Release 6 - Out-of-the-box alerts
The Devo SciSec team is proud to announce that we have released more out-of-the-box content. This release not only includes 33 new OOTB detections, but includes our newest detection technology: Linux.
This release brings more detections through the Devo Security Operations Content Stream, bringing our total to 388 detections, and making them available for installation instantly within your Devo instance. The SciSec team continues on the journey twardo 500 detections. Release 6 has an emphasis on Cloud Security Monitoring as a key use case, containing a large number of detections for Azure, Proxies, and Office 365.
Additionally, Devo has expanded its out of the box coverage for Windows, and AWS, which are commonly ingested into Devo and critical for maintaining security monitoring. Devo is committed to providing high quality alerts for all customer environments, we will continue to deliver these out of the box detections during the next release, focusing on a variety of technologies, including Linux and EDR technologies. All the new and modified alerts as part of Release 6 can be seen in the below tables.
Details on existing detections that were updated can be seen below:
Detection name | Detection description | Devo table/Data source/Category |
SecOpsAWSOpenNetworkACLs | The search looks for CloudTrail events to detect if any network ACLs were created with all the ports open to a specified CIDR. | cloud.aws.cloudtrail |
SecOpsAWSMultipleFailedConsoleLogins | Multiple failed login attempts from the same user were detected. This could indicate an attacker could be trying to brute force access to that specific user account. | cloud.aws.cloudtrail |
SecOpsAWSIAMAssumeRolePolicyBruteForce | Detection of events with errorCode "MalformedPolicyDocumentException.” A malformed policy document exception occurs in instances where roles are attempted to be assumed, or brute forced. | cloud.aws.cloudtrail |
SecOpsAwsGetSecretFromNonAmazonIp | Detects a GetSecretValue action where the source IP does not belong in an Amazon instance IP space. | cloud.aws.cloudtrail |
SecOpsSimultaneouslyLoginbyIP | In order to prevent possible misuse of access credentials, it's important to control simultaneous users used on systems from the same IP addresses. | auth.all |
SecOpsAWSMultipleFailedConsoleLoginsFromASourceIP | The Describe permissions event retrieves a description of permissions for a specified stack. This could be used by an attacker to collect information for further attacks. | cloud.aws.cloudtrail |
Details on the new detections released can be seen below:
Detection name | Detection description | Devo table/Data source/Category |
SecOpsAzureDevOpsProjectVisibilityChanged | This alert identifies when an Azure DevOps project visibility has been set to public. This action should be reviewed since it could be undermining the security posture of the company. | cloud.azure.vm.unknown_events |
SecOpsLinuxWebserverAccessLogsDeleted | Detects the deletion of Web Server access logs. | box.unix |
SecOpsLinuxSysLogFileDeletion | Detects the deletion of sensitive Linux system logs | box.unix |
SecOpsLinuxSudoFileModification | Detects modification to the sudoers file. The sudoers file determines which users have the ability to run with superuser permission. | box.unix |
SecOpsLinuxRestrictedShellBreakoutSSH | Detects potential Linux binary SSH abuse to break out from restricted environments by spawning an interactive system shell. | box.unix |
SecOpsLinuxAuditdMaxFailedLoginAttempts | Detects the maximum number of failed login attempts for a user on a Linux host. | box.unix |
SecOpsLinuxDeletionSSHKey | Detects the deletion of SSH Key. | box.unix |
SecOpsLinuxSetuiSecapUtility | Detects for suspicious setcap utility execution to enable SUID bit. | box.unix |
SecOpsLinuxHijackLibraryCalls | Detects a command that could hijack a library function. This detection looks for the use of LD_PRELOAD command to hijack library functions. | box.unix |
SecOpsLinuxInsertKernelInsmod | Detects insertion of linux kernel module using insmod utility function. This could indicate the installation of a rootkit or other malicious kernel modules. | box.unix |
SecOpsLinuxDoasToolExec | Detects the use of the doas tool. Doas allows users to run commands as another account, commonly used for root privileges. | box.unix |
SecOpsAzureDevOpsSecretNotSecured | This alert identifies when a user has insecurely stored a new variable in Azure Devops that could be containing credentials. | cloud.azure.vm.unknown_events |
