Analysing firewall rules in AWS can be complex. There are Security Groups (SG) as well as Access Control Lists (ACL). Security groups are applied on instances and are the first layer of defense, whereas access control lists are applied on network components (subnets) and are a second layer of defense. A major difference is that SGs are stateful, whereas ACLs are stateless. From a filtering perspective there is also a difference. In security groups all … Read more.
Cyberweapons Arms Race
I recently finished the book “This Is How They Tell Me the World Ends: The Cyberweapons Arms Race” by Nicole Perlroth. The book covers the story of the cyberweapons market and how government agencies fuelled this economy, eventually making the Internet a less safer place for us all.
I added some notes of items of interest in a mindmap that are maybe of use for others. The map is not complete at all, feel free … Read more.
MISP sharing groups demonstration video
Sharing groups in MISP are a more granular way to create re-usable distribution lists for events/attributes that allow users to include organisations from their own instance (local organisations) as well as organisations from directly, or indirectly connected instances (external organisations).
For a possible future project I had to document if sharing groups are an answer for a sort of multi-tenancy for sharing threat events within MISP.
Sharing groups certainly provide an answer, as long as … Read more.
MISP and Microsoft Sentinel
A short post with things to consider when integrating MISP threat intelligence with Microsoft Sentinel. There are two documentation resources that describe the integration in detail and should get you started in no-time:
External Connectors for MISP Integrating open source threat feeds with MISP and Sentinel
This error is caused by invalid client secret or missing client ID. One of the steps in the documentation involves creating a new secret. You then have to add … Read more.
Using VMRay Analyzer for Initial Triage and Incident Response
I published an article on the blog of VMRay: Using VMRay Analyzer for Initial Triage and Incident Response.
In this article I cover a practical case study how VMRay Analyzer helped with getting an accurate and noise-free analysis for initial triage and obtaining the relevant indicators of compromise for faster incident response.
Key recommendations and findings from the HSE Conti ransomware attack
The healthcare sector has been in the crosshairs of ransomware gangs.
One of the victims of last year was Ireland’s Health Services Executive. A report analysing the Conti ransomware attack was published as a follow-up to the incident. This Independent Post Incident Review provides a long list of recommendations that are not only valuable for the HSE but read as a “must-do” list for other organisations to be better prepared for such ransomware incidents.
I … Read more.
Integrate DFIR-IRIS, MISP and TimeSketch
I published a set of scripts that I use to integrate
Threat events and indicators stored in MISP; CSIRT case handling data such as events, IOCs, timelines, assets and evidences in DFIR-IRIS; Analysis events on PCAP and EVTX files in TimeSketch.
The Python scripts tie everything together between MISP, IRIS and TimeSketch. The scripts and example usage, with screenshots, are published in a Github repository: https://github.com/cudeso/dfir-iris-misp-timesketch.
The scripts make it possible to document threat … Read more.
Basic Automation with the VMRay API
I wrote an article on the VMRay website: Basic Automation with the VMRay API. This article walks you through the use of VMRay as a replacement of a Data Exchange Point.
The article documents how to Submit a Sample via VMRay API and look at the Behaviour Patterns to decide if a file is allowed into your environment or not.
Visualising MISP galaxies and clusters
The MISP galaxies and clusters are an easy way to add context to data. I’ve previously written an article “Creating a MISP Galaxy, 101” that describes how you can create your own galaxy and cluster.
Apart from the context, galaxies and clusters also allow you to describe relations between individual elements. These relations can for example be the synonyms (naming) for an APT group or the fact that a specific group uses a (MITRE ATT&CK) … Read more.
Incident response case management, DFIR-IRIS and a bit of MISP
A good case management is indispensable for CSIRTs. There are a number of excellent case management tools available but either these are more tailored towards SOCs, are overpriced or are unnecessary complex to use. I have used TheHive, RTIR, Omnitracker, OTRS and ServiceNow and although TheHive and RTIR come close, I have never really found a solution that addresses my needs.
I currently use a combination of
TheHive Case management Template system to start … Read more.