netbiosreflect

Explanation

The Netbios protocol is used by Microsoft operating systems for file sharing and printer sharing over a network. The reflection attack is when an attacker sends a falsified request to a target system, and the target system responds to a spoofed IP address, thus amplifying the attack.

What to Look For

To examine the results of the netbiosreflect event, network administrators should look for any suspicious Netbios traffic on the network. They should search for any NETBIOS Name Service (NBNS) frames with source addresses that don't belong to their network. Endpoint logs should also be examined for any suspicious activity related to Netbios. In order to prevent the attack, network administrators should consider using firewalls to restrict incoming Netbios traffic.

Related MITRE ATT&CK Categories

Network Denial of Service, Technique T1498 - Enterprise