994561.png" alt="MohamedOsama_28-1728465994561.png"&gt;&lt;/p&gt; 
&lt;p&gt;Figure 27: Customized search.ini file&lt;/p&gt; 
&lt;p&gt;The logic of the above configuration lines is to look for specific keywords, such as &lt;strong&gt;document.execCommand&lt;/strong&gt; (JavaScript method) among other keywords, which would be possibly alarming if discovered. Decoder’s parsers need to be reloaded afterwards, from Decoder’s explore page.&lt;/p&gt; 
&lt;p&gt;&lt;img src="https://50269063.hs-sites.com/hubfs/Imported_Blog_Media/431680iA8F97C9C7F64BEF9.png" title="MohamedOsama_29-1728465994565.png" alt="MohamedOsama_29-1728465994565.png"&gt;&lt;/p&gt; 
&lt;p&gt;Figure 28: Parser's reload signal&lt;/p&gt; 
&lt;p&gt;Afterwards, an Application rule can be created to alert on Indicators of Compromise (IOC) meta key.&lt;/p&gt; 
&lt;p&gt;&lt;img src="https://50269063.hs-sites.com/hubfs/Imported_Blog_Media/431681i9ABFE0C1D310A3FF.png" title="MohamedOsama_30-1728465994570.png" alt="MohamedOsama_30-1728465994570.png"&gt;&lt;/p&gt; 
&lt;p&gt;Figure 29: reCAPTCHA Application rule condition&lt;/p&gt; 
&lt;p&gt;&amp;nbsp;&lt;/p&gt; 
&lt;p&gt;At this point, if a raw packet is exposing keywords as configured, NetWitness would alert as below.&lt;/p&gt; 
&lt;p&gt;&lt;img src="https://50269063.hs-sites.com/hubfs/Imported_Blog_Media/431682i2E121FA78B506E48.png" title="MohamedOsama_31-1728465994576.png" alt="MohamedOsama_31-1728465994576.png"&gt;&lt;/p&gt; 
&lt;p&gt;Figure 30: reCAPTCHA application rule triggered&lt;/p&gt; 
&lt;h2&gt;Investigation&lt;/h2&gt; 
&lt;p&gt;At this moment of the analysis, the analyst should be able to quickly triage the compromised machine. Multiple approaches can be applied. One of the most optimal ones is to analyze the &lt;strong&gt;RunMRU&lt;/strong&gt; (Run Most Recently Used) registry hive, which is populated when a user enters a command into the START &amp;gt; Run prompt. Entries will be logged in the user hive under this path.&lt;/p&gt; 
&lt;p&gt;&lt;strong&gt;&lt;em&gt;Software\Microsoft\Windows\CurrentVersion\Explorer\RunMRU&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt; 
&lt;p&gt;Based on the below collected artifact, the analyst identifies an encoded PowerShell command executed in the Run prompt of this specific user. This confirmed that the victimized user followed the reCAPTCHA malicious instructions.&lt;/p&gt; 
&lt;p&gt;&lt;img src="https://50269063.hs-sites.com/hubfs/Imported_Blog_Media/431685iFD4374FCFFBCC6C5.png" title="MohamedOsama_32-1728465994585.png" alt="MohamedOsama_32-1728465994585.png"&gt;&lt;/p&gt; 
&lt;p&gt;Figure 31: Analysis of RunMRU registry hive&lt;/p&gt; 
&lt;p&gt;Accordingly, another approach that could be extremely useful during lite forensics phase is to acquire the PowerShell’s process memory and pinpoint injected malicious code.&lt;/p&gt; 
&lt;p&gt;&lt;img src="https://50269063.hs-sites.com/hubfs/Imported_Blog_Media/431684i7F215F0015C0FC71.png" title="MohamedOsama_33-1728465994592.png" alt="MohamedOsama_33-1728465994592.png"&gt;&lt;/p&gt; 
&lt;p&gt;Figure 32: PowerShell memory dump analysis showing executed command&lt;/p&gt; 
&lt;p&gt;&lt;img src="https://50269063.hs-sites.com/hubfs/Imported_Blog_Media/431683iB7DE7347C6E1BD12.png" title="MohamedOsama_34-1728465994598.png" alt="MohamedOsama_34-1728465994598.png"&gt;&lt;/p&gt; 
&lt;p&gt;Figure 33: Whoami command captured in the analyzed PowerShell process memory&lt;/p&gt; 
