heroui logo

Remote Server Service Abuse for Lateral Movement

Sigma Rules

View Source
Summary
This rule detects potential lateral movement attempts by monitoring Remote Procedure Call (RPC) communications that could abuse the Microsoft Encrypting File System Remote (MS-EFSR) service. It specifically watches for remote RPC calls linked to the defined UUID associated with the encryption service. By keeping track of these RPC events through the RPC Firewall, the rule helps identify unauthorized or suspicious activities that may indicate an attacker's effort to move laterally within a network. The detection relies on the RPC Firewall application configured to audit and block unauthorized access via specified UUIDs. Given the nature of lateral movement techniques, which often exploit trusted services to navigate through networks, maintaining vigilance against such RPC calls is crucial for securing environments against internal threats and exploits.
Categories
  • Windows
  • Network
  • Endpoint
Data Sources
  • Application Log
  • Process
  • Network Traffic
Created: 2022-01-01