Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the easy-accordion-free domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php on line 6114

Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the zoho-flow domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php on line 6114

Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the wordpress-seo domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php on line 6114

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893
{"id":2636,"date":"2024-03-01T20:50:14","date_gmt":"2024-03-01T20:50:14","guid":{"rendered":"https:\/\/jacksonholdingcompany.com\/cisco-live-melbourne-soc-report-christian-clasen-on-march-1-2024-at-100-pm\/"},"modified":"2024-03-01T20:50:14","modified_gmt":"2024-03-01T20:50:14","slug":"cisco-live-melbourne-soc-report-christian-clasen-on-march-1-2024-at-100-pm","status":"publish","type":"post","link":"https:\/\/jacksonholdingcompany.com\/cisco-live-melbourne-soc-report-christian-clasen-on-march-1-2024-at-100-pm\/","title":{"rendered":"Cisco Live Melbourne SOC Report Christian Clasen on March 1, 2024 at 1:00 pm"},"content":{"rendered":"

Executive Summary. 1<\/a><\/p>\n

The Team\u2026 2<\/a><\/p>\n

Team Leaders. 2<\/a><\/p>\n

Core Infrastructure and Threat Hunting. 2<\/a><\/p>\n

Threat Hunting. 2<\/a><\/p>\n

Build and Operation. 2<\/a><\/p>\n

SOC Architecture. 2<\/a><\/p>\n

Cisco Secure Access Enables ZTNA for SOC\u2026 <\/a>Read more on Cisco Blogs<\/a><\/p>\n

\u200b[[“value”:”<\/p>\n

Executive Summary. 1<\/a><\/p>\n

The Team\u2026 2<\/a><\/p>\n

Team Leaders. 2<\/a><\/p>\n

Core Infrastructure and Threat Hunting. 2<\/a><\/p>\n

Threat Hunting. 2<\/a><\/p>\n

Build and Operation. 2<\/a><\/p>\n

SOC Architecture. 2<\/a><\/p>\n

Cisco Secure Access Enables ZTNA for SOC Admins. 4<\/a><\/p>\n

Powering XDR with the Cisco Secure Portfolio. 6<\/a><\/p>\n

Analyst Stories. 9<\/a><\/p>\n

New Domain Investigations. 9<\/a><\/p>\n

Mirai Botnet Attempts. 11<\/a><\/p>\n

Log4j Attempts. 14<\/a><\/p>\n

SERVER-WEBAPP LB-Link Multiple BLRouters command injection attempt (1:62009:1) Dinkar Sharma, Aditya Sankar<\/em> 16<\/a><\/p>\n

Threat hunting and Noise reduction in XDR Private Intelligence. 18<\/a><\/p>\n

DNS Statistics. 23<\/a><\/p>\n

Executive Summary<\/strong><\/h2>\n

Cisco has long provided security services to third party events such as the Black Hat and RSA conferences, as well as the Super Bowl and the Olympic games. These services come in the form of both products (Umbrella, XDR, Malware Analytics, and more) and skilled SOC analysts who build and operate the infrastructure and hunt for threats from both inside and outside the event networks.<\/p>\n

This year, the team was tapped to build a similar team to support the Cisco Live Melbourne 2023 conference. This report serves as a summary of the design, deployment, and operation of the network, as well some of the more interesting findings from three days of threat hunting on the network.<\/p>\n

The Team<\/strong><\/h2>\n

Team Leaders<\/strong><\/h2>\n

Christian Clasen, Shaun Coulter<\/strong><\/em><\/p>\n

Core Infrastructure and Threat Hunting<\/strong><\/h2>\n

Freddy Bello, Luke Hebdich, Justin Murphy, Ryan MacLennan, Adi Sankar, Dinkar Sharma<\/em><\/strong><\/p>\n

Threat Hunting<\/strong><\/h2>\n

Cam Dunn, Jaki Hasan, Darren Lynn, Ricky Mok, Sandeep Yadav<\/em><\/strong><\/p>\n

Build and Operation<\/strong><\/h2>\n

SOC Architecture<\/strong><\/h3>\n

Ryan MacLennan, Aditya Sankar, Dinkar Sharma<\/em><\/strong><\/p>\n

Security Operation Centers (SOCs) need to work with multiple products to get the data needed to efficiently find threats.\u00a0 The more data a SOC can receive, the richer and more accurate the detections will be. To make sure we get the data we designed the SOC with most of the Cisco Secure portfolio and other supporting products.\u00a0 We are using the below products on-prem:<\/p>\n

Secure Network Analytics
\nFirepower Threat Defense
\nFirewall Management Center
\nCSRv 1k
\nNexus Data Broker
\nCisco Telemetry Broker Manager
\nCisco Telemetry Broker node
\nSplunk<\/p>\n

And we are using the below SaaS products:<\/p>\n

Secure Access
\nXDR
\nSecure Cloud Analytics (SCA)
\nUmbrella
\nCisco Defense Orchestrator (CDO)
\nSecure Endpoint
\nOrbital
\nSecure Malware Analytics<\/p>\n

How all these products integrate is in the diagram below.<\/p>\n\n

This diagram does not go over what the Cisco Live Network Operations Center (NOC) deployed or was using as enforcement measures. As such, those devices and policies are outside the scope of this blog.<\/p>\n

Looking at the above image we see the conference network data coming into the Network Operations Center\u2019s data center (DC) on the left side. Our SOC is being fed the same data the Cisco Live NOC is seeing using a Nexus Data Broker. The broker sends a copy of the data to the Cisco Telemetry Broker and that normalizes the data and sends it to multiple other destinations that we control like Secure Cloud Analytics and Network Analytics.<\/p>\n

The broker sends another copy of the data to our physical Firepower Threat Defense. The Firepower Threat Defense is managed using a virtual Firewall Management Center (FMC) and is not doing any enforcement on the traffic. We did set up the below:<\/p>\n

Network Analysis Policy
\nSecurity Over Connectivity IPS policy
\nFile policy including all files doing a malware cloud lookup
\nDynamic Analysis
\nSpero Analysis
\nStoring Malware<\/p>\n

Logging at the beginning and end of connections
\nDNS sent to Umbrella
\nSecure Malware Analytics integrated
\nSecurity Analytics and Logging (SAL) integration
\nXDR integration<\/p>\n

In the NOC DC, we have a Splunk instance running that is receiving logs from the FMC and from Umbrella.\u00a0 Then Splunk sends its logs up to XDR for additional enrichment in investigations.<\/p>\n

Slightly to the right of the NOC DC, there is a cloud with SOC Analysts in it.\u00a0 This is the internet that we used to connect to our internal resources using Secure Access. We used Secure Access in conjunction with a virtual CSR to connect to internal resources like the FMC and Secure Network Analytics.\u00a0 The deployment of this is delved into further in the next section.<\/p>\n

On the bottom left, we have Secure Client deployed around the conference to send NVM and EDR data to XDR and Secure Endpoint. Lastly, we have all the products in the orange dotted box sending data to XDR and third-party feeds being fed into XDR too.<\/p>\n

Cisco Secure Access Enables ZTNA for SOC Admins<\/strong><\/h2>\n

Christian Clasen, Justin Murphy<\/em><\/strong><\/p>\n

Security operators, not unlike systems administrators, need unique and elevated access to network resources to accomplish their objectives. Mission critical infrastructure hidden behind firewalls and segmented management networks have traditionally been made accessible by remote access VPN solutions. With the development of Zero Trust Access (ZTA) solutions, it is possible to provide a more transparent and efficient way to enable SOC analysts with the access they need without sacrificing security. In the Cisco Live Melbourne SOC, we are using Cisco Secure Access to provide this ZTA to our crew and enable them to manage infrastructure and threat hunt from anywhere while supporting the event.<\/p>\n

There are several benefits ZTA provides over traditional VPN.\u00a0 While VPN provides per connection authentication and posture for network access, ZTA checks identity and posture per application.\u00a0 Instead of giving blanket access to the management network or having to write rules based on source IP, all rules in Secure Access are per user, per application, giving very granular control and logging to all the security consoles.\u00a0 This provides a natural audit log of who is accessing what.\u00a0 Because Secure Access is a cloud service, it can provide secure connectivity from anywhere meaning we cannot participate in threat hunting and troubleshooting inside the SOC, but also from our hotel rooms or wherever we happen to be when needed. It is fully compatible with Secure Client VPN and so our connectivity to Cisco corporate is not impacted when required.<\/p>\n\n

