T1669

Wi-Fi Networks

This detection identifies adversary activity consistent with gaining initial access via wireless network connections, including Wi-Fi network enumeration, suspicious wireless profile creation or modification, connection to new or unauthorized SSIDs, and process execution of wireless management utilities. The detection focuses on command-line wireless management tools (netsh wlan, nmcli, iwconfig, wpa_cli), Windows WLAN AutoConfig operational events, and anomalous wireless interface activity on dual-homed systems that may indicate a Nearest Neighbor-style bridging attack. Associated with APT28 operations documented in the Volexity Nearest Neighbor report, where threat actors compromised geographically proximate organizations to pivot via Wi-Fi into high-value targets.

Microsoft Sentinel / Defender
kusto
let WifiManagementCommands = dynamic([
    "netsh wlan connect",
    "netsh wlan add profile",
    "netsh wlan export profile",
    "netsh wlan delete profile",
    "netsh wlan show networks",
    "netsh wlan show profiles",
    "netsh wlan set profileparameter",
    "Connect-WifiNetwork",
    "Add-WifiProfile",
    "iwconfig",
    "nmcli device wifi",
    "nmcli con add type wifi",
    "wpa_cli connect",
    "wpa_cli scan"
]);
let WifiEnumCommands = dynamic([
    "netsh wlan show networks",
    "netsh wlan show profiles",
    "netsh wlan show interfaces",
    "nmcli device wifi list",
    "iwlist scan",
    "airport -s",
    "wpa_cli scan_results"
]);
union
(
    DeviceProcessEvents
    | where TimeGenerated > ago(1h)
    | where ProcessCommandLine has_any (WifiManagementCommands)
    | extend ActivityType = case(
        ProcessCommandLine has "connect", "WiFi Connection Attempt",
        ProcessCommandLine has "add profile" or ProcessCommandLine has "con add type wifi", "WiFi Profile Created",
        ProcessCommandLine has "delete profile", "WiFi Profile Deleted",
        ProcessCommandLine has "export profile", "WiFi Profile Exported",
        ProcessCommandLine has "show networks" or ProcessCommandLine has "scan", "WiFi Network Enumeration",
        "WiFi Management Activity"
    )
    | project TimeGenerated, DeviceName, AccountName, ProcessCommandLine, ActivityType,
              InitiatingProcessFileName, InitiatingProcessCommandLine,
              InitiatingProcessParentFileName, FolderPath, ReportId
),
(
    SecurityEvent
    | where TimeGenerated > ago(1h)
    | where EventID == 4688
    | where CommandLine has_any (WifiManagementCommands)
    | extend ActivityType = case(
        CommandLine has "connect", "WiFi Connection Attempt",
        CommandLine has "add profile", "WiFi Profile Created",
        CommandLine has "show networks", "WiFi Network Enumeration",
        "WiFi Management Activity"
    )
    | project TimeGenerated, Computer, SubjectUserName, CommandLine, ActivityType,
              NewProcessName, ParentProcessName
)
| order by TimeGenerated desc
high severity medium confidence

Data Sources

Microsoft Defender for Endpoint Windows Security Events

Required Tables

DeviceProcessEvents SecurityEvent

False Positives

  • IT administrators using netsh wlan for legitimate network troubleshooting or configuration management of corporate laptops
  • Corporate endpoint management tools (SCCM, Intune) deploying or rotating Wi-Fi profiles via scripted netsh commands during device provisioning
  • Security tools and network assessment software (Nmap, Kismet host agents) performing authorized Wi-Fi surveys on designated scan hosts
  • Developers and network engineers running wireless diagnostics on test systems or lab environments
  • Automated onboarding scripts that connect new employee devices to corporate SSIDs using pre-staged profiles

Unlock Pro Content

Get the full detection package for T1669 including response playbook, investigation guide, and atomic red team tests.

Response PlaybookInvestigation GuideHunting QueriesAtomic Red Team TestsTuning Guidance

Related Detections