Preventions
- Home
- - Preventions
- -PV015
- ID: PV015
- Created: 01st June 2024
- Updated: 01st June 2024
- Contributor: The ITM Team
Application Whitelisting
By only allowing pre-approved software to be installed and run on corporate devices, the subject is unable to install software themselves.
Sections
ID | Name | Description | |||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
IF009 | Installing Unapproved Software | A subject installs unapproved software on a corporate device, contravening internal policies on acceptable use of company equipment. | |||||||||||||||||||||||||||||||||||
PR003 | Software Installation | A subject may install or attempt to install software that will be used to exfiltrate sensitive data or contravene internal policies. | |||||||||||||||||||||||||||||||||||
AF003 | Timestomping | A subject modifies the modified, accessed, created (MAC) file time attributes to hide new files or obscure changes made to existing files to hinder an investigation by removing a file or files from a timeframe scope.
nTimestomp is part of the nTimetools repository, and it provides tools for working with timestamps on files on the Windows operating system. This tool allows for a user to provide arguments for each timestamp, as well as the option to set all timestamps to the same value.
Linux has the built-in command
The argument | |||||||||||||||||||||||||||||||||||
PR017 | Archive Data | A subject uses utilities to compress and/or encrypt collected data prior to exfiltration. | |||||||||||||||||||||||||||||||||||
ME002 | Unrestricted Software Installation | A subject can install software on a device without restriction. | |||||||||||||||||||||||||||||||||||
ME003 | Installed Software | A subject can leverage software approved for installation or software that is already installed. | |||||||||||||||||||||||||||||||||||
PR021 | Network Scanning | A subject conducts a scan of a network to identify additional systems, or services running on those systems. | |||||||||||||||||||||||||||||||||||
AF016 | Uninstalling Software | The subject uninstalls software, which may also remove relevant artifacts from the system's disk, such as regsitry keys or files necessary for the software to run, preventing them from being used by investigators to track activity. | |||||||||||||||||||||||||||||||||||
AF017 | Use of a Virtual Machine | The subject uses a virtual machine (VM) to contain artifacts of forensic value within the virtualized environment, preventing them from being written to the host file system. This strategy helps to obscure evidence and complicate forensic investigations. By running a guest operating system within a VM, the subject can potentially evade detection by security agents installed on the host operating system, as these agents may not have visibility into activities occurring within the VM. This adds an additional layer of complexity to forensic analysis, making it more challenging to detect and attribute malicious activities. | |||||||||||||||||||||||||||||||||||
IF020 | Unauthorized VPN Client | The subject installs and uses an unapproved VPN client, potentially violating organizational policy. By using a VPN service not controlled by the organization, the subject can bypass security controls, reducing the security team’s visibility into network activity conducted through the unauthorized VPN. This could lead to significant security risks, as monitoring and detection mechanisms are circumvented. | |||||||||||||||||||||||||||||||||||
PR017.001 | Archive via Utility | A subject uses utilities to compress and/or encrypt collected data prior to exfiltration. | |||||||||||||||||||||||||||||||||||
PR017.002 | Archive via Library | A subject uses utilities to compress and/or encrypt collected data prior to exfiltration. | |||||||||||||||||||||||||||||||||||
PR017.003 | Archive via Compression | A subject uses utilities to compress collected data prior to exfiltration. | |||||||||||||||||||||||||||||||||||
PR017.004 | Archive via Encryption | A subject uses utilities to encrypt collected data prior to exfiltration. | |||||||||||||||||||||||||||||||||||
IF005.001 | Exfiltration via Installed Messaging Application | A subject exfiltrates information using a messaging application that is already installed on the system. They will access the conversation at a later date to retrieve information on a different system. | |||||||||||||||||||||||||||||||||||
