Detection Rules & MITRE ATT&CK Techniques - SnapAttack

As a Detection Engineer and Threat Hunter, I love MITRE ATT&CK and I whole-heartedly believe that you should too. However, there’s something about the way that some folks leverage ATT&CK that has me…

SnapAttack

Should a password spray detection in a SIEM alert you when there are 300+ failed logins against a collection of a dozen and a half accounts in an hour, or ONLY when one of those accounts subsequently logs in _successfully_ ?

Is it only a password spray if it eventually succeeds?

#detectionRules #passwordSpray

GitHub - jatrost/awesome-detection-rules: This is a collection of threat detection rules / rules engines that I have come across.

This is a collection of threat detection rules / rules engines that I have come across. - GitHub - jatrost/awesome-detection-rules: This is a collection of threat detection rules / rules engines th...

GitHub
Google Cloud’s intelligence research and applications team released a collection of 165 YARA rules to help defenders flag Cobalt Strike components deployed by attackers - https://www.helpnetsecurity.com/2022/11/21/cobalt-strike-attackers-detection-rules/ - #CobaltStrike #YARA #DetectionRules #RedTeam #BlueTeam #Cybersecurity #InfoSec
Google seeks to make Cobalt Strike useless to attackers - Help Net Security

Google's researchers have released 165 YARA rules to help defenders flag Cobalt Strike components deployed by attackers.

Help Net Security

In the early 2000s, #SvenHenkel and myself developed an #IDMEF/ #IDXP compliant security event message pipelining framework for collecting and consolidating log messages, e.g., from network #IDS, and #EDR products.

In the messages stream, we were able to match multi-stage #correlation #DetectionRules in near real-time (in-memory), before everything was stored in a central database. Structural graph-based #AnomalyDetection was developed later by some colleagues.

We called it #MetaIDS.