TTPwire Vol. 1 · MITRE ATT&CK·Tagged

← All stories

Black Hills InfoSec

Ssh… Don’t Tell Them I Am Not HTTPS: How Attackers Use SSH.exe as a Backdoor Into Your Network

Kassie Kimball · 2023-03-21 · Read original ↗

ATT&CK techniques detected

5 predictions
T1021.004SSH
94%
“##s. there were fraudulent purchases made on personal accounts from their work system when they were not at work at the time. when initially investigating, the client determined that there were remote desktop protocol ( rdp ) connections from their domain controllers to the endpo…”
T1021.004SSH
85%
“. threat actors know its power and versatility too. it is more capable than just logging in to a remote server and interactively running commands. take the command we found during this incident investigation for example : ssh. exe [ email protected ] - f - n - r 50000 - p 443 - o…”
T1021.004SSH
79%
“at all of the known _ hosts files in the environment. when ssh connects to a host on a port that is not tcp 22, it will put brackets around the host name. in most environments, brackets in a known _ hosts file should be considered suspicious. please note : the screenshot above is…”
T1572Protocol Tunneling
66%
“. threat actors know its power and versatility too. it is more capable than just logging in to a remote server and interactively running commands. take the command we found during this incident investigation for example : ssh. exe [ email protected ] - f - n - r 50000 - p 443 - o…”
T1098.004SSH Authorized Keys
47%
“##s. there were fraudulent purchases made on personal accounts from their work system when they were not at work at the time. when initially investigating, the client determined that there were remote desktop protocol ( rdp ) connections from their domain controllers to the endpo…”

Summary

Derek Banks // Living Off the Land Binaries, Scripts, and Libraries, known as LOLBins or LOLBAS, are legitimate components of an operating system that threat actors can use to achieve […]

The post Ssh… Don’t Tell Them I Am Not HTTPS: How Attackers Use SSH.exe as a Backdoor Into Your Network appeared first on Black Hills Information Security, Inc..