11.8 C
New York
Friday, November 15, 2024

The Energy of Endpoint Telemetry in Cybersecurity


A extreme cyberattack leveraging TrickBot malware compromises an organization’s defenses, resulting in important monetary losses. This was not because of a mere oversight, however quite a consequence of insufficient endpoint visibility. With efficient monitoring and real-time insights into endpoint exercise, the menace might have been detected and neutralized earlier than inflicting intensive injury. This underscores the essential significance of complete endpoint telemetry.

What’s endpoint telemetry?

In cybersecurity, endpoint telemetry refers to knowledge collected by monitoring actions on endpoint units, corresponding to computer systems and servers. This knowledge is essential for menace detection, incident response, and enhancing the general cybersecurity posture by providing enhanced visibility.

Essential function of endpoint telemetry

Visibility is essential to stopping advanced cyberattacks early within the kill chain. In the event you can’t see it, you may’t cease it. On the subject of stopping an assault, it’s at all times higher to take action within the early phases of the assault chain.

In response to the MITRE ATT&CK framework, which is usually utilized by cybersecurity professionals, most enterprise-level assaults — corresponding to Turla, ToddyCat, and WizardSpider (TrickBot) — contain numerous phases, generally known as techniques, which attackers can use in numerous sequences to realize their aims.

Example attack chain for an enterprise-level attack.

The MITRE framework catalogs a listing of strategies and sub-techniques that attackers use to hold out every of those techniques on an endpoint. To detect malicious conduct early within the assault chain, it’s important to observe the endpoint and document actions that resemble these generally used strategies. Capturing telemetry is due to this fact very important for figuring out these strategies and intercepting assaults at an early stage. Endpoint telemetry additionally serves as a vital knowledge supply for XDR, enhancing its capability to detect, analyze and reply to safety threats throughout a number of environments.

Minimizing false positives

One of many fundamental challenges in utilizing telemetry to detect threats is managing false positives. Attackers usually exploit Residing Off-the-Land (LOL) binaries — official instruments and utilities that include working methods — to execute numerous strategies or sub-techniques. For instance, the Lazarus Group, a extremely subtle and infamous state-sponsored hacking group, is understood to make use of Scheduled Duties or PowerShell throughout the Persistence or Execution phases of an assault. Lazarus incessantly employs these strategies as a part of their broader Residing Off the Land (LOL) technique, which permits them to use official system instruments and binaries to mix in with common community exercise and keep away from detection by conventional safety options.

Since these actions mimic benign actions generally carried out in enterprises, detecting them incorrectly can result in a excessive charge of false positives. We might deal with this problem is by correlating the occasions and telemetry triggered round that exercise or through the use of an XDR (Prolonged Detection and Response) device, corresponding to Cisco XDR. Cisco XDR correlates telemetry from numerous detection sources to generate high-fidelity incidents, enhancing the flexibility to determine and cease advanced assaults whereas lowering the probability of false positives.

Capturing telemetry utilizing Cisco Safe Endpoint

Cisco Safe Endpoint is an Endpoint Detection and Response (EDR) device that collects and information a variety of endpoint telemetry. It employs numerous detection engines to investigate this telemetry, determine malicious conduct and set off detection occasions. We repeatedly fine-tune the product to seize extra telemetry and detect occasions of various criticality throughout completely different phases of the MITRE ATT&CK framework. Moreover, occasions from Cisco Safe Endpoint are ingested into the Cisco XDR analytics engine and correlated with different knowledge sources to generate high-fidelity incidents inside Cisco XDR.

Let’s discover the detection occasions captured by Cisco Safe Endpoint within the Occasions view, together with the telemetry recorded within the Gadget Trajectory view. We’ll deal with how Safe Endpoint offers visibility into the early phases of an assault and its functionality to cease advanced threats earlier than they escalate.

Exploring detection occasions

All of the occasions used on this instance will be seen from Administration->Occasions web page of the Cisco Safe Endpoint console.

Execution Tactic and Detection

Execution techniques signify the strategies used to run attacker’s payload on a compromised endpoint to carry out some malicious actions.

Instance strategies embody:

  • Encoded PowerShell — Utilizing obfuscated PowerShell instructions to execute code.
  • Home windows Administration Instrumentation (WMI) — Leveraging WMI for executing instructions and scripts.
  • Native APIs — Using built-in system APIs for code execution.

The screenshot beneath shows an occasion generated by the Behavioral Safety engine of Safe Endpoint, which detected a PowerShell command utilizing “Invoke-Expression” and triggered by “sdiagnhost.exe”.

