2022 Threat Detection Report Full Version
2022 Threat Detection Report Full Version
TABLE OF CONTENTS
INTRODUCTION 3 T H R E AT S 41
Introduction 42
Impacket 47
SocGholish 50
T R E N D S 8
Yellow Cockatoo 53
Introduction 9 Gootkit 56
Ransomware 11 BloodHound 58
Supply chain compromise 14 New activity clusters 60
Vulnerabilities 17 Rose Flamingo 60
Affiliates 21 Silver Sparrow 63
Crypters-as-a-service 24 Relevant threats of 2021 65
Common web shells 26 Bazar 65
User-initiated initial access 29 Latent threats 66
Malicious macOS installers 31
Linux coinminers 33
Summary of most
Abusing remote procedure calls 36 prevalent techniques of 2021 72
C O N C L U S I O N 79
2022 Threat Detection Report
INTRODUCTION
• Start perusing the most prevalent techniques, trends, and threats to see Threat Detection Reports. The Threat
what we’ve observed in our customers’ environments. Detection Report is iterative, and parts
• Explore how to detect, mitigate, and simulate specific threats previous years.
and techniques.
This report wouldn’t be
possible without all of you!
• Talk with your team about how the ideas, recommendations, and priorities
map to your security controls and your overall strategy.
In each of these areas, we’ve identified trends that help us understand how
threats are evolving and how we as defenders must evolve in kind. From the
continued scourge of ransomware to high-impact vulnerabilities and supply
chain attacks, this section synthesizes intelligence with insights from the front
lines of threat detection and response.
3 l Introduction
2022 Threat Detection Report
Methodology
When a detection engineer determines that one or more events for a specific
endpoint surpasses the threshold of suspicious or malicious behavior, they
4 l Methodology
2022 Threat Detection Report
You may be wondering how we tally the scores for the Threat Detection Report.
Our methodology for counting technique prevalence has largely remained
consistent since our first Threat Detection Report in 2019. For each malicious
or suspicious detection we published during the year, we incremented the
count for each technique reflected by a detection analytic that contributed
to that detection (excluding data from detections of unwanted software). If
that detection was remediated and the host was reinfected at a later date, a
new detection would be created, thus incrementing the counts again. While
this method of counting tends to overemphasize techniques that get reused
across multiple hosts in a single environment (such as when a laterally moving
adversary generates multiple detections within a single environment), this
gives appropriate weight to the techniques you are most likely to encounter
as a defender.
For the purposes of this report, we decided to set our rankings based on
techniques, even though the majority of our analysis and detection guidance will
be based on sub-techniques. This seemed to be the most reasonable approach,
considering the following:
In cases where a parent technique has no subs or subs that we don’t map to, we
will analyze the parent technique on its own and provide appropriate detection
guidance. However, in cases where sub-technique detections are rampant for
a given parent technique, we will focus our analysis and detection guidance
5 l Methodology
2022 Threat Detection Report
Limitations
There are a few limitations to our methodology for counting threats, as there are
for any approach. Due to the nature of our visibility (i.e., that we predominantly
leverage endpoint detection and response data), our perspective tends to
weigh more heavily on threats that made it through the external defenses—such
as email and firewall gateways—and were able to gain some level of execution
on victim machines. As such, our results are likely different than what you may
see from other vendors focused more on network or email-based detection.
While the top threats are worth focusing on, they are not the only threats
to consider, since other impactful ones may be unidentified and therefore
6 l Methodology
2022 Threat Detection Report
7 l Methodology
8
2022 Threat Detection Report
Trends
Red Canary performed an analysis of emerging and significant trends that we’ve
encountered in confirmed threats, intelligence reporting, and elsewhere over
the past year. We’ve compiled the most prominent trends of 2021 in this report
to show major themes that may continue into 2022.
The technique and threat sections of this report are focused on detection data
and identifying prevalent ATT&CK techniques and threats in those detections.
The trends section takes us one step beyond that data and allows us to narrate
events that might not be prevalent but may be emergent or otherwise deserve
your attention.
9 l Trends
2022 Threat Detection Report
The threat landscape continued Crypters like HCrypt and Snip3 Adversaries exploited web
its trend toward a software- joined the ranks of other “as-a- applications with help from
as-a-service (SaaS) economy, service” threats. web shells such as China
muddying the already murky Chopper, Godzilla, and
waters of attribution. Behinder.
10 l Trends
2022 Threat Detection Report
TREND
Ransomware
Ransomware continued to dominate the 2021 threat landscape, with
operators taking new approaches.
Red Canary carefully tracks affiliates of ransomware groups and the malware
they use, since these adversaries are the ones who sometimes gain initial access
to an environment. These affiliates frequently use crimeware such as Bazar
and Qbot to gain initial access to an environment, later passing off access to
ransomware groups. A few common combinations of malware and ransomware
we observed in 2021 include:
Q bot Egregor
Q bot Sodinokibi/REvil
Q bot Conti
Baza r Conti
11 l Ransomware
2022 Threat Detection Report
Beyond encryption
Adversaries realized they could demand payment for more than just the
threat of a data leak or encryption. An adversary known as Fancy Lazarus (no
affiliation with Fancy Bear or Lazarus Group) extorted victims by threatening to
conduct a distributed denial of service (DDoS) intrusion if they didn’t pay.
12 l Ransomware
2022 Threat Detection Report
TA K E ACT I O N
There is no one simple way to prevent ransomware. The same security approaches
you take to prevent any malware also should help prevent ransomware. It’s critical
to regularly update software, as we often see ransomware after operators exploit a
vulnerability in an internet-facing application. Additionally, internet-facing remote
desktop protocol (RDP) connections without multi-factor authentication (MFA) are
a common ransomware vector, making MFA for any accounts that can log in via RDP
a high priority.
It’s also important to remember that backups are no longer sufficient ransomware
protection. While creating offline backups is an excellent security practice and may
help restore an environment after a ransomware intrusion, organizations cannot
rely on this entirely because adversaries regularly exfiltrate data before encryption,
although this too offers potential opportunities for detection. Backups will allow
an organization to get back up and running more easily, but will not protect you
against leaked data.
While this report focuses on what security teams can do, when it comes to
ransomware, it’s also important to remember that this problem is monumental
and extends beyond defenders. Policymakers are also taking a close look at
ransomware, and it’s necessary for the security community to help them better
understand what we do so they can make better decisions.
