Register now for better personalized quote!

Leveraging Threat Intelligence in Cisco Secure Network Analytics, Part 2

Nov, 08, 2024 Hi-network.com

This blog is continuation of the previous blog on using Cisco Secure Network Analytics. In this part, we cover leveraging public Cisco Talos blogsandthird-party threat intelligence data with Cisco Secure Network Analytics. Be sure to read the first part as this part makes references back toHost Group and Custom Security Eventinstructions covered in the original blog.

Cisco Talos Blogs

The talented researchers at Cisco Talos regularly publish blogs on threats and vulnerabilities. These blogs break down the tactics, techniques and procedures (TTPs) used by threat actors. Talos' research publications often include sample source code, phishing emails, reverse engineering of malicious binaries, tools, scripts, command and control methodology, attacker infrastructure, file hashes, domains and IP addresses used in malicious operations. The indicators of compromise (IOCs) are published on GitHub as JSON and plain text files. We can use these blogs and GitHub files to build Custom Security Events in Cisco Secure Network Analytics.

Let's look at a blog: MoonPeak malware from North Korean actors unveils new details on attacker infrastructure. This blog focuses on a state-sponsored group from North Korea. The group leverages an open-source remote access trojan (RAT) from a family being called MoonPeak.

Fig. 1: Recent blog post from Cisco Talos

Scroll through the article and pay attention to the level of detail provided. Near the very bottom of the blog notice the section titledIOCs.

Fig. 2:IOCssection with a link to GitHub

Click on the link to the GitHub repository. You will be taken to the Cisco Talos GitHub repository where you will find the IOCs are available as JSON and plain text files, and are sorted by the month the blog was published in. Feel free to explore other files, months, and years to get familiar with the indicators regularly provided.

Fig. 3: GitHub files from August 2024 for three Talos blogs

Click on the file "moonpeak-infrastructure-north-korea.txt" or follow the direct link. Scroll down to line 35 of the file where theNetwork IOCsbegin. This list contains twelve IP addresses we are interested in. Noticed that the IP addresses and domains have been defanged with square brackets around the dots so you cannot accidentally click on them.

Fig. 4:Network IOCsprovided by Talos used by North Korean threat actors

You can either manually delete the square brackets or use the find and replace functionality in your favorite text editor to do the job. I prefer to useNotepad++when dealing with text files. I set the "Find and Replace" to look for the square brackets around the dot and replace all instances with a dot.

Fig. 5: UsingNotepad++with find and replace to remove square brackets in defanged IP addressesFig. 6: Successful replacement -notice the square brackets are all gone now

Delete the domains from the list and copy and paste these IP addresses into aNew Host Groupusing the techniques described in the first part of this blog.

Fig. 7: Creating a new host group for the IPs taken from this Cisco Talos blog

You may also consider using a tool to extract IP addresses from text. I really like iplocation IP Extractor. You can paste in a block of text with IPv4 and IPv6 IP addresses and it will extract them so they can be easily reviewed and pasted into a host group. The IPs you paste into this tool cannot be defanged. It requires full and correct IP addresses to work.

Always consider the sensitivity of the information you provide to public tools before using them. You should consider a locally hosted tool for sensitive information

Fig. 8: Using an IP extractor to pull out all valid IP addresses from a block of textFig. 9: Extracted IP addresses ready to copy to a host group

Third-party threat intelligence

If you participate in any Information Sharing and Analysis Centers (ISACs), subscribe to commercial feeds or regularly utilize bulletins and blogs geared towards your industry, you can also utilize their indicators in Cisco Secure Network Analytics. They work the same way we handled internal threat intelligence in the first part of this blog or Cisco Talos blogs shown above. Be careful when scraping threat intelligence to be sure you are only including indicators you intend to use. For example, if you are scraping an entire bulletin that contains IP addresses you are interested in, make sure you don't accidentally copy an IP address from an adjacent and unrelated entry.

You can paste a block of IP addresses into aNew Host Groupor use a tool to pull them out of a block of text and then paste them. Be careful if your source defangs IP addresses, as this is very common. You can use the same techniques I illustrated for the Cisco Talos GitHub entries above.

Host group parent/child relationships

A good practice for building parent and child host groups is to create a new parent host group for any distinct sources. Then create a child host group for each new report. This allows you to easily track back both to the original source or the threat intelligence and identify which campaign or threat actor is involved. I like to include a link to the source in the host group description. This is especially helpful if you are utilizing multiple threat intelligence sources for your security controls. Organize your host groups in a manner that makes the most sense to you.

You can either create a newCustom Security Event(see the first part of this blog) for each child host group with a distinct name or create oneCustom Security Eventfor the parent host group with a generic name. Either case will have you covered, and the host group name in the alarm will help you quickly identify the source of threat intelligence.

Other Considerations

You always want to perform aFlow Search(Investigate -> Flow Search) first before building anyCustom Security Events. This will prevent you from flooding yourself with alerts if you accidentally include the wrong IP address or are already regularly communicating with an IP address you intend to include in a new host group.


We'd love to hear what you think. Ask a Question, Comment Below, and Stay Connected with Cisco Secure on social!


tag-icon Hot Tags : Network security threat intelligence Threat Intelligence Platforms Enterprise Network Security network security monitoring Cisco Secure Network Analytics (SNA)

Copyright © 2014-2024 Hi-Network.com | HAILIAN TECHNOLOGY CO., LIMITED | All Rights Reserved.