Rechercher
Contactez-nous Suivez-nous sur Twitter En francais English Language
 











Freely subscribe to our NEWSLETTER

Newsletter FR

Newsletter EN

Vulnérabilités

Unsubscribe

Malicious ISATAP Tunneling Unearthed on Windows Server What is IPV6 and IPV4?

January 2024 by SecurityHQ

IP stands for Internet Protocol. IPv4 stands for Internet Protocol version 4 and is, despite the name, the first version of IP to be used. IPs are designed to combine multiple numbers and periods, which form an identity for the user to connect to the internet, and from there access and use data. IPv6 is the most recent version, formed with IPv4 could no longer withstand the capabilities needed with regards to the increased volume of internet users.

© noregt

What is ISATAP?
‘ISATAP is an IPv6 transition mechanism that allows IPv6-in-IPv4 tunnels to be created automatically within a site. Each host queries an ISATAP router within the site to obtain the address and routing information. Packets sent to the IPv6 Internet are routed via the ISATAP router, and packets destined for other hosts within the same site are tunneled directly to the destination.’ - IEEE, ‘The implementation of ISATAP router’

How ISATAP is Configured-on Windows Servers
A Windows Server can function as an ISATAP router when it has one interface connected to an IPv6 network and another to an IPv4 network. By enabling the ’IPEnableRouter’ registry setting and configuring the interfaces, the Windows Server can act as an ISATAP router. Once properly configured, machines from the IPv6 network can communicate with machines in the IPv4 network seamlessly. Almost all versions of Windows Operating System support “ISATAP” protocol.

How ISATAP is Leveraged by Cyber Threats
The ISATAP protocol is originally designed for intra-network communication. During a security investigation conducted by the SecurityHQ Digital Forensics and Incident Response (DFIR) team, it was seen being exploited by cyber actors. The team discovered that an external actor had maliciously configured from an internal IPv6 network directly to a ’Command-and-Control’ IP, establishing a network bridge between the internal network and the attacker’s network. This unauthorized connection bypassed existing network security measures, enabling the attacker to gain control over the network without triggering detection by any security controls. While this tactic is not currently associated with any specific cyberattack or APT group, it poses a potential threat that may be leveraged in the future.

How to Detect Malicious ISATAP Tunneling
1. Monitor for communication towards suspicious IPs and ports within your network.
2. Check for Windows System event IDs 4100 (ISATAP address configuration) and 4200 (ISATAP Tunnel brought UP) in the event viewer logs.
3. Review changes made to the ’IPEnableRouter’ registry setting on Windows Servers, as unexpected modifications may indicate malicious activity.
4. Examine network DNS server logs for events related to the activation or configuration of the ’ISATAP’ protocol.
Mitigation Steps
1. Check for any active ISATAP tunnel, use the command or PowerShell:
netsh interface ipv6 isatap show state
To disable the tunnel, user below command –
netsh interface ipv6 isatap set state disabled
2. If you are not actively using the ISATAP protocol, consider disabling it on all Windows servers by applying a Group Policy Object (GPO).

In the event of detecting an active ISATAP tunnel or any suspicious activity, immediately contact your Incident Response team, to investigate the initial vector and take necessary actions to contain the potential attack in progress, or contact SecurityHQ to speak with an expert, here.


See previous articles

    

See next articles












Your podcast Here

New, you can have your Podcast here. Contact us for more information ask:
Marc Brami
Phone: +33 1 40 92 05 55
Mail: ipsimp@free.fr

All new podcasts