&lt;p&gt;&lt;img src="https://50269063.hs-sites.com/hubfs/Imported_Blog_Media/431686iAC1905733F340615.png" title="MohamedOsama_35-1728465994601.png" alt="MohamedOsama_35-1728465994601.png"&gt;&lt;/p&gt; 
&lt;p&gt;Figure 34: Abstract of the injected C2 PowerShell script into the process' memory&lt;/p&gt; 
&lt;h2&gt;Conclusion&lt;/h2&gt; 
&lt;p&gt;Cybersecurity awareness is a fundamental component of an organization's security posture, as even the most robust technical defenses can be undermined by an uninformed employee making a simple mistake. Innocent actions, such as clicking on a phishing link or unknowingly executing malicious code from a fake reCAPTCHA page, can lead to critical breaches, allowing attackers to bypass security controls and infiltrate the network. This underscores the importance of continuous security training for all staff, combined with the implementation of advanced detection and response technologies like Network Detection and Response (NDR), Endpoint Detection and Response (EDR), and Security Information and Event Management (SIEM). These technologies work together to monitor and detect suspicious activity, provide visibility across the network, and enable swift incident response, ensuring that human error is mitigated by layered defenses and proactive security measures.&lt;a href="#_ftnref1"&gt;&lt;/a&gt;&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=50269063&amp;amp;k=14&amp;amp;r=https%3A%2F%2F50269063.hs-sites.com%2Fnetwitness-security-llc-blog%2Fusingnetwitnesstodetectphishingrecaptchacampaign&amp;amp;bu=https%253A%252F%252F50269063.hs-sites.com%252Fnetwitness-security-llc-blog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <pubDate>Wed, 16 Oct 2024 04:00:00 GMT</pubDate>
      <guid>https://50269063.hs-sites.com/netwitness-security-llc-blog/usingnetwitnesstodetectphishingrecaptchacampaign</guid>
      <dc:date>2024-10-16T04:00:00Z</dc:date>
      <dc:creator>Admin</dc:creator>
    </item>
    <item>
      <title>Netwitness Platform Integration with Amazon Elastic Kubernetes Service</title>
      <link>https://50269063.hs-sites.com/netwitness-security-llc-blog/netwitnessplatformintegrationwithamazonelastickubernetesservice</link>
      <description>&lt;p&gt;&lt;strong&gt;Kubernetes:&lt;/strong&gt;&lt;/p&gt;</description>
      <content:encoded>&lt;p&gt;&lt;strong&gt;Kubernetes:&lt;/strong&gt;&lt;/p&gt; 
&lt;p&gt;Kubernetes is an open-source system that helps us to run and management of containerized applications and workloads. It is a distributed system consisting a cluster of control plane nodes and worker nodes. The&amp;nbsp;worker nodes host the&amp;nbsp;Pods that are the components of the application workload. The control plane manages each node in the cluster.&lt;/p&gt; 
&lt;p&gt;&lt;strong&gt;Components of a Node:&lt;/strong&gt;&lt;/p&gt; 
&lt;ul&gt; 
 &lt;li&gt;kubelet: It is an agent node that runs on each node in a cluster and communicates with control plane. It runs health checks and reports them.&lt;/li&gt; 
 &lt;li&gt;container runtime: It is a software that helps run the containers.&lt;/li&gt; 
 &lt;li&gt;kube-proxy: It is an agent that translates service object to network rules in the nodes.&lt;/li&gt; 
&lt;/ul&gt; 
&lt;p&gt;&lt;strong&gt;Components of Control plane:&lt;/strong&gt;&lt;/p&gt; 
&lt;ul&gt; 
 &lt;li&gt;kube-apiserver: It is the front-end component of control plane that exposes the Kubernetes API.&lt;/li&gt; 
 &lt;li&gt;kube-scheduler: It watches each pod and makes sure it is assigned to a node.&lt;/li&gt; 
