Document toolboxDocument toolbox

Release 3 - Out-of-the-box alerts

The Devo Threat Research team has released 42 detections through the Devo Security Operations Content Stream, making them available for installation instantly within your Devo instance.  Release 3 continues Devo’s emphasis on Cloud Security Monitoring as a key use case, containing a large number of detections for Google Cloud Platform.   Additionally, Devo has expanded its out of the box coverage for Windows and Firewall logs, which are commonly ingested into Devo and critical for maintaining security monitoring.  

All the new and modified alerts as part of Release 3 can be seen in the below tables. 

Details on existing detections that were updated can be seen below:

Detection name

Detection description

Devo table/Data source/Category

SecOpsSeveralDNSConnections

The systems usually make name resolution (DNS Protocol) requests to a reduced number of IPs. Any system that makes requests to many different servers in a certain period of time is suspected of being compromised.

firewall.all.traffic

SecOpsLocalUserCreation

The creation of a new Windows user has been detected. Although this could be a legitimate action, It should be reviewed.

box.all.win 

Details on the new detections released can be seen below: 

Detection name

Detection description

Devo table/Data source/Category

SecOpsGCPNewPublicStorageBucket

An attacker could intend to collect data, making public the data from a GCP Storage Bucket.

cloud.gcp

SecOpsGCPKubernetesClusterPodScanDetection

 

An adversary may attempt to enumerate the cloud services running on GCP Kubernetes cluster’s pods

cloud.gcp

SecOpsGCPGCEFirewallRuleCreation

This alert detects any attempt to create a firewall rule in Google Cloud Compute Engine.

cloud.gcp

SecOpsGCPGCEFirewallRuleDeletion

An attacker may have tried to bypass perimeter security by deleting a firewall rule.

cloud.gcp

SecOpsGCPGCEFirewallRuleModification

An attacker may have tried to bypass perimeter security by modifying a firewall rule.

cloud.gcp

SecOpsGCPIAMCustomRoleCreation

An attacker may have created a new Role to gain persistence.

cloud.gcp

SecOpsGCPIAMServiceAccountKeyDeletion

An adversary could delete a IAM Service Account Key to manipulate the service account and maintain access to the systems.

 

cloud.gcp

SecOpsGCPLoggingBucketDeletion

An adversary could remove a Google Cloud Logging Bucket to impair event aggregation and analysis mechanisms.

cloud.gcp

SecOpsGCPPubSubSubscriptionCreation

An adversary could create a Google Cloud Pub/Sub Subscription to collect data.

cloud.gcp

SecOpsGCPPubSubSubscriptionDeletion

An adversary could delete a Google Cloud Pub/Sub subscription to impair event aggregation and analysis mechanisms.

cloud.gcp

SecOpsGCPPubSubTopicCreation

An adversary could create a Google Cloud Pub/Sub topic to collect data.

cloud.gcp

SecOpsGCPPubSubTopicDeletion

An adversary could delete a Google Cloud Pub/Sub topic to impair event aggregation and analysis mechanisms.

cloud.gcp

SecOpsGCPIAMServiceAccountDeletion

An attacker could delete a Service Account to interrupt the availability of systems and network resources by inhibiting access to accounts utilized by legitimate users.

cloud.gcp

SecOpsGCPIAMServiceAccountDisabled

An adversary could disable a IAM Service Account to manipulate the service account and maintain access to the systems.

cloud.gcp

SecOpsGCPIAMServiceAccountKeyCreation

An adversary could create a IAM Service Account Key to manipulate a service account and maintain access to the systems.

cloud.gcp

SecOpsGCPStorageBucketDeletion

An adversary could delete a Google Cloud Storage Bucket to destroy data and files on specific systems or in large numbers on a network to interrupt availability to systems, services, and network resources.

cloud.gcp

SecOpsGCPStorageBucketPermissionsModification

An adversary may modify Storage Bucket Permissions to evade access control lists (ACLs) and access protected files.

cloud.gcp

SecOpsGCPDetectAccountsWithHighRiskRolesByProject

A high risk role have been assigned to a user, this could indicate that a malicious actor could be trying to escalate privileges within the project.

cloud.gcp

SecOpsGCPPrivateCloudRouteDeletion

An attacker may have deleted a VPC Route to interrupt the availability of systems and network resources.

cloud.gcp

SecOpsGCPPrivateCloudRouteCreation

An attacker may have created a new Route to bypass restrictions on traffic routing segregating trusted and untrusted networks.

