Safe Community Analytics model 7.5.2 has been launched, providing thrilling new options such because the Community Visibility Module (NVM) and Zeek detections. We’re increasing our detections throughout present and new sources, and our detections engine now ingests NVM telemetry and Zeek logs, introducing 9 new alerts prominently displayed in Analytics. These alerts are additionally aligned with the widely known MITRE ATT&CK framework.
By integrating a extra various vary of telemetry sources, Safe Community Analytics considerably enhances community visibility and supplies deeper insights into community actions. This launch and its detections signify a sophisticated strategy to broadening detection sources and capabilities. Customers using the Information Retailer structure with Analytics enabled can improve to model 7.5.2 to instantly entry these new capabilities.
The Safe Community Analytics model 7.5.2 software program updates may be downloaded from Cisco Software program Central.
New Community Visibility Module (NVM) Alerts
Community Visibility Module is a part of Cisco Safe Consumer that information and studies on community exercise from an endpoint machine and ties in endpoint fashion info with these community particulars. If you’re used to accumulating NetFlow or IPFIX in your atmosphere, the Community Visibility Module will present the identical particulars a few community connection, however may even embrace issues like hostname, course of identify, person info, working system, interface particulars, and extra. This helps pace up investigations and supplies extra context about who and what host took an motion on the community. The detections engine processes the Community Visibility Module telemetry and alerts on 4 new detections.
You’ll be able to take a look at the Community Visibility Module Configuration Information.
Community Visibility Module (NVM) Alert Names and Descriptions
Potential Gamaredon C2 Callout
A command line utility was used to contact a URL related to the command-and-control servers of a risk actor often known as Gamaredon. Gamaredon (also called Armageddon, Primitive Bear, and ACTINIUM) is an APT energetic since 2013 recognized to leverage spearphishing to contaminate victims with customized malware.
Suspicious Curl Habits
The system utility curl exhibited suspicious habits that could be indicative of exploitation of CVE-2023-38545.
Suspicious MSHTA Exercise
The built-in Home windows utility MSHTA.exe was executed interactively by a non-system person and utilized to make a community connection. Whereas sometimes legit when run mechanically by the system, additionally it is recognized to be utilized by risk actors together with Superior Persistent Threats (APTs).
Suspicious Course of Path
A course of was executed on an endpoint from a listing that ought to not have executables.

New Zeek Alerts
Zeek is a well-liked, free, and open-source community site visitors evaluation device. It screens and inspects site visitors and generates log recordsdata of witnessed exercise. These Zeek log recordsdata may be despatched to Safe Community Analytics as a telemetry supply. The detections engine reads the Zeek logs and alerts on 5 new detections.
Try the Zeek Configuration Information.
Zeek Alert Names and Descriptions
DNS Visitors to Tor Proxy
A tool despatched DNS question site visitors for a recognized Tor proxy. This may occasionally point out that an utility is getting ready to ascertain a connection through a Tor proxy. It could possibly be a botnet making an attempt to contact different units for command-and-control. Adversaries are recognized to leverage it for command-and-control and protection evasion. Even when utilized by a legit person, it could circumvent some safety controls.
PetitPotam Assault By way of EFS RPC Calls
A tool despatched a Distant Process Name (RPC) utilizing the Encrypting File System Distant Protocol (EFSRPC) Protocol library. The PetitPotam assault is understood to be associated to this kind of RPC site visitors. PetitPotam is a device that may exploit this library. It is usually often known as an NTLM relay assault. Since most organizations don’t use this library in any respect, or restrict the utilization of it, any use is unusual sufficient to point a attainable PetitPotam assault.
Potential Impacket SecretDump Exercise
A tool is making an attempt a secrets and techniques dump utilizing an influence device equivalent to secretdump.py, which permits dumping credentials from an Lively Listing (AD) server. That is additionally known as a secrets-dump HKTL.
Distant Job Creation through ATSVC Named Pipe
A tool is making an attempt to create a distant process utilizing ATSVC named pipes, which could possibly be a malicious try to make use of at.exe for performing process scheduling for preliminary or recurring execution of malicious code. The at.exe utility has been deprecated in present variations of Home windows in favor of schticks.
Suspicious PsExec Execution
A tool aside from a Home windows Sysinternal machine is utilizing psexec with a renamed service identify, which may point out a risk actor making an attempt to carry out a distant execution.

Conclusion
Customers of the Safe Community Analytics Information Retailer with Analytics will wish to improve their occasion to model 7.5.2 to realize entry to 9 new detections – 4 based mostly on Community Visibility Module telemetry and 5 based mostly on Zeek logs. These new detections are instantly out there in Analytics. Configure the sources to export and develop your detection protection immediately.
References
We’d love to listen to what you assume. Ask a Query, Remark Under, and Keep Related with Cisco Safe on social!
Cisco Safety Social Channels
Share: