Topline Takeaways
- Industry target: Government
- Blackpoint SOC actions:
- Isolated impacted devices
- Contacted partner
- Attacker Information:
- TeamViewer
- Remote desktop protocol (RDP)
- Publicly accessible virtual private network (VPN) portal
- Recommended mitigations:
- Provide a dedicated software center.
- Implement application controls.
- Regularly audit both environment and endpoints.
Incident Timeline for 2024-11-11
Blackpoint’s MDR technology alerted our Active SOC to an RDP login from an unmonitored device for a user with a government partner to a monitored device. The threat actor then attempted to run the remote monitoring and management (RMM) tool TeamViewer; however, the activity was blocked by Managed Application Control (MAC).
Additional investigation revealed the threat actor attempted enumeration activity by using the Windows tool, net.exe, to query the local administrator group and user information. A review of the environment revealed a publicly accessible VPN portal, there is an even chance this was the initial access vector abused by the threat actor.
Due to the suspicious activity, including a lack of RDP activity from the observed user over the previous six months, Blackpoint’s SOC isolated all affected devices and reached out to the partner to provide information related to the incident.
More About TeamViewer
TeamViewer is a remote access and control software that allows users to connect to and control other computers and devices. TeamViewer is a legitimate tool used by organizations as it is capable of assisting with:
- Asset management
- Device monitoring; and
- Endpoint protection
Threat actors often find this type of tool attractive target and tool to use during cyberattacks due to the wide availability, ability to establish persistence, and the potential for blending into normal traffic.
APG Threat Analysis for TeamViewer
Blackpoint’s Adversary Pursuit Group (APG) predicts the continued use of legitimate RMM tools for persistent access to compromised devices over the next 12 months.
Blackpoint’s APG has identified at least four ransomware operations and five threat groups that have been reported to use TeamViewer in publicly reported incidents.
This assessment is supported by Blackpoint observed incidents, such as the August 30, 2024 incident impacting a healthcare partner, and external reporting detailing the use or targeting of RMM tools, including a June 2024 report of Russia-linked APT29 cyberattack targeting TeamViewer.
Mitigations
- Dedicated Software Center: Ensure employees only download software from monitored, approved sources.
- Implement Managed Application Control (MAC) for continuous monitoring and blocking of unapproved software.
- Regularly audit both environment and endpoints to identify potential rogue applications and potential old/unused accounts that should be removed.