Lateral movement

Automated Replication

Automated Replication

Detection overview

The Automated Replication detection identifies behavior indicative of malware or an attacker using automated methods to replicate itself across multiple hosts within the network. This technique is often used to rapidly spread malware, such as worms or ransomware, from an initial point of compromise to other vulnerable systems within the network.

Triggers

  • An internal host is sending very similar payloads to several internal targets
  • This may be the result of an infected host sending one or more exploits to other hosts in an attempt to infect them

Possible Root Causes

  • An infected host which is part of a botnet is trying to expand the botnet’s footprint by infecting additional hosts
  • An infected host which is taking part in a targeted attack is trying to spread laterally in an effort to get closer to data it wants to exfiltrate
  • An agent on the host is utilizing unusual techniques to discover an available service

Business Impact

  • Internal spreading of botnet-related malware often is repeated by the next infected host, thus mimicking a computer worm and rapidly infecting all possible hosts
  • A wide scale spread of botnet-related malware will incur significant remediation costs
  • Lateral spread which is part of a targeted attack makes the attack more resilient and gets it closer to your crown jewels

Steps to Verify

  1. Look at the protocol and port listed in the detection to determine what network service is being exploited
  2. Determine if there’s any reason for this host to be communicating these services on the listed targets
  3. Try to ascertain what software on this host would emit the traffic being seen
  4. Examine the packet capture file to see if this appears to be a network discovery attempt
Automated Replication

Possible root causes

Malicious Detection

  • Malware infection such as worms, ransomware, or bots attempting to spread across the network.
  • Attackers using automated scripts or tools to propagate their presence from a compromised host to other vulnerable systems.
  • Exploitation of known vulnerabilities to gain access and replicate malicious payloads across the network.

Benign Detection

  • IT administrators deploying software updates or patches across multiple systems using automated scripts or management tools.
  • Legitimate backup or synchronization processes that involve copying files across several hosts.
  • Security assessments or penetration testing activities simulating automated replication behavior.
Automated Replication

Example scenarios

Scenario 1: An internal host starts copying an executable file to multiple systems within a short period. Investigation reveals that the file is a piece of ransomware spreading through the network using SMB protocol.

Scenario 2: A sudden spike in network traffic is detected, with numerous hosts receiving a script file. Further analysis indicates that an IT administrator was deploying a critical software update using an automated script, causing the detection to trigger.

Automated Replication

Business impact

If this detection indicates a genuine threat, the organization faces significant risks:

Rapid Malware Spread

Automated replication can lead to widespread infection, potentially causing significant damage and disruption to business operations.

Data Loss and Corruption

Malicious replication can result in data being corrupted, encrypted (in the case of ransomware), or exfiltrated, leading to potential data loss and breaches.

Operational Downtime

Widespread malware infection can necessitate extensive remediation efforts, causing prolonged operational downtime and loss of productivity.

Automated Replication

Steps to investigate

Automated Replication

MITRE ATT&CK techniques covered

FAQs

What is Automated Replication?

How can I detect Automated Replication in my network?

What are the common signs of Automated Replication?

Why is Automated Replication a significant threat?

Can legitimate software trigger this detection?

What steps should I take if I detect Automated Replication?

How does Vectra AI identify Automated Replication?

What tools can help verify the presence of Automated Replication?

What is the business impact of Automated Replication?

How can I prevent Automated Replication?