The first step in setting up ZTA access was to create a back-haul connection between the SOC infrastructure and Cisco Secure Access. This was accomplished by deploying a Cisco CSR1000v virtual router and configuring it with two IPsec tunnels. The tunnels are authenticated using email-formatted strings and passphrases configured in the dashboard.<\/p>\n\n

Secure Access supports both static and dynamic routing when making private applications available on the router side of the tunnels. Since we had a basic network setup and the CSR was not the default gateway for the security appliances, we opted for static routes to the SOC management subnet. We sourced the tunnels from two loopback interfaces, and added a slightly higher route metric to the backup tunnel to make sure it was only used in the case that the first tunnel was down. Lastly, we added NAT statements to make sure everything sourced from the router used the internet router interface\u2019s IPv4 address. This solved any issues with return traffic from the appliances.<\/p>\n

In Secure Access, we then configured private resources and made them available over both clientless and client-based connections. This solved out management access issues and allowed us to concentrate on our SOC duties rather than our connectivity.<\/p>\n

Powering XDR with the Cisco Secure Portfolio<\/strong><\/h2>\n

Ryan MacLennan, Aditya Sankar, Dinkar Sharma<\/em><\/strong><\/p>\n

An XDR is only as good as the underlying security controls that power it. Cisco XDR is powered by integrations; the more integrations configured the more powerful Cisco XDR becomes. At Cisco Live Melbourne we had numerous Cisco and 3rd party integrations operational in our XDR deployment. Below is an image drawn on a whiteboard at Cisco Live Melbourne which we used to discuss the integrations with the SOC visitors.<\/p>\n\n

On the right side of the image is the Nexus Data Broker. This is ingesting a SPAN of the conference network and distributing it to multiple tools. The SPAN is sent to a flow sensor to enable deep visibility into east-west and north-south traffic using Cisco Secure Network Analytics. This serves as our on-prem NDR with full capabilities to create custom security events and is integrated with XDR through Security Services Exchange. Security Services Exchange keeps a secure web allowing XDR to query the Secure Management center for alerts involving specific IP addresses. The web socket is initiated from inside to outside on TCP 443 so poking holes in an edge firewall is not required for connectivity.<\/p>\n

Next the SPAN is sent to a passive mode Firewall. Cisco Secure Firewall conducts deep packet inspection using the full set of Snort 3 rules. These intrusion detections, including security intelligence events and malware events are sent to Security Services Exchange for enrichment during XDR investigations. Through CDO, the security events along with the connection events are sent to XDR for analytics which can produce anomaly detections and create incidents in XDR (this form of event streaming was known as SaL SaaS). The Firewall is the heart of any network and is a valuable source of data for Cisco XDR.<\/p>\n

Lastly, the SPAN is sent to ONA (observable network appliance). This VM converts the SPAN to IPFIX and forwards it to XDR for analytics of all the conference traffic. There are over 60 detections in XDR that can be triggered from this netflow. The alerts can be corelated together based of similar characteristics into attack chains. These attack chains are then promoted to XDR as single incidents. This level of correlation in XDR allows the security analyst to spend less time triaging alerts and more time focused on the alerts that matter.<\/p>\n

Using the eStreamer protocol, the Firewall sends logs with additional meta data to Splunk. These logs are indexed in splunk and visualized using the\u00a0 Cisco Secure Firewall App for Splunk. <\/em>Splunk also integrated directly with Cisco XDR using Security Services Exchange for on-prem to cloud connectivity. With the Cisco XDR and Splunk integration, investigations in Cisco XDR will query Splunk for logs containing the observables in question. The results are then visualized in the XDR investigation graph. In our case this allowed us to use XDR investigate to not only query the Firewall security events but also query the connection events that were indexed in Splunk.<\/p>\n\n

In the bottom right of the image is the conference network. The endpoints used at the demo stations in World of Solutions had the Cisco Secure Client agent installed on them. This offered XDR granular visibility into the endpoint using Cisco Secure Endpoint. Additionally, the NVM module sends Netflow directly from the endpoints to XDR for analytics and correlation. These endpoints are cloud managed from XDR making it easy to make changes to profiles if needed.<\/p>\n

Umbrella was used as the DNS provider for the entire conference. Umbrella is directly integrated with XDR for enrichment during investigations. The Umbrella roaming client was installed on the endpoints using Cisco Secure Client. XDR Automation also used the Umbrella reporting API to notify the SOC team on Webex if there were any DNS requests in security categories detected by Umbrella.<\/p>\n

The SOC also took advantage of plenty of 3rd party intelligence sources in conjunction with Talos threat intelligence. Another new addition to the SOC was the use of Cisco Secure Access to provide seamless connectivity to our on-prem appliance. This really streamlined our investigation and allowed the entire team to have access to our security tools from anywhere at the conference or at our hotels.<\/p>\n

In summary, Cisco XDR was used to its maximum potential with a litany of Cisco integrations as well as 3rd party integrations. Cisco XDR will continue to advance with more integrations, correlations and data ingest capabilities!<\/p>\n

Analyst Stories<\/strong><\/h2>\n

New Domain Investigations<\/strong><\/h3>\n

Ryan MacLennan<\/em><\/strong><\/p>\n

During the conference we saw resolutions of many new domains that hadn\u2019t been seen by Umbrella\u2019s global DNS resolvers.\u00a0 While checking on these domains we saw an ngrok domain come up Umbrella.<\/p>\n\n

ngrok is a reverse proxy application often used by developers to test webhook implementations, but this warranted further investigation. We took the URL of the domain and tossed it into Malware Analytics to investigate the site manually.<\/p>\n\n

Malware Analytics returned a threat score of 85.\u00a0 That is quite high and tells us that it is worth investigating further. But we need to look at the detonation recording and see where this ngrok URL is redirected to, to determine if it actually is malicious.<\/p>\n

Initially the page went to a ngrok splash page:<\/p>\n\n

Continuing to the site showed that it goes to a Grafana monitoring instance.<\/p>\n\n

We see that it is using HTTPS and is secured from sniffing out the username and password in clear text.\u00a0 This concluded the investigation.<\/p>\n\n

Mirai Botnet Attempts<\/strong><\/h2>\n

Luke Hebditch, Ryan MacLennan<\/em><\/strong><\/p>\n

During the conference we noticed many intrusion events linked to ISAKMP packets coming towards the firewall.<\/p>\n\n

They were all considered to be attempts for the Zyxel unauthenticated IKEv2 injection attack.<\/p>\n\n

Investigating the data in one of the packets showed a command injection attempt. Buried in the packet is a command that attempts to download a file and pipe it into bash to run it immediately. This is a common technique to gain persistence or bypass security measures. These kinds of attempts are generally blocked.<\/p>\n\n

Looking at our logs, we saw our IDS would block this but since the SOC is out-of-band, we only have the analytics we can use at the time.<\/p>\n\n

To further investigate this issue, we spun up a sandbox in Secure Malware Analytics and ran these commands to see what it is trying to do.<\/p>\n

The initial command tries to download a file called \u201cl.\u201d\u00a0 In the \u201cl\u201d file we found these commands being run in the file:<\/p>\n

kill -9 $(ps -ef ]]\u00a0\u00a0This year, the team was tapped to build a similar team to support the Cisco Live Melbourne 2023 conference. This report serves as a summary of the design, deployment, and operation of the network, as well some of the more interesting findings from three days of threat hunting on the network.\u00a0\u00a0Read More<\/a>\u00a0Cisco Blogs\u00a0<\/p>","protected":false},"excerpt":{"rendered":"

