T1219.003

Remote Access Hardware

An adversary may use legitimate remote access hardware to establish an interactive command and control channel to target systems within networks. These services, including IP-based keyboard, video, or mouse (KVM) devices such as TinyPilot and PiKVM, are commonly used as legitimate tools and may be allowed by peripheral device policies within a target environment. Remote access hardware may be physically installed and used post-compromise as an alternate communications channel for redundant access or as a way to establish an interactive remote session with the target system. Using hardware-based remote access tools may allow threat actors to bypass software security solutions and gain more control over the compromised device(s).

Microsoft Sentinel / Defender
kusto
let KVMDeviceNames = dynamic([
  "TinyPilot", "PiKVM", "Raritan", "Avocent", "ATEN", "iDRAC",
  "iLO", "IPMI", "Lantronix", "Opengear", "KVM", "Digi",
  "CyberPower", "ServerTech", "Supermicro IPMI"
]);
let KVMPorts = dynamic([5900, 5901, 443, 80, 8080, 623, 5000, 8443, 8888]);
let KVMUserAgents = dynamic([
  "TinyPilot", "PiKVM", "noVNC", "websockify"
]);
// Detection 1: Network connections to KVM-typical ports from new USB devices
DeviceNetworkEvents
| where Timestamp > ago(24h)
| where RemotePort in (KVMPorts)
| where LocalIP startswith "192.168." or LocalIP startswith "10." or LocalIP startswith "172."
| where RemoteUrl has_any (KVMDeviceNames) or RemoteUrl has_any ("pikvm", "tinypilot", "kvm", "ipmi", "idrac", "ilo")
| project Timestamp, DeviceName, LocalIP, RemoteIP, RemotePort, RemoteUrl,
         InitiatingProcessFileName, InitiatingProcessCommandLine
| sort by Timestamp desc
high severity medium confidence

Data Sources

Network Traffic: Network Connection Creation Network Traffic: Network Traffic Flow Microsoft Defender for Endpoint

Required Tables

DeviceNetworkEvents

False Positives

  • Data center administrators using iDRAC, iLO, or IPMI for legitimate out-of-band server management during maintenance windows
  • IT operations teams using rack-mounted KVM switches (Raritan, Avocent, ATEN) for routine server console access in server rooms
  • Network engineers accessing remote Opengear or Lantronix serial console servers for switch/router management
  • Security teams using KVM-over-IP for incident response when OS-level access is unavailable on compromised systems

Unlock Pro Content

Get the full detection package for T1219.003 including response playbook, investigation guide, and atomic red team tests.

Response PlaybookInvestigation GuideHunting QueriesAtomic Red Team TestsTuning Guidance

Related Detections