PR003.001 | Installing Virtual Machines | A subject installs a hypervisor that allows them to create and access virtual environments on a device. | |||||||||||||||||||||||||||||||||||
PR003.002 | Installing VPN Applications | A subject installs a VPN application that allows them to tunnel their traffic. | |||||||||||||||||||||||||||||||||||
PR003.003 | Installing Browsers | A subject can install an unapproved browser with features that frustrate or prevent preventions or detections, such as built-in VPN, Tor access, or automatic browser artifact destruction. | |||||||||||||||||||||||||||||||||||
PR003.005 | Installing Cloud Storage Applications | A subject can install an unapproved cloud storage application that has the ability to sync files across the Internet. | |||||||||||||||||||||||||||||||||||
PR003.006 | Installing Note-Taking Applications | A subject installs an unapproved note taking application with the ability to sync notes across the Internet. | |||||||||||||||||||||||||||||||||||
PR003.007 | Installing Messenger Applications | A subject installs an unapproved messenger application with the ability to transmit data and/or files across the Internet. | |||||||||||||||||||||||||||||||||||
PR003.008 | Installing SSH Clients | A subject installs a Secure Shell (SSH) client, which can be used to access SSH servers across a network. | |||||||||||||||||||||||||||||||||||
PR003.009 | Installing FTP Clients | A subject installs a File Transfer Protocol (FTP) client which can be used to access FTP servers across the a network. | |||||||||||||||||||||||||||||||||||
PR003.010 | Installing RDP Clients | A subject installs a Remote Desktop Protocol (RDP) client which can be used to access RDP servers across a network. | |||||||||||||||||||||||||||||||||||
PR003.011 | Installing Screen Sharing Software | A subject installs screen sharing software which can be used to capture images or other information from a target system. | |||||||||||||||||||||||||||||||||||
ME003.011 | Screen Sharing Software | A subject has access to or can install screen sharing software which can be used to capture images or other information from a target system. | |||||||||||||||||||||||||||||||||||
IF002.006 | Exfiltration via USB to USB Data Transfer | A USB to USB data transfer cable is a device designed to connect two computers directly together for the purpose of transferring files between them. These cables are equipped with a small electronic circuit to facilitate data transfer without the need for an intermediate storage device. Typically a USB to USB data transfer cable will require specific software to be installed to facilitate the data transfer. In the context of an insider threat, a USB to USB data transfer cable can be a tool for exfiltrating sensitive data from an organization's environment. | |||||||||||||||||||||||||||||||||||
IF002.008 | Exfiltration via USB to Mobile Device | The subject uses a USB cable, and any relevant software if required, to transfer files or data from one system to a mobile device. This device is then taken outside of the organization's control, where the subject can later access the contents. | |||||||||||||||||||||||||||||||||||
IF001.005 | Exfiltration via Note-Taking Web Services | A subject uploads confidential organization data to a note-taking web service, such as Evernote. The subject can then access the confidential data outside of the organization from another device. Examples include (URLs have been sanitized):
| |||||||||||||||||||||||||||||||||||
IF004.004 | Exfiltration via Screen Sharing Software | A subject exfiltrates data outside of the organization's control using the built-in file transfer capabilities of software such as Teamviewer. | |||||||||||||||||||||||||||||||||||
PR006.004 | Security Enumeration via Network Activity | A subject attempts to identify security software by monitoring network traffic. | |||||||||||||||||||||||||||||||||||
AF018.001 | Endpoint Tripwires | A subject installs custom software or malware on an endpoint, potentially disguising it as a legitimate process. This software includes tripwire logic to monitor the system for signs of security activity.
The tripwire software monitors various aspects of the endpoint to detect potential investigations:
Upon detecting security activity, the tripwire can initiate various evasive responses:
| |||||||||||||||||||||||||||||||||||
AF008.001 | Image Steganography | A subject uses image steganography to hide data in an image, to exfiltrate that data and to hide the act of exfiltration.