<\/p>\n

Executive Summary. 1<\/a><\/p>\n

The Team\u2026 2<\/a><\/p>\n

Team Leaders. 2<\/a><\/p>\n

Core Infrastructure and Threat Hunting. 2<\/a><\/p>\n

Threat Hunting. 2<\/a><\/p>\n

Build and Operation. 2<\/a><\/p>\n

SOC Architecture. 2<\/a><\/p>\n

Cisco Secure Access Enables ZTNA for SOC\u2026 <\/a>Read more on Cisco Blogs<\/a><\/p>\n

\u200b[[“value”:”<\/p>\n

Executive Summary. 1<\/a><\/p>\n

The Team\u2026 2<\/a><\/p>\n

Team Leaders. 2<\/a><\/p>\n

Core Infrastructure and Threat Hunting. 2<\/a><\/p>\n

Threat Hunting. 2<\/a><\/p>\n

Build and Operation. 2<\/a><\/p>\n

SOC Architecture. 2<\/a><\/p>\n

Cisco Secure Access Enables ZTNA for SOC Admins. 4<\/a><\/p>\n

Powering XDR with the Cisco Secure Portfolio. 6<\/a><\/p>\n

Analyst Stories. 9<\/a><\/p>\n

New Domain Investigations. 9<\/a><\/p>\n

Mirai Botnet Attempts. 11<\/a><\/p>\n

Log4j Attempts. 14<\/a><\/p>\n

SERVER-WEBAPP LB-Link Multiple BLRouters command injection attempt (1:62009:1) Dinkar Sharma, Aditya Sankar<\/em> 16<\/a><\/p>\n

Threat hunting and Noise reduction in XDR Private Intelligence. 18<\/a><\/p>\n

DNS Statistics. 23<\/a><\/p>\n

Executive Summary<\/strong><\/h2>\n

Cisco has long provided security services to third party events such as the Black Hat and RSA conferences, as well as the Super Bowl and the Olympic games. These services come in the form of both products (Umbrella, XDR, Malware Analytics, and more) and skilled SOC analysts who build and operate the infrastructure and hunt for threats from both inside and outside the event networks.<\/p>\n

This year, the team was tapped to build a similar team to support the Cisco Live Melbourne 2023 conference. This report serves as a summary of the design, deployment, and operation of the network, as well some of the more interesting findings from three days of threat hunting on the network.<\/p>\n

The Team<\/strong><\/h2>\n

Team Leaders<\/strong><\/h2>\n

Christian Clasen, Shaun Coulter<\/strong><\/em><\/p>\n

Core Infrastructure and Threat Hunting<\/strong><\/h2>\n

Freddy Bello, Luke Hebdich, Justin Murphy, Ryan MacLennan, Adi Sankar, Dinkar Sharma<\/em><\/strong><\/p>\n

Threat Hunting<\/strong><\/h2>\n

Cam Dunn, Jaki Hasan, Darren Lynn, Ricky Mok, Sandeep Yadav<\/em><\/strong><\/p>\n

Build and Operation<\/strong><\/h2>\n

SOC Architecture<\/strong><\/h3>\n

Ryan MacLennan, Aditya Sankar, Dinkar Sharma<\/em><\/strong><\/p>\n

Security Operation Centers (SOCs) need to work with multiple products to get the data needed to efficiently find threats.\u00a0 The more data a SOC can receive, the richer and more accurate the detections will be. To make sure we get the data we designed the SOC with most of the Cisco Secure portfolio and other supporting products.\u00a0 We are using the below products on-prem:<\/p>\n

Secure Network Analytics
\nFirepower Threat Defense
\nFirewall Management Center
\nCSRv 1k
\nNexus Data Broker
\nCisco Telemetry Broker Manager
\nCisco Telemetry Broker node
\nSplunk<\/p>\n

And we are using the below SaaS products:<\/p>\n

Secure Access
\nXDR
\nSecure Cloud Analytics (SCA)
\nUmbrella
\nCisco Defense Orchestrator (CDO)
\nSecure Endpoint
\nOrbital
\nSecure Malware Analytics<\/p>\n

How all these products integrate is in the diagram below.<\/p>\n

This diagram does not go over what the Cisco Live Network Operations Center (NOC) deployed or was using as enforcement measures. As such, those devices and policies are outside the scope of this blog.<\/p>\n

Looking at the above image we see the conference network data coming into the Network Operations Center\u2019s data center (DC) on the left side. Our SOC is being fed the same data the Cisco Live NOC is seeing using a Nexus Data Broker. The broker sends a copy of the data to the Cisco Telemetry Broker and that normalizes the data and sends it to multiple other destinations that we control like Secure Cloud Analytics and Network Analytics.<\/p>\n

The broker sends another copy of the data to our physical Firepower Threat Defense. The Firepower Threat Defense is managed using a virtual Firewall Management Center (FMC) and is not doing any enforcement on the traffic. We did set up the below:<\/p>\n

Network Analysis Policy
\nSecurity Over Connectivity IPS policy
\nFile policy including all files doing a malware cloud lookup
\nDynamic Analysis
\nSpero Analysis
\nStoring Malware<\/p>\n

Logging at the beginning and end of connections
\nDNS sent to Umbrella
\nSecure Malware Analytics integrated
\nSecurity Analytics and Logging (SAL) integration
\nXDR integration<\/p>\n

In the NOC DC, we have a Splunk instance running that is receiving logs from the FMC and from Umbrella.\u00a0 Then Splunk sends its logs up to XDR for additional enrichment in investigations.<\/p>\n

Slightly to the right of the NOC DC, there is a cloud with SOC Analysts in it.\u00a0 This is the internet that we used to connect to our internal resources using Secure Access. We used Secure Access in conjunction with a virtual CSR to connect to internal resources like the FMC and Secure Network Analytics.\u00a0 The deployment of this is delved into further in the next section.<\/p>\n

On the bottom left, we have Secure Client deployed around the conference to send NVM and EDR data to XDR and Secure Endpoint. Lastly, we have all the products in the orange dotted box sending data to XDR and third-party feeds being fed into XDR too.<\/p>\n

Cisco Secure Access Enables ZTNA for SOC Admins<\/strong><\/h2>\n

Christian Clasen, Justin Murphy<\/em><\/strong><\/p>\n

Security operators, not unlike systems administrators, need unique and elevated access to network resources to accomplish their objectives. Mission critical infrastructure hidden behind firewalls and segmented management networks have traditionally been made accessible by remote access VPN solutions. With the development of Zero Trust Access (ZTA) solutions, it is possible to provide a more transparent and efficient way to enable SOC analysts with the access they need without sacrificing security. In the Cisco Live Melbourne SOC, we are using Cisco Secure Access to provide this ZTA to our crew and enable them to manage infrastructure and threat hunt from anywhere while supporting the event.<\/p>\n

There are several benefits ZTA provides over traditional VPN.\u00a0 While VPN provides per connection authentication and posture for network access, ZTA checks identity and posture per application.\u00a0 Instead of giving blanket access to the management network or having to write rules based on source IP, all rules in Secure Access are per user, per application, giving very granular control and logging to all the security consoles.\u00a0 This provides a natural audit log of who is accessing what.\u00a0 Because Secure Access is a cloud service, it can provide secure connectivity from anywhere meaning we cannot participate in threat hunting and troubleshooting inside the SOC, but also from our hotel rooms or wherever we happen to be when needed. It is fully compatible with Secure Client VPN and so our connectivity to Cisco corporate is not impacted when required.<\/p>\n

The first step in setting up ZTA access was to create a back-haul connection between the SOC infrastructure and Cisco Secure Access. This was accomplished by deploying a Cisco CSR1000v virtual router and configuring it with two IPsec tunnels. The tunnels are authenticated using email-formatted strings and passphrases configured in the dashboard.<\/p>\n

Secure Access supports both static and dynamic routing when making private applications available on the router side of the tunnels. Since we had a basic network setup and the CSR was not the default gateway for the security appliances, we opted for static routes to the SOC management subnet. We sourced the tunnels from two loopback interfaces, and added a slightly higher route metric to the backup tunnel to make sure it was only used in the case that the first tunnel was down. Lastly, we added NAT statements to make sure everything sourced from the router used the internet router interface\u2019s IPv4 address. This solved any issues with return traffic from the appliances.<\/p>\n

In Secure Access, we then configured private resources and made them available over both clientless and client-based connections. This solved out management access issues and allowed us to concentrate on our SOC duties rather than our connectivity.<\/p>\n

