{"id":112055,"date":"2020-06-01T12:00:45","date_gmt":"2020-06-01T19:00:45","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=112055"},"modified":"2020-07-09T14:24:55","modified_gmt":"2020-07-09T21:24:55","slug":"cortex-insider-threat","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2020\/06\/cortex-insider-threat\/","title":{"rendered":"Physical Hack, Insider Threat: Busted by Cortex XDR Managed Threat Hunting"},"content":{"rendered":"<p><b>One day, a SOC analyst sits down at his computer with his morning coffee and opens the following message alerting him to a possible insider threat:<\/b><\/p>\n<p><b><i>\u201cHello, my name is Alicia from the Cortex XDR Managed Threat Hunting (MTH) team. I\u2019m investigating suspicious activity in your network and could use some assistance... To help our investigation, could you please check the following? ... \u201d <\/i><\/b><\/p>\n<p><b>What is this?! Read on to learn about a sneaky insider attack and the service that discovered it with the latest story in our <\/b><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/tag\/ai-stories\/\"><b>Busted by Cortex XDR series<\/b><\/a><b>, featuring our Cortex XDR Managed Threat Hunting team!<\/b><\/p>\n<p><div style=\"max-width:100%\" data-width=\"900\"><span class=\"ar-custom\" style=\"padding-bottom:50%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter wp-image-112056 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2020\/05\/Cortex-sec-cam.jpg\" alt=\"This conceptual image illustrates how the Cortex XDR Managed Threat Hunting team was able to &quot;spot&quot; evidence of an employee operating an insider threat.\" width=\"900\" height=\"450\" \/><\/span><\/div><\/p>\n<p><span style=\"font-weight: 400\">This real customer story from an EMEA-based consulting firm took place in March before the COVID-19 pandemic hit, and began with an employee hacking his own laptop to obtain local admin credentials, using a technique called \u201cSticky Keys.\u201d Here\u2019s how the MTH team caught the employee, traced how the individual learned and built up the hack, and how the customer\u2019s SOC team contained the attack:<\/span><\/p>\n<p><div style=\"max-width:100%\" data-width=\"900\"><span class=\"ar-custom\" style=\"padding-bottom:43.44%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter wp-image-112069 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2020\/05\/hello.png\" alt=\"This screenshot of an email reads: Hello, My name is [OBSCURED] and I'm part of the MTH team. I'm investigating some activity in your network and can use some assistance. The activity in question can be viewed in XDR: XDR Activity. Overview of the activity: The activity appears to be a technique known as Sticky Keys. More information about this type of attack can be found here: [web address]. To help further our investigation could you please check the following: [Obscured details]. Thank you and please feel rfree to contact us if you have any questions or concerns. Very Respectfully, [Name Obscured], Cortex XDR Managed Threat Hunting Team \" width=\"900\" height=\"391\" \/><\/span><\/div><\/p>\n<table>\n<tbody>\n<tr>\n<td><b>\u201cSticky Keys\u201d?<\/b><\/p>\n<p><span style=\"font-weight: 400\">Windows contains accessibility features that may be launched with a key combination from the login screen. An adversary can replace these programs to get a command prompt \u2013 by default, these applications run under the system account, with administrative credentials.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400\">Two common accessibility programs are:<\/span><\/p>\n<p><span style=\"font-weight: 400\">1. C:\\Windows\\System32\\sethc.exe, launched when the shift key is pressed five times (Sticky Keys)\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400\">2. C:\\Windows\\System32\\utilman.exe, the Windows application that is designed to allow the user to configure Accessibility options, such as the Magnifier, High Contrast Theme, Narrator and On Screen Keyboard when they press Windows + U on the login screen.