Wednesday, July 31, 2024

10% Early Bird discount for Security Onion for Analysts & Threat Hunters Class in September 2024!

We've scheduled the next run of our 4-day Security Onion for Analysts & Threat Hunters class!


Use promo code earlybird by August 12, 2024 to receive 10% off!


For more details and to register, please see:


https://securityonionsep2024.eventbrite.com/


If you have any questions about this class, please use the Contact link on the bottom of the Eventbrite page.


For other training options, please see:


https://securityonionsolutions.com/training/




Quick Malware Analysis: LATRODECTUS INFECTION pcap from 2024-06-25

Thanks to Brad Duncan for sharing this pcap from 2024-06-25 on his malware traffic analysis site! Due to issues with Google flagging a warning for the site, we're not including the actual hyperlink but it should be easy to find.


We did a quick analysis of this pcap on the NEW Security Onion 2.4.90:

https://blog.securityonion.net/2024/07/security-onion-2490-now-available.html


If you'd like to follow along, you can do the following:



The screenshots at the bottom of this post show some of the interesting alerts, metadata logs, and session transcripts. Want more practice? Check out our other Quick Malware Analysis posts at:

https://blog.securityonion.net/search/label/quick%20malware%20analysis


About Security Onion


Security Onion is a versatile and scalable platform that can run on small virtual machines and can also scale up to the opposite end of the hardware spectrum to take advantage of extremely powerful server-class machines.  Security Onion can also scale horizontally, growing from a standalone single-machine deployment to a full distributed deployment with tens or hundreds of machines as dictated by your enterprise visibility needs. To learn more about Security Onion, please see:
https://securityonion.net


Do you want to deploy Security Onion to your enterprise and want the best enterprise hardware? Here are the top 5 reasons to purchase appliances from Security Onion Solutions: https://blog.securityonion.net/2023/08/top-5-reasons-to-purchase-security.html


Screenshots


First, we start with the overview of all alerts and logs:



Next, let's look at just the alerts:





If we ungroup the alerts, then we can see them individually sorted by timestamp:




The first alert is interesting so let's pivot to full packet capture:




Let's switch to the ASCII transcript to make it a little more readable. We can clearly see that the victim is downloading an MSI file:




Now let's look at all of the protocol metadata:




We'll start with the HTTP logs:




Next, we'll look at the Zeek Notices:




SSL/TLS:




X.509:




File transfers:




DNS lookups:




Connections with GeoIP lookups:





Monday, July 29, 2024

Security Onion 2.4.90 now available including improvements for Detections and much more!

Security Onion 2.4.90 is now available! 


Security Onion is a cybersecurity platform built by defenders for defenders. Recently, we released Security Onion 2.4.70 which was the culmination of several MONTHS of thinking through the defender workflow specifically around detection engineering. This resulted in a new interface called Detections that makes it super simple to tune your NIDS rules for Suricata, Sigma rules for ElastAlert, and YARA rules for Strelka. In 2.4.80, we listened to your feedback about Detections and made lots of improvements including syntax highlighting and much more. In this 2.4.90 release, we continued to iterate on Detections with regex support, massive performance increases, and history diff highlighting!


In addition to Detections improvements, we've also added a new action to the SOC Actions menu that makes it easier for you to add your own custom actions!


Clicking this new action will take you directly to the configuration screen for actions:


In that last screenshot, you'll notice a new icon in the upper right corner of the config section. Clicking this new icon will expand the config section to full width to make it easier to read and customize larger config settings.


There are many more features and fixes included in this release! For a complete list of all changes, please see the Release Notes:

https://docs.securityonion.net/en/2.4/release-notes.html#changes


Known Issues


For a list of known issues, please see:

https://docs.securityonion.net/en/2.4/release-notes.html#known-issues


About Security Onion


Security Onion is a free and open platform built by defenders for defenders. It includes network visibility, host visibility, intrusion detection honeypots, log management, and case management. 


For network visibility, we offer signature based detection via Suricata, rich protocol metadata and file extraction using your choice of either Zeek or Suricata, full packet capture, and file analysis. For host visibility, we offer the Elastic Agent which provides data collection, live queries via osquery, and centralized management using Elastic Fleet. Intrusion detection honeypots based on OpenCanary can be added to your deployment for even more enterprise visibility. All of these logs flow into Elasticsearch and we’ve built our own user interfaces for alerts, dashboards, threat hunting, case management, and grid management. 


