September 2023

Prev Next

Product updates

Lead attributes in API

The /GET leads API endpoint will now return lead attributes, depending on the value of the include_attributes parameter. If set to true, the response will include the lead attributes as in the example below:

{
            "ip": { "value": "..." },
            "os": { "value": "Mac OS X (iPad)" },
            "browser": { "value": "SAFARI" },
            "user_agent": {
            "value": "..."
            },
            "device_type": { "value": "Tablet" },
            "outcome_reason": { "value": "LOCKED_OUT" },
            "outcome_result": {"value": "FAILURE" },
            "display_message": {
              "value": "Max sign in attempts exceeded"
            },
            "okta_display_name": { "value": "..." },
            "action_request_uri": {
              "value": "/api/v1/authn"
            },
            "actor_alternate_id": {
              "value": "..."
            },
            "device_fingerprint": {
              "value": "..."
            },
            "action_request_uri_full": {
              "value": "/api/v1/authn?"
            } 
          }

Learn more here

Data source health status in API

🚧 Note:

This feature is currently in Beta stage.

The /GET data source status and health API endpoint response was updated with the following items:

  • The error_details parameter will be deprecated and replaced by the new message parameter. This is to allow all statuses to be returned with a message, not just error statuses.
  • A new parameter, inner_status, was added. If the data source status is Error, this field will show the type of error that occurred. Possible values: 'Internal error', 'Configuration issue'.
📘 Learn more

Contact your account manager to learn more about this new capability.

Improvement in data retrieval time

As part of our ongoing infrastructural efforts, we’ve improved our Office365 Puller, focusing on its error-handling mechanism.

We recently noticed some delays in data retrieval. To remedy the situation, we’ve transformed this puller into an asynchronous one, enabling us to retrieve data faster and more efficiently.

Integrations

Auth0

A new data type from Auth0 is now supported by Hunters - Auth0 Log Events. You can connect this data type independently to Hunters from the platform.

The integration includes:

  • API Collection
  • Ingestion into the datalake (SOLUTIONS_STAGING_DB.RAW.AUTH_ZERO_LOG_EVENTS)
  • Mapping to Login Unified Schema

Learn more here

Atlassian

Hunters’ Atlassian integration now includes BitBucket Audit Logs. Bitbucket is a Git-based source code repository hosting service owned by Atlassian. The auditing component of Bitbucket Data Center and Server will log many different events that occur when being used.

The new integration includes:

  • A transformer for BitBucket Audit Logs
  • Mapping of the events to IOC Search

Learn more here

Lacework

An enhancement to the Lacework integrations offering - Lacework Agent Alerts. These are third-party alerts by Lacework over the Lacework Agent data source. So far this data source was used for ingestion only, but now these events will generate a third-party alert in the system.

Learn more here

Linux

Hunters now supports the ingestion of Linux SSHD logs. sshd, the Secure Shell Daemon, allows remote access to the system. It’s a silent process that listens to all the authentication and login attempts of Linux. Using sshd logs, you can monitor authorized and unauthorized login attempts on your system, which helps in keeping your system secure. The logs should be located under the /var/log/auth.log location.

The new integration includes:

  • A transformer for the Linux SSHD logs
  • Mapping of the source to Login Unified Schema
  • Mapping of the source to IOC Search

Learn more here

Crowdstrike

We are growing our Crowdstrike integrations offering with an addition of Crowdstrike Indicators.

Falcon Intelligence provides threat intelligence information gathered by CrowdStrike to help understand the threat landscape. The Indicators data type shows active indicators in the environments that are related to malware activity (IOCs such as URL, Hashs, domain).

The integration includes:

  • API Collection
  • Self service ingestion
  • Ingestion into the data lake
  • Mapping to Threat Intel IOCs Unified Schema
  • Mapping to IOC Search
  • Connection to threat_intel_ioc_lookup DrillDown

Learn more here

Detection

New detectors

🔎 Login to a user tagged as terminated

Detector ID: login_logs_terminated_user_login

The detector looks for login events made by users tagged (via Asset Tagging) as employees who have been terminated. If a user is tagged as terminated prior to the login event, a lead will be created for the login event.

