WLAN Credential Leak

Rule added on 30th May, 2024

Rule type:

Correlation

Rule description:

A WLAN ( Wireless Local Area Network) credential leak involves the attempt to dump wireless saved access keys in a clear text using the netsh command. Once the attackers gain access to the network security keys or WiFi passwords, they can move laterally within the network to gather sensitive information.

Attack chain scenario: Man-in-the-middle (MitM) Attack -> WLAN traffic interception -> Password sniffing -> Data exfiltration

Impact:

It can impact the organizations in the following ways:

  • Credential theft
  • Data exfiltration
  • Network breaches

Data source:

Windows > Process Creation

Required configuration: The rule is based on the process creation and termination. Prerequisites required are installing and configuring Sysmon, enabling audit process creation audit policy, and the command line auditing.

Relevant MITRE ATT&CK techniques and tactics:

Tactic: TA0007- Discovery

Technique: T1003- System Network Configuration Discovery

Sub Technique: T1016.002- Wi-Fi Discovery

Criteria:

( ( Process Name ends with netsh.exe" ) OR ( Original File Name ends with "netsh.exe" ) ) AND ( ( Command Line contains "wlan" ) AND ( Command Line contains "Key") AND ( Command Line contains "clear" ) )

netsh.exe - Displays the network configurations of the computer in use.

wlan - Displays the wifi profiles and their associated properties.

clear - Display the security keys of the Wifi profiles in plaintext.

When to enable this rule:

Enabling this rule will help you meet the security standard's requirement listed below:

Security standards (NIST CSF 2.0):

DE.CM-09: Computing hardware and software, runtime environments, and their data are monitored to find potentially adverse events

When this rule is triggered, you're notified when a suspicious WLAN credential leak has occurred using netsh command. This empowers you to use corrective actions, such as restricting the administrator privileges to necessary users.

Known false positives: This event may be generated while clearing a forgotten wireless profile.

Next steps:

When this alert is triggered, the following measures can be implemented:

  • Identification: Identify if the alert is a new incident or part of an existing incident.
  • Analysis: Analyze the impact and extent of the compromise to comprehend the severity of the attack.
  • Response: Respond promptly by initiating an automated workflow to cease the malicious process.
  • Deploy advanced encryption methods: Use advanced encryption methods such as WPA3 for securing WiFi networks.