Powering XDR with the Cisco Secure Portfolio<\/strong><\/h2>\n

Ryan MacLennan, Aditya Sankar, Dinkar Sharma<\/em><\/strong><\/p>\n

An XDR is only as good as the underlying security controls that power it. Cisco XDR is powered by integrations; the more integrations configured the more powerful Cisco XDR becomes. At Cisco Live Melbourne we had numerous Cisco and 3rd party integrations operational in our XDR deployment. Below is an image drawn on a whiteboard at Cisco Live Melbourne which we used to discuss the integrations with the SOC visitors.<\/p>\n

On the right side of the image is the Nexus Data Broker. This is ingesting a SPAN of the conference network and distributing it to multiple tools. The SPAN is sent to a flow sensor to enable deep visibility into east-west and north-south traffic using Cisco Secure Network Analytics. This serves as our on-prem NDR with full capabilities to create custom security events and is integrated with XDR through Security Services Exchange. Security Services Exchange keeps a secure web allowing XDR to query the Secure Management center for alerts involving specific IP addresses. The web socket is initiated from inside to outside on TCP 443 so poking holes in an edge firewall is not required for connectivity.<\/p>\n

Next the SPAN is sent to a passive mode Firewall. Cisco Secure Firewall conducts deep packet inspection using the full set of Snort 3 rules. These intrusion detections, including security intelligence events and malware events are sent to Security Services Exchange for enrichment during XDR investigations. Through CDO, the security events along with the connection events are sent to XDR for analytics which can produce anomaly detections and create incidents in XDR (this form of event streaming was known as SaL SaaS). The Firewall is the heart of any network and is a valuable source of data for Cisco XDR.<\/p>\n

Lastly, the SPAN is sent to ONA (observable network appliance). This VM converts the SPAN to IPFIX and forwards it to XDR for analytics of all the conference traffic. There are over 60 detections in XDR that can be triggered from this netflow. The alerts can be corelated together based of similar characteristics into attack chains. These attack chains are then promoted to XDR as single incidents. This level of correlation in XDR allows the security analyst to spend less time triaging alerts and more time focused on the alerts that matter.<\/p>\n

Using the eStreamer protocol, the Firewall sends logs with additional meta data to Splunk. These logs are indexed in splunk and visualized using the\u00a0 Cisco Secure Firewall App for Splunk. <\/em>Splunk also integrated directly with Cisco XDR using Security Services Exchange for on-prem to cloud connectivity. With the Cisco XDR and Splunk integration, investigations in Cisco XDR will query Splunk for logs containing the observables in question. The results are then visualized in the XDR investigation graph. In our case this allowed us to use XDR investigate to not only query the Firewall security events but also query the connection events that were indexed in Splunk.<\/p>\n

In the bottom right of the image is the conference network. The endpoints used at the demo stations in World of Solutions had the Cisco Secure Client agent installed on them. This offered XDR granular visibility into the endpoint using Cisco Secure Endpoint. Additionally, the NVM module sends Netflow directly from the endpoints to XDR for analytics and correlation. These endpoints are cloud managed from XDR making it easy to make changes to profiles if needed.<\/p>\n

Umbrella was used as the DNS provider for the entire conference. Umbrella is directly integrated with XDR for enrichment during investigations. The Umbrella roaming client was installed on the endpoints using Cisco Secure Client. XDR Automation also used the Umbrella reporting API to notify the SOC team on Webex if there were any DNS requests in security categories detected by Umbrella.<\/p>\n

The SOC also took advantage of plenty of 3rd party intelligence sources in conjunction with Talos threat intelligence. Another new addition to the SOC was the use of Cisco Secure Access to provide seamless connectivity to our on-prem appliance. This really streamlined our investigation and allowed the entire team to have access to our security tools from anywhere at the conference or at our hotels.<\/p>\n

In summary, Cisco XDR was used to its maximum potential with a litany of Cisco integrations as well as 3rd party integrations. Cisco XDR will continue to advance with more integrations, correlations and data ingest capabilities!<\/p>\n

Analyst Stories<\/strong><\/h2>\n

New Domain Investigations<\/strong><\/h3>\n

Ryan MacLennan<\/em><\/strong><\/p>\n

During the conference we saw resolutions of many new domains that hadn\u2019t been seen by Umbrella\u2019s global DNS resolvers.\u00a0 While checking on these domains we saw an ngrok domain come up Umbrella.<\/p>\n

ngrok is a reverse proxy application often used by developers to test webhook implementations, but this warranted further investigation. We took the URL of the domain and tossed it into Malware Analytics to investigate the site manually.<\/p>\n

Malware Analytics returned a threat score of 85.\u00a0 That is quite high and tells us that it is worth investigating further. But we need to look at the detonation recording and see where this ngrok URL is redirected to, to determine if it actually is malicious.<\/p>\n

Initially the page went to a ngrok splash page:<\/p>\n

Continuing to the site showed that it goes to a Grafana monitoring instance.<\/p>\n

We see that it is using HTTPS and is secured from sniffing out the username and password in clear text.\u00a0 This concluded the investigation.<\/p>\n

Mirai Botnet Attempts<\/strong><\/h2>\n

Luke Hebditch, Ryan MacLennan<\/em><\/strong><\/p>\n

During the conference we noticed many intrusion events linked to ISAKMP packets coming towards the firewall.<\/p>\n

They were all considered to be attempts for the Zyxel unauthenticated IKEv2 injection attack.<\/p>\n

Investigating the data in one of the packets showed a command injection attempt. Buried in the packet is a command that attempts to download a file and pipe it into bash to run it immediately. This is a common technique to gain persistence or bypass security measures. These kinds of attempts are generally blocked.<\/p>\n

Looking at our logs, we saw our IDS would block this but since the SOC is out-of-band, we only have the analytics we can use at the time.<\/p>\n

To further investigate this issue, we spun up a sandbox in Secure Malware Analytics and ran these commands to see what it is trying to do.<\/p>\n

The initial command tries to download a file called \u201cl.\u201d\u00a0 In the \u201cl\u201d file we found these commands being run in the file:<\/p>\n

kill -9 $(ps -ef ]]\u00a0\u00a0This year, the team was tapped to build a similar team to support the Cisco Live Melbourne 2023 conference. This report serves as a summary of the design, deployment, and operation of the network, as well some of the more interesting findings from three days of threat hunting on the network.\u00a0\u00a0Read More<\/a>\u00a0Cisco Blogs\u00a0<\/p>\n

