May 2024

Prev Next

Note

This article was originally published on May 16, 2024.

Integrations

Cofense

Cofense, formerly known as PhishMe, is a provider of comprehensive cybersecurity solutions that focus on empowering organizations to detect, respond to, and mitigate phishing threats. Their services include phishing detection and response tools, as well as training and simulation products to enhance employees' awareness and ability to identify phishing attempts.

The new integration includes:

  • 2 supported data types:

    • Cofense Threat Intel Feed

    • Cofense Reports

  • Ingestion of the data to the data lake

  • Mapping the data to Hunters’ Login Schema

  • Mapping the data to IOC Search

Learn more here

Cisco Meraki Syslog

Meraki devices can generate syslog logs, which are messages containing information about system events, status, and performance. These logs can be sent to a syslog server for storage, analysis, and monitoring. Syslog logs from Meraki devices can provide valuable insights into network activity, security incidents, and device performance. By analyzing syslog logs, administrators can identify and troubleshoot issues, monitor network traffic, and ensure compliance with security policies. Meraki syslog logs can be configured to include different levels of detail, allowing administrators to customize the logging process to meet their specific needs.

The new integration includes:

  • Ingestion of the data to the data lake

  • Mapping the data to Hunters’ Network Schema

  • Mapping the data to IOC Search

Learn more here

Darktrace Model Breaches Details

Darktrace Model Breaches Details are a supplement to the Alert logs. They are used to gather detailed information about a specific model breach alert, or about a device and its connections for investigation or monitoring purposes.

The new integration includes:

  • Ingestion of the data to the data lake

  • Mapping the data to IOC Search

Learn more here

Alibaba Cloud

Alibaba Bastion

Alibaba Cloud Bastion Host is a secure, cloud-based service that provides users a unified interface to manage access to their Elastic Compute Service (ECS) instances and other cloud resources. It acts as a critical control point for administrators, allowing them to authenticate, authorize, and audit access to servers without exposing them directly to the internet. This service helps reduce the risk of external attacks while simplifying the management of permissions and credentials for organizations operating in the cloud.

The new integration includes:

  • Ingestion of the data to the data lake

  • Mapping the data to Hunters’ Login Schema

  • Mapping the data to IOC Search

Learn more here

Alibaba OSS

Alibaba Cloud Object Storage Service (OSS) is a secure, cost-effective, and highly scalable cloud storage solution designed to store, back up, and archive large amounts of data. With its flexible storage class options, OSS allows users to optimize storage costs based on their data access patterns. It offers high availability and reliability, ensuring that data is always accessible. Additionally, OSS integrates seamlessly with other Alibaba Cloud services, making it easy to build scalable and resilient applications. Its robust security features, including encryption, access control, and data protection, ensure that data remains secure at all times. Overall, Alibaba OSS is a powerful storage solution that enables businesses to store and manage their data efficiently in the cloud.

The new integration includes:

  • Ingestion of the data to the data lake

  • Mapping the data to IOC Search

Learn more here

Mimecast

Mimecast Attachment TTP logs

Mimecast's Targeted Threat Protection (TTP) for attachments is a security feature designed to protect organizations from malicious email attachments. The "Attachment TTP" part specifically refers to the scanning and analysis of email attachments to detect potential threats such as viruses, malware, or other harmful content before they reach the end user's inbox.

The new integration includes:

  • Ingestion of the data to the data lake

  • Mapping the data to Hunters’ Email Activity Schema

  • Mapping the data to IOC Search

Learn more here

Mimecast URL TTP logs

The URL TTP service scans, rewrites, and checks the safety of URLs contained within email messages to prevent phishing attacks, malware downloads, and other security threats.

The new integration includes:

  • Ingestion of the data to the data lake

  • Mapping the data to Hunters’ Email Activity Schema

  • Mapping the data to IOC Search

Learn more here

Imperva

Imperva Near Real Time SIEM Integration

Imperva's Near Real-Time Log Integration is a feature that enables organizations to stream security logs from their Imperva products to external SIEM systems in near real-time. This integration provides organizations with enhanced visibility into security events and enables faster incident response.

The new integration includes:

  • Ingestion of the data to the data lake

  • Mapping the data to Hunters’ Web Requests Schema

  • Mapping the data to IOC Search

Learn more here

Imperva Attack Analytics

Imperva Attack Analytics is a cybersecurity product that leverages machine learning and artificial intelligence to provide advanced threat detection and analysis capabilities. It is designed to help organizations identify and respond to sophisticated cyber threats in real-time. Attack Analytics monitors network traffic, application logs, and user behavior to detect anomalies and suspicious activities that may indicate a security breach.

The new integration includes:

  • Ingestion of the data to the data lake

  • Mapping of third-party alerts

  • Mapping the data to IOC Search

Learn more here


Detection

New detectors

💡Detectors below are part of the Kubernetes Detection Pack

With the growing adoption of container orchestration solutions such as Kubernetes for application management and deployment, the importance of solid security measures is more critical than ever. We took it upon ourselves to explore the complex realm of Kubernetes security, beginning with the essential Kubernetes API Audit Log and its pivotal function in spotting and neutralizing potential security threats. We will also cover tactics for developing strategies to detect and counteract key threat tactics like Initial Access, Privilege Escalation, Defense Evasion, and Discovery.

🔎 Creation or modification of RoleBinding with a highly privileged built-in role

Detector ID: k8s_suspicious_high_privilege_rolebinding

Creating/updating RoleBinding or ClusterRoleBinding to an overly permissive built-in role (e.g. admin) is a privilege escalation method that lets the attacker gain highly privileged permissions that allow him to execute privileged operations in the cluster (reading secrets, creating pods, etc.). This detector is looking for the creation or modification of a RoleBinding or ClusterRoleBinding to an overly permissive built-in role which is a PE procedure to alert on such issues.

