Adversaries may attempt to get a listing of services running on remote hosts and local network infrastructure devices, including those that may be vulnerable to remote software exploitation. Common methods to acquire this information include port and/or vulnerability scans using tools that are brought onto a system.[1]
Within cloud environments, adversaries may attempt to discover services running on other cloud hosts. Additionally, if the cloud environment is connected to a on-premises environment, adversaries may be able to identify services running on non-cloud systems as well.
Within macOS environments, adversaries may use the native Bonjour application to discover services running on other macOS hosts within a network. The Bonjour mDNSResponder daemon automatically registers and advertises a host’s registered services on the network. For example, adversaries can use a mDNS query (such as dns-sd -B _ssh._tcp .
) to find other systems broadcasting the ssh service.[2][3]
ID | Name | Description |
---|---|---|
G1030 | Agrius |
Agrius used the open-source port scanner |
G0050 | APT32 |
APT32 performed network scanning on the network to search for open ports, services, OS finger-printing, and other vulnerabilities.[5] |
G0087 | APT39 |
APT39 has used CrackMapExec and a custom port scanner known as BLUETORCH for network scanning.[6][7] |
G0096 | APT41 |
APT41 used a malware variant called WIDETONE to conduct port scans on specified subnets.[8] |
S0093 | Backdoor.Oldrea |
Backdoor.Oldrea can use a network scanning module to identify ICS-related ports.[9] |
G0135 | BackdoorDiplomacy |
BackdoorDiplomacy has used SMBTouch, a vulnerability scanner, to determine whether a target is vulnerable to EternalBlue malware.[10] |
S1081 | BADHATCH |
BADHATCH can check for open ports on a computer by establishing a TCP connection.[11] |
S0089 | BlackEnergy |
BlackEnergy has conducted port scans on a host.[12] |
G0098 | BlackTech |
BlackTech has used the SNScan tool to find other potential targets on victim networks.[13] |
S1063 | Brute Ratel C4 |
Brute Ratel C4 can conduct port scanning against targeted systems.[14] |
C0018 | C0018 |
During C0018, the threat actors used the SoftPerfect Network Scanner for network scanning.[15] |
C0027 | C0027 |
During C0027, used RustScan to scan for open ports on targeted ESXi appliances.[16] |
S0572 | Caterpillar WebShell |
Caterpillar WebShell has a module to use a port scanner on a system.[17] |
G0114 | Chimera |
Chimera has used the |
S0020 | China Chopper |
China Chopper's server component can spider authentication portals.[19] |
G0080 | Cobalt Group |
Cobalt Group leveraged an open-source tool called SoftPerfect Network Scanner to perform network scanning.[20][21][22] |
S0154 | Cobalt Strike |
Cobalt Strike can perform port scans from an infected host.[23][24][25] |
S0608 | Conficker | |
C0004 | CostaRicto |
During CostaRicto, the threat actors employed nmap and pscan to scan target environments.[27] |
G0105 | DarkVishnya |
DarkVishnya performed port scanning to obtain the list of active services.[28] |
G1003 | Ember Bear |
Ember Bear has used tools such as NMAP for remote system discovery and enumeration in victim environments.[29] |
S0363 | Empire | |
G1016 | FIN13 |
FIN13 has utilized |
G0037 | FIN6 |
FIN6 used publicly available tools (including Microsoft's built-in SQL querying tool, osql.exe) to map the internal network and conduct reconnaissance against Active Directory, Structured Query Language (SQL) servers, and NetBIOS.[33] |
G0117 | Fox Kitten |
Fox Kitten has used tools including NMAP to conduct broad scanning to identify open ports.[34][35] |
S1144 | FRP |
As part of load balancing FRP can set |
S0061 | HDoor | |
S0698 | HermeticWizard |
HermeticWizard has the ability to scan ports on a compromised network.[38] |
S0601 | Hildegard |
Hildegard has used masscan to look for kubelets in the internal Kubernetes network.[39] |
C0038 | HomeLand Justice |
During HomeLand Justice, threat actors executed the Advanced Port Scanner tool on compromised systems.[40][41] |
G1032 | INC Ransom |
INC Ransom has used NETSCAN.EXE for internal reconnaissance.[42][43] |
S0604 | Industroyer |
Industroyer uses a custom port scanner to map out a network.[44] |
S0260 | InvisiMole |
InvisiMole can scan the network for open ports and vulnerable instances of RDP and SMB protocols.[45] |
S0250 | Koadic |
Koadic can scan for open TCP ports on the target network.[46] |
G0032 | Lazarus Group |
Lazarus Group has used nmap from a router VM to scan ports on systems within the restricted segment of an enterprise network.[47] |
G0077 | Leafminer |
Leafminer scanned network services to search for vulnerabilities in the victim system.[48] |
S0532 | Lucifer |
Lucifer can scan for open ports including TCP ports 135 and 1433.[49] |
G0059 | Magic Hound |
Magic Hound has used KPortScan 3.0 to perform SMB, RDP, and LDAP scanning.[50] |
