Topline Takeaways
- Industry target: Real Estate
- Blackpoint SOC actions:
- Isolated impacted devices
- Contacted partner
- Attacker methods:
- RDP
- Scheduled tasks
- Rclone
- Recommended mitigations:
- Enforce multi-factor authentication (MFA) on all user accounts.
- Regularly audit both the environment and endpoints.
- Create and implement an Incident Response Plan (IRP).
Incident Timeline for 2024-11-05
Blackpoint’s MDR technology alerted to potential lateral spread and policy violations on a host of a real estate partner. Blackpoint’s SOC isolated all affected devices to prevent further activity, the incident resulted in five isolated devices and prevention of any malware deployment.
Initial investigation of the host revealed that a user executed privileged commands, which included disabling Windows firewall for all network profiles as well as modifying Windows Registry Keys to enable RDP connection. Additionally, Blackpoint’s SOC identified a publicly access SSL VPN instance.
Further investigation revealed suspicious Rclone (rclone.exe) execution on other hosts within the environment, indicating that the threat actor was likely attempting to exfiltrate data.
Based on the observed activity, Blackpoint’s APG and SOC assess this incident was likely related to ransomware activity.
More About Rclone
Rclone is a command-line program designed to allow users to manage files on cloud storage. Threat actors likely find Rclone an attractive option for data exfiltration due to its fast data transfer capabilities and the ability to integrate with multiple cloud services and protocols.
Rclone is efficient for large data exfiltration efforts and the legitimate use of the tool allows threat actors to blend in to “normal” traffic and evade detection. Blackpoint’s APG has tracked at least 13 ransomware operations that have been reported to rely on Rclone for data exfiltration.
APG Threat Analysis for Rclone
APG predicts continued use of legitimate tools, like Rclone, for data exfiltration activities over the next 12 months. This assessment is supported by multiple external reports of threat actors’ use of Rclone, including a ReliaQuest report indicating that Rclone is the most popular exfiltration tool used by threat actors in ReliaQuest-observed incidents.
Mitigations
- MFA on All Accounts: Enforcing MFA can prevent attackers from exploiting compromised credentials.
- Audit Environment: Regularly review scheduled tasks and system configurations for anomalies.
- Incident Response Plan: Ensure proper IRPs are in place in the event of an incident to ensure business continuity.