Table of Contents | ||||||
---|---|---|---|---|---|---|
|
Overview
Recorded Future is a threat intelligence provider that allows you to access known bad incidents of compromise and entity enrichment capabilities. It has 6 different modules and charges on a per-user basis for access to the product. The 6 different modules are:
Security Operations: Providing intel into SIEM / SOAR platforms.
Standalone Threat Intelligence: An extension of Security Operations providing context and enrichment of known and emerging threats/incidents.
Brand Intelligence: Monitoring an organization’s external exposure.
Vulnerability Management: Intelligence into the prioritization of threats.
Third party intelligence: Data from third party sources.
Geo-political: More focussed on nation-state attacks and threat indicators.
Note |
---|
Recorded Future also charges customers for each integration they use. For example, a mutual customer of Recorded Future and Devo using this integration will pay Recorded Future a subscription fee. |
Devo collector features
...
Feature
...
Details
...
Allow parallel downloading (multipod
)
...
Not allowed
...
Running environments
...
Collector server
On-premise
...
Populated Devo events
...
Lookups
Data sources
...
Data Source
...
Description
...
API Endpoint
...
Collector service name
...
Devo Table
...
Available from release
...
IpAddressLookupPuller
...
This endpoint provides a list of IPs classified as Threat by Recorded Future.
...
https://api.recordedfuture.com/v2/ip/risklist?format=csv%2Fsplunk
...
lookup_puller
type: ip
...
Lookup
my.lookuplist.Recorded_Future_IPv4_Address_Threat_List
my.lookuplist.Recorded_Future_IPv6_Address_Threat_List
...
v1.0.0
...
DomainLookupPuller
...
This endpoint provides a list of domains classified as Threat by Recorded Future.
...
https://api.recordedfuture.com/v2/domain/risklist?format=csv%2Fsplunk
...
lookup_puller
type: domain
...
Lookup
my.lookuplist.Recorded_Future_Domain_Threat_List
...
v1.0.0
...
FileHashLookupPuller
...
This endpoint returns a list of file hashes classified as Threat by Recorded Future.
...
https://api.recordedfuture.com/v2/hash/risklist?format=csv%2Fsplunk
...
lookup_puller
type: hash
...
Lookup
my.lookuplist.Recorded_Future_File_Hash_Threat_List
...
v1.0.0
...
UrlLookupPuller
...
This endpoint returns a list of URL classified as Threat by Recorded Future.
...
https://api.recordedfuture.com/v2/url/risklist?format=csv%2Fsplunk
...
lookup_puller
type: url
...
Lookup
my.lookuplist.Recorded_Future_URL_Threat_List
...
v1.0.0
...
VulnerabilityLookupPuller
...
This endpoint returns a list of vulnerabilities classified as Threat by Recorded Future.
...
https://api.recordedfuture.com/v2/vulnerability/risklist?format=csv%2Fsplunk
...
lookup_puller
type: vulnerability
...
Lookup
my.lookuplist.Recorded_Future_Vulnerability_Threat_List
...
v1.0.0
...
PublicUkraineRussiaIpsLookupPuller
...
This endpoint returns a list of IPs related with Russia and Ukraine.
...
https://api.recordedfuture.com/v2/fusion/files/?path=/public/ukraine/ukraine_russia_ip.csv
...
lookup_puller
type: PublicUkraineRussiaIps
...
Lookup
my.lookuplist.Recorded_Future_IPv4_Public_Ukranie_Russia_List
my.lookuplist.Recorded_Future_IPv6_Public_Ukranie_Russia_List
...
v1.2.0
Vendor setup
This collector only requires a source configuration by generating a Recorded Future API key. Recorded Future clients with Advanced or Core licenses, and one or more Connect API subscriptions can create and manage their API tokens directly in the Recorded Future portal.
Enable the collection
Here you find the necessary steps to enable the collection.
Steps
...
Screenshots
...
1
...
Login to your Recorded Future account. Open the Menu in the upper-right corner and select the option User Settings.
...
2
...
Select the API Access tab. Â To create a new API token, click on Generate New API Token.
...
3
...
Enter a name for the token in the Name field. Then click on Generate.
...
 -
...
4
...
Select Devo from the drop-down integration list
...
 -
...
5
...
Click on the Generate new API token button. The new API token appears in the table below. Make a note of the token value as this is required for the ingest Configuration.
Â
-
Minimum configuration required for basic pulling
Although this collector supports advanced configuration, the fields required to retrieve data with basic configuration are defined below.
Info |
---|
This minimum configuration refers exclusively to those specific parameters of this integration. There are more required parameters related to the generic behavior of the collector. Check setting sections for details. |
...
Setting
...
Details
...
url_value
...
This param refers to the endpoint used by the collector to pull data.
...
api_token_value
...
Table of Contents | ||||||
---|---|---|---|---|---|---|
|
Configuration requirements
To run this collector, there are some configurations detailed below that you need to take into account.