<\/p>\n","protected":false},"author":0,"featured_media":2637,"comment_status":"","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[12],"tags":[],"class_list":["post-2636","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cisco-learning"],"yoast_head":"\nCisco Live Melbourne SOC Report Christian Clasen on March 1, 2024 at 1:00 pm - JHC<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/jacksonholdingcompany.com\/cisco-live-melbourne-soc-report-christian-clasen-on-march-1-2024-at-100-pm\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cisco Live Melbourne SOC Report Christian Clasen on March 1, 2024 at 1:00 pm\" \/>\n<meta property=\"og:description\" content=\"Executive Summary. 1 The Team\u2026 2 Team Leaders. 2 Core Infrastructure and Threat Hunting. 2 Threat Hunting. 2 Build and Operation. 2 SOC Architecture. 2 Cisco Secure Access Enables ZTNA for SOC\u2026 Read more on Cisco Blogs \u200b[["value":" Executive Summary. 1 The Team\u2026 2 Team Leaders. 2 Core Infrastructure and Threat Hunting. 2 Threat Hunting. 2 Build and Operation. 2 SOC Architecture. 2 Cisco Secure Access Enables ZTNA for SOC Admins. 4 Powering XDR with the Cisco Secure Portfolio. 6 Analyst Stories. 9 New Domain Investigations. 9 Mirai Botnet Attempts. 11 Log4j Attempts. 14 SERVER-WEBAPP LB-Link Multiple BLRouters command injection attempt (1:62009:1) Dinkar Sharma, Aditya Sankar 16 Threat hunting and Noise reduction in XDR Private Intelligence. 18 DNS Statistics. 23 Executive Summary Cisco has long provided security services to third party events such as the Black Hat and RSA conferences, as well as the Super Bowl and the Olympic games. These services come in the form of both products (Umbrella, XDR, Malware Analytics, and more) and skilled SOC analysts who build and operate the infrastructure and hunt for threats from both inside and outside the event networks. This year, the team was tapped to build a similar team to support the Cisco Live Melbourne 2023 conference. This report serves as a summary of the design, deployment, and operation of the network, as well some of the more interesting findings from three days of threat hunting on the network. The Team Team Leaders Christian Clasen, Shaun Coulter Core Infrastructure and Threat Hunting Freddy Bello, Luke Hebdich, Justin Murphy, Ryan MacLennan, Adi Sankar, Dinkar Sharma Threat Hunting Cam Dunn, Jaki Hasan, Darren Lynn, Ricky Mok, Sandeep Yadav Build and Operation SOC Architecture Ryan MacLennan, Aditya Sankar, Dinkar Sharma Security Operation Centers (SOCs) need to work with multiple products to get the data needed to efficiently find threats.\u00a0 The more data a SOC can receive, the richer and more accurate the detections will be. To make sure we get the data we designed the SOC with most of the Cisco Secure portfolio and other supporting products.\u00a0 We are using the below products on-prem: Secure Network Analytics Firepower Threat Defense Firewall Management Center CSRv 1k Nexus Data Broker Cisco Telemetry Broker Manager Cisco Telemetry Broker node Splunk And we are using the below SaaS products: Secure Access XDR Secure Cloud Analytics (SCA) Umbrella Cisco Defense Orchestrator (CDO) Secure Endpoint Orbital Secure Malware Analytics How all these products integrate is in the diagram below. This diagram does not go over what the Cisco Live Network Operations Center (NOC) deployed or was using as enforcement measures. As such, those devices and policies are outside the scope of this blog. Looking at the above image we see the conference network data coming into the Network Operations Center\u2019s data center (DC) on the left side. Our SOC is being fed the same data the Cisco Live NOC is seeing using a Nexus Data Broker. The broker sends a copy of the data to the Cisco Telemetry Broker and that normalizes the data and sends it to multiple other destinations that we control like Secure Cloud Analytics and Network Analytics. The broker sends another copy of the data to our physical Firepower Threat Defense. The Firepower Threat Defense is managed using a virtual Firewall Management Center (FMC) and is not doing any enforcement on the traffic. We did set up the below: Network Analysis Policy Security Over Connectivity IPS policy File policy including all files doing a malware cloud lookup Dynamic Analysis Spero Analysis Storing Malware Logging at the beginning and end of connections DNS sent to Umbrella Secure Malware Analytics integrated Security Analytics and Logging (SAL) integration XDR integration In the NOC DC, we have a Splunk instance running that is receiving logs from the FMC and from Umbrella.\u00a0 Then Splunk sends its logs up to XDR for additional enrichment in investigations. Slightly to the right of the NOC DC, there is a cloud with SOC Analysts in it.\u00a0 This is the internet that we used to connect to our internal resources using Secure Access. We used Secure Access in conjunction with a virtual CSR to connect to internal resources like the FMC and Secure Network Analytics.\u00a0 The deployment of this is delved into further in the next section. On the bottom left, we have Secure Client deployed around the conference to send NVM and EDR data to XDR and Secure Endpoint. Lastly, we have all the products in the orange dotted box sending data to XDR and third-party feeds being fed into XDR too. Cisco Secure Access Enables ZTNA for SOC Admins Christian Clasen, Justin Murphy Security operators, not unlike systems administrators, need unique and elevated access to network resources to accomplish their objectives. Mission critical infrastructure hidden behind firewalls and segmented management networks have traditionally been made accessible by remote access VPN solutions. With the development of Zero Trust Access (ZTA) solutions, it is possible to provide a more transparent and efficient way to enable SOC analysts with the access they need without sacrificing security. In the Cisco Live Melbourne SOC, we are using Cisco Secure Access to provide this ZTA to our crew and enable them to manage infrastructure and threat hunt from anywhere while supporting the event. There are several benefits ZTA provides over traditional VPN.\u00a0 While VPN provides per connection authentication and posture for network access, ZTA checks identity and posture per application.\u00a0 Instead of giving blanket access to the management network or having to write rules based on source IP, all rules in Secure Access are per user, per application, giving very granular control and logging to all the security consoles.\u00a0 This provides a natural audit log of who is accessing what.\u00a0 Because Secure Access is a cloud service, it can provide secure connectivity from anywhere meaning we cannot participate in threat hunting and troubleshooting inside the SOC, but also from our hotel rooms or wherever we happen to be when needed. It is fully compatible with Secure Client VPN and so our connectivity to Cisco corporate is not impacted when required. The first step in setting up ZTA access was to create a back-haul connection between the SOC infrastructure and Cisco Secure Access. This was accomplished by deploying a Cisco CSR1000v virtual router and configuring it with two IPsec tunnels. The tunnels are authenticated using email-formatted strings and passphrases configured in the dashboard. Secure Access supports both static and dynamic routing when making private applications available on the router side of the tunnels. Since we had a basic network setup and the CSR was not the default gateway for the security appliances, we opted for static routes to the SOC management subnet. We sourced the tunnels from two loopback interfaces, and added a slightly higher route metric to the backup tunnel to make sure it was only used in the case that the first tunnel was down. Lastly, we added NAT statements to make sure everything sourced from the router used the internet router interface\u2019s IPv4 address. This solved any issues with return traffic from the appliances. In Secure Access, we then configured private resources and made them available over both clientless and client-based connections. This solved out management access issues and allowed us to concentrate on our SOC duties rather than our connectivity. Powering XDR with the Cisco Secure Portfolio Ryan MacLennan, Aditya Sankar, Dinkar Sharma An XDR is only as good as the underlying security controls that power it. Cisco XDR is powered by integrations; the more integrations configured the more powerful Cisco XDR becomes. At Cisco Live Melbourne we had numerous Cisco and 3rd party integrations operational in our XDR deployment. Below is an image drawn on a whiteboard at Cisco Live Melbourne which we used to discuss the integrations with the SOC visitors. On the right side of the image is the Nexus Data Broker. This is ingesting a SPAN of the conference network and distributing it to multiple tools. The SPAN is sent to a flow sensor to enable deep visibility into east-west and north-south traffic using Cisco Secure Network Analytics. This serves as our on-prem NDR with full capabilities to create custom security events and is integrated with XDR through Security Services Exchange. Security Services Exchange keeps a secure web allowing XDR to query the Secure Management center for alerts involving specific IP addresses. The web socket is initiated from inside to outside on TCP 443 so poking holes in an edge firewall is not required for connectivity. Next the SPAN is sent to a passive mode Firewall. Cisco Secure Firewall conducts deep packet inspection using the full set of Snort 3 rules. These intrusion detections, including security intelligence events and malware events are sent to