Attackers installing SIEM agents to evade!

Sandbox Breaker - DFIR

Level 12
Thread author
Verified
Top Poster
Well-known
Jan 6, 2022
538
1,723
1,069
Inside a sandbox.
From Santiago Bassett:

The article, written by a Kaspersky analyst (Alexander Kryazhev), explains how Wazuh is misused by attackers who already had full administrative privileges over the victim's system.

This scenario is similar to how attackers might abuse other legitimate tools, like SSH, once they control a system.

According to the article, attackers installed the Wazuh agent and enabled "remote_commands" feature, which requires manual activation and admin-level access. This feature is useful for incident responders and digital forensics, and it is common in XDR (eXtended Detection and Response) products. The attackers misused it to run commands in the already compromised system.

In summary, Wazuh is not the attack vector. The system was already fully compromised. This is a common case of attackers abusing legitimate tools for malicious purposes after gaining admin access.

Wazuh itself is a defensive tool designed to protect systems, not to attack them.

I hope it helps.
 
From Santiago Bassett:

The article, written by a Kaspersky analyst (Alexander Kryazhev), explains how Wazuh is misused by attackers who already had full administrative privileges over the victim's system.

This scenario is similar to how attackers might abuse other legitimate tools, like SSH, once they control a system.

According to the article, attackers installed the Wazuh agent and enabled "remote_commands" feature, which requires manual activation and admin-level access. This feature is useful for incident responders and digital forensics, and it is common in XDR (eXtended Detection and Response) products. The attackers misused it to run commands in the already compromised system.

In summary, Wazuh is not the attack vector. The system was already fully compromised. This is a common case of attackers abusing legitimate tools for malicious purposes after gaining admin access.

Wazuh itself is a defensive tool designed to protect systems, not to attack them.

I hope it helps.
Umm. Ok. Thanks for breakdown GPT. Welcome to MT and that was your first post. It's just a news post but thanks for the interpretation.
1000024344.jpg
1000024345.png
 
Last edited:
  • HaHa
Reactions: oldschool