{"id":21899,"date":"2022-05-10T19:11:42","date_gmt":"2022-05-10T19:11:42","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/?p=21899"},"modified":"2022-05-10T19:13:53","modified_gmt":"2022-05-10T19:13:53","slug":"hackers-exploit-windows-event-logs","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/threats\/hackers-exploit-windows-event-logs\/","title":{"rendered":"Hackers Are Now Exploiting Windows Event Logs"},"content":{"rendered":"\n<p>Hackers have found a way to infect Windows Event Logs with fileless <a href=\"https:\/\/www.esecurityplanet.com\/threats\/malware-types\/\">malware<\/a>, security researchers have found.<\/p>\n\n\n\n<p>Kaspersky researchers on May 4 <a href=\"https:\/\/securelist.com\/a-new-secret-stash-for-fileless-malware\/106393\/\" target=\"_blank\" rel=\"noreferrer noopener\">revealed<\/a> \u201ca new stash for fileless malware.\u201d During a \u201cvery targeted\u201d campaign, hackers used Windows Event Logs to inject shellcode <a href=\"https:\/\/www.esecurityplanet.com\/threats\/how-hackers-use-payloads-to-take-over-your-machine\/\">payloads<\/a> and operate stealthily.<\/p>\n\n\n\n<p>This new approach is highly sophisticated yet could still become popular, as it seems quite efficient for injecting malicious DLL and <a href=\"https:\/\/www.esecurityplanet.com\/threats\/how-hackers-evade-detection\/\">evading detection<\/a>. Kaspersky researchers discovered that the attackers used various tools, including custom and commercial solutions like Cobalt Strike and a new toolset used by the hackers.<\/p>\n\n\n\n<p>The researchers said it&#8217;s clearly the work of an advanced threat actor but they could not attribute the campaign to a known <a href=\"https:\/\/www.esecurityplanet.com\/threats\/advanced-persistent-threat\/\">APT<\/a> group. The campaign is dubbed \u201cSilentBreak\u201d for now, after the name of the toolset used by the hackers.<\/p>\n\n\n\n<p>Also read: <a href=\"https:\/\/www.esecurityplanet.com\/threats\/how-cobalt-strike-became-a-favorite-tool-of-hackers\/\">How Cobalt Strike Became a Favorite Tool of Hackers<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>SilentBreak&#8217;s Attack Techniques<\/strong><\/h2>\n\n\n\n<p>The researchers were struck by \u201cthe variety of the campaign\u2019s techniques and modules,\u201d so they made a classification to analyze the modules one by one:<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh5.googleusercontent.com\/6sI3c6Iuac52CLApfxcdrGa_ZjcQ1i18F69s03xAeOwzmyIFz012SiDCIR-Pmwx49MfSJoVG6R5i1-P9x_yw182dV4kaKT-v1YaNcWn0u7LazAA6OmdYQXkRvzZwcXdXZW5oqxKEnFnqlLwhDQ\" alt=\"\"\/><\/figure>\n\n\n\n<p>All these stages were possible because the hackers managed to trick a target into downloading an infected .rar on file.io, a legitimate website. After that, they were able to spread a digitally-signed Cobalt Strike module to exfiltrate sensitive data.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>How the Attackers Injected Code in Windows Logs<\/strong><\/h2>\n\n\n\n<p>The researchers discovered malicious payloads into Windows event logs for the Key Management Services (KMS):<br><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/lh4.googleusercontent.com\/eafeS30MSjq_WHUZIZ86YL3K2ix05vaj0FLfrc-xAfyBvTXCh_MyMVtjAs-vpyE1mIIIU4RbzSxo8JfHFXC36AgjGcbu7Ww-DUC-lzC6AZDQoa2JtTYyX9BNUyh80rPlcDUWys6yGR8oLaM1IA\" width=\"643\" height=\"195\"><\/p>\n\n\n\n<p>To achieve the first stage in their campaign, the hackers used a custom malware dropper that copies the legitimate Windows Error Reporting executable (WerFault.exe) to C:\\Windows\\Tasks, and then drops a malicious binary in the same directory:<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"682\" height=\"433\" src=\"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2022\/05\/denis_legezo_screen.png\" alt=\"\" class=\"wp-image-21901\" srcset=\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/05\/denis_legezo_screen.png 682w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/05\/denis_legezo_screen-300x190.png 300w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/05\/denis_legezo_screen-150x95.png 150w\" sizes=\"(max-width: 682px) 100vw, 682px\" \/><\/figure>\n\n\n\n<p>This technique is called DLL hijacking and consists of replacing a required DLL file with a malicious one and placing it in the same directory as the targeted application. The system uses DLL (Dynamic Link Library) files to store some resources the application needs and will load automatically.<\/p>\n\n\n\n<p>The new WerFault.exe is then set to autorun, which creates a \u201cWindows Problem Reporting value in the Software\\Microsoft\\Windows\\CurrentVersion\\Run Windows system registry branch.\u201d<\/p>\n\n\n\n<p>The dropper then looks for logs with a specific category (0x4142) and with the KMS as a source. If it does not find one, the encrypted shell code is written in 8KB chunks in the event logs.<\/p>\n\n\n\n<p>Kaspersky researchers explored the code and discovered it acts as a proxy to intercept all calls to the original library (the legitimate one) and prepare the next stages, which indicates an iterative procedure.