HomeCyber BalkansHackers Exploited Windows Event Logs Tool for Log Manipulation and Data Exfiltration

Hackers Exploited Windows Event Logs Tool for Log Manipulation and Data Exfiltration

Published on

spot_img

The Windows Event Log management tool, wevtutil.exe, has been identified as a potential vulnerability for LOLBAS (Living Off the Land Binary and Script) attacks. This tool, designed for event log management on Windows systems, can be exploited by attackers to manipulate system logs, execute arbitrary commands, download malicious payloads, and establish persistence, all while evading traditional security measures.

wevtutil.exe enables users to export event logs as XML, clear logs selectively or entirely, and query logs using specific criteria. While these functionalities are essential for system administrators in managing event logs effectively, attackers can misuse this tool to conceal malicious activities, compromise system integrity, and steal sensitive data.

In post-exploitation scenarios, attackers can leverage wevtutil.exe to manipulate event logs to hinder incident response efforts and facilitate data exfiltration. By selectively clearing specific event logs, such as Application logs, attackers aim to evade detection and bypass traditional security measures that focus on more commonly used tools like PowerShell. However, this exploitation requires elevating user privileges to an administrative level through the command prompt.

It is important to note that wevtutil.exe cannot selectively clear specific events within an event log, only entire logs. Clearing the security log generates an Event ID 1102, which serves as a security indicator, making it easily detectable by security tools and less attractive to stealthy attackers. As a result, Windows does not natively log events for non-Security log clearing, as these logs are considered of lower priority compared to the critical Security log, which is essential for auditing and forensics.

To monitor log clearing activities and track changes made to log management settings, administrators can implement Audit Policies by enabling the “Audit Other Object Access Events” policy under “Advanced Audit Policy Configuration.” This helps enhance visibility and detect any unauthorized log manipulation attempts using tools like wevtutil.exe.

Furthermore, attackers can use wevtutil.exe to export sensitive event logs in XML format, potentially exfiltrating credentials or internal activity indicators. While this requires elevated privileges, successful execution can compromise sensitive information. Administrators and users with read access can export logs, with administrators having broader access and standard users often limited to application/system logs.

To mitigate LOLBAS attacks involving wevtutil.exe, organizations should enhance monitoring capabilities, enforce strict access controls on event logs, and utilize behavioral analytics to detect anomalous usage patterns and flag suspicious tool combinations like wevtutil.exe, makecab.exe, and certutil.exe. By staying vigilant and proactive in identifying and addressing these vulnerabilities, organizations can better protect their systems and data from potential exploitation by malicious actors.

Source link

Latest articles

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...

Fortinet Warns of Active Exploitation of FortiOS SSL VPN 2FA Bypass Vulnerability

 Fortinet on Wednesday said it observed "recent abuse" of a five-year-old security flaw in FortiOS...

More like this

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...