{"id":320,"date":"2022-06-17T13:00:06","date_gmt":"2022-06-17T13:00:06","guid":{"rendered":"https:\/\/pc-keeper.tech\/index.php\/2022\/06\/17\/mitigation-against-bits-jobs-technique\/"},"modified":"2022-06-17T13:00:06","modified_gmt":"2022-06-17T13:00:06","slug":"mitigation-against-bits-jobs-technique","status":"publish","type":"post","link":"https:\/\/pc-keeper.tech\/index.php\/2022\/06\/17\/mitigation-against-bits-jobs-technique\/","title":{"rendered":"Mitigation against BITS Jobs technique"},"content":{"rendered":"<p> [ad_1]<br \/>\n<\/p>\n<div>\n<p style=\"color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-282386 img-responsive alignright\" src=\"https:\/\/ieeecs-media.computer.org\/wp-media\/2022\/06\/14191916\/BITS-Jobs-technique.jpg\" alt=\"BITS Jobs technique\" width=\"250\" height=\"250\" srcset=\"https:\/\/ieeecs-media.computer.org\/wp-media\/2022\/06\/14191916\/BITS-Jobs-technique.jpg 250w, https:\/\/ieeecs-media.computer.org\/wp-media\/2022\/06\/14191916\/BITS-Jobs-technique-150x150.jpg 150w, https:\/\/ieeecs-media.computer.org\/wp-media\/2022\/06\/14191916\/BITS-Jobs-technique-100x100.jpg 100w\" sizes=\"auto, (max-width: 250px) 100vw, 250px\"\/>Windows Background Intelligent Transfer Service (BITS) is a service that was first included with Windows XP, and it allows applications to transfer files in the background without interrupting the user. When an application wants to send or receive a file, BITS queues requests and determines the best delivery time. If the user is idle, BITS can use the spare bandwidth to download files; if the user is active, BITS will delay the transfer until the user is idle. This service helps keep applications running smoothly by ensuring that they can continue to be a service that transfers files between your computer and other computers or devices on your network. BITS uses peer-to-peer networking technology, which means that BITS can use your computer\u2019s resources to transfer files to other computers or devices on your network.<\/p>\n<p>\u00a0<\/p>\n<hr style=\"width: 100%;\"\/>\n<p>\u00a0<\/p>\n<p style=\"text-align: center; color: #ff6600;\"><strong>Want More Tech News? Subscribe to <i>ComputingEdge<\/i> Newsletter Today!<\/strong><\/p>\n<p>\u00a0<\/p>\n<hr style=\"width: 100%;\"\/>\n<p>\u00a0<\/p>\n<h2 style=\"color: #002855; font-size: 24px; font-family: Montserrat; font-weight: 500; line-height: 29px;\">BITS used by adversaries<\/h2>\n<hr style=\"text-align: left; width: 30%; height: 3px; color: #ffa300; background-color: #ffa300; border: none;\"\/>\n<p style=\"color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\">BITS can be abused by adversaries to download, execute, and even clean up after running malicious code on a victim\u2019s system. BITS is often used to download malware or other executables without drawing attention to something happening. Adversaries can also use BITS job objects to keep their activities hidden from administrators, making it difficult for security tools to detect malicious activity. Exfiltration, the unauthorized transfer of data from a computer system, is a critical security concern for governments and businesses. Often, sensitive data is exfiltrated through simple methods such as email or removable media. However, attackers have started to use more advanced techniques to avoid detection. Recent research has shown that the BITS (Background Intelligent Transfer Service) upload functionality can be used to exfiltrate data from systems without being detected. This finding underscores the importance of implementing strong security approaches. While the recent ransomware attacks have been in the spotlight, a different type of cyberattack has been happening in the background. APT39, a known Iranian threat group, has been using the BITS (Background Intelligent Transfer Service) protocol to exfiltrate stolen data from a compromised host. This is an interesting development because BITS is a low-bandwidth protocol that doesn\u2019t cause performance degradation on the target system. In addition, it\u2019s hard to detect because it seems to be a normal operation from a legitimate user. The Advanced Persistent Threat (APT), known as APT41, uses the Microsoft BITS Admin tool to download and install payloads on victims\u2019 machines. This is not the first time that BITS Admin has been used in this way \u2013 the infamous Equation Group also used it in attacks dating back to at least 2010.<\/p>\n<p>\u00a0<\/p>\n<h2 style=\"color: #002855; font-size: 24px; font-family: Montserrat; font-weight: 500; line-height: 29px;\">Manage BITS<\/h2>\n<hr style=\"text-align: left; width: 30%; height: 3px; color: #ffa300; background-color: #ffa300; border: none;\"\/>\n<p style=\"color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\">BITS jobs can be managed through PowerShell and the BITS Admin tool. PowerShell is a task automation and configuration management framework from Microsoft. It consists of a command-line shell and associated scripting language built on the .NET Framework. Administrators use PowerShell to manage machines and automate common tasks. The BITS Admin tool is a command-line tool that helps administrators create, manage, and monitor jobs and transfers on the Background Intelligent Transfer Service (BITS) service. Together, PowerShell and the BITS Admin tool provide administrators with a robust set of tools for managing jobs.