Security Onion has been downloaded over 2 million times and is being used by security teams around the world to monitor and defend their enterprises. Our easy-to-use Setup wizard allows you to build a distributed grid for your enterprise in minutes!


Documentation


You can find our online documentation here:


https://docs.securityonion.net/en/2.4/


Documentation is always a work in progress. If you find documentation that needs to be updated, please let us know as described in the Feedback section below.


New Installations


If this is your first time installing Security Onion 2.4, then we highly recommend starting with an IMPORT installation as shown at:


https://docs.securityonion.net/en/2.4/first-time-users.html


Once you’re comfortable with your IMPORT installation, then you can move on to more advanced installations as shown at:


https://docs.securityonion.net/en/2.4/architecture.html


Existing 2.4 Installations


If you have an existing Security Onion 2.4 installation, you can update to the latest version using soup:


https://docs.securityonion.net/en/2.4/soup.html


Before updating your production deployment, we highly recommend testing the upgrade process on a test deployment that closely matches your production deployment if possible.


If you haven't already upgraded to 2.4.70 then, in preparation for the new Detections module, the following will be completed during soup:

  • Playbook Plays will be backed up to /nsm/backup/detections-migration/ and any active Elastalert rules will be backed up and removed.
  • Suricata tuning configurations will be backed to /nsm/backup/detections-migration/ and any thresholds will be migrated over to the new Detections module.


2.3 EOL


As a reminder, Security Onion 2.3 reached End Of Life (EOL) on April 6, 2024:


https://blog.securityonion.net/2023/10/6-month-eol-notice-for-security-onion-23.html


Thanks


Lots of love went into this release!


Special thanks to all our folks working so hard to make this release happen!


  • Josh Brower
  • Jason Ertel
  • Wes Lambert
  • Corey Ogburn
  • Josh Patterson
  • Mike Reeves


Questions, Problems, and Feedback


If you have any questions or problems relating to Security Onion 2.4, please use the 2.4 category at our Discussions site:

https://github.com/Security-Onion-Solutions/securityonion/discussions/categories/2-4


Security Onion Pro


We recently celebrated 10 years in business by announcing Security Onion Pro:

https://blog.securityonion.net/2024/07/celebrating-10-years-of-security-onion.html


Security Onion Pro includes many enterprise features that folks have been asking for:

  • Open ID Connect (OIDC)
  • Data at Rest Encryption
  • FIPS for the OS
  • DoD STIG for the OS
  • External Notifications in SOC
  • Time Tracking inside of Cases
  • Guaranteed Message Delivery


You can read more about these enterprise features at:

https://securityonion.com/pro

Training


Need training? Start with our free Security Onion Essentials training and then take a look at some of our other official Security Onion training!

https://securityonion.net/training


Security Onion Solutions Hardware Appliances


We know Security Onion's hardware needs, and our appliances are the perfect match for the platform. Leave the hardware research, testing, and support to us, so you can focus on what's important for your organization. Not only will you have confidence that your Security Onion deployment is running on the best-suited hardware, you will also be supporting future development and maintenance of the Security Onion project!


https://securityonion.com/hardware


Cloud Installations


For new Security Onion 2 installations in the cloud, Security Onion 2.4 will soon be available on the AWS, Azure, and GCP marketplaces!


AWS Marketplace and Documentation:


https://securityonion.net/aws/?ref=_ptnr_soc_blog_240725


https://docs.securityonion.net/en/2.4/cloud-amazon.html


Azure Marketplace and documentation:


https://securityonion.net/azure


https://docs.securityonion.net/en/2.4/cloud-azure.html


GCP Marketplace and documentation:


https://securityonion.net/google


https://docs.securityonion.net/en/2.4/cloud-google.html


Screenshot Tour


If you want the quickest and easiest way to try out Security Onion 2.4, just follow the screenshots below to install an Import node. This can be done in a minimal VM with only 4GB RAM! For more information, please see:

https://docs.securityonion.net/en/2.4/first-time-users.html