Cyber protection safeguards data programs, networks, and knowledge from cyber threats by proactive safety measures. It entails deploying methods and applied sciences to guard towards evolving threats which will trigger hurt to enterprise continuity and fame. These methods embrace threat evaluation and administration, menace detection and incident response planning, and catastrophe restoration.
Menace Intelligence (TI) performs a vital position in cyber protection by offering helpful insights from analyzing indicators of compromise (IoCs) reminiscent of domains, IP addresses, and file hash values associated to potential and energetic safety threats. These IoCs allow organizations to establish menace actors’ ways, strategies, and procedures, enhancing their capacity to defend towards potential assault vectors.
Menace intelligence helps safety groups flip uncooked knowledge into actionable insights, offering a deeper understanding of cyberattacks and enabling them to remain forward of latest threats. Some advantages of using menace intelligence in a corporation embrace:
- Simpler safety: Menace Intelligence helps organizations prioritize safety by understanding probably the most prevalent threats and their impression on their IT environments. This permits for efficient useful resource allocation of personnel, expertise, and finances.
- Improved safety posture: By understanding the evolving menace panorama, organizations can establish and handle vulnerabilities of their programs earlier than attackers can exploit them. This strategy ensures steady monitoring of present threats whereas anticipating and making ready for future threats.
- Enhanced incident response: Menace intelligence gives helpful context about potential threats, permitting safety groups to reply quicker and extra successfully. This helps organizations decrease downtime and doable harm to their digital belongings.
- Price effectivity: Organizations can get monetary savings by stopping cyberattacks and knowledge breaches by menace intelligence. An information breach can lead to vital prices, reminiscent of repairing system harm, lowered productiveness, and fines resulting from regulatory violations.
Wazuh is a free, open supply safety resolution that gives unified SIEM and XDR safety throughout a number of platforms. It gives capabilities like menace detection and response, file integrity monitoring, vulnerability detection, safety configuration evaluation, and others. These capabilities assist safety groups swiftly detect and reply to threats of their data programs.
Wazuh gives out-of-the-box help for menace intelligence sources like VirusTotal, YARA, Maltiverse, AbuseIPDB, and CDB lists to establish recognized malicious IP addresses, domains, URLs, and file hashes. By mapping safety occasions to the MITRE ATT&CK framework, Wazuh helps safety groups perceive how threats align with widespread assault strategies and prioritize and reply to them successfully. Moreover, customers can carry out customized integrations with different platforms, permitting for a extra tailor-made strategy to their menace intelligence program.
The part beneath reveals examples of Wazuh integrations with third-party menace intelligence options.
MITRE ATT&CK integration
The MITRE ATT&CK framework, an out-of-the-box integration with Wazuh, is a consistently up to date database that categorizes cybercriminals’ ways, strategies, and procedures (TTPs) all through an assault lifecycle. Wazuh maps ways and strategies with guidelines to prioritize and detect cyber threats. Customers can create customized guidelines and map them to the suitable MITRE ATT&CK ways and strategies. When occasions involving these TTPs happen on monitored endpoints, alerts are triggered on the Wazuh dashboard, enabling safety groups to reply swiftly and effectively.
WazuhDetermine 1: MITRE ATT&CK ways and strategies on the Wazuh dashboard
The out-of-the-box rule beneath detects when there’s an try to log in to a server utilizing SSH with a non-existent person.
|
 <rule id=”5710″ stage=”5″>    <if_sid>5700</if_sid>    <match>unlawful person|invalid person</match>    <description>sshd: Try to login utilizing a non-existent person</description>    <mitre>      <id>T1110.001</id>      <id>T1021.004</id>    </mitre>    <group>authentication_failed,gdpr_IV_35.7.d,gdpr_IV_32.2,gpg13_7.1,hipaa_164.3 12.b,invalid_login,nist_800_53_AU.14,nist_800_53_AC.7,nist_800_53_AU.6,pci_d ss_10.2.4,pci_dss_10.2.5,pci_dss_10.6.1,tsc_CC6.1,tsc_CC6.8,tsc_CC7.2,tsc_CC7.3, </group>  </rule> |
The place:
- 001 refers back to the MITRE ATT&CK ways of brute forcing or password guessing.
- 004 refers back to the MITRE ATT&CK ways of lateral motion utilizing distant companies like SSH
WazuhDetermine 2: Alerts on the Wazuh dashboard displaying MITRE ATT&CK strategies and ways
YARA integration
YARA is an open supply device for sample matching and figuring out malware signatures. Wazuh integrates with YARA to boost menace detection by figuring out patterns and signatures related to malicious information. YARA makes use of the Wazuh FIM module to scan monitored endpoints for malicious information.
The effectiveness of the YARA integration is demonstrated in how Wazuh responds to Kuiper ransomware on an contaminated Home windows endpoint.
WazuhDetermine 3: Kuiper ransomware detection utilizing Wazuh and YARA integration.
VirusTotal integration
VirusTotal is a safety platform for aggregating malware signatures and different menace intelligence artifacts. Wazuh integrates with the VirusTotal API to establish recognized indicators of compromise, enhancing the pace and accuracy of menace detection.
For instance, the Wazuh proof of idea information reveals methods to detect and take away malware utilizing VirusTotal integration.
The beneath block within the Wazuh configuration file /var/ossec/and so on/ossec.conf detects adjustments to information and queries their hashes towards the VirusTotal API.
|
<ossec_config> Â <integration> Â Â Â <title>virustotal</title> Â Â Â <api_key><API_KEY></api_key><!– Exchange together with your VirusTotal API key –> Â Â Â <rule_id>554,550</rule_id> Â Â Â <alert_format>json</alert_format> Â </integration> </ossec_config> |
Additionally, the Wazuh command monitoring configuration within the Wazuh server configuration file /var/ossec/and so on/ossec.conf triggers the remove-threat.sh executable to take away the malicious file from the monitored endpoint when there’s a constructive VirusTotal match.
|
<ossec_config> Â <command> Â Â Â <title>remove-threat</title> Â Â Â <executable>remove-threat.sh</executable> Â Â Â <timeout_allowed>no</timeout_allowed> Â </command> Â <active-response> Â Â Â <disabled>no</disabled> Â Â Â <command>remove-threat</command> Â Â Â <location>native</location> Â Â Â <rules_id>87105</rules_id> Â </active-response> </ossec_config> |
The determine beneath reveals the detection and response alerts on the Wazuh dashboard.
WazuhDetermine 4: VirusTotal alert on the Wazuh dashboard
Wazuh is a free and open supply SIEM and XDR platform with many out-of-the-box capabilities that present safety throughout workloads in cloud and on-premises environments. Integrating Wazuh with menace intelligence feeds and platforms reminiscent of YARA, VirusTotal, and Maltiverse enhances its menace detection and response capabilities.
Be taught extra about Wazuh by exploring our documentation and becoming a member of our skilled group.
Copyright © 2024 IDG Communications, Inc.


