Edgewater Federal Solutions’ expert cyber threat hunters continuously seek innovative ways to detect and mitigate malicious activity. Our proactive approach blends traditional cyber threat intelligence with deep environmental awareness, allowing us to identify and track threats targeting critical assets—especially those that evade conventional detection methods. 

Recently, our team analyzed the latest report on the Russian APT group, Seashell Blizzard, and developed enhanced hunting queries to strengthen threat detection capabilities. 

Edgewater’s Hypothesis: 

Threat actor Seashell Blizzard, as part of the BadPilot campaign, has compromised a public-facing web application via known CVE and has established persistence and an active presence within our network. 

Hunting Queries: 

Renamed Procdump: 

What Caught Our Eye: The report noted that adversaries in the BadPilot campaign used renamed utilities to dump credentials from LSASS. 

Objective: The query identifies processes that don’t have the typical “procdump” name but include the command-line flags (“-accepteula” and “lsass”) that are commonly used when procdump is leveraged to dump LSASS memory. This indicates an attempt to evade detection by renaming the utility while still performing a credential dumping action. 

Rationale: Attackers can rename a known tool (in this case, procdump) to avoid the usual alarms that trigger when the tool’s real name is seen. Even though the tool has been renamed, its behavior—like using specific command-line options to target the LSASS process—is still suspicious. So, by disguising the tool’s name, the attacker hopes to slip past systems that only look for the original, well-known name, while still carrying out their credential-dumping actions. 

MITRE ATT&CK: T1003.001 (LSASS memory dumping) 

Query Syntax:

Task Manager UI 

What Caught Our Eye: The report noted adversaries in the BadPilot campaign were observed leveraging built-in system tools to interact with LSASS, a key process containing credential data. 

Objective: This query is looking for suspicious activity where the built-in Task Manager is being used to access the LSASS process. Under normal circumstances, Task Manager doesn’t open LSASS with the OpenProcess API call. When it does, it may be an indication that an attacker is using Task Manager—an otherwise trusted system tool—to perform credential dumping by reading LSASS memory. 

Rationale: Attackers can use a normally trusted tool (Task Manager) to do something it’s not supposed to do—access the LSASS process, which holds sensitive credentials. Since Task Manager is a built-in Windows program, using it in this way might not immediately raise alarms with security software that typically looks for unusual or foreign tools. This tactic lets the attacker blend in with normal system activity, making their malicious actions harder to spot. 

MITRE ATT&CK: T1003.001 (LSASS memory dumping) 

Query Syntax: 

Suspicious Remote Admin Tools 

What Caught Our Eye: The report noted adversaries in the BadPilot campaign used legitimate remote access applications to blend into normal administrative activity. 

Objective: This query is looking for signs that an attacker is using a remote management tool to gain access to a target system. Threat hunters should focus on cases where the remote access software (like TeamViewer, AnyDesk, etc.) is not expected or known to be used in the environment as this may uncover suspicious activity. 

Rationale: Attackers deploy and use trusted remote tools within their target networks so that their actions look like normal administrative tasks. This lets the attacker perform any actions that would be available to an IT professional using the same tool. In this case, the attacker used Task Manager to quietly check running processes and gather system details without drawing attention, effectively hiding their true intentions. 

MITRE ATT&CK: T1219 (Remote access Software) 

Query Syntax: 

Back to All News

Further Reading

Revolutionizing Data with AI-Driven Tagging 

In the ever-evolving data management landscape, quickly finding and relating information is paramount. By harnessing the power of open-source AI […]

Case Study: Hunting for Midnight Blizzard to Safeguard a Global Scientific Research Organization

Dangerous organizations are becoming more emboldened in their cyberattacks. Armed with an arsenal of powerful malware tools, expertise of their […]

Tracking the Unseen: Edgewater’s Enhanced Queries for Seashell Blizzard APT 

Edgewater Federal Solutions’ expert cyber threat hunters continuously seek innovative ways to detect and mitigate malicious activity. Our proactive approach […]

EDGEWATER ADDS BOB AMANI AS CHIEF TRANSFORMATION OFFICER

Frederick, Md. [December 11, 2024] — Edgewater Federal Solutions, Inc. (“Edgewater”), a leading enterprise IT, cybersecurity, and systems engineering provider […]

EDGEWATER APPOINTS TOM FERRANDO AS COMPANY CHIEF EXECUTIVE OFFICER

Frederick, Md. [December 4, 2024] – Edgewater Federal Solutions, Inc. (“Edgewater”), a leader in enterprise IT, cybersecurity, and systems engineering […]

Edgewater Federal Solutions Named to Inc.’s 2024 Best in Business List in IT Management for the Second Time

Frederick, Md. (December 3, 2024) – Edgewater Federal Solutions, Inc. (Edgewater), a leading enterprise IT, cybersecurity, and application development Government […]

Edgewater Named Elev8 GovCon Honoree for the 2nd Time

Frederick, Md. (October 8, 2024) – For the second year, Edgewater Federal Solutions, Inc. (Edgewater) is recognized as an OrangeSlices’ […]

Edgewater Federal Solutions to Be Featured on Trending Today on A&E

Frederick, MD – September 18, 2024 – Edgewater Federal Solutions, a leading provider of innovative IT and cyber solutions, is […]

For the 6th Time, Edgewater Makes the Inc. 5000  at No. 2297  

Frederick, Md. (August 13, 2024) – Inc. revealed today that Edgewater Federal Solutions, Inc. (Edgewater), a leading IT and cybersecurity […]

Edgewater Promotes Phillip Lopez to VP, General Manager

Frederick, Md. (August 8, 2024) – Today, Edgewater Federal Solutions, Inc. (Edgewater) proudly announces the promotion of Phillip Lopez to […]

Edgewater Promotes Chris Christianson to CISO 

Frederick, Md. (June 26, 2024) — Today, Edgewater Federal Solutions, Inc. (Edgewater) announces that Chris Christianson has been promoted to […]

Our People…Your Edge

We didn’t create our outstanding team by accident.

Our advantage comes from a consistent focus on attracting highly talented and dedicated people – and a commitment to honoring and empowering them so that they stay. With meaningful work and industry-leading training, compensation, and benefits, Edgewater careers are enviable so that our people are our edge.

I have been working at Edgewater as a Configuration Manager for over 5 years. The job has been challenging, rewarding and has provided an environment for professional growth. As an on-sight contractor, I have been working with a team of seasoned professionals who have provided both technical expertise and a warm friendly environment.

- Barry Cohen