For this detector to function as planned, use the Hunters Asset Tagging capability and tag past employees with the terminated_user tag.

🔎 Usage of EC2 instance credentials outside of AWS

Detector ID: cloudtrail_ec2_instance_credentials_used_from_outside_aws

This detector is part of our noise reduction efforts, replacing the existing Instance Profile Security Credentials Used by the Multiple IP Addresses detector (see deprecation message below).

The detector covers a very interesting attack surface - Instance credentials which are given to EC2 instances to perform API calls. This detector detects the usage of EC2 instance credentials outside of AWS. EC2 credentials should be used directly within AWS by EC2 instances. Malicious actors can gain access to these credentials using various methods. Once they are used from an ASN that does not belong to AWS it might indicate the credentials were compromised.

It is recommended to check whether the ASN belongs to the organization and if not, investigate the activity performed using the instance credentials.

🔎 Suspicious App Impersonation in O365 Exchange

Detector ID: o365_suspicious_app_impersonation

As part of our growing Office365 content pack, this new detector looks for application impersonation in O365 exchange.

Malicious actors who gain access to the Exchange Administrator (or any user with the Organization Management or Company Administrator role) might assign an “Application Impersonation” role in order to remain persistent in Office 365 exchange online. This role enables the user given the role assignment the ability to impersonate other mailboxes users. Moreover, by default, the user granted the role assignment is able to impersonate and gain access to all mailboxes.

🔎 Over Permissive Access Was Granted On Microsoft 365's Mailbox Folder

Detector ID: office365_over_permissive_access_granted_to_mailbox_folder

Another addition to our Office365 content pack is this new detector, designed to detect possible threat actors gaining access to a mailbox or to admin permissions which they can then leverage to set folder permission on the compromised mailbox, and hence maintain access even with a non-privileged user.

This technique is mainly common in financial frauds or exfiltration attempts, as a result of a business email compromise scenario.

The detector looks at Set-MailboxFolderPermission or Add-MailboxFolderPermission operations, where the Anonymous or Default users have been assigned permissions other than None. Default users can be internal, authenticated users, i.e., every Office365 user within the organization, while Anonymous user refers to external, unauthenticated users, i.e., every Office365 user, including users out of the organization.

There are cases where the requested access rights are limited only to certain details related to the calendar. The detector filters out such cases since they are common in an enterprise environment

Modified detectors

🔎 New Device Using RDP Connection

Detector ID: edr_new_device_with_rdp_connection

The detector is based on the fact that normally, in a network, there are machines that should initiate RDP connections on a regular basis (jump boxes, system admins, support, etc.) and there are machines that shouldn’t (Finance, Marketing, Executives, etc.). Hence, the detector should trigger on machines that have never initiated RDP and then suddenly start using it.

As part of the effort to decrease the noise level we made some modifications to this detector. As a result, we now see a decrease of ~75% of the previously detected noise.
Due to these improvements, we’ve decided to increase the confidence of this detector from 2 to 3, and by that, the base risk is 2 (instead of 1).

🔎 Possible exfiltration of secrets from AWS Secrets Manager

Detector ID: cloudtrail_secrets_exfil

The detector counts GetSecret API calls performed by users in order to detect multiple events performed by the same user, in a given time frame, that could be used in order to exfiltrate AWS secrets from the Secret Manager.

Previously, this detector did not yield many leads since it was looking for specific occasions that contained ListSecret events. We’ve converted this detector into a time-series template to increase the coverage and now the detector is only looking for GetSecret events and creates the baseline for Distinct secrets.

Deprecated detectors

🔎 Instance Profile Security Credentials Used by Multiple IP Addresses

Detector ID: instance_profile_used_by_multiple_ips

The detector aims to find malicious usage of EC2 instance credentials, however, due to its implementation it created a lot of false positives. As a result of our noise reduction efforts, we have decided to deprecate it and replace it with a new detector: Usage of EC2 instance credentials outside of AWS (see above).