G0045 | menuPass |
menuPass has used tcping.exe, similar to Ping, to probe port status on systems of interest.[51] |
S1146 | MgBot |
MgBot includes modules for performing HTTP and server service scans.[52] |
S0233 | MURKYTOP |
MURKYTOP has the capability to scan for open ports on hosts in a connected network.[19] |
G0019 | Naikon |
Naikon has used the LadonGo scanner to scan target networks.[53] |
S0590 | NBTscan | |
G0049 | OilRig |
OilRig has used the publicly available tool SoftPerfect Network Scanner as well as a custom tool called GOLDIRONY to conduct network scanning.[56] |
C0014 | Operation Wocao |
During Operation Wocao, threat actors scanned for open ports and used nbtscan to find NETBIOS nameservers.[57] |
S0598 | P.A.S. Webshell |
P.A.S. Webshell can scan networks for open ports and listening services.[58] |
S0683 | Peirates |
Peirates can initiate a port scan against a given IP address.[59] |
S0378 | PoshC2 | |
S0192 | Pupy | |
S0583 | Pysa |
Pysa can perform network reconnaissance using the Advanced Port Scanner tool.[62] |
S0458 | Ramsay |
Ramsay can scan for systems that are vulnerable to the EternalBlue exploit.[63][64] |
G1039 | RedCurl | |
S0125 | Remsec |
Remsec has a plugin that can perform ARP scanning as well as port scanning.[66] |
G0106 | Rocke |
Rocke conducted scanning for exposed TCP port 7001 as well as SSH and Redis servers.[67][68] |
S1073 | Royal |
Royal can scan the network interfaces of targeted systems.[69] |
S0692 | SILENTTRINITY |
SILENTTRINITY can scan for open ports on a compromised machine.[70] |
S0374 | SpeakUp |
SpeakUp checks for availability of specific ports on servers.[71] |
G0039 | Suckfly |
Suckfly the victim's internal network for hosts with ports 8080, 5900, and 40 open.[72] |
G0139 | TeamTNT |
TeamTNT has used masscan to search for open Docker API ports and Kubernetes clusters.[73][39][74] TeamTNT has also used malware that utilizes zmap and zgrab to search for vulnerable services in cloud environments.[75] |
G0027 | Threat Group-3390 |
Threat Group-3390 actors use the Hunter tool to conduct network service discovery for vulnerable systems.[76][77] |
G0081 | Tropic Trooper |
Tropic Trooper used |
G1017 | Volt Typhoon |
Volt Typhoon has used commercial tools, LOTL utilities, and appliances already present on the system for network service discovery.[80] |
S0341 | Xbash | |
S0117 | XTunnel |
XTunnel is capable of probing the network for open ports.[82] |
S0412 | ZxShell |
ID | Mitigation | Description |
---|---|---|
M1042 | Disable or Remove Feature or Program |
Ensure that unnecessary ports and services are closed to prevent risk of discovery and potential exploitation. |
M1031 | Network Intrusion Prevention |
Use network intrusion detection/prevention systems to detect and prevent remote service scans. |
M1030 | Network Segmentation |
Ensure proper network segmentation is followed to protect critical servers and devices. |
ID | Data Source | Data Component | Detects |
---|---|---|---|
DS0025 | Cloud Service | Cloud Service Enumeration |
Cloud service discovery techniques will likely occur throughout an operation where an adversary is targeting cloud-based systems and services. Data and events should not be viewed in isolation, but as part of a chain of behavior that could lead to other activities based on the information obtained.Normal, benign system and network events that look like cloud service discovery may be uncommon, depending on the environment and how they are used. Monitor cloud service usage for anomalous behavior that may indicate adversarial presence within the environment. |
DS0017 | Command | Command Execution |
Monitor executed commands and arguments that may attempt to get a listing of services running on remote hosts, including those that may be vulnerable to remote software exploitation. |
DS0029 | Network Traffic | Network Traffic Flow |
Monitor network data for uncommon data flows. Processes utilizing the network that do not normally have network communication or have never been seen before are suspicious. It should be noted that when a host/ port/ service scan is performed from a compromised machine, a single machine makes multiple calls to other hosts in the network to identify live hosts and services. After compromising an initial machine, adversaries commonly attempt to laterally move across the network. The first step to attempt the Lateral Movement often involves conducting host identification, port and service scans on the internal network via the compromised machine using tools such as Nmap, Cobalt Strike, etc. Note: It should be noted that when a host/ port/ service scan is performed from a compromised machine, a single machine makes multiple calls to other hosts in the network to identify live hosts and services. This can be detected using the following query Analytic 1 - Identifying Port Scanning Activity
|