Security Services Exchange for enrichment during XDR investigations. Through CDO, the security events along with the connection events are sent to XDR for analytics which can produce anomaly detections and create incidents in XDR (this form of event streaming was known as SaL SaaS). The Firewall is the heart of any network and is a valuable source of data for Cisco XDR. Lastly, the SPAN is sent to ONA (observable network appliance). This VM converts the SPAN to IPFIX and forwards it to XDR for analytics of all the conference traffic. There are over 60 detections in XDR that can be triggered from this netflow. The alerts can be corelated together based of similar characteristics into attack chains. These attack chains are then promoted to XDR as single incidents. This level of correlation in XDR allows the security analyst to spend less time triaging alerts and more time focused on the alerts that matter. Using the eStreamer protocol, the Firewall sends logs with additional meta data to Splunk. These logs are indexed in splunk and visualized using the\u00a0 Cisco Secure Firewall App for Splunk. Splunk also integrated directly with Cisco XDR using Security Services Exchange for on-prem to cloud connectivity. With the Cisco XDR and Splunk integration, investigations in Cisco XDR will query Splunk for logs containing the observables in question. The results are then visualized in the XDR investigation graph. In our case this allowed us to use XDR investigate to not only query the Firewall security events but also query the connection events that were indexed in Splunk. In the bottom right of the image is the conference network. The endpoints used at the demo stations in World of Solutions had the Cisco Secure Client agent installed on them. This offered XDR granular visibility into the endpoint using Cisco Secure Endpoint. Additionally, the NVM module sends Netflow directly from the endpoints to XDR for analytics and correlation. These endpoints are cloud managed from XDR making it easy to make changes to profiles if needed. Umbrella was used as the DNS provider for the entire conference. Umbrella is directly integrated with XDR for enrichment during investigations. The Umbrella roaming client was installed on the endpoints using Cisco Secure Client. XDR Automation also used the Umbrella reporting API to notify the SOC team on Webex if there were any DNS requests in security categories detected by Umbrella. The SOC also took advantage of plenty of 3rd party intelligence sources in conjunction with Talos threat intelligence. Another new addition to the SOC was the use of Cisco Secure Access to provide seamless connectivity to our on-prem appliance. This really streamlined our investigation and allowed the entire team to have access to our security tools from anywhere at the conference or at our hotels. In summary, Cisco XDR was used to its maximum potential with a litany of Cisco integrations as well as 3rd party integrations. Cisco XDR will continue to advance with more integrations, correlations and data ingest capabilities! Analyst Stories New Domain Investigations Ryan MacLennan During the conference we saw resolutions of many new domains that hadn\u2019t been seen by Umbrella\u2019s global DNS resolvers.\u00a0 While checking on these domains we saw an ngrok domain come up Umbrella. ngrok is a reverse proxy application often used by developers to test webhook implementations, but this warranted further investigation. We took the URL of the domain and tossed it into Malware Analytics to investigate the site manually. Malware Analytics returned a threat score of 85.\u00a0 That is quite high and tells us that it is worth investigating further. But we need to look at the detonation recording and see where this ngrok URL is redirected to, to determine if it actually is malicious. Initially the page went to a ngrok splash page: Continuing to the site showed that it goes to a Grafana monitoring instance. We see that it is using HTTPS and is secured from sniffing out the username and password in clear text.\u00a0 This concluded the investigation. Mirai Botnet Attempts Luke Hebditch, Ryan MacLennan During the conference we noticed many intrusion events linked to ISAKMP packets coming towards the firewall. They were all considered to be attempts for the Zyxel unauthenticated IKEv2 injection attack. Investigating the data in one of the packets showed a command injection attempt. Buried in the packet is a command that attempts to download a file and pipe it into bash to run it immediately. This is a common technique to gain persistence or bypass security measures. These kinds of attempts are generally blocked. Looking at our logs, we saw our IDS would block this but since the SOC is out-of-band, we only have the analytics we can use at the time. To further investigate this issue, we spun up a sandbox in Secure Malware Analytics and ran these commands to see what it is trying to do. The initial command tries to download a file called \u201cl.\u201d\u00a0 In the \u201cl\u201d file we found these commands being run in the file: kill -9 $(ps -ef ]]\u00a0\u00a0This year, the team was tapped to build a similar team to support the Cisco Live Melbourne 2023 conference. This report serves as a summary of the design, deployment, and operation of the network, as well some of the more interesting findings from three days of threat hunting on the network.\u00a0\u00a0Read More\u00a0Cisco Blogs\u00a0\" \/>\n<meta property=\"og:url\" content=\"https:\/\/jacksonholdingcompany.com\/cisco-live-melbourne-soc-report-christian-clasen-on-march-1-2024-at-100-pm\/\" \/>\n<meta property=\"og:site_name\" content=\"JHC\" \/>\n<meta property=\"article:published_time\" content=\"2024-03-01T20:50:14+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/03\/16598183-EZr5kW.gif\" \/>\n\t<meta property=\"og:image:width\" content=\"1\" \/>\n\t<meta property=\"og:image:height\" content=\"1\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/gif\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"12 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/cisco-live-melbourne-soc-report-christian-clasen-on-march-1-2024-at-100-pm\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/cisco-live-melbourne-soc-report-christian-clasen-on-march-1-2024-at-100-pm\/\"},\"author\":{\"name\":\"\",\"@id\":\"\"},\"headline\":\"Cisco Live Melbourne SOC Report Christian Clasen on March 1, 2024 at 1:00 pm\",\"datePublished\":\"2024-03-01T20:50:14+00:00\",\"dateModified\":\"2024-03-01T20:50:14+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/cisco-live-melbourne-soc-report-christian-clasen-on-march-1-2024-at-100-pm\/\"},\"wordCount\":2331,\"publisher\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/cisco-live-melbourne-soc-report-christian-clasen-on-march-1-2024-at-100-pm\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/03\/16598183-EZr5kW.gif\",\"articleSection\":[\"Cisco: Learning\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/cisco-live-melbourne-soc-report-christian-clasen-on-march-1-2024-at-100-pm\/\",\"url\":\"https:\/\/jacksonholdingcompany.com\/cisco-live-melbourne-soc-report-christian-clasen-on-march-1-2024-at-100-pm\/\",\"name\":\"Cisco Live Melbourne SOC Report Christian Clasen on March 1, 2024 at 1:00 pm - JHC\",\"isPartOf\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/cisco-live-melbourne-soc-report-christian-clasen-on-march-1-2024-at-100-pm\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/cisco-live-melbourne-soc-report-christian-clasen-on-march-1-2024-at-100-pm\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/03\/16598183-EZr5kW.gif\",\"datePublished\":\"2024-03-01T20:50:14+00:00\",\"dateModified\":\"2024-03-01T20:50:14+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/cisco-live-melbourne-soc-report-christian-clasen-on-march-1-2024-at-100-pm\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/jacksonholdingcompany.com\/cisco-live-melbourne-soc-report-christian-clasen-on-march-1-2024-at-100-pm\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/cisco-live-melbourne-soc-report-christian-clasen-on-march-1-2024-at-100-pm\/#primaryimage\",\"url\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/03\/16598183-EZr5kW.gif\",\"contentUrl\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/03\/16598183-EZr5kW.gif\",\"width\":1,\"height\":1},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/cisco-live-melbourne-soc-report-christian-clasen-on-march-1-2024-at-100-pm\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/jacksonholdingcompany.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cisco Live Melbourne SOC Report Christian Clasen on March 1, 2024 at 1:00 pm\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/#website\",\"url\":\"https:\/\/jacksonholdingcompany.com\/\",\"name\":\"JHC\",\"description\":\"Your Business Is Our Business\",\"publisher\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/jacksonholdingcompany.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/#organization\",\"name\":\"JHC\",\"url\":\"https:\/\/jacksonholdingcompany.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/07\/cropped-cropped-jHC-white-500-\u00d7-200-px-1-1.png\",\"contentUrl\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/07\/cropped-cropped-jHC-white-500-\u00d7-200-px-1-1.png\",\"width\":452,\"height\":149,\"caption\":\"JHC\"},\"image\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cisco Live Melbourne SOC Report Christian Clasen on March 1, 2024 at 1:00 pm - JHC","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/jacksonholdingcompany.com\/cisco-live-melbourne-soc-report-christian-clasen-on-march-1-2024-at-100-pm\/","og_locale":"en_US","og_type":"article","og_title":"Cisco Live Melbourne SOC Report Christian Clasen on March 1, 2024 at 1:00 pm","og_description":"Executive Summary. 