LevelBlue Completes Acquisition of Cybereason. Learn more

LevelBlue Completes Acquisition of Cybereason. Learn more

Services
Cyber Advisory
Managed Cloud Security
Data Security
Manage Detection & Response
Email Security
Managed Network Infrastructure Security
Exposure Management
Security Operations Platforms
Incident Readiness & Response
SpiderLabs Threat Intelligence
Solutions
BY TOPIC
Offensive Security
Solutions to maximize your security ROI
Operational Technology
End-to-end OT security
Microsoft Security
Unlock the full power of Microsoft Security
Securing the IoT Landscape
Test, monitor and secure network objects
Why LevelBlue
About Us
Awards and Accolades
LevelBlue SpiderLabs
LevelBlue Security Operations Platforms
Security Colony
Partners
Microsoft
Unlock the full power of Microsoft Security
Technology Alliance Partners
Key alliances who align and support our ecosystem of security offerings

Stories from the SOC – Cloud and On-site Protection

This blog was jointly authored by Josue Gomez

Stories from the SOC is a blog series that describes recent real-world security incident investigations conducted and reported by the LeveBlue SOC analyst team for LeveBlue Managed Threat Detection and Response customers.

Executive Summary

One of the benefits of having your managed detection and response (MDR) service managed by LeveBlue Cybersecurity is the visibility into threats from a large number of customers of all sizes and across different industries.  This allows the team to take what they learn from one customer and apply it to another.  Our security operation center (SOC) analysts were able to use an OTX alarm and an AWS correlation rule to discover open ports on public facing servers for two different customers in 24 hours.

Investigation

Initial Alarm Review

Indicators of Compromise (IOCs)

In a 24-hour period the LeveBlue SOC analyst team identified open port vulnerabilities which malicious actors were attempting to exploit on two different customer instances. While the environments of these two customers are very different, the sensors that are deployed as part of the LeveBlue Unified Security Management (USM) platform provide flexibility and help customers to stay protected across multiple platforms.

Customer 1’s initial alarm is below. In addition to the OTX indicator, the fact that the alarm was based on a public URL and the event outcome was “Accept” led our analyst team to speculate that the alarm was accurately indicating a successful system compromise.

suspicious behavior screen

The Customer 2 initial alarm came in when an IP located in a foreign country was observed attempting to brute force authenticate via SSH port 22 on one of Customer 2’s cloud-based security management servers.

brute force alarm

Unlike Customer 1 who has a primarily on-premises environment, Customer 2 has a largely cloud based infrastructure. The analyst team performed a deep dive into the targeted AWS cloud asset and observed logs showing multiple IPs located in the foreign country attempting to establish a connection      over the open vulnerable port.

packet dropped

Expanded investigation

Alarm Detail

In the case of Customer 1, the analyst team determined the IP identified by OTX had been scanning multiple public facing assets in the hours before the alarm was triggered.  Logs indicated the malicious actor was focusing on scanning for a Telnet service until they found an open Port 23, at which point scanning ended.   A search for that malicious IP on the destination side showed an outbound connection from Customer 1’s web server with an “Allow” outcome, confirming a two-way connection had been established over Telnet.  The analyst team communicated the details of the investigation to Customer 1 and recommended they close all the server’s ports, aside from Port 80 and Port 443, as is the best practice for a public facing web server. 

For Customer 2, the team prioritized the malicious activity on their AWS instance as High severity and quickly jumped on a call to inform the customer of the SSH brute-force attacks occurring against one of their internal cloud assets. The built-in Amazon Guard Duty plugin, paired with the cloud monitoring capabilities available in the USM platform, allowed the team to capture this malicious activity in real time.  After reviewing the investigation with the customer and detailing the dangers of having a port open to the internet such as SSH, the customer quickly realized this as a misconfiguration on their end.  The customer took the recommendation of our analyst team and instructed their AWS administrators to close the open port.

Response

Building the investigation

The timeline for Customer 1’s incident from alarming and analysis to notification took 90 minutes.  From time of discovery of Customer 2’s attack to remediation steps put in place, the LeveBlue Cybersecurity platform and team was able to alarm, investigate and respond to the threat in 70 minutes. Both investigations resulted in the hardening of a public facing server (one on premise, and one in the cloud) to help prevent further incidents.  The two separate incidents showcase the value and flexibility LeveBlue Cybersecurity brings to any network environment. 

ABOUT LEVELBLUE

LevelBlue is a globally recognized cybersecurity leader that reduces cyber risk and fortifies organizations against disruptive and damaging cyber threats. Our comprehensive offensive and defensive cybersecurity portfolio detects what others cannot, responds with greater speed and effectiveness, optimizes client investment, and improves security resilience. Learn more about us.

Latest Intelligence

Discover how our specialists can tailor a security program to fit the needs of
your organization.

Request a Demo