<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><span style=\"font-weight: 400\">Our customer\u2019s SOC analyst clicked on the Cortex XDR Activity in Alicia\u2019s email to get a picture of what she was referring to. Cortex XDR explained the suspicious activity in a simple graphical form:<\/span><\/p>\n<figure id=\"attachment_112082\" aria-describedby=\"caption-attachment-112082\" style=\"width: 900px\" class=\"wp-caption aligncenter\"><div style=\"max-width:100%\" data-width=\"900\"><span class=\"ar-custom\" style=\"padding-bottom:37.78%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"wp-image-112082 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2020\/05\/utilmanexe.png\" alt=\"Cortex XDR\u2019s root cause analysis screen showing the affected laptop\" width=\"900\" height=\"340\" \/><\/span><\/div><figcaption id=\"caption-attachment-112082\" class=\"wp-caption-text\">Cortex XDR\u2019s root cause analysis screen showing the affected laptop<\/figcaption><\/figure>\n<p><span style=\"font-weight: 400\">The customer\u2019s SOC analyst quickly downed his coffee, rolled up his sleeves and grabbed his keyboard to confirm Alicia\u2019s analysis. Alicia replied a few minutes later, explaining the nature of the threat and recommending steps for remediation. Here\u2019s a screenshot of the actual response:<\/span><\/p>\n<p><div style=\"max-width:100%\" data-width=\"900\"><span class=\"ar-custom\" style=\"padding-bottom:37.56%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter wp-image-112095 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2020\/05\/morning.png\" alt=\"This screenshot of an email reads: Thanks for getting back to me with the details, which confirmed what I was seeing. I'm just going to share with you some of my thoughts and recommendations being that I understand the Windows ecosystem and the technique. Utilman.exe is a Windows protected file and the only way to overwrite it would be to first disable windows system file checker. To achieve this one would need to be logged in ot the PC and typically is performed manually. The modification is done in the registry or direct calls into [obscured]. From the activity I would treat the host as fully compromised and from the commands issued assume that local creds were taken. Hopefully the local creds aren't domain creds? Recommend changing the users account information. Attackers typically do this as a 2nd stage access to a network in the event their initial access is lost. Thanks for the help and please let me know if you have any questions. [Name obscured]\" width=\"900\" height=\"338\" \/><\/span><\/div><\/p>\n<p><span style=\"font-weight: 400\">The \u201cSticky Keys\u201d technique triggered our MTH team\u2019s attention as part of looking for signs of admin credentials harvesting. Utilman.exe is a Windows protected file and the only way to overwrite it would be to first disable the Windows system file checker, or do it without the operating system running.\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><span style=\"font-weight: 400\">Unfortunately...<\/span><\/h2>\n<p><span style=\"font-weight: 400\">The employee had already gained local admin creds and continued his attack through the command shell. The question now: What did the employee do with those creds? Before we share what happened in the heat of the moment, let\u2019s take a break instead and learn who Alicia is.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><span style=\"font-weight: 400\">Who\u2019s Alicia?<\/span><\/h2>\n<p><span style=\"font-weight: 400\">Alicia is an expert in hunting and collecting threats, and in reverse-engineering malware using code analysis. Her team runs in-depth research to gain insight into techniques that threat actors use to compromise entire organizations. Her goal is to provide context, explain the nuts and bolts of attacks, who\u2019s executing them and why they do so. What gets Alicia going is to empower SOCs to better defend their companies.\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><span style=\"font-weight: 400\">The Hack<\/span><\/h2>\n<p><span style=\"font-weight: 400\">Back to the story: Cortex XDR\u2019s endpoint agent logs signaled that the employee obtained admin credentials to his laptop (which, for the record, happened without the company\u2019s permission). He replaced utilman.exe on his computer with cmd.exe, the Windows command shell, which triggered an alert that Alicia picked up and connected with a couple of commands that the employee ran right after. Until Alicia\u2019s email arrived, the customer\u2019s SOC analyst was unaware of the situation. Without the Managed Threat Hunting service, this could have come across as a few unrelated activities, and could have ended up as a missed attack.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><span style=\"font-weight: 400\">But Why?<\/span><\/h2>\n<p><span style=\"font-weight: 400\">The MTH team continued to investigate Cortex XDR network and endpoint logs and found that the employee ran commands to reset the local admin\u2019s password and to list local user accounts that were previously logged into his laptop.