Source: How to log and monitor PowerShell activity for suspicious scripts and commands | CSO Online
Author: unknown
URL: https://www.csoonline.com/article/4006326/how-to-log-and-monitor-powershell-activity-for-suspicious-scripts-and-commands.html
ONE SENTENCE SUMMARY:
Attackers exploit consultants’ systems using legitimate tools and remote access methods, highlighting the need for enhanced workstation protection strategies.
MAIN POINTS:
- Consultants’ computers are attractive targets due to their access across multiple organizations.
- Recent attack involved installing Alpha Agent and updating Splashtop for remote access.
- Attackers employed legitimate tools and normal processes, avoiding antivirus detection.
- Entry point of the initial attack remains unknown.
- Adjust attack surface reduction rules to prevent common attack techniques.
- Enable PowerShell script logging via Group Policy or Intune for monitoring.
- Regularly review logs for suspicious scripts, encoding, and obfuscation techniques.
- Microsoft Defender for Cloud can detect suspicious PowerShell and script activities.
- Maintain awareness of authorized remote access tools and restrict unauthorized ones.
- Monitor consultant workstations closely to detect abnormal activities quickly.
TAKEAWAYS:
- Tighten security rules to block execution of potentially malicious scripts.
- Enable detailed PowerShell logging on all critical workstations.
- Regularly analyze logs for unusual activities or attempts to harvest credentials.
- Clearly document approved remote access tools and restrict unauthorized installations.
- Increase monitoring and alerts specifically on consultant machines accessing internal resources.