13 l Ransomware
2022 Threat Detection Report
TREND
Supply chain compromises were prevalent in 2021, and these incidents aren’t
going away any time soon. It’s important to understand the different types
of supply chain compromises. To state it simply, a supply chain compromise
occurs when an adversary compromises a software developer, hardware
manufacturer, or service provider and uses that access to target customers who
use the affected software, hardware, or service. For example, the SolarWinds
and Kaseya incidents involved an adversary compromising update servers
to target customers of the companies’ IT management software. Separately,
NPM package and Log4j incidents involved adversaries exploiting open source
libraries in sweeping compromises that impacted products that use Log4j or
NPM packages as a dependency—as well as anyone who uses those products
directly. Each of these incidents made headlines in mainstream media as well as
infosec publications.
SolarWinds
Kaseya
There were many other NPM compromises throughout the year, most notably
us-parser-js. Prior to this compromise, an adversary copied the legitimate
ua-parser-js library and combined it with malicious code to publish a malicious
library. Following this compromise, an adversary took control of two NPM
packages, coa and rc. These incidents used a combination of XMRig coinminer
on macOS and Danabot on Windows. Red Canary continues to track
this activity.
Log4j
One reason the community didn’t observe a large volume of exploitation in the
first few days may be that these vulnerabilities are highly application-specific,
depending on how they’ve implemented Log4j. This means an adversary could
not have crafted a single exploit that would have had a broad impact on many
types of applications at once. Though it took adversaries a few weeks to ramp
up targeting, in late December 2021 and early 2022, internet-facing VMware
Horizon servers using vulnerable versions of Log4j became a target for multiple
operators. Adversaries were likely attracted to VMware Horizon because it is
widely used and often internet-facing. We anticipate the continued targeting of
internet-facing applications using vulnerable versions of Log4j for months
to come.
TA K E ACT I O N
TREND
TA K E ACT I O N
Vulnerabilities We’ve outlined several of 2021’s
major vulnerabilities below,
In 2021, adversaries exploited vulnerabilities affecting popular enterprise
platforms to drop web shells, spread ransomware, and more. along with some detection
guidance. Detecting exploitation
of a vulnerability from an endpoint
perspective can be difficult and
Several high-profile vulnerabilities made it into the collective consciousness of
depends on how exploitation occurs
the security community in 2021. ProxyLogon and ProxyShell targeted Microsoft
in practice. We have tried to supply
Exchange servers and affected a massive number of systems, sometimes leading
detection guidance as close to the
to ransomware deployment. The exploitation of vulnerabilities in Kaseya’s
point of exploitation as possible. In
VSA appliance software also led to ransomware deployment on some of the
other cases, we provide detection
thousands of organizations that used Kaseya software for remote administration
opportunities that would most likely
of endpoints. In the latter half of the year, adversaries exploited multiple
appear as follow-on behavior, such
vulnerabilities in Zoho’s ManageEngine suite of products. PrintNightmare and
as suspicious child processes or
an MSHTML vulnerability caused a ruckus among the security community and
registry modifications. The targeting
media; however, their actual impact appears to have been limited.
of vulnerabilities in enterprise
applications and platforms is
An important nuance to call out is that vulnerabilities are just flaws in code—a
unlikely to slow down in 2022, so it’s
threat must exploit that vulnerability. Given the frequency with which
important to detect the threats that
vulnerabilities are disclosed and the ease with which adversaries can exploit
exploit them head-on.
newly reported weaknesses, particularly in common applications, Red Canary
focuses on identifying and detecting the behavior we observe surrounding
exploitation of a vulnerability. We recommend other organizations do the
same. Understanding the threats and the ways in which adversaries operate in
compromised networks allows defenders to protect against malicious activity
regardless of the means by which their environment is accessed.
17 l Vulnerabilities
2022 Threat Detection Report
process == msexchangemailboxreplication.exe
&&
filemod_extension == .aspx
PrintNightmare (CVE-2021-34527)
Though the vulnerability was concerning, there were not many reported
campaigns exploiting it. That said, ransomware operators such as Vice Society
and Magniber have exploited the vulnerability to gain initial access, and
therefore it’s worth looking out for. We observed a single malicious instance of
PrintNightmare exploitation leading to precursor ransomware behaviors.
18 l Vulnerabilities
2022 Threat Detection Report
parent_process == spoolsv.exe
&&
process == cmd.exe
process == certutil.exe
&&
command_line_includes (decode)
19 l Vulnerabilities
2022 Threat Detection Report
parent_process == keytool.exe
&&
20 l Vulnerabilities
2022 Threat Detection Report
TREND
Affiliates
The threat landscape continued moving toward a software-as-a-service
(SaaS) economy, muddying the already murky waters of attribution.
The term “affiliate” has been increasingly used to describe the cybercrime
ecosystem’s evolution into a software-as-a-service (SaaS) economy. Borrowed
from the subscription-based software specialization strategy, an “affiliate”
refers to the provider-customer relationship of malicious services. In the
cybercrime ecosystem, several SaaS variants have emerged, from phishing-
as-a-service (PhaaS) to access-as-a-service to crypter-as-a-service to
ransomware-as-a-service (Raas). It has never been easier to find an adversary
for hire.
Tracking affiliates is tricky, and to help explain why we think it’s so important,
we want to share some background on our threat tracking journey. At Red
Canary, we primarily track threats by documenting their observable behaviors
in the form of tactics, techniques and procedures (TTP). When we first set out
on this intelligence mission, we began by clustering the most prominent and
prevalent threats within our data. We often focused on the primary payload as
a means of referring to the threat within a detection—think Qbot, TrickBot, or
Cobalt Strike. Often we would see one or more of these threats progressing
to another threat, especially in the wild west of active incident response
engagements.
21 l Affiliates
2022 Threat Detection Report
22 l Affiliates
2022 Threat Detection Report
TA K E ACT I O N
• Does the email that delivered this payload belong to a phishing affiliate, or is
this entire campaign a cohesive cluster?
• What about the attachment or link within the email—is that a commodity
maldoc? Is it part of access broker infrastructure, or does it belong to the
adversary operating the later-stage payload?
• Is the download cradle and loader the beginning of the next-stage payload,
or the last vestige of the delivery affiliate before handing off execution to the
delivered payload?
By honing in on the handoff between one affiliate and the next, you gain better
insight into the potential pivot points in the progression of an incident, hopefully
detecting adversaries closer to the start of an intrusion. Distinguishing phishing
affiliates such as TA551 or TR from the IcedID or Qbot payloads they deliver not only
helps delineate the handoff between the affiliates, but allows you to dive deeper
into delivery patterns to identify differences when the deployed payload changes.
