XDR - portproxy enabled allow a man-in-the-middle attack

cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 
Announcements
Please sign in to see details of an important advisory in our Customer Advisories area.

XDR - portproxy enabled allow a man-in-the-middle attack

L3 Networker

Hi

Does anyone know if Cortex XDR detect and/or protect against this type of attack:

 

Windows 10 must not have portproxy enabled or in use (syxsense.com)

Best regards
Tiago Marques
1 accepted solution

Accepted Solutions

L4 Transporter

Hi @tlmarques, thanks for reaching us using the Live Community.

 

I did a test in my lab by modifying the registry as mentioned in the link, and it was not detected by the XDR Agent as malicious.

In this cases you can create custom BIOCs to detect this behaviors that might not be malicious by themselves.

I have created this custom BIOC rule that you can apply in Detection Rules - BIOC - Add Bioc to detect modifications to this registry key.

 

dataset = xdr_data 
| filter event_type = ENUM.REGISTRY and event_sub_type = ENUM.REGISTRY_CREATE_KEY 
| filter action_registry_key_name contains  """HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Services\\PortProxy\\"""

 Tested and working as expected:

jmazzeo_0-1714161955058.png

You can even add the BIOC to a Restriction Profile and block the process doing the registry modification.

 

If this post answers your question, please mark it as the solution.

JM

View solution in original post

1 REPLY 1

L4 Transporter

Hi @tlmarques, thanks for reaching us using the Live Community.

 

I did a test in my lab by modifying the registry as mentioned in the link, and it was not detected by the XDR Agent as malicious.

In this cases you can create custom BIOCs to detect this behaviors that might not be malicious by themselves.

I have created this custom BIOC rule that you can apply in Detection Rules - BIOC - Add Bioc to detect modifications to this registry key.

 

dataset = xdr_data 
| filter event_type = ENUM.REGISTRY and event_sub_type = ENUM.REGISTRY_CREATE_KEY 
| filter action_registry_key_name contains  """HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Services\\PortProxy\\"""

 Tested and working as expected:

jmazzeo_0-1714161955058.png

You can even add the BIOC to a Restriction Profile and block the process doing the registry modification.

 

If this post answers your question, please mark it as the solution.

JM
  • 1 accepted solution
  • 339 Views
  • 1 replies
  • 0 Likes
Like what you see?

Show your appreciation!

Click Like if a post is helpful to you or if you just want to show your support.

Click Accept as Solution to acknowledge that the answer to your question has been provided.

The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!

These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!

The LIVEcommunity thanks you for your participation!