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Hackers Focused on Evasion<\/strong><\/h2>\n\n\n\n<p>The top priority for this operation was obviously to remain undetected. To achieve that, the attackers used various anti-detection techniques such as:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>a legitimate digital certificate to sign malicious files<\/li><li>autorunned copies of legitimate executable (Werfault.exe)<\/li><li>anti-detection wrappers compiled in various languages such as Go or C++<\/li><li>obfuscated function names in code<\/li><li>malicious instructions split into chunks of shell code in the Windows Event Logs<\/li><\/ul>\n\n\n\n<p>The malware analysis by Kaspersky is quite remarkable and detailed. The researchers had to write custom scripts to decrypt all the hidden areas.<\/p>\n\n\n\n<p>According to the researches, the most unusual and innovative aspect of the SilentBreak campaign is the \u201cEncrypted shellcode divided into 8 KB blocks and saved in the binary part of event log.\u201d<\/p>\n\n\n\n<p>During the second stage, the hackers used custom decryptor launchers for Cobalt Strike to decrypt the shell code and map it into memory and ultimately execute the malicious instructions and deploy malware.<\/p>\n\n\n\n<p>Also read: <a href=\"https:\/\/www.esecurityplanet.com\/threats\/how-hackers-evade-detection\/\">How Hackers Evade Detection<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>The Campaign Relied on Trojans<\/strong><\/h2>\n\n\n\n<p>The attackers used two types of Trojans:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>HTTP-based Trojan with C2 (command and control)<\/li><li>Named-pipe based Trojan<\/li><\/ul>\n\n\n\n<p>The encrypted shell code in event logs contained very specific arguments such as the address of next stage Trojan or the hashes of function names used inside the Trojan.&nbsp;<\/p>\n\n\n\n<p>There were also unused strings like \u201cdave\u201d and the constant \u201c4.\u201d The researchers believed the launcher might support other modules that require additional parameters, which could explain such artifacts.<\/p>\n\n\n\n<p>The HTTP Trojan seems to generate fingerprinting-containing information such as the computer name, the local IP addresses, the OS version, the architecture (x86 or x64), and the values of MachineGUID.<\/p>\n\n\n\n<p>This information is then used to send targeted instructions through the rogue communication channel (C2).<\/p>\n\n\n\n<p>According to the researchers, the named-pipe Trojan has \u201ca more profound command system,&#8221; including privilege escalation, taking screenshots, or measuring inactivity time.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>How to Protect Against Event Log Attacks<\/strong><\/h2>\n\n\n\n<p>Such a high degree of preparation and the time spent on writing custom modules and decryptors suggest the work of an advanced hacking group that remains unidentified at the time of writing.<\/p>\n\n\n\n<p>There\u2019s not much you can do to anticipate such high-profile attacks, and <a href=\"https:\/\/www.esecurityplanet.com\/products\/antivirus-software\/\">antivirus software<\/a> or built-in <a href=\"https:\/\/www.esecurityplanet.com\/networks\/types-of-firewalls\/\">firewalls<\/a> aren&#8217;t likely to catch them. However, you can take concrete measures like using <a href=\"https:\/\/www.esecurityplanet.com\/products\/edr-solutions\/\">EDR and other endpoint security solutions<\/a> to increase your chances of detecting unusual and suspicious activities, particularly if those solutions have a <a href=\"https:\/\/www.esecurityplanet.com\/products\/best-user-and-entity-behavior-analytics-ueba-tools\/\">behavioral component<\/a>.<\/p>\n\n\n\n<p>A <a href=\"https:\/\/www.esecurityplanet.com\/networks\/microsegmentation-is-catching-on-as-key-to-zero-trust\/\">zero trust architecture<\/a> may also help to contain the infection, as here, for example, the hackers had a strategy to spread their malware and iterate the infection cycle.<\/p>\n\n\n\n<p>Security vendors and knowledge bases such as <a href=\"https:\/\/www.esecurityplanet.com\/networks\/use-mitre-attck-to-understand-attacker-behavior\/\">MITRE ATT&amp;CK<\/a> are likely to add this new approach to their catalogs in coming months. In any case, that would be a good idea to help security teams map the technique for threat intelligence purposes.<\/p>\n\n\n\n<p>Read next:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><a href=\"https:\/\/www.esecurityplanet.com\/products\/zero-trust-security-solutions\/\">Best Zero Trust Security Solutions<\/a><\/li><li><a href=\"https:\/\/www.esecurityplanet.com\/trends\/zero-trust-challenges\/\">Zero Trust Can\u2019t Protect Everything. Here\u2019s What You Need to Watch.