Topline Takeaways
- Industry target: Technology
- Attacker methods:
- Multiple scheduled tasks: “Apple Sync,” “Google Disk Sync,” “Google Photo Sync,” “Security Update”
- SSH port forwarding
- Encoded PowerShell
- Recommended mitigations:
- Employ least privilege access control.
- Ensure the operating system is configured securely.
- Regularly audit both the environment and endpoints.
Incident Timeline for 2024-09-18
Blackpoint’s MDR technology alerted our Active SOC to encoded PowerShell and SSH port forwarding on the host of a technology partner. Initial investigation tied these alerts to multiple scheduled tasks running on the host, including “Apple Sync,” “Google Disk Sync,” “Google Photo Sync,” and “Security Update.”
Further analysis revealed these tasks installed, started, and disabled OpenSSH, enabling SSH port forwarding. Blackpoint’s SOC analysts isolated the device, deleted the scheduled tasks, and found no signs of lateral movement or additional malicious activity.
More About Malicious Use of Scheduled Tasks
Scheduled tasks allow administrators to automate maintenance but have been historically exploited by threat actors to maintain persistence. These tasks blend in with normal traffic and allow attackers to execute malicious code undetected.
In this case, the “Apple Sync” task was tied to SSH port forwarding, while the “Google Disk Sync” and “Google Photo Sync” tasks executed encoded PowerShell that called out to a C2 domain linked to Cobalt Strike campaigns. “Security Update” allowed these tasks to run by installing OpenSSH.
APG Threat Analysis for Scheduled Tasks
Blackpoint’s Adversary Pursuit Group (APG) predicts the continued use of scheduled tasks by threat actors for persistence in 2024, as observed in similar incidents involving our partners in Industrials on August 21, 2024, and Technology on June 9, 2024. External reports further reinforce this trend, with threat actors like Fox Kitten leveraging scheduled tasks for ransomware attacks.
Mitigations
- Least Privilege Access Control: Limit user access to the necessary resources to reduce lateral movement.
- Audit Environment: Regularly review scheduled tasks and system configurations for anomalies.
- Ensure OS Configurations: Force tasks to run under authenticated user accounts rather than the system to avoid privilege escalation.