Anticipating the next stage of a threat’s progression based on early observables
enables defenders and incident responders to implement mitigations before that
initial access can progress to lateral movement, data exfiltration, or ransomware.
23 l Affiliates
2022 Threat Detection Report
TREND
Crypters-as-a-service
In 2021, crypters like HCrypt and Snip3 joined the ranks of other
“as-a-service” threats.
Throughout 2021, Red Canary observed operators using crypters HCrypt and
Snip3 to deliver various remote access trojans (RAT). Like other “as-a-service”
threats, the developers sell or lease these crypters to affiliates who use them
to carry out campaigns, expanding the threat landscape and creating new
economies of scale. The “as-a-service” ecosystem lowers the technical barrier
to entry, allowing operators to purchase capabilities rather than develop them.
HCrypt
Snip3
Like HCrypt, Snip3 is a crypter designed to evade detection and download
additional malware. Snip3 is often delivered via phishing emails that prompt
victims to download a VBA file. To evade detection, Snip3 leverages obfuscated
PowerShell commands that contain the RemoteSigned flag. We’ve observed
these PowerShell commands connecting to top4top[.]io, a legitimate file-sharing
service popular in Egypt, Algeria, and Yemen.
24 l Crypters-as-a-service
2022 Threat Detection Report
TA K E ACT I O N
Detection opportunities
WScript spawning Powershell using
Invoke-Expression
This detection analytic will identify wscript.exe spawning PowerShell that
uses Invoke-Expression or one of its aliases. HCrypt and Snip3 use PowerShell
Invoke-Expression cmdlets to execute downloaded PowerShell content
filelessly, without the downloaded scripts touching disk.
process == powershell.exe
&&
parent_process== wscript.exe
&&
command_line_includes (iex || invoke || invoke-expression)
25 l Crypters-as-a-service
2022 Threat Detection Report
TREND
Web shells seriously affected many environments in 2021 due in large part to
Microsoft Exchange and Zoho ManageEngine web server exploitation. Throughout
the year, adversaries exploited ProxyShell, a Microsoft Exchange vulnerability, to
gain privileged access to email systems owned by thousands of organizations. In
these cases, the adversaries left behind a China Chopper web shell, a small and
extensible bit of code that runs arbitrary ASP.NET, PHP, JSP, and other languages.
Some versions of China Chopper require authentication with a preset password,
but many adversaries fail to implement this, meaning that multiple adversaries
can use the same web shell in different campaigns at once.
later. In some incidents, responders may find many web shells on a single server or
evidence of multiple adversaries using an abandoned web shell. Web shells should
be removed as soon as possible to prevent further access.
TA K E ACT I O N
Patching should be the first step for remediating vulnerable web applications like
Exchange, to prevent web shells from being dropped at all. Look for evidence
of an existing breach by following guidance from the application developers.
For example, Microsoft recommends using the Microsoft Support Emergency
Response Tool (MSERT) to scan the Exchange server for exploitation.
If you cannot patch your web applications, consider creating IIS rewrite rules,
disabling Unified Messaging services, and disabling multiple Internet Information
Services (IIS) application pools. These stopgap measures may affect the internal
and external availability of your applications, depending on which products your
organization uses. For more remediation advice, check out our blog Microsoft
Exchange server exploitation: how to detect, mitigate, and stay calm.
To detect web shells, start by examining file modifications and process executions.
For Exchange servers, look for suspicious ASPX file modifications that may indicate
an adversary wrote a web shell to disk. For other web applications like ASP.NET,
PHP, and JSP applications, look for suspicious process behaviors. For example,
you may be able to identify web shell activity by watching for web server worker
processes spawning cmd.exe and PowerShell, certutil on Windows, or curl on
Linux systems.
parent == w3wp.exe
&&
&&
TREND
In 2021, Red Canary observed adversaries use a range of initial access mechanisms
to gain a foothold into victims’ environments. Much of the activity we saw was
consistent with our expectations, with many detections resulting from malicious
emails, attempts to harvest victims’ credentials, and breaches by way of a trusted
party. Additional details on trends associated with these initial access vectors
and follow-on activity such as webstall installation can be found throughout the
report.
Notably, over the past year, we observed a rise in what we refer to as “user-
initiated activity:” cases where victims downloaded a malicious executable after
engaging with content they purposefully sought out. This often occurs without the
victim’s knowledge, particularly in cases where adversaries poison search engine
results to direct victims to compromised websites.
• Adversaries behind both Gootkit and Yellow Cockatoo abuse search engine
optimization (SEO) to display malicious content at the top of a victim’s
search results. Because compromised websites are displayed prominently
and presented to the victim from a trusted search engine, victims are often
easily “lured” to these sites. They are then prompted to download malicious
content masquerading as legitimate content. For example, if a user searched
for “this is my query,” the binary they downloaded would be named this-
is-my-query.exe. Because the file looks familiar, users are less likely to
scrutinize it closely or look for red flags.
In each case, the tradecraft allows the operators to carry out seemingly targeted
social engineering intrusions at scale.
TA K E ACT I O N
To harden your intrusion surface against the search engine tradecraft commonly
used by Yellow Cockatoo and Gootkit, we recommend taking steps to prevent
access to malicious domains and other malicious content on the internet. This
could involve configuring your web proxy to block newly registered and low-
reputation domains (e.g., *.tk, *.top, and *.gg) and blocking ads.
To mitigate risks associated with the fake browser updates related to SocGholish
and the malicious JavaScript files used by Gootkit, we recommend preventing
automatic execution of JavaScript files. You can do this by changing the default file
associations for .js and .jse files.
TREND
TREND
TA K E ACT I O N
Remote monitoring and We see the use of RMM tools as a way
Adversaries regularly abuse remote monitoring and management (RMM) tools Rather than solely focusing on
because they’re widely used for legitimate reasons and seem benign. Along blocking known malware samples or
with the ability to blend in while moving laterally, these tools offer adversaries writing detection logic surrounding
a reliable way to communicate with and pass information in and out of infected built-in operating system tool abuse
In 2021 we identified an uptick of ransomware operators abusing RMM to inventory in mind as well.
computers. These software suites allow users to remotely control hosts, providing hundreds, if not thousands, of
adversaries with a user-friendly graphical interface, secure network connections software suites, but accounting for
via cloud hosted infrastructure, and host persistence. This makes it a challenge for what’s legitimate in your organization
defenders to catch the early stages of intrusions. It became increasingly clear to us is important. We’re not suggesting
throughout the year that being able to initially detect abnormal installation and the near impossible, which is to keep
execution of these tools can help thwart ransomware or slow further deployment tabs on all abnormal behavior of your
Not all ransomware operators or affiliates use these tools as part of their intrusion permissibility of their presence.
chain, meaning other security controls are still important to cover other access
paths. Community reporting has identified ransomware groups like REvil, Conti, Correlating with the legendary
Avos Locker, and Blackheart using software suites such as ScreenConnect, Atera, Pyramid of Pain, malicious use of
and Anydesk to gain persistent footholds to hosts after compromising them. In RMM tools finds itself near the top of
many instances, this led to the deployment of ransomware. Identifying rogue the pyramid, under “Known Tools”
instances of these management tools is a great starting point to help understand and “TTPs.” Gathering laundry lists of
TREND
Linux coinminers
Coinminers continued to dominate the Linux threat landscape in 2021.
