ID | Name |
---|---|
T1219.001 | IDE Tunneling |
T1219.002 | Remote Desktop Software |
T1219.003 | Remote Access Hardware |
An adversary may use legitimate desktop support software to establish an interactive command and control channel to target systems within networks. Desktop support software provides a graphical interface for remotely controlling another computer, transmitting the display output, keyboard input, and mouse control between devices using various protocols. Desktop support software, such as VNC
, Team Viewer
, AnyDesk
, ScreenConnect
, LogMein
, AmmyyAdmin
, and other remote monitoring and management (RMM) tools, are commonly used as legitimate technical support software and may be allowed by application control within a target environment.[1][2][3]
Remote access modules/features may also exist as part of otherwise existing software such as Zoom or Google Chrome’s Remote Desktop.[4][5]
ID | Name | Description |
---|---|---|
C0015 | C0015 |
During C0015, the threat actors installed the AnyDesk remote desktop application onto the compromised network.[6] |
C0018 | C0018 |
During C0018, the threat actors used AnyDesk to transfer tools between systems.[7][8] |
G0120 | Evilnum |
EVILNUM has used the malware variant, TerraTV, to run a legitimate TeamViewer application to connect to compromised machines.[9] |
G0094 | Kimsuky |
Kimsuky has used a modified TeamViewer client as a command and control channel.[10][11] |
G0129 | Mustang Panda |
Mustang Panda has installed TeamViewer on targeted systems.[12] |
G0048 | RTM |
RTM has used a modified version of TeamViewer and Remote Utilities for remote access.[13] |
G1046 | Storm-1811 |
Storm-1811 has abused multiple types of legitimate remote access software and tools, such as ScreenConnect, NetSupport Manager, and AnyDesk.[14][15] |
G0076 | Thrip |
Thrip used a cloud-based remote access software called LogMeIn for their attacks.[16] |
ID | Mitigation | Description |
---|---|---|
M1042 | Disable or Remove Feature or Program |
Consider disabling unnecessary remote connection functionality, including both unapproved software installations and specific features built into supported applications. |
M1038 | Execution Prevention |
Use application control to mitigate installation and use of unapproved software that can be used for remote access. |
M1037 | Filter Network Traffic |
Properly configure firewalls, application firewalls, and proxies to limit outgoing traffic to sites and services used by remote access software. |
ID | Data Source | Data Component | Detects |
---|---|---|---|
DS0029 | Network Traffic | Network Connection Creation |
Monitor for Outbound connections to known RMM service endpoints (e.g., .teamviewer.com, .anydesk.com)New connections from internal systems to unexpected IPs on:TCP 5938 (TeamViewer)TCP 7070–7071 (AnyDesk)TCP 5650 (Ammyy Admin)TCP/UDP 443, 80, or randomized ports Analytic 1 - Detect network traffic for Remote Desktop software
|
Network Traffic Content |
Monitor and analyze traffic patterns and packet inspection associated to protocol(s) that do not follow the expected protocol standards and traffic flows (e.g. extraneous packets that do not belong to established flows, gratuitous or anomalous traffic patterns, anomalous syntax, or structure). Consider correlation with process monitoring and command line to detect anomalous processes execution and command line arguments associated to traffic patterns (e.g. monitor anomalies in use of files that do not normally initiate connections for respective protocol(s)). |
||
DS0009 | Process | Process Creation |
Monitor for applications and processes related to remote desktop software. Correlate activity with other suspicious behavior that may reduce false positives if this type of software is used by legitimate users and administrators. Domain Fronting may be used in conjunction to avoid defenses. Adversaries will likely need to deploy and/or install these remote software to compromised systems. It may be possible to detect or prevent the installation of this type of software with host-based solutions. Analytic 1 - Detect Remote Desktop Execution
|