An adversary can reduce their footprint by using credentials to directly connect to the network as a legitimate user, instead of relying on the RAT.

Malware/Threat actors

Preventions

<Mitigation techniques>

Detections

  • Monitor source IP addresses connecting to your VPN instance and compare these addresses to a GeoIP database. Your users should be connecting to your VPN from locations that relative to office locations.
  • Monitor timestamps when connections are initiated to your VPN instance. Look for timestamps of users connecting to the VPN at irregular times.

Toolkit

<Toolkit instructions, if applicable>

Similar techniques

References

  • [<Source name>](<Source link>)