While coinminers affect all operating systems, they made up the majority of the
threats we saw on Linux environments in 2021, just as we’ve seen in years prior. As
Log4j vulnerabilities consumed the information security news cycle in December
2021, researchers reported adversaries exploiting Log4j to deliver XMRig payloads
and other coinminers. Being able to detect and respond to common threats like
coinminers will help any blue team detect a wide range of activity—even when it
emanates from unknown exploits.
Many of our Linux coinminer detections began with a Secure Shell (SSH) daemon
or a web server process. While we often did not know the exact method of initial
access, the intrusion chains we observed suggested that many of them began
with weak user authentication or exploitation of web applications. After gaining
initial access, adversaries usually leveraged system utilities such as curl or wget
to download additional utilities like shell scripts and coinmining binaries from
external sources.
Finally, Bird Miner tried to execute XMRig payloads on macOS hosts by using
Qemu to emulate a Linux environment. No matter how elaborate their initial
access techniques, the commonality between these threats is XMRig payloads.
Due to its popularity, XMRig artifacts provide excellent opportunities for
detection, including several discussed below.
33 l Linux coinminers
2022 Threat Detection Report
TA K E ACT I O N
Compromises involving coinmining have been surprisingly consistent over the last
few years, and many of the detection opportunities we have shared previously
are still relevant. Focusing on post-exploitation activity should help, regardless
of whether the initial access method is a weak SSH password, outdated web
application, or exploitation of a vulnerability like Log4Shell.
Here are some additional detection analytics to help identify potential Linux
coinminer activity.
process == bash
&&
filemod_filepath == .ssh/authorized_keys
*Note: There are many shells on Linux endpoints, and this analytic will likely need
to be modified to specify the shells that are used within your Linux environment.
34 l Linux coinminers
2022 Threat Detection Report
process == pkill
&&
command_line == xmr
Renamed coinminers
This detection analytic will identify processes that have command-line
options specific to XMRig and similar miners. While command-line arguments
can be brittle, this is a great way to catch “lazy” adversaries who do little to
hide their activities.
||
&&
*Note: This is a non-exhaustive list of pools and web browsers, which you can
add to with additional research. Additionally, this analytic will likely need to
be tuned to your specific environment, depending on your use of browsers and
business purposes.
35 l Linux coinminers
2022 Threat Detection Report
TREND
We covered RPC abuse in depth on the Red Canary blog last year, but two
methods of RPC abuse stood out in 2021: PetitPotam and PrintNightmare. Both
emerged over the summer, and adversaries quickly adapted them from theoretical
proofs of concept for privilege escalation into real-world intrusions. Both were
reportedly leveraged in ransomware campaigns, underscoring the urgency behind
these threats. We’ve done extensive testing to replicate these techniques and
validate detective and preventive controls for them. What follows is a summary of
these compromises and what you can do to defend your organization.
PetitPotam
method, intercept the authentication response (NTLM relay) between the client
and a server, and use that to authenticate to another workstation. If they target a
domain controller, an adversary could potentially compromise the entire domain
by relaying that authentication to an AD CS server. James Forshaw’s detailed
article from August is a great place to learn more.
TA K E ACT I O N
Security teams seeking to observe and detect PetitPotam intrusions have multiple
options. We’ll describe relevant telemetry that can be gathered from EDR tools and
native operating system logs.
Start by monitoring the Window Security Event 4624 log for anonymous and
other suspicious logins. Many EDR products collect named pipe data, so you can
also monitor for lsarpc or efsrpc named pipe connections to domain controllers.
This will show when an unauthenticated user is trying to communicate with the
domain controller over those transport protocols.
•
• Disable or set EFS Service startup type to disabled if service is not
being used.
• Apply an RPC filter to only allow authenticated connection to the EFS service
over Kerberos.
PrintNightmare
of the Print System Remote Protocol (MS-RPRN) protocol, while the other abuses
a similar driver installation feature of a different protocol, the Print System
Asynchronous Remote Protocol (MS-PAR) protocol. In both cases, an inbound
connection is accepted by the print spooler service (running as SYSTEM), which
allows the creation of a separate process also running as SYSTEM. Once an
adversary gains SYSTEM level privileges, they effectively have full control over
that host.
TA K E ACT I O N
The following data sources, largely available via commercial EDR tools, can help
you identify PrintNightmare-related behavior:
• Monitor files for the the creation of suspicious DLLs in the following file path:
C:\Windows\System32\spool\drivers\(x64/W32X86)\*\.dll
• Monitor module loads to identify when DLLs (especially unsigned ones) are
loaded from the following file path: C:\Windows\System32\spool\drivers\
(x64/W32X86)\*\.dll
TREND
We see a lot of testing. In fact, 23.4 percent of all the confirmed threats we
detected in 2021 were confirmed by customers to be testing. We’re all for testing
(as you can hopefully tell by our work with Atomic Red Team), and we wanted to
share what we’ve observed about testing when compared to “proper villains.”
We also have some suggestions for how to make testing more effective.
TA K E ACT I O N
One approach that can help ensure you’re testing based on real-world threats that
matter is to enhance testing with threat intelligence. Adversary emulation, in which
testers use threat intelligence to try to carefully mimic threats of concern as closely
as possible, is a widespread methodology that can provide significant value and
help organizations improve testing. MITRE’s adversary emulation plans provide
a helpful starting point.
We also recommend changing up your toolset. Automated red teaming and testing
tools are powerful, but they are often easier for defenders to detect. To ensure your
organization has robust detection capabilities for a range of behaviors, consider
different ways you could test the same techniques. For example, instead of just
using Mimikatz for credential dumping, try using Gsecdump, NPPSpy, or other tests
from Atomic Red Team.
Top threats
The following chart illustrates the specific threats Red Canary detected most
frequently across our customer environments in 2021. We ranked these threats
by the percentage of customer organizations affected to prevent a single, major
malware outbreak from skewing the metrics.