<\/p>\n<p>\u00a0<\/p>\n<h2 style=\"color: #002855; font-size: 24px; font-family: Montserrat; font-weight: 500; line-height: 29px;\">Mitigation<\/h2>\n<hr style=\"text-align: left; width: 30%; height: 3px; color: #ffa300; background-color: #ffa300; border: none;\"\/>\n<p style=\"color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\"><i>Filter Network Traffic to only allow legitimate BITS traffic:<\/i> Filtering network traffic is critical for ensuring your network\u2019s security. Particularly in these days of ransomware and other malicious cyber-attacks, it\u2019s important to ensure that only authorized traffic can reach your systems. One way of doing this is to use a filter to block all unauthorized traffic, which can be very labor-intensive and block legitimate traffic. A better solution is using a filter allowing only authorized BITS traffic. This will help to keep your systems safe.<\/p>\n<p style=\"color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\"><i>User Account Management to limit access to the BITS interface to specific users or groups:<\/i> User account management for the Background Intelligent Transfer Service (BITS) is a necessary precaution to limit access to the BITS interface to specific users or groups. By default, all users have access to the BITS interface and can start and stop jobs, configure job properties, and get job status information. In addition, administrators can use group policies to control access to the BITS interface for specific users or groups.<\/p>\n<p style=\"color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\"><i>Operating System Configuration to reduce the default BITS job lifetime in Group Policy:<\/i> A default Group Policy setting sets the maximum lifetime of a BITS job to two days. When configuring operating systems in an enterprise environment, it is often necessary to reduce this value to prevent jobs from running indefinitely. This can be accomplished by editing the Group Policy Object (GPO) linked to the organizational unit (OU) in which the target systems are located. This blog post will provide instructions for reducing the default BITS job lifetime on Windows Server 2008, 2012, and 2016 operating systems.<\/p>\n<p>\u00a0<\/p>\n<h2 style=\"color: #002855; font-size: 24px; font-family: Montserrat; font-weight: 500; line-height: 29px;\">Conclusion<\/h2>\n<hr style=\"text-align: left; width: 30%; height: 3px; color: #ffa300; background-color: #ffa300; border: none;\"\/>\n<p style=\"color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\">Windows Background Intelligent Transfer Service (BITS) is a service that transfers files between your computer and other computers or devices on your network. BITS uses peer-to-peer networking technology, which means that BITS can use your computer\u2019s resources to transfer files to other computers or devices on your network. BITS is a reliable and controlled infrastructure that adversaries often use to transfer files. BITS allows files to be transferred in a way that is not easily monitored or traced. However, adversaries may use BITS to transfer files that contain malicious code or to transfer files that contain information that they wish to keep confidential. According to MITRE, to mitigate against BITS technique, we have to use 1) Filter Network Traffic to only allow legitimate BITS traffic, 2) User Account Management to limit access to the BITS interface to specific users or groups, and 3) Operating System Configuration to reducing the default BITS job lifetime in Group Policy.<\/p>\n<\/p><\/div>\n<p><script>\n  !function(f,b,e,v,n,t,s)\n  {if(f.fbq)return;n=f.fbq=function(){n.callMethod?\n    n.callMethod.apply(n,arguments):n.queue.push(arguments)};\n    if(!f._fbq)f._fbq=n;n.push=n;n.loaded=!0;n.version='2.0';\n    n.queue=[];t=b.createElement(e);t.async=!0;\n    t.src=v;s=b.getElementsByTagName(e)[0];\n    s.parentNode.insertBefore(t,s)}(window,document,'script',\n    'https:\/\/connect.facebook.net\/en_US\/fbevents.js');\n  fbq('init', '2406379906149876');\n  fbq('track', 'PageView');\n<\/script><script>\n  !function(f,b,e,v,n,t,s)\n  {if(f.fbq)return;n=f.fbq=function(){n.callMethod?\n    n.callMethod.apply(n,arguments):n.queue.push(arguments)};\n    if(!f._fbq)f._fbq=n;n.push=n;n.loaded=!0;n.version='2.0';\n    n.queue=[];t=b.createElement(e);t.async=!0;\n    t.src=v;s=b.getElementsByTagName(e)[0];\n    s.parentNode.insertBefore(t,s)}(window,document,'script',\n    'https:\/\/connect.facebook.net\/en_US\/fbevents.js');\n  fbq('init', '721875948349197');\n  fbq('track', 'PageView');\n<\/script><br \/>\n<br \/>[ad_2]<br \/>\n<br \/><a href=\"https:\/\/www.computer.org\/publications\/tech-news\/research\/mitigation-against-bits-jobs-technique\/\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>[ad_1] Windows Background Intelligent Transfer Service (BITS) is a service that was first included with Windows XP, and it allows&hellip;<\/p>\n","protected":false},"author":1,"featured_media":321,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[258,259,2,260],"tags":[],"class_list":["post-320","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-bits","category-bits-job-technique","category-tech-news-post","category-windows"],"_links":{"self":[{"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/posts\/320","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/comments?post=320"}],"version-history":[{"count":0,"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/posts\/320\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/media\/321"}],"wp:attachment":[{"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/media?parent=320"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/categories?post=320"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/tags?post=320"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}