Veeam Backup Servers Credential Dumping Script Execution

Detects execution of a PowerShell script that contains calls to the "Veeam.Backup" class, in order to dump stored credentials.

Sigma rule (View on GitHub)

 1title: Veeam Backup Servers Credential Dumping Script Execution
 2id: 976d6e6f-a04b-4900-9713-0134a353e38b
 3status: test
 4description: Detects execution of a PowerShell script that contains calls to the "Veeam.Backup" class, in order to dump stored credentials.
 5references:
 6    - https://www.pwndefend.com/2021/02/15/retrieving-passwords-from-veeam-backup-servers/
 7    - https://labs.withsecure.com/publications/fin7-target-veeam-servers
 8author: Nasreddine Bencherchali (Nextron Systems)
 9date: 2023/05/04
10tags:
11    - attack.credential_access
12logsource:
13    product: windows
14    category: ps_script
15    definition: bade5735-5ab0-4aa7-a642-a11be0e40872
16detection:
17    selection:
18        ScriptBlockText|contains|all:
19            - '[Credentials]'
20            - '[Veeam.Backup.Common.ProtectedStorage]::GetLocalString'
21            - 'Invoke-Sqlcmd'
22            - 'Veeam Backup and Replication'
23    condition: selection
24falsepositives:
25    - Administrators backup scripts (must be investigated)
26level: high

References

Related rules

to-top