This was our second year tracking top threats. When compared to the top
threats in 2020, the overall percentage of customers affected by each threat was
down. For example, in 2020, 15.5 percent of customers were affected by TA551,
compared to 10.2 percent of customers in 2021. While it’s unclear whether this is
anything more than a natural ebb and flow of activity, we suspect one factor is
the overall increase in detection volume we observed in 2021.
42 l Threats
2022 Threat Detection Report
Top threats
50%
2 8.8% Mimikatz
4 6.8% Qbot
5 5.9% Impacket
6 5.5% SocGholish
9 3.8% Gootkit
9 3.8% Bloodhound
Note: We analyzed each of the top 10 threats in last year’s Threat Detection report.
However, since there is significant overlap between the top threats for 2021 and
2022, we opted only to analyze new entrants to the top 10 or reanalyze existing top
10 threats that have changed significantly.
43 l Threats
2022 Threat Detection Report
T O P T E N T H R E AT H I G H L I G H T S
Cobalt Strike #3
Cobalt Strike continues to be a favorite C2 tool among adversaries, as many OVERALL RANK
rely on its functionality to maintain a foothold into victim organizations.
Analysis 7.9%
Cobalt Strike has never been more popular, as adversaries are increasingly CUSTOMERS AFFECTED
adopting it as their favorite C2 tool. Adversaries—ransomware operators in
particular—rely substantially on Cobalt Strike’s core functionalities as they seek
to deepen their foothold in their victims’ environments. Its speed, flexibility,
and advanced features are likely contributing factors as to why ransomware
attacks have been ticking upward in recent years. Some of the most notorious
ransomware operators— including groups like Conti, Ryuk, and REvil/
Sodinokibi—are known to rely heavily on Cobalt Strike in their attacks.
The security community is embracing the fact that whatever functional label you
place on Cobalt Strike, it’s here to stay, it’s implicated in all variety of intrusions,
and it’s our duty to defend against it. Luckily for defenders, over the course of
this past year the security community has produced a plethora of great technical
analysis and detection opportunities around preventing and investigating
Cobalt Strike. Some of the more common detection strategies documented in
public reporting include:
• command-line monitoring
• public network infrastructure scanning
• in-memory scanning
• dynamic/static binary analysis
• abnormal process lineage
• network traffic monitoring
• baselining the prevalence of reconnaissance commands
Keep in mind that although many of these methods of detection can be easily
bypassed with changes to the Cobalt Strike configurations, we highly suggest
using them as a stopgap until your teams develop more advanced methods.
44 l Cobalt Strike
2022 Threat Detection Report
each of the following resources because they all have unique takeaways and
cover a majority of the most effective detection techniques:
• https://www.mandiant.com/resources/defining-cobalt-strike-components
• https://blog.talosintelligence.com/2020/09/coverage-strikes-back-cobalt-strike-paper.html
• https://thedfirreport.com/2021/08/29/cobalt-strike-a-defenders-guide/
• https://thedfirreport.com/2022/01/24/cobalt-strike-a-defenders-guide-part-2/
• https://go.recordedfuture.com/hubfs/reports/mtp-2021-0914.pdf
Detection opportunities
Cobalt Strike beacon implant
This detection analytic identifies an adversary using a Cobalt Strike beacon
implant to pivot and issue commands over SMB through the use of configurable
named pipes. Cobalt Strike beacons have configurable options to allow SMB
communication over named pipes, utilizing a host of default names commonly
used by adversaries. Analysis should focus on any file modifications to a
suspicious named pipe within this process.
parent_process == rundll32.exe
&&
process == cliconfg.exe
45 l Cobalt Strike
2022 Threat Detection Report
process == cmd
&&
command_line_includes (/(?i)echo\s+[0-9a-f]{11}\s+\>\;?\s+\\\\\.\\
pipe\\[0-9a-f]{6}/.match)
*Note: The above regular expression will match on the following example what of
using GetSystem may look like via a Cobalt Strike beacon:
46 l Cobalt Strike
2022 Threat Detection Report
T O P T E N T H R E AT H I G H L I G H T S
Impacket #5
Though Impacket is used legitimately for testing, it is often abused by OVERALL RANK
ransomware operators and other adversaries, thanks in large part to
its versatility.
Analysis 5.8%
CUSTOMERS AFFECTED
At its core, Impacket is a collection of Python libraries that plug into
applications like vulnerability scanners, allowing them to work with Windows
network protocols. These Python classes are used in multiple tools, including
post-exploitation and vulnerability-scanning products, to facilitate command
execution over Server Message Block (SMB) and Windows Management
Instrumentation (WMI). Oftentimes the popular Python scripts smbexec ,
wmiexec , or dcomexec are used directly without referring to Impacket, as
they are versatile and easily implemented code samples. This is the first year
that Impacket made it into our top 10 threat rankings, which we attribute to
increased use by adversaries and testers alike.
47 l Impacket
2022 Threat Detection Report
Responding to Impacket
Response actions may vary depending on the Impacket script component the
adversary is leveraging. If you detect a malicious instance of Impacket, seriously
consider isolating the endpoint because there’s likely an active adversary in
your environment.
Once the endpoint is isolated, evaluate if the adversary loaded other tools, if
they were able to move laterally from the device, and if they stole credentials.
If the adversary moved laterally, isolate any devices they may have accessed. If
there is evidence of credential theft, reset passwords for the impacted accounts.
Please note that if the adversary leveraged Kerberos, passwords will need a
double reset over the course of 10 hours (based on the default 10-hour ticket
Time to Live setting) to reset and invalidate existing tickets.
Following the initial response steps above, stop any active processes
associated with Impacket, remove any malicious files written to disk, and
remove any changes to the device made by the adversary. Reimaging impacted
devices is not out of the question, since an adversary may have installed other
tools or established persistence.
Detection opportunities
WMIexec execution
This detection analytic uses a regular expression to identify commands from the
Impacket wmiexec script, which allows a semi-interactive shell used via WMI.
This analytic shows output being redirected to the localhost ADMIN$ share. The
regular expression identifies an output file named as a Unix timestamp (similar
to 1642629756.323274) generated through the script.
parent_process == wmiprvse.exe
&&
process == cmd.exe
&&
SMBexec execution
This detection analytic uses a regular expression to identify commands from the
48 l Impacket
2022 Threat Detection Report
parent_process == services.exe
&&
process == cmd.exe
&&
49 l Impacket
2022 Threat Detection Report
T O P T E N T H R E AT H I G H L I G H T S
SocGholish #5
SocGholish leverages drive-by-downloads masquerading as software OVERALL RANK
updates to trick visitors of compromised websites into executing malware.