cloud.gcp

SecOpsGCPPrivateCloudNetworkDeletion

An attacker could delete a Virtual Private Cloud Network (VPC) to interrupt availability of systems and network resources.

cloud.gcp

SecOpsGCPLoggingSinkModification

An attacker could be modifying a logging sink to avoid detection, or redirect logs to a different destination.

cloud.gcp

SecOpsGCPLoggingSinkDeletion

An attacker could be deleting a logging sink to avoid detection.

cloud.gcp

SecOpsWinLockoutsEndpoint

Multiple Windows account lockouts were detected on the same endpoint.

box.all.win

SecOpsWinAnonymousAccountCreated

Detects the creation of suspicious user accounts similar to ANONYMOUS LOGON. These accounts can be created as a means to evade defenses and monitoring by masquerading as a third party service.

box.all.win

SecOpsWinDisableAntispywareRegistry

Detects users enabling the DisableAntiSpyware registry key. Attackers may utilize this technique for evasion.

box.all.win

SecOpsWinWmiprvseSpawningProcess

Detects child processes spawned by WMIPRVSE. Adversaries can use this to obscure parent child relationships or launch cmd.exe or PowerShell.

box.all.win

SecOpsWinExcessiveUserInteractiveLogin

Detects when a user performs a significant number of Windows interactive logins to multiple destination hosts in 24 hours period.

box.all.win

SecOpsWinLocalSystemExecuteWhoami

Detects a local system executing whoami.exe on the command prompt. Adversaries often run this command to understand account privileges. Investigate the parent process and user account for other related, suspicious activity.

box.all.win

SecOpsWinLsassKeyModification

Monitors for changes to lsass.exe related registry keys that are often edited to enable or obfuscate activity related to dumping the process.

box.all.win

SecOpsWinRegistryQuery

Identifies queries to the registry. Adversaries often query the registry to gather information about the system, configuration, and installed software.

box.all.win

SecOpsWinScheduledTaskCreation

Detects when a scheduled task is created in Windows.

box.all.win

SecOpsWinUserCredentialDumpRegistry

Monitors for use of reg.exe with parameters indicating the attempted export of hashed credentials.

box.all.win

SecOpsWinWmiProcessCallCreate

Detects usage of WMI to create processes on the local or remote hosts. WMI is a native Windows tool and can be used to bypass application whitelisting.

box.all.win

SecOpsWinWmiLaunchingShell

Detects WMI creating a child process of cmd.exe or PowerShell. An attacker can use WMI to launch a shell on the local or remote host to bypass application whitelisting, since WMI is a native Windows management tool.

box.all.win

SecOpsWinBackupCatalogDeleted

Detects suspicious usage of wbadmin.exe (Windows Backup Administrator Tool) to delete backup files.

box.all.win

SecOpsWinUserAddedToLocalSecurityEnabledGroup

Attackers may attempt to escalate privileges to a user account by adding it to a local security enabled group. This could indicate privilege abuse or potential malicious activity.

box.all.win 

SecOpsWinWmiExecVbsScript

Detects suspicious file execution by wscript and cscript. Adversaries can use this mechanism to execute malicious code for persistence or privilege escalation.

box.all.win 

SecOpsFWExternalSMBTrafficDetectedFirewall

Identifies SMB traffic from external sources allowed through the firewall. Due to known vulnerabilities with the SMB protocol, this type of external traffic falls outside best practices.

firewall.all.traffic

SecOpsFWSMBTrafficOutbound

Detects SMB traffic from internal to external sources allowed through the firewall.

firewall.all.traffic

SecOpsFWRDPExternalAccess

Identifies RDP traffic from external sources allowed through the firewall. This type of traffic may indicate an adversary is in possession of valid accounts and is accessing a host from outside the network.

firewall.all.traffic

SecOpsFortinetHighRiskAppUse

Alerts when Fortinet Firewall detects a high risk application within the environment.

firewall.fortinet.traffic.forward

SecOpsFortinetCriticalRiskAppUse

Fortinet Firewall detected a critical risk application within the environment.

firewall.fortinet.traffic.forward

SecOpsPanAuthExcessiveFailedLoginIP

Detects excessive Palo Alto firewall authentication failures for a single IP within a short period of time.

firewall.paloalto.system

SecOpsPanAuthExcessiveFailedLoginUser

Detects excessive Palo Alto firewall authentication failures for a single user account within a short period of time.

firewall.paloalto.system

SecOpsPanAuthFailMultipleUserSingleIP

Detects brute force attacks via the Palo Alto firewalls. A source IP address attempted and failed to authenticate multiple times while providing multiple usernames.

firewall.paloalto.system