Simple Threat Hunting Exercise

Simple Threat Hunting Exercise

In this post I'm going to discuss some incredibly simple threat hunting you can do in your industry or "vertical" that may have a big pay off in the end. Rather than using Healthcare, I decided to focus on Education. Why? Because so many of my contacts are either students, faculty or staff of educational institutions. I'm fairly certain 90% of them will be able to relate to this post. I also thought that this would be an excellent use of a class hour or two, having students conduct the same tests and then reporting the findings to the colleges IT department.

Ok, let's get started. Over the past few weeks I've run into several instances where a user was redirected to a malicious website due to a typo in one of my industries popular websites. I used that knowledge to block numerous domains proactively, and you could do the same. For this post, I'm focusing on education, so an example of a popular educational website would be "Blackboard.com" because it is used by so many colleges.

In two tries I found a malware site related to the blackboard.com domain. On my second try, I typed blackbord[.]com and this is what happened:

No alt text provided for this image

Once I hit return I was redirected to this site:

No alt text provided for this image

Yeah, Joe, so what... it's just a company that took over the domain and is using it for advertising. You would be correct except I'm familiar with the tactic of these malicious sites using the browser agent to find out what kind of computer is connecting. So upon seeing this, I reprogrammed Mozilla to spoof Internet Explorer as the browser:

No alt text provided for this image

After that, connecting to the same website produced this:

No alt text provided for this image

For those of you keeping track of the actionable intelligence... that's two websites that need to be blocked... blackbord[.]com and bbcheat[.]world. Yup, changing the browser agent made the redirect send me to a "fake update site". If you read closely, my "system files" are automatically deleted and I must fix the problem immediately. Trying to leave it produced this:

No alt text provided for this image

Oh no, still damaged and vulnerable - I better follow instructions and "Update".

No alt text provided for this image

I only had 241 seconds left to fix my system so I had to hurry up! Clicking "Update" produced this:

No alt text provided for this image

Here's another domain that I can take action on! www.greatpcchoice[.]com (that's number 3)

No alt text provided for this image

Clicking the "Download Now" button produced a download from yet another domain... cdnrep.reimageplus[.]com (that's number 4!)

Of course, I could be "all wet" and this could be a legitimate application that will fix some problem that my computer is having. Let's head on over to VirusTotal and see what it has to say:

No alt text provided for this image

Ok, Ok, Ok, I know what you're saying. Your college uses "state of the art", "next generation" firewalls with "category blocking" yada yada yada. Let's see what these sites are categorized with one of those "name brand firewalls - PaloAlto".

What's blackbord[.]com categorized as?

No alt text provided for this image

Oops, "Business and Economy", I doubt that category is being blocked! How about bbcheat[.]world, surely that will be blocked:

No alt text provided for this image

Insufficient Content...but "Low Risk"? site like www.google.com? I'd say that's a fail. ...and I'd really like to know what PaloAlto's definition of "benign" is. What about the next site, greatpcchoice[.]com:

No alt text provided for this image

Same as above... "Low Risk". But surely the site that holds the malware will be there, cdnrep.reimageplus[.]com!

No alt text provided for this image

This one might have been, seeing as the Category is "Questionable" but it's still considered "Low Risk".

So there you go, you can look at domains that your users might be typing regularly, come up with the easily typo'd ones and block them proactively!

If I were still teaching I can see teaching this and then having an assignment where students conduct the research on different verticals and then provide their findings. Get and education and save the world! Please share if you think others will find this useful.





Christopher Viste

Creative and Driven Entrepreneur

5 年

P.S.I have only been using the LinkedIn profile through the web browser ever since 2015 When we had the discussion about how the LinkedIn app was handing out all of our contact information, as well as sending invites on its own.? I will tell you trying to type text on the web browser is a pain in the rear for my phone. So sorry if you see any errors.??

回复
Christopher Viste

Creative and Driven Entrepreneur

5 年

HI Joe, this is a great read with some great ways to be proactive could certainly follow this as if we were watching demo on lab for Security class. I will gladly share. Hope all is well!

回复
Joe Cicero

Senior Security Engineer

5 年

Michael Goetzman, Mark Krzyszkowski, Greg Brodt, Did you guys read my latest post? Next CypherCon Contest - we pick an industry and then the competitor teams search for malicious websites in that industry. Team that find the most win! Industry wins! Internet becomes a safer place!

要查看或添加评论,请登录

Joe Cicero的更多文章

  • AirDrive USB Wifi Keylogger

    AirDrive USB Wifi Keylogger

    I was recently reading a colleague's research proposal about access vulnerabilities with RFID authentication systems…

    5 条评论
  • My First Ripple20 Discovery

    My First Ripple20 Discovery

    I was able to obtain the Treck Network Discovery Tool by JSOF. It is a python script which took a little to get working…

  • When a picture is worth a thousand w?o?r?d?s? lines of code.

    When a picture is worth a thousand w?o?r?d?s? lines of code.

    All right, maybe not a thousand lines. I've noticed an increase in this type of malware in the past month so I'm pretty…

    12 条评论
  • URL/Firewall Audit or Curriculum Idea... you choose.

    URL/Firewall Audit or Curriculum Idea... you choose.

    If you're one of my instructor friends, here is a great idea for an IT Security exercise. If you're one of my IT…

    6 条评论
  • Curveball post not about Curveball

    Curveball post not about Curveball

    I could go on for ever about what this post is "NOT" about. I'm not saying "Don't Patch".

  • Blocking Future Attacks

    Blocking Future Attacks

    In this post I'd like to show you how you can harness the power of the website dnstwister.report, to proactively block…

  • Cyber Shopping Swindle Site?

    Cyber Shopping Swindle Site?

    Doing a little "Black Friday"..

    4 条评论
  • Targeting Your Customers

    Targeting Your Customers

    This post is similar to the previous about "Keyword Stuffing". Though, this takes that post to a new level, targeting…

    2 条评论
  • Keyword Stuffing Malicious Domains

    Keyword Stuffing Malicious Domains

    Over the last few weeks I've been examining the free Country Code Top Level Domains (CC TLDs) for malicious intent. I…

  • New Scam... To Me Anyway... Craigslist - Prove Your A Human.

    New Scam... To Me Anyway... Craigslist - Prove Your A Human.

    Thought I would write this quick article in the event it can help anyone out. This scam has been around for at least a…

社区洞察

其他会员也浏览了