Analysis 5.5%
SocGholish is an initial access threat that leverages drive-by-downloads CUSTOMERS AFFECTED
masquerading as software updates. Active since at least April 2018, SocGholish
has been linked to the suspected Russian cybercrime group Evil Corp (also
known as Indrik Spider). Red Canary encountered SocGholish in a wide variety
of industry verticals in 2021. These drive-by-downloads placed SocGholish
inside the top five most prevalent threats we track. This ranking was fueled
by an increasing number of detections as the year went on, culminating in
SocGholish peaking as the most prevalent threat we encountered in December.
50 l SocGholish
2022 Threat Detection Report
In 2021, Red Canary observed NetSupport RAT and BLISTER malware delivered
by SocGholish. In the past, we have seen SocGholish deploy a Cobalt Strike
payload that led to WastedLocker ransomware. The connection between
SocGholish and BLISTER is notable, as this malware loader was only identified
by Elastic in late December 2021. Following BLISTER deployment in an
environment initially compromised with SocGholish, we detected several
post-exploitation reconnaissance behaviors on the affected endpoint.
The majority of SocGholish infections we’ve detected did not result in a second-
stage payload, sometimes due to existing mitigations or rapid response to
isolate the host. In most cases, we observed reconnaissance activity that only
identified the infected endpoint and user. In some cases, Active Directory and
domain enumeration followed user discovery. Both of these can be a precursor
to lateral movement, however, the hosts were isolated before any lateral
movement activity could begin. Much of the reconnaissance conducted by the
malicious JavaScript file happens in memory, with data being exfiltrated directly
via POST commands to the C2 domain. One good source of insight into this
behavior comes from collecting script load content, if such telemetry is available
from your endpoint detection and response (EDR) sensor. Collecting this data
provides key insight into the specific commands executed and data exfiltrated.
Detection opportunities
JavaScript executing from a ZIP file and making
external network connections
Executing script contents from within a ZIP file is unusual, especially when that
script is making external network connections. This detection analytic regularly
identifies the initial execution and network connections from a SocGholish
JavaScript payload extracted from a ZIP file.
51 l SocGholish
2022 Threat Detection Report
process == wscript.exe
&&
&&
has_external_netconn
parent_process == wscript.exe
&&
process == cmd.exe
&&
command_line_includes ( whoami/all>> )
process == nltest.exe
&&
52 l SocGholish
2022 Threat Detection Report
T O P T E N T H R E AT H I G H L I G H T S
Yellow Cockatoo #7
Yellow Cockatoo is an activity cluster involving a remote access trojan (RAT) OVERALL RANK
that filelessly delivers various other malware modules.
Analysis 4.9%
As Yellow Cockatoo uses effective search engine poisoning tactics, can stealthily CUSTOMERS AFFECTED
persist in a compromised environment, and appears to affect a wide array of
organizations across various sectors and geographies, we weren’t surprised
to see it crack our top 10 threats in 2021. In September the volume of Yellow
Cockatoo detections increased substantially (relative to earlier in the year). This
may have been the result of a new installation mechanism, chronicled in detail
by researchers from Morphisec (they call this threat “Jupyter”).
53 l Yellow Cockatoo
2022 Threat Detection Report
Execution: Following installation, the EXE or MSI file spawns a command line
and creates a similarly named TMP file that launches PowerShell. All of this is
precursor activity that leads to the execution of a malicious dynamic link library
(DLL). This is a remote access trojan (RAT) implemented as a .NET assembly
designed to be reflectively loaded into PowerShell.
To harden your attack surface against the search engine redirects commonly
used by Yellow Cockatoo, we recommend taking steps to prevent access to
malicious domains and other malicious content on the internet. This could
involve configuring your web proxy to block newly registered and low-
reputation domains (e.g.,*.tk, *.top, and *.gg) and block advertisements.
Detection opportunities
PowerShell writing startup shortcuts
We frequently observe adversaries using PowerShell to write malicious LNK files
into the startup directory to establish persistence. Accordingly, this detection
opportunity is likely to identify persistence mechanisms in multiple threats. In
the context of Yellow Cockatoo, this persistence mechanism eventually launches
the command-line script that leads to the installation of a malicious DLL:
process == powershell.exe
&&
command_line_includes ( appdata )
&&
&&
filemod_extension == .Ink
*Note: You can test the efficacy of this detection opportunity by running this Atomic
Red Team test in PowerShell with elevated privileges.
54 l Yellow Cockatoo
2022 Threat Detection Report
process == powershell.exe
&&
command_line_includes ( reflection.assembly )
&&
command_line_regex_encoded == /(?i)::\(?load\)?(?:|file)\(/
55 l Yellow Cockatoo
2022 Threat Detection Report
T O P T E N T H R E AT H I G H L I G H T S
Gootkit #9
Gootkit is a banking trojan that can deliver additional payloads, siphon data OVERALL RANK
from victims, and stealthily persist in a compromised environment.
Analysis 3.8%
A malware threat with a JavaScript loader component, Gootkit has been actively CUSTOMERS AFFECTED
observed in the wild for more than a decade. Over the past several years, it has
evolved into a multi-stage tool used to facilitate a range of hands-on-keyboard
activity in multi-pronged attacks, wherein more than one objective is likely
accomplished. Gootkit was originally delivered via spam email campaigns and
older exploit kits, but over time its initial access has shifted to SEO poisoning
tactics. Specifically, operators alter search engine results to direct victims
to legitimate but compromised websites hosting Gootkit. Upon visiting
a compromised website, victims are prompted to download a ZIP archive
containing a malicious JavaScript file, which if executed can allow an adversary
to remotely access a victim’s system. While some researchers track the delivery
mechanism as “Gootloader” and the trojan activity as “Gootkit,” Red Canary
tracks both components as “Gootkit.” Our classification may shift as we gather
additional information.
Follow-on activity varies. In 2021, Red Canary saw operators use Gootkit
to deliver Cobalt Strike. Though we didn’t observe any ransomware in that
intrusion, the intrusion chain mirrored public reporting of compromises
where victims’ networks were ultimately encrypted with Sodinokibi (REvil)
ransomware. Based on public research and follow-on activity observed in
customer environments last year, it’s likely that Gootkit operators facilitate
ransomware-as-a-service (RaaS) activity in some cases, either deploying other
payloads directly or selling access to environments with Gootkit infections. We
have also observed Gootkit dropping the Osiris banking trojan.