An event generated by the behavioral protection engine of secure endpoint in response to a malicious PowerShell command.

Persistence Tactic and Detection

Persistence refers to techniques that enable malicious payloads to stay on a compromised system and proceed their operations even after reboots or different system adjustments. These strategies allow the malware to keep up communication with a command-and-control server and obtain additional directions.

Instance strategies embody:

  • Create or Modify System Course of — This method includes creating new companies or modifying present companies to execute malicious code at startup or at particular intervals.
  • Registry Modifications — Altering registry entries to make sure malicious packages execute on system startup.
  • Creating Scheduled Duties — Establishing duties that run at specified instances or intervals.

The screenshot beneath illustrates an occasion generated when a brand new service was created to run malware at startup.

Screenshot of an event generated when a new service is created to run malware at startup.

Protection Evasion Tactic and Detection

Protection Evasion includes strategies utilized by attackers to cover their malicious payloads and keep away from detection by safety methods. The aim is to make it troublesome for safety instruments and analysts to determine and cease the assault.

Instance strategies embody:

  • Course of Hollowing — It’s a method the place a suspended course of is created, and a malicious code is injected into the deal with area of that suspended course of.
  • Impair Defenses — Modify sufferer’s setting and disable defenses, like turning off anti-virus, firewall or occasion logging mechanisms.
  • Masquerading — Making malicious recordsdata or actions seem official to evade detection.

The screenshot beneath reveals the Course of Hollowing method captured by the Exploit Prevention engine throughout the Protection Evasion stage of the assault.

Screenshot of an event showing the Process Hollowing technique

Discovery Tactic and Detection

Discovery refers back to the completely different strategies adversaries use to collect details about the sufferer’s setting.

Instance strategies embody:

  • Course of Discovery — Enumerating operating processes to search out invaluable or susceptible targets.
  • System Data Discovery — Amassing particulars concerning the working system, {hardware} and put in software program.
  • System Community Configuration Discovery — Figuring out the community settings, interfaces and related units.

The screenshot beneath depicts the occasion Safe Endpoint generated on observing “tasklist.exe” utilization within the endpoint in a suspicious method, run by “rundll32.exe”, and mapping the conduct to Course of Discovery method.

Screenshot of an event showing .exe usage in the endpoint behaving in a suspicious manner

Gadget trajectory telemetry

Cisco Safe Endpoint (CSE) captures two forms of telemetry underneath Gadget Trajectory view: Exercise Telemetry and Behavioral Telemetry.

Exercise Telemetry

By filtering out undesirable knowledge, this telemetry reduces noise and presents clear visibility into endpoint actions, together with processes, parent-child course of relationships, triggered occasions, recordsdata and community exercise, whether or not malicious or benign.

The screenshot beneath reveals the Gadget Trajectory view within the Safe Endpoint console, with the Exercise Telemetry captured.

Screenshot of the device trajectory view in the secure endpoint console, with the activity telemetry captured

Behavioral Telemetry

This particular kind of telemetry is displayed within the Gadget Trajectory view after evaluation by the detection engine. It’s triggered when a malicious exercise is linked to an in any other case benign exercise, offering extra context to assist distinguish between benign and malicious actions.

The screenshot beneath reveals the Gadget Trajectory view within the Safe Endpoint console, highlighting Behavioral Telemetry recognized by the detection engine. On this instance, the rundll32.exe course of is related to suspicious community exercise.

Screenshot of the Device Trajectory view in the Secure endpoint console.

The telemetry particulars captured by Safe Endpoint on this view present essential context across the noticed exercise, permitting safety groups to rapidly assess the state of affairs. This enriched data not solely aids in figuring out the character and intent of the exercise but additionally empowers groups to conduct extra thorough and efficient investigations. By providing a deeper understanding of potential threats, Safe Endpoint helps to streamline the menace detection course of, lowering response instances and enhancing general safety posture.

Conclusion

The exploration of Cisco Safe Endpoint’s detection occasions and telemetry highlights the ability of visibility in early assault detection. By monitoring and analyzing endpoint conduct, organizations achieve invaluable insights into potential threats, permitting them to detect and reply to assaults at their earliest phases. This enhanced visibility is essential to safeguarding essential methods and fortifying defenses towards evolving cyber threats.

References


We’d love to listen to what you suppose. Ask a Query, Remark Beneath, and Keep Related with Cisco Safety on social!

Cisco Safety Social Channels

Instagram
Fb
Twitter
LinkedIn

Share:



Related Articles

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Latest Articles