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Alicia explains that attackers can use a password reset to gain access to accounts. They do this to regain network access when they\u2019ve lost it over the course of carrying out an attack. The employee may have been on the network for a while.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400\">In the best-case scenario, the employee turned to the dark side only to \u201clevel up\u201d his laptop for innocent, work-related tasks.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Alternatively, Alicia explains that the enumeration of local user accounts is a sign of an attempt to gain access to other users\u2019 accounts, and possibly even to domain admin credentials. The former can grant access to confidential information, such as source code or sales results, while the latter can take the company\u2019s computer network down. When a user logs in to a PC, the login credentials get cached in Windows. With local admin rights, attackers can enumerate that cache and, with various techniques, operate on behalf of those accounts \u2013 even on behalf of domain admin accounts \u2013 to access network resources.\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><span style=\"font-weight: 400\">How Could He Do It as a Regular User?<\/span><\/h2>\n<p><span style=\"font-weight: 400\">The employee was a regular user and shouldn\u2019t have been able to replace utilman.exe with the command shell. The Windows operating system deploys several protective mechanisms to prevent this abuse. One mechanism is that the application must reside within the System32 folder (which is why cmd.exe was used, and not other applications). Another is that the change can only be made by an administrator.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Alicia kept investigating. She searched the internet, network and endpoint logs for clues to help the customer\u2019s SOC analyst understand how the user could escalate his privileges to be an admin. She eventually found that the employee physically attached a USB stick to his laptop, restarted the computer, launched a live Linux distribution from the USB stick, mounted the Windows partition and finally copied cmd.exe onto utilman.exe, overriding Windows\u2019 operating system file protection while Windows wasn\u2019t running. The employee then reset the system again, removed the USB stick, booted back the Windows partition, pressed Windows + U on the login screen and suddenly faced a blank command window, running under the highest local privileges, ready to execute his commands.<\/span><\/p>\n<p><div style=\"max-width:100%\" data-width=\"900\"><span class=\"ar-custom\" style=\"padding-bottom:25.44%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter wp-image-112108 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2020\/05\/system32.png\" alt=\"This screenshot shows a record of Utilman.exe being modified to allow escalated privileges. \" width=\"900\" height=\"229\" \/><\/span><\/div><\/p>\n<p>&nbsp;<\/p>\n<h2><span style=\"font-weight: 400\">Busted.<\/span><\/h2>\n<p><span style=\"font-weight: 400\">Following these insights by Alicia, the customer\u2019s SOC analyst confirmed the employee\u2019s\u00a0 activities by connecting to the laptop using Cortex XDR Live Terminal. The customer\u2019s SOC analyst took the laptop down, disabled the employee\u2019s account and initiated the necessary HR actions that same day. Alicia had found a threat, helped the customer\u2019s SOC analyst find the root cause, recommended remediation action and moved on to the next threat in the world. The customer\u2019s SOC analyst learned a new trick and, thankfully, got out of this trouble before it turned into a disaster. What happened with the employee and how far he got before they caught him remains a mystery. What we know is that they caught him early enough to not read this story in the news as a data breach, a long outage or a copyright infringement case \u2013 and that\u2019s what matters.<\/span><\/p>\n<p><span style=\"font-weight: 400\">The CSO remembers the next day\u2019s triage with a sense of a \u201cperfect day,\u201d feeling confident about his SOC team and how the Cortex XDR Managed Threat Hunting team helped\u00a0 protect his company.