heroui logo

Use of UltraVNC Remote Access Software

Sigma Rules

View Source
Summary
This rule identifies the use of UltraVNC, a legitimate remote access software, which could be exploited by adversaries for unauthorized access to target systems. The detection focuses on the process creation events generated when UltraVNC VNCViewer is executed. Given that remote desktop applications are commonly utilized for technical support, their legitimate usage can lead to false positives in security monitoring. Therefore, it's crucial to analyze the context of usage when monitoring these events. The detection rule specifically looks for process creations of common identifiers associated with UltraVNC, such as the product name 'UltraVNC VNCViewer' and the executable 'VNCViewer.exe'. This enables the identification of potential misuse while allowing legitimate business use to continue without unnecessary alerts. Organizations should remain vigilant as successful exploitation of remote access tools can lead to significant breaches such as data exfiltration or lateral movement within networks.
Categories
  • Endpoint
  • Windows
Data Sources
  • Process
ATT&CK Techniques
  • T1219
Created: 2022-10-02