Topline Takeaways
- Industry target: Industrials
- Attacker information:
- PCHunter64.exe
- FileZilla
- Remote desktop protocol (RDP)
- AV and / or EDR present in environment? Yes
- Threat assessment for partners:
- The APG predicts that it is very likely that threat actors will continue to use legitimate, allowlisted Windows tools to exploit other industrials organizations over the next 12 months.
- Recommended remediations and mitigations:
- Least-privilege access controls
- Zero trust network architecture
- Regularly audit both environment and endpoints
PCHunter Incident Timeline for April 22, 2024
- 11:55 p.m. ET: Blackpoint’s MDR alerted to an industrial end client’s security product blocking the hacking tool “PCHunter64.exe” running from the unusual location of “C:\PerfLogs”.
- 11:58 p.m. ET: An MDR analyst began initial triage and investigation, during which six additional impacted devices are discovered. The investigation also discovered share mount failures of ADMIN$ by two separate user accounts on a single machine and infecting several other machines, as well as other indicators of compromise (IoCs), including the threat actor’s use of:
- FileZilla
- MASSCAN
- PowerTool
- AnyDesk
- RDP for inter-machine network connections
- 11:58 p.m. ET: The analyst escalated the incident to senior SOC leadership.
- 12:02 a.m. ET: The senior SOC analyst isolated all seven impacted endpoints from all external and internal communications.
- 12:11 a.m. ET: The SOC made contact with the partner about the incident and provided additional remediation advice.
More About Abuse of Legitimate Windows Tools and Processes: PC Hunter, MASSCAN, AnyDesk, and RDP
PC Hunter
PC Hunter is a toolkit with access to hundreds of settings including kernels, kernel modules, processes, network, startup, and more (7).
When abused, this tool can allow threat actors to effectively access sensitive processes, collect system information, and terminate security software.
FileZilla
FileZilla is a free file transfer protocol (FTP) software that can be used to manage website files, upload and download files, backup data, and transfer files between local and remote servers (8).
FileZilla is often abused by threat actor to exfiltrate sensitive data from victim environments. This data can later be sold on cybercriminal markets, held for extortion purposes, and used to conduct future cyberattacks.
The APG has previously tracked ransomware operators that have been observed using FileZilla to aid in exfiltration operations, including Akira (9), Trigona, Mallox, LockBit (10), Karakurt Hacking Team, and AvosLocker(11).
MASSCAN
MASSCAN is a TCP port scanner that transmits SYN packets asynchronously and produces results similar to nmap (12).
MASSCAN can be abused by threat actors to identify running application and services on remote open ports. The Akira ransomware operation has previously deployed MASSCAN to discover additional remote system targets (13).
AnyDesk
AnyDesk is a legitimate and popular remote monitoring and management (RMM) tool used to remotely access and manage devices within an organization’s environment… and is often exploited by threat actors during cyberattacks.
The APG has identified 17 ransomware operators that have utilized the AnyDesk RMM tool during cyberattacks.
Ironically, not only do threat actors abuse legitimate tools such as AnyDesk to conduct attacks, but they also occasionally target them, as well. In January 2024, AnyDesk was targeted for its own cyberattack demonstrating the double-edged efficacy of RMM tools in MSP and organizational environments for sysadmins and threat actors alike (14).
RDP
RDP is a network communications protocol built into enterprise and pro versions of Windows. It is used for remote access to physical work devices, particularly for technicians to perform remote administrative work.
However, just like AnyDesk and RMM tools, threat actors abuse RDP for their own unauthorized remote access onto organizational devices (15).
RDP can be targeted for initial access via brute force, misconfigurations, vulnerabilities, and exposed instances. Threats also achieve persistence using RDP, as the protocol is a legitimate and pre-installed Windows function that better blends in with legitimate traffic. Finally, RDP facilitates lateral movement, as its entire purpose is to allow (authorized) access to remote devices.
The APG has identified 29 ransomware operations that have previously targeted or used RDP during cyberattacks, including:
- LockBit
- Black Basta
- ALPHV / BlackCat
APG Threat Analysis of Abuse of Legitimate Windows Tools and Processes for 2024
The APG predicts that threat actors will very likely continue to abuse legitimate Windows tools and processes – particularly RMM and other remote management and access tools – over the next 12 months.
We base this assessment in part on broader industry research, trends, and advisories.
Specifically, U.S. CISA previously released guidance on RMM software, warning of threat actors’ use of these legitimate tools for initial access, persistence, and lateral movement.
Additionally, the APG frequently observes threat actors’ continued attempted abuse of RMM tools during cyberattacks within SOC incidents and secured environments. While these tools are useful, RMMs and similar remote management tools present a tremendous amount of risk to MSPs and other partner organizations, as already-established tools for lateral movement make attractive targets for threat actors attempting to remain undetected by AV or EDR solutions.
Recommended Legitimate Windows Tools Abuse Mitigations and Remediations
The APG recommends the following actions to help mitigate the use of legitimate tools for malicious purposes by threat actors:
- Implement least-privilege access controls wherever possible, to quarantine even previously unknown compromised users to a limited set of applications and endpoints. The fewer things users have even passive access to that are not necessary for daily operations, the less likely a threat actor can find an easy point to hop from one device to another.
- Adopt a zero trust strategic security philosophy, which assumes that all requests to each resource is malicious until otherwise proven by credentials, authorizations, and other checks – even if the request comes from a previously acceptable and cleared source. (Ask every time it’s feasible to do so!)
- Regularly audit both environment and endpoints for malingering credentials and authorizations that may no longer be needed, as well as ensuring that all technical and administrative controls are in place and effective throughout the organization. A policy is only as effective as how well it’s followed and enforced within your environment!