Veeam Backup Servers Credential Dumping Script Execution
Detects execution of a PowerShell script that contains calls to the "Veeam.Backup" class, in order to dump stored credentials.
Sigma rule (View on GitHub)
1title: Veeam Backup Servers Credential Dumping Script Execution
2id: 976d6e6f-a04b-4900-9713-0134a353e38b
3status: test
4description: Detects execution of a PowerShell script that contains calls to the "Veeam.Backup" class, in order to dump stored credentials.
5references:
6 - https://www.pwndefend.com/2021/02/15/retrieving-passwords-from-veeam-backup-servers/
7 - https://labs.withsecure.com/publications/fin7-target-veeam-servers
8author: Nasreddine Bencherchali (Nextron Systems)
9date: 2023-05-04
10tags:
11 - attack.credential-access
12logsource:
13 product: windows
14 category: ps_script
15 definition: bade5735-5ab0-4aa7-a642-a11be0e40872
16detection:
17 selection:
18 ScriptBlockText|contains|all:
19 - '[Credentials]'
20 - '[Veeam.Backup.Common.ProtectedStorage]::GetLocalString'
21 - 'Invoke-Sqlcmd'
22 - 'Veeam Backup and Replication'
23 condition: selection
24falsepositives:
25 - Administrators backup scripts (must be investigated)
26level: high
References
Related rules
- AADInternals PowerShell Cmdlets Execution - ProccessCreation
- AADInternals PowerShell Cmdlets Execution - PsScript
- ADCS Certificate Template Configuration Vulnerability
- ADCS Certificate Template Configuration Vulnerability with Risky EKU
- APT31 Judgement Panda Activity