9.5 C
London
Friday, November 8, 2024

Utilizing Risk Intelligence in Cisco Safe Community Analytics


This weblog is continuation of the earlier weblog on utilizing Cisco Safe Community Analytics. On this half, we cowl leveraging public Cisco Talos blogs and third-party menace intelligence information with Cisco Safe Community Analytics. Be sure you learn the primary half as this half makes references again to Host Group and Customized Safety Occasion directions coated within the unique weblog.

Cisco Talos Blogs

The proficient researchers at Cisco Talos recurrently publish blogs on threats and vulnerabilities. These blogs break down the ways, methods and procedures (TTPs) utilized by menace actors. Talos’ analysis publications typically embody pattern supply code, phishing emails, reverse engineering of malicious binaries, instruments, scripts, command and management methodology, attacker infrastructure, file hashes, domains and IP addresses utilized in malicious operations. The indications of compromise (IOCs) are printed on GitHub as JSON and plain textual content recordsdata. We are able to use these blogs and GitHub recordsdata to construct Customized Safety Occasions in Cisco Safe Community Analytics.

Let’s take a look at a weblog: MoonPeak malware from North Korean actors unveils new particulars on attacker infrastructure. This weblog focuses on a state-sponsored group from North Korea. The group leverages an open-source distant entry trojan (RAT) from a household being known as MoonPeak.

Graphic representation showing computer infected by malware
Fig. 1: Latest weblog put up from Cisco Talos

Scroll by way of the article and take note of the extent of element supplied. Close to the very backside of the weblog discover the part titled IOCs.

Text that reads, IOCs for this research can also be found at our GitHub repository here.
Fig. 2: IOCs part with a hyperlink to GitHub

Click on on the hyperlink to the GitHub repository. You may be taken to the Cisco Talos GitHub repository the place you’ll discover the IOCs can be found as JSON and plain textual content recordsdata, and are sorted by the month the weblog was printed in. Be happy to discover different recordsdata, months, and years to get aware of the indications recurrently supplied.

GitHub files from Talos blogs
Fig. 3: GitHub recordsdata from August 2024 for 3 Talos blogs

Click on on the file “moonpeak-infrastructure-north-korea.txt” or comply with the direct hyperlink. Scroll right down to line 35 of the file the place the Community IOCs start. This listing incorporates twelve IP addresses we’re all in favour of. Observed that the IP addresses and domains have been defanged with sq. brackets across the dots so you can’t unintentionally click on on them.

List of defanged IOCs
Fig. 4: Community IOCs supplied by Talos utilized by North Korean menace actors

You possibly can both manually delete the sq. brackets or use the discover and substitute performance in your favourite textual content editor to do the job. I favor to make use of Notepad++ when coping with textual content recordsdata. I set the “Discover and Change” to search for the sq. brackets across the dot and substitute all cases with a dot.

Using Notepad++ with find and replace to remove square brackets in defanged IP addresses
Fig. 5: Utilizing Notepad++ with discover and substitute to take away sq. brackets in defanged IP addresses
Successful replacement in Notepad++
Fig. 6: Profitable substitute – discover the sq. brackets are all gone now

Delete the domains from the listing and replica and paste these IP addresses right into a New Host Group utilizing the methods described within the first a part of this weblog.

Creating a new host group for the IPs taken from this Cisco Talos blog
Fig. 7: Creating a brand new host group for the IPs taken from this Cisco Talos weblog

You may additionally think about using a software to extract IP addresses from textual content. I actually like iplocation IP Extractor. You possibly can paste in a block of textual content with IPv4 and IPv6 IP addresses and it’ll extract them to allow them to be simply reviewed and pasted into a number group. The IPs you paste into this software can’t be defanged. It requires full and proper IP addresses to work.

All the time think about the sensitivity of the knowledge you present to public instruments earlier than utilizing them. You must think about a domestically hosted software for delicate data

iplocation IP Extractor
Fig. 8: Utilizing an IP extractor to drag out all legitimate IP addresses from a block of textual content
Extracted IP addresses ready to copy to a host group
Fig. 9: Extracted IP addresses prepared to repeat to a number group

Third-party menace intelligence

If you happen to take part in any Info Sharing and Evaluation Facilities (ISACs), subscribe to industrial feeds or recurrently make the most of bulletins and blogs geared in the direction of your business, you may as well make the most of their indicators in Cisco Safe Community Analytics. They work the identical manner we dealt with inner menace intelligence within the first a part of this weblog or Cisco Talos blogs proven above. Watch out when scraping menace intelligence to make certain you’re solely together with indicators you plan to make use of. For instance, if you’re scraping a complete bulletin that incorporates IP addresses you have an interest in, ensure you don’t unintentionally copy an IP handle from an adjoining and unrelated entry.

You possibly can paste a block of IP addresses right into a New Host Group or use a software to drag them out of a block of textual content after which paste them. Watch out in case your supply defangs IP addresses, as this is quite common. You need to use the identical methods I illustrated for the Cisco Talos GitHub entries above.

Host group dad or mum/little one relationships

A great apply for constructing dad or mum and little one host teams is to create a brand new dad or mum host group for any distinct sources. Then create a baby host group for every new report. This lets you simply monitor again each to the unique supply or the menace intelligence and establish which marketing campaign or menace actor is concerned. I like to incorporate a hyperlink to the supply within the host group description. That is particularly useful if you’re using a number of menace intelligence sources to your safety controls. Manage your host teams in a fashion that makes essentially the most sense to you.

You possibly can both create a brand new Customized Safety Occasion (see the primary a part of this weblog) for every little one host group with a definite identify or create one Customized Safety Occasion for the dad or mum host group with a generic identify. Both case may have you coated, and the host group identify within the alarm will provide help to shortly establish the supply of menace intelligence.

Different Concerns

You at all times need to carry out a Movement Search (Examine -> Movement Search) first earlier than constructing any Customized Safety Occasions. This may stop you from flooding your self with alerts should you unintentionally embody the fallacious IP handle or are already recurrently speaking with an IP handle you plan to incorporate in a brand new host group.


We’d love to listen to what you assume. Ask a Query, Remark Beneath, and Keep Linked with Cisco Safe on social!

Cisco Safety Social Channels

Instagram
Fb
Twitter
LinkedIn

Share:



Latest news
Related news

LEAVE A REPLY

Please enter your comment!
Please enter your name here