Least Significant Bit (LSB) Steganography
How it works:
Example:
Advantages:
Disadvantages:
Masking and Filtering Steganography
How it works:
Advantages:
Disadvantages:
Transform Domain Steganography
Types of Transform Domain Methods:
How it works:
Advantages:
Disadvantages:
b. Discrete Wavelet Transform (DWT) Steganography
How it works:
Advantages:
Disadvantages:
c. Fourier Transform-Based Steganography
Advantages:
Disadvantages:
Palette-Based and Color Modification Techniques
a. Palette-Based Steganography (GIF, PNG)
Advantages:
Disadvantages:
b. Alpha Channel Manipulation
Advantages:
Disadvantages:
Edge-Based and Texture-Based Steganography
a. Edge Detection Steganography
Advantages:
Disadvantages:
b. Patchwork Algorithm
Advantages:
Disadvantages:
Spread Spectrum and Noise-Based Techniques
a. Spread Spectrum Steganography
Advantages:
Disadvantages:
b. Statistical Steganography
Advantages:
Disadvantages:
Adaptive and AI-Based Steganography
Disadvantages:
Comparison Table of Image Steganography Methods
| |||||||||||||||||||||||||||||||||||
IF004.006 | Exfiltration via Python Listening Service | A subject may employ a Python-based listening service to exfiltrate organizational data, typically as part of a self-initiated or premeditated breach. Python’s accessibility and versatility make it a powerful tool for creating custom scripts capable of transmitting sensitive data to external or unauthorized internal systems.
In this infringement method, the subject configures a Python script—often hosted externally or on a covert internal system—to listen for incoming connections. A complementary script, running within the organization’s network (such as on a corporate laptop), transmits sensitive files or data streams to the listening service using common protocols such as HTTP or TCP, or via more covert channels including DNS tunneling, ICMP, or steganographic methods. Publicly available tools such as PyExfil can facilitate these operations, offering modular capabilities for exfiltrating data across multiple vectors.
Examples of Use:
Detection Considerations:
| |||||||||||||||||||||||||||||||||||
PR024.001 | Privilege Escalation through Kerberoasting | Kerberoasting is a technique that can be exploited by a subject to escalate privileges and gain unauthorized access to sensitive systems within a network. From the perspective of a subject—who may be a low-privileged user with legitimate access to the network—the attack takes advantage of weaknesses in the Kerberos authentication protocol used by Active Directory (AD).
Kerberos Authentication ProcessIn a Kerberos-based network (like those using Active Directory), clients—users, computers, or services—authenticate to services using service tickets. When a client wants to access a service (e.g., a file server or email service), it requests a service ticket from the Ticket Granting Service (TGS). This request is made using the Service Principal Name (SPN) of the target service. The TGS then issues a service ticket containing the hashed credentials (password) of the service account associated with that SPN. These credentials are encrypted in the service ticket, and the client can present the ticket to the service to authenticate.
Subject Requesting Service TicketsA subject, typically a domain user with limited privileges, can exploit this process by requesting service tickets for service accounts running critical or high-privilege services, such as domain controllers or admin-level service accounts. These accounts are often associated with SPNs in Active Directory. The subject can identify these SPNs—often for high-value targets like SQL Server, Exchange, or other administrative services—by querying the domain or using enumeration tools. Once these SPNs are identified, the subject can request service tickets for these service accounts from the TGS.
Cracking the Service TicketsThe key aspect of the Kerberoasting attack is that the service tickets contain hashed credentials of the service account. If these service accounts use weak, easily guessable passwords, the subject can extract the service tickets and attempt to crack the hashes offline using tools like Hashcat or John the Ripper. Since these passwords are typically not subject to regular user password policies (i.e., they may not be as complex), weak or easily cracked passwords are a prime target for the subject.
Privilege Escalation and Unauthorized AccessOnce the subject successfully cracks the password of a service account, they can use the credentials to gain elevated privileges. For example:
Reconnaissance and ExploitationThe subject can perform additional reconnaissance within the network to identify other high-privilege accounts and services associated with service accounts. They can continue requesting service tickets for additional SPNs and cracking any other weak passwords they find, gradually escalating their access to more critical systems. With broad access, the subject may also attempt to manipulate access controls, elevate privileges further, or carry out malicious actions undetected. This provides a potential stepping stone to more serious insider threats and an expanded attack surface for other actors. | |||||||||||||||||||||||||||||||||||
IF009.006 | Installing Crypto Mining Software | The subject installs and operates unauthorized cryptocurrency mining software on organizational systems, leveraging compute, network, and energy resources for personal financial gain. This activity subverts authorized system use policies, degrades operational performance, increases attack surface, and introduces external control risks.
Characteristics
Example ScenarioA subject installs a customized |