 &lt;li&gt;kube-controller-manager: It is a control plane component that runs all control processes like node controller, job controller, Service Account controller and EndpointSlice controller.&lt;/li&gt; 
 &lt;li&gt;cloud-controller-manager: This is a component that runs controller processes that are only specific to cloud provider like&amp;nbsp;checking the cloud provider to determine if a node has been deleted in the cloud after it stops responding (node controller) or setting up routes in the underlying cloud infrastructure (route controller) or&amp;nbsp;creating, updating and deleting cloud provider load balancers (service controller)&lt;/li&gt; 
 &lt;li&gt;etcd: It is a key-value data store to store all critical information throughout the cluster.&lt;/li&gt; 
&lt;/ul&gt; 
&lt;p&gt;&lt;strong&gt;Amazon Elastic Kubernetes Service&lt;/strong&gt; (Amazon EKS) is a managed service that makes it easy for you to run Kubernetes on Amazon Web Services.&amp;nbsp;Amazon EKS ensures every cluster has its own unique Kubernetes control plane to avoid overlaps of cluster or aws accounts. The Amazon EKS architecture can be referred here:&amp;nbsp;&lt;a href="https://docs.aws.amazon.com/eks/latest/userguide/eks-architecture.html"&gt;Amazon EKS architecture - Amazon EKS&lt;/a&gt;&lt;/p&gt; 
&lt;p&gt;Amazon EKS provides built-in tools for logging. The EKS audit and diagnostic of control plane can be forwarded to Amazon CloudWatch and these logs are sent as log streams to a group for each Amazon EKS cluster in CloudWatch.&lt;/p&gt; 
&lt;p&gt;For configuring logging to CloudWatch refer:&amp;nbsp;&lt;a href="https://docs.aws.amazon.com/eks/latest/userguide/control-plane-logs.html"&gt;https://docs.aws.amazon.com/eks/latest/userguide/control-plane-logs.html&lt;/a&gt;&amp;nbsp;&lt;/p&gt; 
&lt;p&gt;&lt;strong&gt;Netwitness Platform&lt;/strong&gt; now has integrated the Amazon EKS control plane logs with Amazon CloudWatch plugin.&lt;/p&gt; 
&lt;p&gt;&lt;img src="https://50269063.hs-sites.com/hs-fs/hubfs/Imported_Blog_Media/430542i9B8DFA103AA07F93.png?width=673&amp;amp;height=483&amp;amp;name=430542i9B8DFA103AA07F93.png" width="673" height="483" title="RachanaSR_0-1723041623045.png" alt="RachanaSR_0-1723041623045.png"&gt;&lt;/p&gt; 
&lt;p&gt;To take advantage of this new capability within RSA NetWitness, please visit the link below and search for the terms below in RSA Live.&lt;br&gt;&lt;strong&gt;Configuration Guide:&amp;nbsp;&lt;/strong&gt;&lt;a href="https://community.netwitness.com/s/article/AWSCloudWatchEventSourceLogConfigurationGuide"&gt;https://community.netwitness.com/s/article/AWSCloudWatchEventSourceLogConfigurationGuide&lt;/a&gt;&amp;nbsp;&lt;br&gt;&lt;strong&gt;Collector Package on RSA Live:&lt;/strong&gt;&amp;nbsp;"Log Collector configuration content for event source Amazon CloudWatch"&lt;br&gt;&lt;strong&gt;Parser on RSA Live&lt;/strong&gt;: Kubernetes&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=50269063&amp;amp;k=14&amp;amp;r=https%3A%2F%2F50269063.hs-sites.com%2Fnetwitness-security-llc-blog%2Fnetwitnessplatformintegrationwithamazonelastickubernetesservice&amp;amp;bu=https%253A%252F%252F50269063.hs-sites.com%252Fnetwitness-security-llc-blog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <pubDate>Wed, 07 Aug 2024 04:00:00 GMT</pubDate>
      <guid>https://50269063.hs-sites.com/netwitness-security-llc-blog/netwitnessplatformintegrationwithamazonelastickubernetesservice</guid>
      <dc:date>2024-08-07T04:00:00Z</dc:date>
      <dc:creator>Admin</dc:creator>
    </item>
  </channel>
</rss>
