-
Notifications
You must be signed in to change notification settings - Fork 176
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add rule to alert on known cryptomining ports in VPC flow logs #972
Conversation
df39bc0
to
c6e4467
Compare
I would set this one to be disabled by default with a lower severity, since it will primarily be used as a building block for correlation rules. By itself it will probably be very noisy. |
That was in the back of my mind -- I think this is a safer idea. |
I've done crypto mining detections before ... this will be VERY noisy. Better to use a list of domain names w/VPCdns. Also, AFAIK VPC flow logs are uni-directional so Did you test this on KoS? This rule seems very dubious. |
The plan is to potentially leverage the rule for correlations. We already have DNS rules in place that do work for these types of detections, so this will be supplemental at most and will not be relied upon as a primary rule. |
Background
This PR adds a rule to look for known cryptomining ports in VPC flow logs. The rule also contains an empty set that can hold known destination addresses to avoid alerts when a more common port is detected for outbound traffic to a public address (
8080
, for instance).Changes
CRYPTO_MINING_PORTS
topanther-iocs.py
aws_vpc_crypto_ports.py
rule which consumes the aforementioned setaws_vpc_crypto_ports.yml
with a few tests (nothing elaborate since we're emulating flow logs)Testing
make fmt; make lint; make test