Remote Access Hardware
An adversary may use legitimate remote access hardware to establish an interactive command and control channel to target systems within networks. These services, including IP-based keyboard, video, or mouse (KVM) devices such as TinyPilot and PiKVM, are commonly used as legitimate tools and may be allowed by peripheral device policies within a target environment. Remote access hardware may be physically installed and used post-compromise as an alternate communications channel for redundant access or as a way to establish an interactive remote session with the target system. Using hardware-based remote access tools may allow threat actors to bypass software security solutions and gain more control over the compromised device(s).
let KVMDeviceNames = dynamic([
"TinyPilot", "PiKVM", "Raritan", "Avocent", "ATEN", "iDRAC",
"iLO", "IPMI", "Lantronix", "Opengear", "KVM", "Digi",
"CyberPower", "ServerTech", "Supermicro IPMI"
]);
let KVMPorts = dynamic([5900, 5901, 443, 80, 8080, 623, 5000, 8443, 8888]);
let KVMUserAgents = dynamic([
"TinyPilot", "PiKVM", "noVNC", "websockify"
]);
// Detection 1: Network connections to KVM-typical ports from new USB devices
DeviceNetworkEvents
| where Timestamp > ago(24h)
| where RemotePort in (KVMPorts)
| where LocalIP startswith "192.168." or LocalIP startswith "10." or LocalIP startswith "172."
| where RemoteUrl has_any (KVMDeviceNames) or RemoteUrl has_any ("pikvm", "tinypilot", "kvm", "ipmi", "idrac", "ilo")
| project Timestamp, DeviceName, LocalIP, RemoteIP, RemotePort, RemoteUrl,
InitiatingProcessFileName, InitiatingProcessCommandLine
| sort by Timestamp desc Data Sources
Required Tables
False Positives
- Data center administrators using iDRAC, iLO, or IPMI for legitimate out-of-band server management during maintenance windows
- IT operations teams using rack-mounted KVM switches (Raritan, Avocent, ATEN) for routine server console access in server rooms
- Network engineers accessing remote Opengear or Lantronix serial console servers for switch/router management
- Security teams using KVM-over-IP for incident response when OS-level access is unavailable on compromised systems
References (8)
- https://attack.mitre.org/techniques/T1219/003/
- https://unit42.paloaltonetworks.com/north-korean-it-workers/
- https://cloud.google.com/blog/topics/threat-intelligence/mitigating-dprk-it-worker-threat/
- https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-207a
- https://pikvm.org/
- https://tinypilotkvm.com/
- https://learn.microsoft.com/en-us/defender-endpoint/advanced-hunting-devicenetworkevents-table
- https://www.dell.com/support/kbdoc/en-us/000178115/idrac-9-security-configuration-guide
Unlock Pro Content
Get the full detection package for T1219.003 including response playbook, investigation guide, and atomic red team tests.