Stories from the SOC is a blog series that describes recent real-world security incident investigations conducted and reported by the AT&T SOC analyst team for AT&T Managed Extended Detection and Response customers.
Executive summary
AT&T Alien Labs does a tremendous job of developing and maintaining a database of observed Indicators of Compromise (IOC) that have been involved with at least one customer through the Open Threat Exchange (OTX). Containing over 70 million reference points that cover an array of attack types, techniques, and industries, OTX provides an additional resource for the AT&T Security Operations Center (SOC) analysts to utilize in the event that an unrecognized event takes place on a customer’s network. Not only can an analyst browse external Open Source Intelligence (OSINT), but there is also a repository of previously identified IOCs that can be referenced to point out any sort of pattern or commonality. SOC analysts also have the ability to add newly observed IOCs or remove ‘out of date’ indicators that are no longer a threat to the customers we serve.
The AT&T Managed Threat Detection and Response (MTDR) SOC detected a successful connection made between a customer asset and an IOC with a known reputation via OSINT as well as OTX. Signatures provided by the OTX reveal the potential IOC associated with the ‘Cobalt Strike’ Malware Family, which could be in relation to C2 Beaconing activity involving a customer asset. Upon further investigation, it was determined that the activity was indeed malicious, however due to the location of the subnet it proved to be benign in this specific case.
Investigation
Initial alarm review
Indicators of Compromise (IOC)
From the initial breakdown of the alarm, the analysts knew that a connection was ‘Allowed’ from a customer owned IP to a specific domain ‘tomatoreach[.]com’ and external IP ‘192.243.59[.]12’. The known OTX reputation of the URL and IP is what caused the alarm to trigger. The external OSINT on the two observed IOCs confirmed the suspicious reputation.
Expanded investigation
Events search
Event logs of the actual alarm do not reveal any additional IOCs or supporting information as it pertains to the activity.
Event deep dive
Upon further investigation into the involved user around the time of the event, it was determined that the user was associated with browsing an additional 20+ suspicious IOCs. Subject of these newly identified domains varies from content streaming to blog posts. Each new IOC was presented with the investigation in hopes of correlating any unrecognized activity occurring.
Response
Building the investigation
Due to the fact that the observed IOCs contain a reputation both on the OTX as well as externally, this alarm looks to be a legitimate concern for the customer. Originally, it was received with a ‘High’ severity. After additional review, the investigation was opened with a ‘Medium’ severity because there were no obvious malicious actions taking place with the involved user other than the browsing of suspicious web sites, which may not be authorized under company policy. All supporting evidence was included in the investigation, and a recommendation for remediation was also provided.
Customer interaction
Per the customer’s Incident Response Plan (IRP) a phone call was not required when this investigation was opened. Once addressed, the customer was able to confirm that what occurred was not in the scope of normal business activity. However, identifying the user and the host involved, the customer was able to establish the subnet being a “Guest” network that is authorized for personal use. MTDR’s full breakdown of user involved web traffic was valued and aided in the effortless closing of this investigation.
More Stories
Darknet’s Xanthorox AI Offers Customizable Tools for Hackers
Xanthorox AI, a self-contained system for offensive cyber operations, has emerged on darknet forums Read More
King Bob pleads guilty to Scattered Spider-linked cryptocurrency thefts from investors
A Florida man, linked to the notorious Scattered Spider hacking gang, has pleaded guilty to charges related to cryptocurrency thefts...
DIRNSA Fired
In “Secrets and Lies” (2000), I wrote: It is poor civic hygiene to install technologies that could someday facilitate a...
Vodafone Urges UK Cybersecurity Policy Reforms as SME Cyber-Attack Costs Reach £3.4bn
Vodafone Business has urged the UK government to implement policy changes, including improvements to the Cyber Essentials scheme and tax...
Government Backs Britain’s First Cyber Seed Fund, Worth £50m
Osney Capital’s new fund is the first to focus exclusively on early-stage UK cybersecurity Read More
Aussie Pension Savers Hit with Wave of Credential Stuffing Attacks
Cyber-attacks on Australian superannuation funds leave some savers out of pocket Read More