<\/a><\/li><\/ul>\n\n\n<div id=\"ta-campaign-widget-66d7018b9a95a-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d7018b9a95a\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d7018b9a95a\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d7018b9a95a\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d7018b9a95a\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d7018b9a95a\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d7018b9a95a\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Hackers have found a way to infect Windows Event Logs with fileless malware, security researchers have found. Kaspersky researchers on May 4 revealed \u201ca new stash for fileless malware.\u201d During a \u201cvery targeted\u201d campaign, hackers used Windows Event Logs to inject shellcode payloads and operate stealthily. This new approach is highly sophisticated yet could still [&hellip;]<\/p>\n","protected":false},"author":267,"featured_media":21901,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[15],"tags":[5648,532],"b2b_audience":[33,35],"b2b_industry":[],"b2b_product":[31788,382],"class_list":["post-21899","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-threats","tag-advanced-persistent-threats","tag-microsoft","b2b_audience-awareness-and-consideration","b2b_audience-implementation-and-support","b2b_product-advanced-persistent-threats","b2b_product-application-security-vulnerability-management"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Hackers Are Now Exploiting Windows Event Logs | eSecurity Planet<\/title>\n<meta name=\"description\" content=\"Advanced hackers have figured out how to hide fileless malware in event logs. Here&#039;s how to protect your organization.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/threats\/hackers-exploit-windows-event-logs\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Hackers Are Now Exploiting Windows Event Logs | eSecurity Planet\" \/>\n<meta property=\"og:description\" content=\"Advanced hackers have figured out how to hide fileless malware in event logs. Here&#039;s how to protect your organization.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/threats\/hackers-exploit-windows-event-logs\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2022-05-10T19:11:42+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-05-10T19:13:53+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/05\/denis_legezo_screen.png\" \/>\n\t<meta property=\"og:image:width\" content=\"682\" \/>\n\t<meta property=\"og:image:height\" content=\"433\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Julien Maury\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Julien Maury\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/hackers-exploit-windows-event-logs\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/hackers-exploit-windows-event-logs\/\"},\"author\":{\"name\":\"Julien Maury\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/4723f5dca54d7ee1d8111912ac8b1d4a\"},\"headline\":\"Hackers Are Now Exploiting Windows Event Logs\",\"datePublished\":\"2022-05-10T19:11:42+00:00\",\"dateModified\":\"2022-05-10T19:13:53+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/hackers-exploit-windows-event-logs\/\"},\"wordCount\":927,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/hackers-exploit-windows-event-logs\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/05\/denis_legezo_screen.png\",\"keywords\":[\"advanced persistent threats\",\"Microsoft\"],\"articleSection\":[\"Threats\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/hackers-exploit-windows-event-logs\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/threats\/hackers-exploit-windows-event-logs\/\",\"name\":\"Hackers Are Now Exploiting Windows Event Logs | eSecurity Planet\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/hackers-exploit-windows-event-logs\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/hackers-exploit-windows-event-logs\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/05\/denis_legezo_screen.png\",\"datePublished\":\"2022-05-10T19:11:42+00:00\",\"dateModified\":\"2022-05-10T19:13:53+00:00\",\"description\":\"Advanced hackers have figured out how to hide fileless malware in event logs. Here's how to protect your organization.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/hackers-exploit-windows-event-logs\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/threats\/hackers-exploit-windows-event-logs\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/hackers-exploit-windows-event-logs\/#primaryimage\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/05\/denis_legezo_screen.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/05\/denis_legezo_screen.png\",\"width\":682,\"height\":433},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/hackers-exploit-windows-event-logs\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Hackers Are Now Exploiting Windows Event Logs\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/4723f5dca54d7ee1d8111912ac8b1d4a\",\"name\":\"Julien Maury\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/02\/JulienMaury-AvatarImg-150x150.webp\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/02\/JulienMaury-AvatarImg-150x150.webp\",\"caption\":\"Julien Maury\"},\"description\":\"eSecurity Planet contributor Julien Maury writes about penetration testing, code security, open source security and more. He is a backend developer, a mentor and a technical writer who enjoys sharing his knowledge and learning new concepts.