56 l Gootkit
2022 Threat Detection Report
Detection opportunities
Windows Scripting Host executing
JavaScript files
This detection analytic will identify unusual activity originating from wscript.
exe executing JavaScript files from the %APPDATA% directory. This applies
to GootKit because the initial loader for the threat is implemented in JavaScript
that gets executed via wscript.exe when the victim double-clicks on the
downloaded loader.
process == wscript.exe
&&
file_path_includes ( %APPDATA% )
process == powershell.exe
&&
57 l Gootkit
2022 Threat Detection Report
T O P T E N T H R E AT H I G H L I G H T S
BloodHound #9
BloodHound is an open source tool that provides visibility into Active OVERALL RANK
Directory environments. It is a common precursor to follow-on activity,
whether that’s further testing or ransomware.
Analysis 3.8%
CUSTOMERS AFFECTED
BloodHound is an open source tool that can be used to identify attack paths
and relationships in an Active Directory (AD) environment. Like Impacket, this is
the first year BloodHound made it into our top 10 threat rankings, thanks to both
testing activity and adversary use. It is popular among adversaries and testers
because having information about an AD environment can enable further lateral
movement throughout a network. BloodHound has multiple components,
including SharpHound, which is a data collector for BloodHound written in
C#. Throughout 2021, SharpHound was one of the most common BloodHound
components we observed.
58 l BloodHound
2022 Threat Detection Report
Detection opportunities
High-volume port 445 connections
This detection opportunity identifies a single process exceeding a set threshold
for a normal volume of network connections to port 445. We did not specify logic
for this detection analytic, since the normal number of connections will differ
in each environment. While it takes some tuning, this analytic helps detect not
only BloodHound, but also various types of post-exploitation SMB scanning and
lateral movement.
59 l BloodHound
2022 Threat Detection Report
T H R E AT : N E W A C T I V I T Y C L U S T E R
Analysis 1.1%
Rose Flamingo is an activity cluster named by Red Canary that focuses on CUSTOMERS AFFECTED
opportunistic, financially motivated malware as an initial access broker. Rose
Flamingo targets victims who are looking to download licensed software
without having to pay for it. Payloads related to Rose Flamingo typically arrive
as archive files that are distributed via phony file-sharing websites purporting to
provide users with “free” cracked software packages. To lure potential victims,
the adversaries behind Rose Flamingo use search engine optimization (SEO)
poisoning to elevate a malicious site’s search ranking.
Rose Flamingo victims will typically download a ZIP archive file containing two
files at a minimum. Archives related to Rose Flamingo may contain words like
free , key , download , license , latest , ISO , and crack . While these archives
usually appear as ZIP files, they infrequently appear as other compressed
archive formats as well. The files in a typical Rose Flamingo archive are a
“password” text file and one password-protected archive. Some iterations
of these “password” files contain the password and some classic ASCII art,
as shown below, though the purpose behind the art is unknown. This type of
delivery method conceals the malicious payloads that are contained within the
password-protected archive from any prying security software
Figure 2: The contents of a “password” text file associated with Rose Flamingo
60 l Rose Flamingo
2022 Threat Detection Report
• Just about a week later in March 2021, Proofpoint published research about
a threat they call CopperStealer (Mingloa), describing infrastructure and
payload-naming conventions that are very similar to Rose Flamingo’s.
• In late July 2021, BitDefender joined the party, helping corroborate many of
our own observations with their MosaicLoader whitepaper, a great report
that touches on much of the initial loader activity we’ve observed in Rose
Flamingo-related incidents.
• Last but not least, in September 2021, SophosLabs released research that
focuses on a content delivery network that has many infrastructure and
payload overlaps with our analysis.
Because none of us have perfect visibility, we appreciate that other teams share
their perspective and how they track these threats.
61 l Rose Flamingo
2022 Threat Detection Report
Detection opportunities
Archive containing ZIP and TXT files
containing password
This detection analytic will identify processes making file modifications for
ZIP archive files and TXT files with the string password in them, which we
commonly observe in Rose Flamingo activity. The password files may contain
different naming variations, such as p@ssword or passw0rd . Detecting TXT
files with these strings may generate fewer false positives. If you have trouble
getting this detection opportunity to work, you may find further success
focusing on application processes that are responsible for handling archives in
your organization, such as 7zip.
filemod_includes ( zip )
&&
||
filename_includes ( -fre e || - crack || - download || -key || -license ||
-iso || -Install )
&&
62 l Rose Flamingo
2022 Threat Detection Report
T H R E AT : N E W A C T I V I T Y C L U S T E R
Silver Sparrow
Silver Sparrow is a macOS activity cluster with fully functional distribution
methods and infrastructure but no final payload.
• At the time of analysis, its malware was compatible with M1 ARM64 and
Intel chipsets. Researchers have uncovered very few threats for the M1
ARM64 architecture because the architecture is young.
63 l Silver Sparrow
2022 Threat Detection Report
process == PlistBuddy
&&
command_line_includes ( RunAtLoad )
process_name == ( sqlite3 )
&&
command_line_includes ( LSQuarantineURLString )
64 l Silver Sparrow
2022 Threat Detection Report
R E L E V A N T T H R E AT S O F 2 0 2 1
Bazar #16
The Bazar family of malware continued to be active in 2021, spurring OVERALL RANK
ransomware infections.
1.7%
The Bazar malware family was quite active in 2021, spreading via multiple
delivery affiliates, including TA551 and BazaCall. There are many names
for Bazar (sometimes referred to as “Baza”) floating around that refer to
various parts of the intrusion chain. Bazar is relevant because of its role as CUSTOMERS AFFECTED
a malware precursor, and many 2021 intrusions starting with Bazar led to
ransomware like Ryuk and Conti. The Bazar malware family encompasses a
loader, BazarLoader, and backdoor, BazarBackdoor. These components have
been delivered via multiple delivery affiliates. As we discuss in the Affiliates
section of this report, differentiating initial delivery affiliates from loaders and
payloads will help you understand each phase of the threat and how to better
protect your organization.
One affiliate we’ve been tracking for a while, TA551, began delivering Bazar
during 2021. While TA551 relied on email attachments to deliver Bazar, another
affiliate behind a 2021 phishing campaign known as BazaCall opted to trick
users into calling a phone number sent in an email. After a victim called
the number, an adversary provided step-by-step instructions that led to
downloading Bazar malware. (Check out Brad Duncan’s video for an example
of how this intrusion plays out.) Once BazaLoader was installed, BazaCall led to
Cobalt Strike and eventually, ransomware.