1 The Team\u2026 2 Team Leaders. 2 Core Infrastructure and Threat Hunting. 2 Threat Hunting. 2 Build and Operation. 2 SOC Architecture. 2 Cisco Secure Access Enables ZTNA for SOC\u2026 Read more on Cisco Blogs \u200b[[\"value\":\" Executive Summary. 1 The Team\u2026 2 Team Leaders. 2 Core Infrastructure and Threat Hunting. 2 Threat Hunting. 2 Build and Operation. 2 SOC Architecture. 2 Cisco Secure Access Enables ZTNA for SOC Admins. 4 Powering XDR with the Cisco Secure Portfolio. 6 Analyst Stories. 9 New Domain Investigations. 9 Mirai Botnet Attempts. 11 Log4j Attempts. 14 SERVER-WEBAPP LB-Link Multiple BLRouters command injection attempt (1:62009:1) Dinkar Sharma, Aditya Sankar 16 Threat hunting and Noise reduction in XDR Private Intelligence. 18 DNS Statistics. 23 Executive Summary Cisco has long provided security services to third party events such as the Black Hat and RSA conferences, as well as the Super Bowl and the Olympic games. These services come in the form of both products (Umbrella, XDR, Malware Analytics, and more) and skilled SOC analysts who build and operate the infrastructure and hunt for threats from both inside and outside the event networks. This year, the team was tapped to build a similar team to support the Cisco Live Melbourne 2023 conference. This report serves as a summary of the design, deployment, and operation of the network, as well some of the more interesting findings from three days of threat hunting on the network. The Team Team Leaders Christian Clasen, Shaun Coulter Core Infrastructure and Threat Hunting Freddy Bello, Luke Hebdich, Justin Murphy, Ryan MacLennan, Adi Sankar, Dinkar Sharma Threat Hunting Cam Dunn, Jaki Hasan, Darren Lynn, Ricky Mok, Sandeep Yadav Build and Operation SOC Architecture Ryan MacLennan, Aditya Sankar, Dinkar Sharma Security Operation Centers (SOCs) need to work with multiple products to get the data needed to efficiently find threats.\u00a0 The more data a SOC can receive, the richer and more accurate the detections will be. To make sure we get the data we designed the SOC with most of the Cisco Secure portfolio and other supporting products.\u00a0 We are using the below products on-prem: Secure Network Analytics Firepower Threat Defense Firewall Management Center CSRv 1k Nexus Data Broker Cisco Telemetry Broker Manager Cisco Telemetry Broker node Splunk And we are using the below SaaS products: Secure Access XDR Secure Cloud Analytics (SCA) Umbrella Cisco Defense Orchestrator (CDO) Secure Endpoint Orbital Secure Malware Analytics How all these products integrate is in the diagram below. This diagram does not go over what the Cisco Live Network Operations Center (NOC) deployed or was using as enforcement measures. As such, those devices and policies are outside the scope of this blog. Looking at the above image we see the conference network data coming into the Network Operations Center\u2019s data center (DC) on the left side. Our SOC is being fed the same data the Cisco Live NOC is seeing using a Nexus Data Broker. The broker sends a copy of the data to the Cisco Telemetry Broker and that normalizes the data and sends it to multiple other destinations that we control like Secure Cloud Analytics and Network Analytics. The broker sends another copy of the data to our physical Firepower Threat Defense. The Firepower Threat Defense is managed using a virtual Firewall Management Center (FMC) and is not doing any enforcement on the traffic. We did set up the below: Network Analysis Policy Security Over Connectivity IPS policy File policy including all files doing a malware cloud lookup Dynamic Analysis Spero Analysis Storing Malware Logging at the beginning and end of connections DNS sent to Umbrella Secure Malware Analytics integrated Security Analytics and Logging (SAL) integration XDR integration In the NOC DC, we have a Splunk instance running that is receiving logs from the FMC and from Umbrella.\u00a0 Then Splunk sends its logs up to XDR for additional enrichment in investigations. Slightly to the right of the NOC DC, there is a cloud with SOC Analysts in it.\u00a0 This is the internet that we used to connect to our internal resources using Secure Access. We used Secure Access in conjunction with a virtual CSR to connect to internal resources like the FMC and Secure Network Analytics.\u00a0 The deployment of this is delved into further in the next section. On the bottom left, we have Secure Client deployed around the conference to send NVM and EDR data to XDR and Secure Endpoint. Lastly, we have all the products in the orange dotted box sending data to XDR and third-party feeds being fed into XDR too. Cisco Secure Access Enables ZTNA for SOC Admins Christian Clasen, Justin Murphy Security operators, not unlike systems administrators, need unique and elevated access to network resources to accomplish their objectives. Mission critical infrastructure hidden behind firewalls and segmented management networks have traditionally been made accessible by remote access VPN solutions. With the development of Zero Trust Access (ZTA) solutions, it is possible to provide a more transparent and efficient way to enable SOC analysts with the access they need without sacrificing security. In the Cisco Live Melbourne SOC, we are using Cisco Secure Access to provide this ZTA to our crew and enable them to manage infrastructure and threat hunt from anywhere while supporting the event. There are several benefits ZTA provides over traditional VPN.\u00a0 While VPN provides per connection authentication and posture for network access, ZTA checks identity and posture per application.\u00a0 Instead of giving blanket access to the management network or having to write rules based on source IP, all rules in Secure Access are per user, per application, giving very granular control and logging to all the security consoles.\u00a0 This provides a natural audit log of who is accessing what.\u00a0 Because Secure Access is a cloud service, it can provide secure connectivity from anywhere meaning we cannot participate in threat hunting and troubleshooting inside the SOC, but also from our hotel rooms or wherever we happen to be when needed. It is fully compatible with Secure Client VPN and so our connectivity to Cisco corporate is not impacted when required. The first step in setting up ZTA access was to create a back-haul connection between the SOC infrastructure and Cisco Secure Access. This was accomplished by deploying a Cisco CSR1000v virtual router and configuring it with two IPsec tunnels. The tunnels are authenticated using email-formatted strings and passphrases configured in the dashboard. Secure Access supports both static and dynamic routing when making private applications available on the router side of the tunnels. Since we had a basic network setup and the CSR was not the default gateway for the security appliances, we opted for static routes to the SOC management subnet. We sourced the tunnels from two loopback interfaces, and added a slightly higher route metric to the backup tunnel to make sure it was only used in the case that the first tunnel was down. Lastly, we added NAT statements to make sure everything sourced from the router used the internet router interface\u2019s IPv4 address. This solved any issues with return traffic from the appliances. In Secure Access, we then configured private resources and made them available over both clientless and client-based connections. This solved out management access issues and allowed us to concentrate on our SOC duties rather than our connectivity. Powering XDR with the Cisco Secure Portfolio Ryan MacLennan, Aditya Sankar, Dinkar Sharma An XDR is only as good as the underlying security controls that power it. Cisco XDR is powered by integrations; the more integrations configured the more powerful Cisco XDR becomes. At Cisco Live Melbourne we had numerous Cisco and 3rd party integrations operational in our XDR deployment. Below is an image drawn on a whiteboard at Cisco Live Melbourne which we used to discuss the integrations with the SOC visitors. On the right side of the image is the Nexus Data Broker. This is ingesting a SPAN of the conference network and distributing it to multiple tools. The SPAN is sent to a flow sensor to enable deep visibility into east-west and north-south traffic using Cisco Secure Network Analytics. This serves as our on-prem NDR with full capabilities to create custom security events and is integrated with XDR through Security Services Exchange. Security Services Exchange keeps a secure web allowing XDR to query the Secure Management center for alerts involving specific IP addresses. The web socket is initiated from inside to outside on TCP 443 so poking holes in an edge firewall is not required for connectivity. Next the SPAN is sent to a passive mode Firewall. Cisco Secure Firewall conducts deep packet inspection using the full set of Snort 3 rules. These intrusion detections, including security intelligence events and malware events are sent to Security Services Exchange for enrichment during XDR investigations. Through CDO, the security events along with the connection events are sent to XDR for analytics which can produce anomaly detections and create incidents in XDR (this form of event streaming was known as SaL SaaS). The Firewall is the heart of any network and is a valuable source of data for Cisco XDR. Lastly, the SPAN is sent to ONA (observable network appliance). This VM converts the SPAN to IPFIX and forwards it to XDR for analytics of all the conference traffic. There are over 60 detections