\",\"url\":\"https:\/\/www.esecurityplanet.com\/author\/jmaury\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Hackers Are Now Exploiting Windows Event Logs | eSecurity Planet","description":"Advanced hackers have figured out how to hide fileless malware in event logs. Here's how to protect your organization.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/threats\/hackers-exploit-windows-event-logs\/","og_locale":"en_US","og_type":"article","og_title":"Hackers Are Now Exploiting Windows Event Logs | eSecurity Planet","og_description":"Advanced hackers have figured out how to hide fileless malware in event logs. Here's how to protect your organization.","og_url":"https:\/\/www.esecurityplanet.com\/threats\/hackers-exploit-windows-event-logs\/","og_site_name":"eSecurity Planet","article_published_time":"2022-05-10T19:11:42+00:00","article_modified_time":"2022-05-10T19:13:53+00:00","og_image":[{"width":682,"height":433,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/05\/denis_legezo_screen.png","type":"image\/png"}],"author":"Julien Maury","twitter_card":"summary_large_image","twitter_creator":"@eSecurityPlanet","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Julien Maury","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/threats\/hackers-exploit-windows-event-logs\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/hackers-exploit-windows-event-logs\/"},"author":{"name":"Julien Maury","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/4723f5dca54d7ee1d8111912ac8b1d4a"},"headline":"Hackers Are Now Exploiting Windows Event Logs","datePublished":"2022-05-10T19:11:42+00:00","dateModified":"2022-05-10T19:13:53+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/hackers-exploit-windows-event-logs\/"},"wordCount":927,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/hackers-exploit-windows-event-logs\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/05\/denis_legezo_screen.png","keywords":["advanced persistent threats","Microsoft"],"articleSection":["Threats"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/threats\/hackers-exploit-windows-event-logs\/","url":"https:\/\/www.esecurityplanet.com\/threats\/hackers-exploit-windows-event-logs\/","name":"Hackers Are Now Exploiting Windows Event Logs | eSecurity Planet","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/hackers-exploit-windows-event-logs\/#primaryimage"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/hackers-exploit-windows-event-logs\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/05\/denis_legezo_screen.png","datePublished":"2022-05-10T19:11:42+00:00","dateModified":"2022-05-10T19:13:53+00:00","description":"Advanced hackers have figured out how to hide fileless malware in event logs. Here's how to protect your organization.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/hackers-exploit-windows-event-logs\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/threats\/hackers-exploit-windows-event-logs\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/threats\/hackers-exploit-windows-event-logs\/#primaryimage","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/05\/denis_legezo_screen.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/05\/denis_legezo_screen.png","width":682,"height":433},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/threats\/hackers-exploit-windows-event-logs\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"Hackers Are Now Exploiting Windows Event Logs"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/4723f5dca54d7ee1d8111912ac8b1d4a","name":"Julien Maury","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/02\/JulienMaury-AvatarImg-150x150.webp","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/02\/JulienMaury-AvatarImg-150x150.webp","caption":"Julien Maury"},"description":"eSecurity Planet contributor Julien Maury writes about penetration testing, code security, open source security and more. He is a backend developer, a mentor and a technical writer who enjoys sharing his knowledge and learning new concepts.","url":"https:\/\/www.esecurityplanet.com\/author\/jmaury\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/21899"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/267"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=21899"}],"version-history":[{"count":0,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/21899\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media\/21901"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=21899"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=21899"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=21899"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=21899"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=21899"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=21899"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}