Audio player loading…

Task automation platform PowerShell, which is often abused by threat actors distributing malware (opens in new tab), can also be used for attack detection and prevention. This is the advice the US National Security Agency (NSA) recently gave to system administrators everywhere. 

Alongside cybersecurity centers in the UK and New Zealand, the NSA published a security advisory in which it argues that blocking PowerShell, a common security practice, actually lowers organizations’ defensive capabilities against ransomware (opens in new tab) and other forms of cyberattacks.

Instead, system admins should use it to boost their forensics and incident response, as well as to automate as many repetitive tasks as possible.

Numerous recommendations

“Blocking PowerShell hinders defensive capabilities that current versions of PowerShell can provide, and prevents components of the Windows operating system from running properly. Recent versions of PowerShell with improved capabilities and options can assist defenders in countering abuse of PowerShell,” the NSA stated.

The advisory comes with a number of recommendations, including leveraging PowerShell remoting, or using Secure Shell protocol (SSH) to improve the security of public-key authentication.

“Proper configuration of WDAC or AppLocker on Windows 10+ helps to prevent a malicious actor from gaining full control over a PowerShell session and the host,” the document explained.

System admins can also hunt for signs of abuse on their endpoints (opens in new tab) by recording PowerShell activity and monitoring logs. 

The advisory also recommends admins turn on features such as Deep Script Block Logging, Module Logging, or Over-The-Shoulder Transcription, as the former create a log database, handy for spotting aggressive PowerShell activity. 

The latter allows admins to record every PowerShell input and output, getting a better understanding of the attackers’ goals. 

“PowerShell is essential to secure the Windows operating system,” the NSA concluded, adding that, with proper configuration and management, it can be a great tool for system maintenance and security.

Via BleepingComputer (opens in new tab)

Leave a Reply