Here are some detections / preventions in response to the DarkSide findings.
INITIAL COMPROMISE
Password attacks on perimeter. 2FA everything. Set lockout thresholds on logins. Ingest logs to SIEM and monitor for brute force attempts and impossible travel.
1/14
TeamViewer / Anydesk. Create a SIEM rule and / or run threat hunt for ports in below thread. Try to pick one remote access for your organisation, block the rest.
Keep sure you can detect internal port scans of different types, spikes in traffic from a host OR port (Anomaly detection) based on either count or byte volume.
10/14
If you have an IDPS, it should do this for you out of the box.
Patch. I know this can be easier said than do at times, but it can be the difference between being breached, and not.
Test your defences - Once you have defences in place, test them. Are things really being blocked? Do alerts really trigger in your SIEM?
12/14
Test your responses. If shit does have the fan - do you have an IR team? Do you have one on retainer? Have you played out scenarios and went through the how, who and why you will respond to a real event?
13/14
I’m sorry this was so long and unstructured, but I hope it helps someone. 😀
I rarely use this account anymore, but due to the potential #Okta breach here are some SIEM rules which could potentially be useful running back over the past 90 days of data if you can.
25494 of the URLs end with Mozi.m, relating to the Mozi Botnet - securityintelligence.com/posts/botnet-a…. To detect this, we can look for the regex pattern .*Mozi\.m$
A further 4636 of the URLs end with Mozi.a, related to the above. We can detect this using regex pattern .*Mozi\.a$
Finally, there are 10 URLs which contain Mozi within them in different patterns to above. It is therefore worthwhile searching for any case of Mozi within a URL (This will be greedier than the above, but still worthwhile checking)
I have a lot of people asking me ‘Will SOAR / Automation in general replace SOC/Cybersecurity Analyst jobs in X number of years’
My opinion - Simple answer, no.
Long answer, it is already (and will in all SOCs in the future) replace simple tasks such as copy pasting info
1/
From tools into ticketing platforms, sorting mailboxes, running scans on IOCs and things such as this. (Which in a lot of cases are currently classed as Tier/Level 1 analysts tasks)
It will not replace expert knowledge, such as in-depth analysis skills, remediating difficult
2/
Problems (Incident Response), threat Intel investigations / reporting, risk mitigation etc etc. The list goes on of tasks and skills which SOAR/Automation will not replace any time soon.
So don’t be worried - SOAR/Automation should be thought of as an assistant for us all
3/
Intel Owl (Threat intel data about a specific file IOC from a single API at scale) - github.com/intelowlprojec…
Cyber Chef (Web app for carrying out all manner of "cyber" operations within a web browser.) - gchq.github.io/CyberChef/
TheHive (Scalable Incident Response Platform designed to make life easier for SOCs, CSIRTs, and CERTs, featuring integration with MISP.) - thehive-project.org
CertSpotter (Alerts you when a SSL/TLS certificate is issued for one of your domains.) - github.com/SSLMate/certsp…