Recommended investigation steps:

  • Check the activity of the Kubernetes user that created the role/cluster bind:

    • Check if this user has multiple IPs related to it from unrelated geographic places/multiple user agents (indication of compromise).

    • Check if the user created any RoleBinds in the past or if it is the first time.

  • Check what other Kubernetes API requests the initiating IP did before and after the request:

    • Check if this IP has more than one user associated with it.

  • Check the reputation and activity of the initiating IP address using: PulseDive, IPInfo, AbuseIPdb, etc.

  • Check the details related to the Role/ClusterRoleBinding:

    • Check which role is assigned via the ClusterRoleBind/RoleBind and what it allows

    • Check on which cluster/namespace this RoleBind was created and what are the services under this area.

    • Check who is the user that got this role/cluster role, when it was created, and if it should get this permission.

🔎 Kubernetes suspicious impersonation

Detector ID: k8s_sus_impersonation

Impersonation is an API call that lets a user perform an action using the privileges and in the name of another user. In a Kubernetes environment, the normal usage of this feature is limited to specific service accounts performing specific actions. An impersonation attempt that deviates from normal behavior might point to a threat actor abusing Impersonation privileges for privilege escalation or hiding malicious activity. This detector is looking for impersonation attempts in a Kubernetes environment to alert on such behavior.

Recommended investigation steps:

  • Investigate the initiating user, his role, and his past actions

  • Investigate the source IP address to find any known malicious sources

  • Investigate the target of the impersonation, and understand which privileges were gained or if they have been abused.

🔎 Kubernetes service account request denied

Detector ID: k8s_service_account_request_denied

In a Kubernetes environment, service accounts serve a specific purpose and usually perform a predetermined set of actions. A denied request from a service account may indicate deviation from its normal behavior and potentially, compromise. This detector is looking for denied API requests originating from service accounts while using the detect-changes template to reduce noise from previously known requests.

Recommended investigation steps:

  • Investigate the recent activity of the service account to identify the resources and namespaces it usually accesses, and compare to the requested URL.

  • Investigate the requested URL and determine the risk associated with gaining access to it.

  • Investigate the source IP and its recent activity to identify a compromise.

Updated detectors

The detection improvements below are a result of an ongoing initiative to improve detection quality and will be released on May 22, 2024.

Improvements to EDR detection

Effective May 22, 2024

TL;DR

The following detectors were deprecated:

  • edr_commandline_contains_echo_to_base64

  • edr_certutil_uses_encode_or_decode_params

And replaced by this new detector:

  • edr_commandline_contains_base64_encoding_or_decoding_methods

We decided to depracate the edr_commandline_contains_echo_to_base64 and edr_certutil_uses_encode_or_decode_params detectors, that contain base64 encoding or decoding techniques, due to low fidelity.

In their place, we've created a new detector to cover base64 encoding or decoding techniques. The new detector, Running suspicious command lines with Base64 encoding or decoding techniques (edr_commandline_contains_base64_encoding_or_decoding_methods) supports seven different techniques: Perl, Python, OpenSSL, Powershell, Base64, Certutil, and Node.js.

Note:

  • Currently, we don’t support Poewrshell’s flags -enc and -EncodedCommands which exist in many legitimate processes and can cause many false positives alerts.

  • We reduced noise by mapping a technique to the operating system that the technique is relevant to, e.g. Certutil should run on Windows machines and not Unix-based machines.

  • We added built-in Ignore rules to the detector’s code that deals with VA’s agent's activity (like Rapid7, Nessus, SolarWinds), configuration scripts (docker-desktop osascript), and others.

Improvements to the Potential SSO hijack detector

Effective May 22, 2024

TL;DR

The name of the okta_logs_potential_sso_hijack detector changed from Potential SSO hijack to Potential Okta session hijack using browser cookies.

We have identified the Potential SSO hijack detector (okta_logs_potential_sso_hijack) as low fidelity. As a result, we have decided to modify it to focus only on SSO hijacking related to browser session theft.

Browser session theft (aka “session token theft”, “session cookie replay”) is a very common adversarial technique in the past few years. The main purpose behind this technique is to enable account takeover while bypassing MFA, and can be implemented as cookie theft from the victim’s machine or by using Adversary-in-the-Middle (AitM) infrastructure.

The detector looks for multiple Okta SSO events (user.authentication.sso), originated by web browsers, of the same user in the same Okta session, from different user agents and IP addresses.
As a result of this change, the detector's name has changed to Potential Okta session hijack using browser cookies.

New enrichments

Investigation flow improvements for Cloudtrail detectors

Whenever an aggregated detector contains IP address aggregation and there's only one IP associated with malicious activity, it will be enriched with a SaaSSourceActor entity. This enhancement facilitates automatic investigation drill-downs such as geographical location enrichment, IP activity analysis, Pulsedive enrichment, and much more, providing more contextual information. Additionally, scoring layers will dynamically adjust the risk score of the lead based on this enriched context.

If only one agent ID is detected behind the IP address during the lead's timeframe, a LocalHost entity will be created. Consequently, additional drill-downs and scoring layers will be activated.

This improvement will benefit the following detectors:

  • cloudtrail_mass_rds_deletion

  • cloudtrail_cloud_awareness_behavior

  • cloudtrail_privilege_escalation_behavior

  • cloudtrail_secrets_exfil

  • cloudtrail_secrets_exfil_by_new_user

  • cloudtrail_saml_replay