Configuration | Details |
---|---|
Recorded Future API key | Generate your API token. |
Info |
---|
Refer to the Vendor setup section to know more about these configurations. |
Overview
Recorded Future is a threat intelligence provider that allows you to access known bad incidents of compromise and entity enrichment capabilities. It has 6 different modules and charges on a per-user basis for access to the product. The 6 different modules are:
Security Operations: Providing intel into SIEM / SOAR platforms.
Standalone Threat Intelligence: An extension of Security Operations providing context and enrichment of known and emerging threats/incidents.
Brand Intelligence: Monitoring an organization’s external exposure.
Vulnerability Management: Intelligence into the prioritization of threats.
Third party intelligence: Data from third-party sources.
Geo-political: More focussed on nation-state attacks and threat indicators.
Note |
---|
Recorded Future also charges customers for each integration they use. For example, a mutual customer of Recorded Future and Devo using this integration will pay Recorded Future a subscription fee. |
Devo collector features
Feature | Details |
Allow parallel downloading ( |
|
Running environments |
|
Populated Devo events |
|
Flattening Preprocessing |
|
Data sources
Data Source | Description | API Endpoint | Collector service name | Devo Table | Available from release |
IpAddressLookupPuller | This endpoint provides a list of IPs classified as Threat by Recorded Future. |
|
type: | Lookup
|
|
DomainLookupPuller | This endpoint provides a list of domains classified as Threat by Recorded Future. |
|
| Lookup
|
|
FileHashLookupPuller | This endpoint returns a list of file hashes classified as Threat by Recorded Future. |
|
| Lookup
|
|
UrlLookupPuller | This endpoint returns a list of URL classified as Threat by Recorded Future. |
|
| Lookup
|
|
VulnerabilityLookupPuller | This endpoint returns a list of vulnerabilities classified as Threat by Recorded Future. |
|
| Lookup
|
|
PublicUkraineRussiaIpsLookupPuller | This endpoint returns a list of IPs related with Russia and Ukraine. |
|
| Lookup
|
|
Vendor setup
There are some minimal requirements to enable this collector:
Login on Recorded Future
Create a new token
Action | Steps |
Login on Recorded Future |
|
Create a new token |
|
Minimum configuration required for basic pulling
Although this collector supports advanced configuration, the fields required to retrieve data with basic configuration are defined below.
Info |
---|
This minimum configuration refers exclusively to those specific parameters of this integration. There are more required parameters related to the generic behavior of the collector. Check setting sections for details. |
Setting | Details |
---|---|
| This param refers to the endpoint used by the collector to pull data. |
| This is the access token provided by Recorded Future. |
| This configuration allows you to define what data sources will be pulled. |
Info |
---|
See the Accepted authentication methods section to verify what settings are required based on the desired authentication method. |
Accepted authentication methods
Authentication Method | Token | ||||||
---|---|---|---|---|---|---|---|
Token |
|
Run the collector
Once the data source is configured, you can either send us the required information if you want us to host and manage the collector for you (Cloud collector), or deploy and host the collector in your own machine using a Docker image (On-premise collector).
Rw ui tabs macro | ||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
We use a piece of software called Collector Server to host and manage all our available collectors. To enable the collector for a customer:
Editing the JSON configuration
Please replace the placeholders with real world values following the description table below: | ||||||||||||||||||||||||||||||||||||||||||||||
Rw ui tabs macro | ||||||||||||||||||||||||||||||||||||||||||||||
|
Info |
---|
See the Accepted authentication methods section to verify what settings are required based on the desired authentication method. |
Accepted authentication methods
...
Authentication Method
...
Token
...
Token
...
Status | ||||
---|---|---|---|---|
|
Run the collector
Once the data source is configured, you can either send us the required information if you want us to host and manage the collector for you (Cloud collector), or deploy and host the collector in your own machine using a Docker image (On-premise collector).
This data collector can be run in any machine that has the Docker service available because it should be executed as a docker container. The following sections explain how to prepare all the required setup for having the data collector running. StructureThe following directory structure should be created for being used when running the collector:
Devo credentialsIn Devo, go to Administration → Credentials → X.509 Certificates, download the Certificate, Private key and Chain CA and save them in
Editing the config.yaml file
Replace the placeholders with your required values following the description table below:
Download the Docker imageThe collector should be deployed as a Docker container. Download the Docker image of the collector as a .tgz file by clicking the link in the following table:
Use the following command to add the Docker image to the system:
The Docker image can be deployed on the following services: DockerExecute the following command on the root directoryÂ
Docker ComposeThe following Docker Compose file can be used to execute the Docker container. It must be created in theÂ
To run the container using docker-compose, execute the following command from theÂ
|
...
This section is intended to explain how to proceed with specific actions for services.
Lookup
...
puller service
The only service available in this collector is lookup_puller
. It contains 6 different pullers:
IpAddressLookupPuller
FileHashLookupPuller
DomainLookupPuller
UrlLookupPuller
VulnerabilityLookupPuller
PublicUkraineRussiaIpsLookupPuller
Expand | ||
---|---|---|
| ||
All events of this service are ingested into these tables:
|
...
