• Platformchevron right
  • Solutionschevron right
  • Modern NDRchevron right
  • Resourceschevron right
  • Companychevron right

DETECTION OVERVIEW

Unconventional Protocol Communication

Risk Factors

Certain types of devices might only require a specific set of protocols for routine tasks. For example, VoIP phones communicate over the SIP and RTP protocols to send and receive calls and never communicate over SMB. If an attacker compromises a device on the network, they might conduct malicious activity (such as exfiltration or scanning) over unconventional protocols. Unconventional protocol activity should be examined before it enables critical or costly attacks.

The system might change the risk score for this detection.

Kill Chain

Exploitation

Risk Score

60

Detection diagram
Next in Exploitation: Unconventional RDP Behavior

Attack Background

An adversary can choose from many attack techniques to compromise a device, from performing supply-chain attacks to exploiting unknown (zero-day) vulnerabilities. This detection surfaces stealthy attack behavior attributed to a number of techniques by identifying unconventional behavior of a compromised device. First, the ExtraHop system observes the network behavior of each device on the network and looks for similarities among their protocol and host interactions. Next, the ExtraHop system applies a clustering algorithm that identifies groups of devices that similarly behave. Over time, as new behaviors are observed, the ExtraHop system can detect when a device is no longer acting conventionally compared to similar devices.

The following diagram shows one example scenario with several clusters of similarly behaving devices, where an R&D build server is compromised through a supply-chain attack and starts communicating with an HR file share over the SSH protocol. The new behavior of this compromised server is unconventional compared to the behavior of similar R&D build servers.

Mitigation Options

Remove or disable any extraneous applications, services, and daemons on the device

Quarantine the device while checking for indicators of compromise, such as the presence of malware

Implement strong authentication methods for remote access services

Implement network segmentation and the principle of least privilege on accounts to minimize the damage caused by a compromised device

MITRE ATT&CK ID

What else can RevealX do for you?