in XDR that can be triggered from this netflow. The alerts can be corelated together based of similar characteristics into attack chains. These attack chains are then promoted to XDR as single incidents. This level of correlation in XDR allows the security analyst to spend less time triaging alerts and more time focused on the alerts that matter. Using the eStreamer protocol, the Firewall sends logs with additional meta data to Splunk. These logs are indexed in splunk and visualized using the\u00a0 Cisco Secure Firewall App for Splunk. Splunk also integrated directly with Cisco XDR using Security Services Exchange for on-prem to cloud connectivity. With the Cisco XDR and Splunk integration, investigations in Cisco XDR will query Splunk for logs containing the observables in question. The results are then visualized in the XDR investigation graph. In our case this allowed us to use XDR investigate to not only query the Firewall security events but also query the connection events that were indexed in Splunk. In the bottom right of the image is the conference network. The endpoints used at the demo stations in World of Solutions had the Cisco Secure Client agent installed on them. This offered XDR granular visibility into the endpoint using Cisco Secure Endpoint. Additionally, the NVM module sends Netflow directly from the endpoints to XDR for analytics and correlation. These endpoints are cloud managed from XDR making it easy to make changes to profiles if needed. Umbrella was used as the DNS provider for the entire conference. Umbrella is directly integrated with XDR for enrichment during investigations. The Umbrella roaming client was installed on the endpoints using Cisco Secure Client. XDR Automation also used the Umbrella reporting API to notify the SOC team on Webex if there were any DNS requests in security categories detected by Umbrella. The SOC also took advantage of plenty of 3rd party intelligence sources in conjunction with Talos threat intelligence. Another new addition to the SOC was the use of Cisco Secure Access to provide seamless connectivity to our on-prem appliance. This really streamlined our investigation and allowed the entire team to have access to our security tools from anywhere at the conference or at our hotels. In summary, Cisco XDR was used to its maximum potential with a litany of Cisco integrations as well as 3rd party integrations. Cisco XDR will continue to advance with more integrations, correlations and data ingest capabilities! Analyst Stories New Domain Investigations Ryan MacLennan During the conference we saw resolutions of many new domains that hadn\u2019t been seen by Umbrella\u2019s global DNS resolvers.\u00a0 While checking on these domains we saw an ngrok domain come up Umbrella. ngrok is a reverse proxy application often used by developers to test webhook implementations, but this warranted further investigation. We took the URL of the domain and tossed it into Malware Analytics to investigate the site manually. Malware Analytics returned a threat score of 85.\u00a0 That is quite high and tells us that it is worth investigating further. But we need to look at the detonation recording and see where this ngrok URL is redirected to, to determine if it actually is malicious. Initially the page went to a ngrok splash page: Continuing to the site showed that it goes to a Grafana monitoring instance. We see that it is using HTTPS and is secured from sniffing out the username and password in clear text.\u00a0 This concluded the investigation. Mirai Botnet Attempts Luke Hebditch, Ryan MacLennan During the conference we noticed many intrusion events linked to ISAKMP packets coming towards the firewall. They were all considered to be attempts for the Zyxel unauthenticated IKEv2 injection attack. Investigating the data in one of the packets showed a command injection attempt. Buried in the packet is a command that attempts to download a file and pipe it into bash to run it immediately. This is a common technique to gain persistence or bypass security measures. These kinds of attempts are generally blocked. Looking at our logs, we saw our IDS would block this but since the SOC is out-of-band, we only have the analytics we can use at the time. To further investigate this issue, we spun up a sandbox in Secure Malware Analytics and ran these commands to see what it is trying to do. The initial command tries to download a file called \u201cl.\u201d\u00a0 In the \u201cl\u201d file we found these commands being run in the file: kill -9 $(ps -ef ]]\u00a0\u00a0This year, the team was tapped to build a similar team to support the Cisco Live Melbourne 2023 conference. This report serves as a summary of the design, deployment, and operation of the network, as well some of the more interesting findings from three days of threat hunting on the network.\u00a0\u00a0Read More\u00a0Cisco Blogs\u00a0","og_url":"https:\/\/jacksonholdingcompany.com\/cisco-live-melbourne-soc-report-christian-clasen-on-march-1-2024-at-100-pm\/","og_site_name":"JHC","article_published_time":"2024-03-01T20:50:14+00:00","og_image":[{"width":1,"height":1,"url":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/03\/16598183-EZr5kW.gif","type":"image\/gif"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"12 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/jacksonholdingcompany.com\/cisco-live-melbourne-soc-report-christian-clasen-on-march-1-2024-at-100-pm\/#article","isPartOf":{"@id":"https:\/\/jacksonholdingcompany.com\/cisco-live-melbourne-soc-report-christian-clasen-on-march-1-2024-at-100-pm\/"},"author":{"name":"","@id":""},"headline":"Cisco Live Melbourne SOC Report Christian Clasen on March 1, 2024 at 1:00 pm","datePublished":"2024-03-01T20:50:14+00:00","dateModified":"2024-03-01T20:50:14+00:00","mainEntityOfPage":{"@id":"https:\/\/jacksonholdingcompany.com\/cisco-live-melbourne-soc-report-christian-clasen-on-march-1-2024-at-100-pm\/"},"wordCount":2331,"publisher":{"@id":"https:\/\/jacksonholdingcompany.com\/#organization"},"image":{"@id":"https:\/\/jacksonholdingcompany.com\/cisco-live-melbourne-soc-report-christian-clasen-on-march-1-2024-at-100-pm\/#primaryimage"},"thumbnailUrl":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/03\/16598183-EZr5kW.gif","articleSection":["Cisco: Learning"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/jacksonholdingcompany.com\/cisco-live-melbourne-soc-report-christian-clasen-on-march-1-2024-at-100-pm\/","url":"https:\/\/jacksonholdingcompany.com\/cisco-live-melbourne-soc-report-christian-clasen-on-march-1-2024-at-100-pm\/","name":"Cisco Live Melbourne SOC Report Christian Clasen on March 1, 2024 at 1:00 pm - JHC","isPartOf":{"@id":"https:\/\/jacksonholdingcompany.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/jacksonholdingcompany.com\/cisco-live-melbourne-soc-report-christian-clasen-on-march-1-2024-at-100-pm\/#primaryimage"},"image":{"@id":"https:\/\/jacksonholdingcompany.com\/cisco-live-melbourne-soc-report-christian-clasen-on-march-1-2024-at-100-pm\/#primaryimage"},"thumbnailUrl":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/03\/16598183-EZr5kW.gif","datePublished":"2024-03-01T20:50:14+00:00","dateModified":"2024-03-01T20:50:14+00:00","breadcrumb":{"@id":"https:\/\/jacksonholdingcompany.com\/cisco-live-melbourne-soc-report-christian-clasen-on-march-1-2024-at-100-pm\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/jacksonholdingcompany.com\/cisco-live-melbourne-soc-report-christian-clasen-on-march-1-2024-at-100-pm\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/jacksonholdingcompany.com\/cisco-live-melbourne-soc-report-christian-clasen-on-march-1-2024-at-100-pm\/#primaryimage","url":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/03\/16598183-EZr5kW.gif","contentUrl":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/03\/16598183-EZr5kW.gif","width":1,"height":1},{"@type":"BreadcrumbList","@id":"https:\/\/jacksonholdingcompany.com\/cisco-live-melbourne-soc-report-christian-clasen-on-march-1-2024-at-100-pm\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/jacksonholdingcompany.com\/"},{"@type":"ListItem","position":2,"name":"Cisco Live Melbourne SOC Report Christian Clasen on March 1, 2024 at 1:00 pm"}]},{"@type":"WebSite","@id":"https:\/\/jacksonholdingcompany.com\/#website","url":"https:\/\/jacksonholdingcompany.com\/","name":"JHC","description":"Your Business Is Our Business","publisher":{"@id":"https:\/\/jacksonholdingcompany.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/jacksonholdingcompany.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/jacksonholdingcompany.com\/#organization","name":"JHC","url":"https:\/\/jacksonholdingcompany.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/jacksonholdingcompany.com\/#\/schema\/logo\/image\/","url":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/07\/cropped-cropped-jHC-white-500-\u00d7-200-px-1-1.png","contentUrl":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/07\/cropped-cropped-jHC-white-500-\u00d7-200-px-1-1.png","width":452,"height":149,"caption":"JHC"},"image":{"@id":"https:\/\/jacksonholdingcompany.com\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/posts\/2636","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/comments?post=2636"}],"version-history":[{"count":0,"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/posts\/2636\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/media\/2637"}],"wp:attachment":[{"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/media?parent=2636"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/categories?post=2636"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/tags?post=2636"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}