Expand | ||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| ||||||||||||||||||
Once the collector has been launched, it is important to check if the ingestion is performed in a proper way. To do so, go to the collector’s logs console. This service has the following components:
Setup outputA successful run has the following output messages for the setup module:
Puller outputA successful initial run has the following output messages for the puller module:
After a successful collector’s execution (that is, no error logs found), you will see the following log message:
|
...
This section is intended to explain how to proceed with specific operations of this collector.
...
v1.2.0-stable
...
...
Status | ||||
---|---|---|---|---|
|
...
New features:
Added new custom data source for retrieving IPs related to Ukraine and Russia countries.
...
Recommended version
Configuration checklist
Here you will find a brief checklist of the important configurations that need to be done for deploying this collector:
...
Configuration
...
Requirements
...
Recorded Future API key
Generate your API token.
...
Expand | ||||||||
---|---|---|---|---|---|---|---|---|
| ||||||||
InitializationThe initialization module is in charge of setup and running the input (pulling logic) and output (delivering logic) services and validating the given configuration. A successful run has the following output messages for the initializer module:
Events delivery and Devo ingestionThe event delivery module is in charge of receiving the events from the internal queues where all events are injected by the pullers and delivering them using the selected compatible delivery method. A successful run has the following output messages for the initializer module:
Events delivery and Devo ingestionThe event delivery module is in charge of receiving the events from the internal queues where all events are injected by the pullers and delivering them using the selected compatible delivery method. A successful run has the following output messages for the initializer module:
Sender servicesThe Integrations Factory Collector SDK has 3 different senders services depending on the event type to delivery ( | ||||||||
Sender services | Description | |||||||
| In charge of delivering internal metrics to Devo such as logging traces or metrics. | |||||||
| In charge of delivering pulled events to Devo. | |||||||
Logging trace | Description | |||||||
| Displays the number of concurrent senders available for the given Sender Service. | |||||||
| Displays the items available in the internal sender queue.
| |||||||
| Displayes the number of events from the last time and following the given example, the following conclusions can be obtained:
|
Expand | ||||
---|---|---|---|---|
| ||||
To check the memory usage of this collector, look for the following log records in the collector which are displayed every 5 minutes by default, always after running the memory-free process.
|
Expand | ||
---|---|---|
| ||
Sometimes it is necessary to activate the debug mode of the collector's logging. This debug mode increases the verbosity of the log and allows you to print execution traces that are very helpful in resolving incidents or detecting bottlenecks in heavy download processes.
For more information, visit the configuration and parameterization section corresponding to the chosen deployment mode. |
Change log for v1.x.x
...
Release
...
Released on
...
Release type
...
Details
...
Recommendations
...
v1.0.0
...
...
Status | ||||
---|---|---|---|---|
|
...
New features:
Initial release with the following
Recorded Future Threat List
default data sources:IPs
Domains
URLs
File Hashes
Vulnerabilities
...
Upgrade
...
v1.1.0
...
Status | ||||
---|---|---|---|---|
|
Status | ||||
---|---|---|---|---|
|
...
Improvement:
Upgrade the
IFC SDK Lookup Factory Service
to improve the data model validation.The underlay Devo Collector SDK has been upgraded to
v1.1.4
to improve efficiency, increase the resilience and mitigate vulnerabilities.The hard-reset procedure when losing connection with Devo has been improved.
Vulnerabilities mitigated:
CVE-2022-1664
CVE-2021-33574
CVE-2022-23218
CVE-2022-23219
CVE-2019-8457
CVE-2022-1586
CVE-2022-1292
CVE-2022-2068
CVE-2022-1304
CVE-2022-1271
CVE-2021-3999
CVE-2021-33560
CVE-2022-29460
CVE-2022-29458
CVE-2022-0778
CVE-2022-2097
CVE-2020-16156
CVE-2018-25032
...
Upgrade
Sender servicesThe Integrations Factory Collector SDK has 3 different senders services depending on the event type to delivery (
Sender statisticsEach service displays its own performance statistics that allow checking how many events have been delivered to Devo by type:
|
Expand | ||||
---|---|---|---|---|
| ||||
To check the memory usage of this collector, look for the following log records in the collector which are displayed every 5 minutes by default, always after running the memory-free process.
|
Expand | ||
---|---|---|
| ||
Sometimes it is necessary to activate the debug mode of the collector's logging. This debug mode increases the verbosity of the log and allows you to print execution traces that are very helpful in resolving incidents or detecting bottlenecks in heavy download processes.
For more information, visit the configuration and parameterization section corresponding to the chosen deployment mode. |
Change log
Release | Released on | Release type | Details | Recommendations | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|
|
| |||||||||||||
|
|
|
| |||||||||||||
|
| Updated DCSDK from 1.1.4 to 1.9.1: https://devoinc.atlassian.net/wiki/spaces/IF/pages/3901620225 |
| |||||||||||||
|
| Added new custom data sources from
|
| |||||||||||||
|
| This release includes:
|
| |||||||||||||
|
| Initial release with the following
|
|