Security News Attackers installing SIEM agents to evade!

Sandbox Breaker

Level 11
Thread author
Verified
Top Poster
Well-known
Jan 6, 2022
519

javier.castro

New Member
Oct 4, 2024
1
From Santiago Bassett:

The article, written by a Kaspersky analyst (Alexander Kryazhev), explains how Wazuh is misused by attackers who already had full administrative privileges over the victim's system.

This scenario is similar to how attackers might abuse other legitimate tools, like SSH, once they control a system.

According to the article, attackers installed the Wazuh agent and enabled "remote_commands" feature, which requires manual activation and admin-level access. This feature is useful for incident responders and digital forensics, and it is common in XDR (eXtended Detection and Response) products. The attackers misused it to run commands in the already compromised system.

In summary, Wazuh is not the attack vector. The system was already fully compromised. This is a common case of attackers abusing legitimate tools for malicious purposes after gaining admin access.

Wazuh itself is a defensive tool designed to protect systems, not to attack them.

I hope it helps.
 

Sandbox Breaker

Level 11
Thread author
Verified
Top Poster
Well-known
Jan 6, 2022
519
From Santiago Bassett:

The article, written by a Kaspersky analyst (Alexander Kryazhev), explains how Wazuh is misused by attackers who already had full administrative privileges over the victim's system.

This scenario is similar to how attackers might abuse other legitimate tools, like SSH, once they control a system.

According to the article, attackers installed the Wazuh agent and enabled "remote_commands" feature, which requires manual activation and admin-level access. This feature is useful for incident responders and digital forensics, and it is common in XDR (eXtended Detection and Response) products. The attackers misused it to run commands in the already compromised system.

In summary, Wazuh is not the attack vector. The system was already fully compromised. This is a common case of attackers abusing legitimate tools for malicious purposes after gaining admin access.

Wazuh itself is a defensive tool designed to protect systems, not to attack them.

I hope it helps.
Umm. Ok. Thanks for breakdown GPT. Welcome to MT and that was your first post. It's just a news post but thanks for the interpretation.
1000024344.jpg
1000024345.png
 
Last edited:
  • HaHa
Reactions: oldschool

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top