SecOpsO365NewFederatedDomain | The addition of a new Federated domain may be a normal activity. However, these events need to be followed closely, as they may indicate federated credential abuse or a backdoor via federated identities. | cloud.office365.management.exchange |
SecOpsO365ExcessiveSSOLoginFailures | Adversaries may use brute-force techniques to gain access to accounts when passwords are unknown or when password hashes are obtained. | cloud.office365.management.azureactivedirectory |
SecOpsO365ExcessiveAuthFailureAttempts | This detection is triggered when a user account attempts an excessive number of authentication attempts with a failed status result in a short time window. | cloud.office365.management.azureactivedirectory |
SecOpsO365DisableMFA | Adversaries may modify authentication mechanisms and processes to access user credentials, bypass authentication mechanisms or enable otherwise unwarranted access to accounts. | cloud.office365.management.azureactivedirectory |
SecOpsO365BypassMFAviaIP | This activity is not necessarily malicious. However, these events need to be followed closely. Attackers are often known to use this technique so that they can bypass the MFA system. | cloud.office365.management |
SecOpsO365AddedServicePrincipal | This detection is triggered when new Service Principal credentials have been added in Azure. | cloud.office365.management.azureactivedirectory |
SecOpsO365MailboxAuditBypass | The mailbox audit is responsible for logging specified mailbox events. Attackers may attempt to bypass this mechanism to conceal actions taken. | cloud.office365.management.exchange |
SecOpsAzureDevOpsPATMisuse | This alert identifies specific actions that are not usually performed using a PAT. | cloud.azure.vm.unknown_events |
SecOpsAzureDevOpsAuditDisabled | This alert identifies when a user has disabled an Azure audit stream within the Azure Devops service. This could indicate that an attacker is trying to hide malicious activity. | cloud.azure.vm.unknown_events |
SecOpsAzureHybridHealthADFSDelete | This alert identifies when a user has deleted an Azure AD Hybrid health AD FS service instance. A malicious user could have been using a fake AD FS service to spoof AD FS signing logs and is deleting it since it is no longer needed. | cloud.azure.others.administrative |
SecOpsAzureHybridHealthADFSNewServer | This alert identifies when a user has updated or created a server instance in an Azure AD Hybrid health AD FS service, this should be checked since it could be undermining the security posture of the environment. | cloud.azure.others.administrative |
SecOpsGSuiteDriveExternallyShared | Adversaries may exfiltrate data to a cloud storage service rather than over their primary command and control channel. | cloud.gsuite.reports.drive |
SecOpsWinSysInternalsActivityDetected | Checks for the Accepted Sysinternals EULA from the registry key "HKCU\Software\Sysinternals\[TOOL]\”. When a Sysinternals tool is first run on a system, the EULA must be accepted. This writes a value called EulaAccepted under that key. | box.all.win |
SecOpsProxyLargeFileUpload | Identifies file uploads above 50 MB in size. Excessive file uploads may indicate exfiltration by an adversary or insider. The size threshold should be tuned per organization. | proxy.all.access |
SecOpsWinUserAddedSelfToSecGroup | Identifies when a user account has added themselves to the Windows security group. This could indicate a user attempting to escalate their privileges. | box.all.win |
SecOpsWinSysTimeDiscovery | Detects use of various commands to query the system time. This technique may be used before executing a scheduled task or to discover the time zone of a target system. | box.all.win |
SecOpsWinSamStopped | Detects when the Windows Security Account Manager (SAM) is stopped via command-line. This is consistent with ransomware infections across a fleet of endpoints | box.all.win |
SecOpsWinRunasCommandExecution | Detects the use of runas.exe process. Adversaries can abuse the runas.exe process to gain elevated privileges in the target host. | box.all.win |
SecOpsWinDefenderDownloadActivity | Detects the use of Microsoft Defender to download files. | box.all.win |
SecOpsWinCmstpNetworkConnectionDetected | Detects CMSTP.exe creating external connections. Actors can bypass application control defenses by leveraging CMSTP to download and execute DLLs or scripts from remote servers. | box.all.win |
SecOpsAzureConditionalAccessPolicyUpdated | This alert identifies when a user has modified a conditional access policy, this should be checked since it could be undermining the security posture of the environment. | cloud.azure.eh.events |