Detection opportunities
Microsoft Certificate Services using
certutil.exe to initiate download
This detection analytic looks for instances of the Microsoft Certificate
Utility ( certutil.exe ) initiating a download, a technique used to download
Bazar payloads.
process == certutil.exe
&&
command_line_includes ( urlcache )
65 l Bazar
2022 Threat Detection Report
R E L E V A N T T H R E AT S O F 2 0 2 1
Latent threats
Threats come and go, but some—like USB stowaways and network
worms—like to stick around.
USB stowaways
In this section we characterize “USB stowaways” as threats that leverage USB
thumb drives to find their victims.
This detection analytic identifies file modifications that are consistent with
Floxif malware execution.
66 l Latent threats
2022 Threat Detection Report
&&
parent_process == explorer.exe
&&
command_line_does_not_include ( .dll )
67 l Latent threats
2022 Threat Detection Report
&&
Network worms
In this section we characterize “network worms” as threats that exploit
vulnerabilities in software to infect and establish control over an endpoint.
Following initial access, adversaries leverage the infected endpoints’ network
connections to identify additional assets to infect and repeat the cycle.
process_name == mssecsvc.exe
||
process_name == tasksche.exe
68 l Latent threats
2022 Threat Detection Report
This detection analytic will identify instances of the Local Security Authority
Subsystem Service ( lsass.exe ) spawning processes that are not typically
observed being launched by lsass.exe . LSASS is an injection target for
WannaCry, as detailed by Microsoft.
parent_process == lsass.exe
&&
process == powershell.exe
&&
69 l Latent threats
2022 Threat Detection Report
&&
&&
70 l Latent threats
71
2022 Threat Detection Report
Top techniques
The purpose of this section is to help you detect malicious activity in its
early stages so you don’t have to deal with the consequences of a serious
security incident.
72 l Techniques
2022 Threat Detection Report
TOP TECHNIQUES
T1 0 5 5 : Proces s I n je ct io n 6 21. 7%
T1 0 5 3 : Sch ed u le d Ta s k /J o b 7 14. 7%
• T 1053.005: S chedul ed Task (4) (12.2%)
T1 0 3 6 : Ma s q u e ra din g 9 22. 1%
• T 1036.003: Ren ame S ystem U t il it ies (7) (15.6%)
• T 1036.005: M atch Legit imate Name or Lo cat ion (11) (7.9%)
T1 5 7 4 : Hi j a ck Exe c u t io n Flow 10 8. 4%
• T 1574.001: DLL S earch Order Hijackin g (5) (7.8%)
*Note: We chose not to include analysis for each technique in the PDF supplement to the report,
but, as always, they’re available in full on the Threat Detection Report website.
73 l Techniques
2022 Threat Detection Report
• descriptions of data sources that offer visibility into the technique (e.g.,
command monitoring, process monitoring, etc.)
• guidance on the tooling or logs that will enable you to collect those data
sources (e.g., EDR, Sysmon, AMSI, Windows Events. etc.)
• specific examples of how you can use that telemetry to detect adversaries
abusing the technique
To that point, we mostly detect adversaries as they’re setting the stage for later,
more impactful actions. We catch them attempting to abuse native operating
system utilities to execute code or bring in custom tooling. We catch them
elevating their privilege levels to get deeper access to compromised systems.
We catch them establishing persistence so they can maintain their presence. We
catch them manipulating our customers’ defensive controls to evade prevention
or detection. These are necessary means to an end—whether the goal is to
conduct espionage, a ransomware attack, or something else altogether. When
we disrupt these means, we prevent their ends.
This is precisely why exfiltration and impact techniques (e.g., ransomware) don’t
rank highly on our list. The following heatmap shows the distribution of the 20
most prevalent techniques across the ATT&CK matrix.
74 l Techniques
2022 Threat Detection Report
Figure 3: MITRE ATT&CK Navigator layer showing the 20 most prevalent ATT&CK techniques detected by Red Canary
75 l Techniques
2022 Threat Detection Report
Interestingly, if we create a heatmap like the one above where we only include
detections from our incident response work, we see a slightly different
arrangement of techniques that does include impact tactics—as well as more
defense evasion, more lateral movement, and less execution. This makes sense
because in incident response engagements we are entering environments
where a lot of the preliminary activity—the stuff we generally catch early for our
full-time customers—has already occurred. In other words, we’re already at the
impactful part of the incident.
Figure 4: MITRE ATT&CK Navigator layer showing the 20 most prevalent ATT&CK techniques detected by Red Canary
during incident response engagements
76 l Techniques
2022 Threat Detection Report
However, this analysis is still useful for practitioners or leaders who aren’t
immediately ready to operationalize it. For leaders, the most prevalent
techniques can help you identify gaps as you develop a road map for improving
coverage. You can assess your existing sources of collection against the ones
listed in this report to inform your investments in new tools and personnel.
Red Canary is actively adopting new data sources that reach beyond the
endpoint to enhance our detection, investigation, and incident handling
capabilities, and you’ll see evidence of this throughout the techniques
section—particularly in the visibility, collection, and detection subsections.
Even so, the majority of our detection analytics are based on endpoint
telemetry and the majority of the endpoints we monitor are client workstations.
This reality shapes our perspective and the contents of this report.
Given our vantage point and the defense-in-depth our detection analytics offer,
we tend to detect the adversary behaviors that happen just after initial access.
As a result, execution, privilege escalation, persistence, and defense evasion
techniques are probably over-emphasized in our report. On the other hand, one
of the most prevalent forms of initial access—email-based phishing—is under-
represented. Under no circumstance should anyone interpret these findings to
suggest that phishing protection is unimportant. To the contrary, phishing is
among the most prevalent ways that adversaries initially access our customers’
environments, and the data in this report does reflect a great number of
77 l Techniques
2022 Threat Detection Report
78 l Techniques
2022 Threat Detection Report
Conclusion
Thank you for devoting your time to absorbing this report; we appreciate your dedication to
protecting your organization. We understand there are lots of reports floating around the
information security community, and we take pride in our work to muffle the noise, opting
instead for curated and actionable content. We hope the information encompassed in this
report offers insights into how to improve your security posture and what you can do if you
encounter any of the most prevalent threats, trends, and techniques. We will continue to
update the Red Canary blog with relevant resources related to the Threat Detection Report
and many other valuable resources you can use to take action.
If you have any questions or concerns, or just want to chat, please feel free to reach out to us
at [email protected].
Contributors
Thank you to all our contributors who helped make this report possible.
79 l Conclusion
80