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><span style=\"font-weight: 400\">Best Practices to Protect Against Insider Threats<\/span><\/h2>\n<p><span style=\"font-weight: 400\">Insider-caused security incidents \u2013 whether due to malice or negligence \u2013 are a pervasive problem for organizations and can be hard to prevent without disrupting the ability for employees to do their jobs. <\/span><a href=\"https:\/\/cdw-prod.adobecqms.net\/content\/dam\/cdw\/on-domain-cdw\/brands\/proofpoint\/ponemon-global-cost-of-insider-threats-2020-report.pdf\" rel=\"nofollow,noopener\" ><span style=\"font-weight: 400\">Ponemon Institute has found<\/span><\/a><span style=\"font-weight: 400\"> that the percentage of insider incidents has increased by 47% since 2018, and the cost has increased by 31% over the same time period. Here are some steps that your security team can take in order to minimize the chances of an insider threat like the one described above:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400\"><b>Identify and manage critical or sensitive assets. <\/b><span style=\"font-weight: 400\">The development of workplace technologies has allowed for rapid collaboration and access to information, but also allows for those assets to be more easily exfiltrated. Security teams should have a complete account of an organization's assets along with access management tools and policies to defend against an insider threat.<\/span><\/li>\n<li style=\"font-weight: 400\"><b>Document and enforce security policies. <\/b><span style=\"font-weight: 400\">At times, employees may become unintentional insider threats due to unclear or inconsistent security policies regarding an organization's assets. Organizations must clearly outline acceptable use of assets, use of privileged accounts, ownership of intellectual property and other similar topics. Along with the policies, organizations should be able to provide clear justification and reasoning behind each policy.<\/span><\/li>\n<li style=\"font-weight: 400\"><b>Create a response strategy for insider threats. <\/b><span style=\"font-weight: 400\">While we may not be able to completely eliminate insider threats, an organization can construct strategies to rapidly respond to insider threat incidents, thus helping to minimize damage to the organization should one occur. These strategies may involve creating a working group across departments and functions or having dedicated personnel to handle insider threat incidents.\u00a0<\/span><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h2><span style=\"font-weight: 400\">Sharpen Your Threat Hunting Skills<\/span><\/h2>\n<p><span style=\"font-weight: 400\">On June 23, we\u2019ll be holding the \u201c<\/span><a href=\"https:\/\/start.paloaltonetworks.com\/inside-the-hunt-virtual-summit?utm_source=MTHblog&amp;utm_medium=social&amp;utm_content=MTH_summit&amp;sfdcid=7010g000001JOCxAAO\"><span style=\"font-weight: 400\">Inside The Hunt<\/span><\/a><span style=\"font-weight: 400\">\u201d virtual summit, dedicated to threat hunters everywhere. We\u2019ve gathered some of the best and the brightest threat hunters and industry experts from around the world to share best practices on threat hunting strategies, techniques, challenges and technologies. Learn new tips that will help you improve your threat hunting practices right away and participate in trivia to win prizes. <\/span><a href=\"https:\/\/start.paloaltonetworks.com\/inside-the-hunt-virtual-summit?utm_source=MTHblog&amp;utm_medium=social&amp;utm_content=MTH_summit&amp;sfdcid=7010g000001JOCxAAO\"><span style=\"font-weight: 400\">Register for \u201cInside the Hunt\u201d for free<\/span><\/a><span style=\"font-weight: 400\">!<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>An EMEA-based consulting firm was able to identify and stop an insider threat with the help of the Cortex XDR Managed Threat Hunting team.<\/p>\n","protected":false},"author":663,"featured_media":112056,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[6770],"tags":[6737,7109,6786],"coauthors":[6848],"class_list":["post-112055","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-secure-the-future","tag-cortex-xdr","tag-managed-threat-hunting","tag-threat-hunting"],"jetpack_featured_media_url":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2020\/05\/Cortex-sec-cam.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/112055","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/663"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=112055"}],"version-history":[{"count":4,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/112055\/revisions"}],"predecessor-version":[{"id":113617,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/112055\/revisions\/113617"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/112056"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=112055"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=112055"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=112055"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=112055"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}