Tuesday, April 1, 2025
HomeHealthCommunity Visibility Module & Zeek Detections in SNA

Community Visibility Module & Zeek Detections in SNA


Safe Community Analytics model 7.5.2 has been launched, providing thrilling new options such because the Community Visibility Module (NVM) and Zeek detections. We’re increasing our detections throughout current and new sources, and our detections engine now ingests NVM telemetry and Zeek logs, introducing 9 new alerts prominently displayed in Analytics. These alerts are additionally aligned with the well known MITRE ATT&CK framework.

By integrating a extra numerous vary of telemetry sources, Safe Community Analytics considerably enhances community visibility and offers deeper insights into community actions. This launch and its detections signify a sophisticated method to broadening detection sources and capabilities. Customers using the Information Retailer structure with Analytics enabled can improve to model 7.5.2 to right away entry these new capabilities.

The Safe Community Analytics model 7.5.2 software program updates could be downloaded from Cisco Software program Central.

New Community Visibility Module (NVM) Alerts

Community Visibility Module is a element of Cisco Safe Shopper that information and reviews on community exercise from an endpoint machine and ties in endpoint model data with these community particulars. If you’re used to amassing NetFlow or IPFIX in your atmosphere, the Community Visibility Module will present the identical particulars a few community connection, however will even embody issues like hostname, course of title, consumer data, working system, interface particulars, and extra. This helps pace up investigations and offers extra context about who and what host took an motion on the community. The detections engine processes the Community Visibility Module telemetry and alerts on 4 new detections.

You may try the Community Visibility Module Configuration Information.

Community Visibility Module (NVM) Alert Names and Descriptions

Potential Gamaredon C2 Callout

A command line utility was used to contact a URL related to the command-and-control servers of a risk actor generally known as Gamaredon. Gamaredon (often known as Armageddon, Primitive Bear, and ACTINIUM) is an APT lively since 2013 identified to leverage spearphishing to contaminate victims with customized malware.

Suspicious Curl Conduct

The system utility curl exhibited suspicious conduct which may be indicative of exploitation of CVE-2023-38545.

Suspicious MSHTA Exercise

The built-in Home windows software MSHTA.exe was executed interactively by a non-system consumer and utilized to make a community connection. Whereas sometimes reliable when run mechanically by the system, it is usually identified to be utilized by risk actors together with Superior Persistent Threats (APTs).

Suspicious Course of Path

A course of was executed on an endpoint from a listing that ought to not have executables.

New alerts from NVM telemetry in analytics
Fig. 1 – New alerts from Community Visibility Module (NVM) telemetry in Analytics

New Zeek Alerts

Zeek is a well-liked, free, and open-source community site visitors evaluation device. It displays and inspects site visitors and generates log information of witnessed exercise. These Zeek log information could be despatched to Safe Community Analytics as a telemetry supply. The detections engine reads the Zeek logs and alerts on 5 new detections.

Take a look at the Zeek Configuration Information.

Zeek Alert Names and Descriptions

DNS Visitors to Tor Proxy

A tool despatched DNS question site visitors for a identified Tor proxy. This will likely point out that an software is making ready to determine a connection through a Tor proxy. It could possibly be a botnet trying to contact different units for command-and-control. Adversaries are identified to leverage it for command-and-control and protection evasion. Even when utilized by a reliable consumer, it may possibly circumvent some safety controls.

PetitPotam Assault Through EFS RPC Calls

A tool despatched a Distant Process Name (RPC) utilizing the Encrypting File System Distant Protocol (EFSRPC) Protocol library. The PetitPotam assault is understood to be associated to one of these RPC site visitors. PetitPotam is a device that may exploit this library. It’s also generally known as an NTLM relay assault. Since most organizations don’t use this library in any respect, or restrict the utilization of it, any use is rare sufficient to point a doable PetitPotam assault.

Attainable Impacket SecretDump Exercise

A tool is trying a secrets and techniques dump utilizing an influence device reminiscent of secretdump.py, which permits dumping credentials from an Lively Listing (AD) server. That is additionally known as a secrets-dump HKTL.

Distant Process Creation through ATSVC Named Pipe

A tool is trying to create a distant job utilizing ATSVC named pipes, which could possibly be a malicious try to make use of at.exe for performing job scheduling for preliminary or recurring execution of malicious code. The at.exe utility has been deprecated in present variations of Home windows in favor of schticks.

Suspicious PsExec Execution

A tool apart from a Home windows Sysinternal machine is utilizing psexec with a renamed service title, which might point out a risk actor trying to carry out a distant execution.

Alerts from Zeek logs in analytics
Fig. 2 – Alerts from Zeek Logs in Analytics

Conclusion

Customers of the Safe Community Analytics Information Retailer with Analytics will need to improve their occasion to model 7.5.2 to realize entry to 9 new detections – 4 based mostly on Community Visibility Module telemetry and 5 based mostly on Zeek logs. These new detections are instantly obtainable in Analytics. Configure the sources to export and develop your detection protection at present.

References


We’d love to listen to what you assume. Ask a Query, Remark Beneath, and Keep Related with Cisco Safe on social!

Cisco Safety Social Channels

Instagram
Fb
Twitter
LinkedIn

Share:



RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Most Popular