TTPwire Vol. 1 · MITRE ATT&CK·Tagged

← All stories

Huntress

Ransomware Deployment Attempts Via TeamViewer | Huntress

2024-01-17 · Read original ↗

ATT&CK techniques detected

8 predictions
T1486Data Encrypted for Impact
100%
"incoming. txt log entries extended back to 2018, but also showed that before the threat actor ’ s access, the last login session to the endpoint via teamviewer had occurred over three months prior. huntress analysts have previously observed threat actors accessing endpoints via t…"
T1486Data Encrypted for Impact
99%
"ransomware deployment attempts via teamviewer | huntress huntress soc analysts recently alerted customers regarding two disparate endpoints identified as being minimally impacted by ransomware ; that is, only a limited number of ransomware canary files were encrypted. in neither …"
T1080Taint Shared Content
94%
"ransomware deployment attempts via teamviewer | huntress huntress soc analysts recently alerted customers regarding two disparate endpoints identified as being minimally impacted by ransomware ; that is, only a limited number of ransomware canary files were encrypted. in neither …"
T1486Data Encrypted for Impact
86%
"required them to make alternate attempts to encrypt files on the endpoint. following log messages indicating that the above dll file was quarantined, the threat actor made several attempts to launch the following file before it was quarantined by security software : c : \ users \…"
T1219Remote Access Tools
78%
"2023 16 : 22 : 15 21 - 12 - 2023 16 : 29 : 51 user remotecontrol { guid } log entry from endpoint b : win - 8gpej3vgb8u 21 - 12 - 2023 20 : 03 : 23 21 - 12 - 2023 20 : 13 : 31 user remotecontrol { guid } both log entries were extremely valuable, as they not only demonstrate that …"
T1219Remote Access Tools
57%
"ransomware deployment attempts via teamviewer | huntress huntress soc analysts recently alerted customers regarding two disparate endpoints identified as being minimally impacted by ransomware ; that is, only a limited number of ransomware canary files were encrypted. in neither …"
T1219Remote Access Tools
33%
"required them to make alternate attempts to encrypt files on the endpoint. following log messages indicating that the above dll file was quarantined, the threat actor made several attempts to launch the following file before it was quarantined by security software : c : \ users \…"
T1080Taint Shared Content
32%
"incoming. txt log entries extended back to 2018, but also showed that before the threat actor ’ s access, the last login session to the endpoint via teamviewer had occurred over three months prior. huntress analysts have previously observed threat actors accessing endpoints via t…"

Summary

Huntress analysts continue to observe access to endpoints via legacy TeamViewer installations, and/or compromised TeamViewer credentials.