* . *
  • Tech News
    Nikon’s Z5 II is the cheapest full-frame camera yet with internal RAW video

    Nikon’s Z5 II is the cheapest full-frame camera yet with internal RAW video

    The Morning After: Let’s talk Switch 2 pricing

    The Morning After: Let’s talk Switch 2 pricing

    Amazon’s ‘Buy for Me’ AI will purchase stuff from third-party websites

    Amazon’s ‘Buy for Me’ AI will purchase stuff from third-party websites

    Vibe coding at enterprise scale: AI tools now tackle the full development lifecycle

    Vibe coding at enterprise scale: AI tools now tackle the full development lifecycle

  • Reviews
  • Noteworthy
  • Science
  • Opinions
  • Applications
  • Blockchain
    Gain an edge with DTX’s groundbreaking Hybrid Blockchain: Presale now open for LINK and XRP Traders

    Gain an edge with DTX’s groundbreaking Hybrid Blockchain: Presale now open for LINK and XRP Traders

    Unraveling the Mystery: What Exactly is Blockchain Technology?

    Unraveling the Mystery: What Exactly is Blockchain Technology?

    Revolutionary Gasless Blockchain Gaming Partnership Between Atari Founder’s New Firm and Skale Labs

    Discover the Exciting Outcome of a Blockchain Experiment: Decentralized Learning Robots Swarm to Success

    Unleashing a Swarm of Decentralized Learning Robots: The Surprising Results of Blockchain Experiment

    Vishvasya: Revolutionizing Citizen-Centric Apps with National Blockchain Framework for Enhanced Security and Transparency

    Vishvasya: Revolutionizing Citizen-Centric Apps with National Blockchain Framework for Enhanced Security and Transparency

  • Applications
  • Culture
  • Deals
  • Events
  • How-to
  • Roundups
  • Startups
Thursday, May 15, 2025
No Result
View All Result
Tech News, Magazine & Review WordPress Theme 2017
  • Contact Us
  • Legal
    • Privacy Policy
    • Terms of Use
    • DMCA
    • Cookie Privacy Policy
    • California Consumer Privacy Act (CCPA)
  • Tech News
    Nikon’s Z5 II is the cheapest full-frame camera yet with internal RAW video

    Nikon’s Z5 II is the cheapest full-frame camera yet with internal RAW video

    The Morning After: Let’s talk Switch 2 pricing

    The Morning After: Let’s talk Switch 2 pricing

    Amazon’s ‘Buy for Me’ AI will purchase stuff from third-party websites

    Amazon’s ‘Buy for Me’ AI will purchase stuff from third-party websites

    Vibe coding at enterprise scale: AI tools now tackle the full development lifecycle

    Vibe coding at enterprise scale: AI tools now tackle the full development lifecycle

  • Reviews
  • Noteworthy
  • Science
  • Opinions
  • Applications
  • Blockchain
    Gain an edge with DTX’s groundbreaking Hybrid Blockchain: Presale now open for LINK and XRP Traders

    Gain an edge with DTX’s groundbreaking Hybrid Blockchain: Presale now open for LINK and XRP Traders

    Unraveling the Mystery: What Exactly is Blockchain Technology?

    Unraveling the Mystery: What Exactly is Blockchain Technology?

    Revolutionary Gasless Blockchain Gaming Partnership Between Atari Founder’s New Firm and Skale Labs

    Discover the Exciting Outcome of a Blockchain Experiment: Decentralized Learning Robots Swarm to Success

    Unleashing a Swarm of Decentralized Learning Robots: The Surprising Results of Blockchain Experiment

    Vishvasya: Revolutionizing Citizen-Centric Apps with National Blockchain Framework for Enhanced Security and Transparency

    Vishvasya: Revolutionizing Citizen-Centric Apps with National Blockchain Framework for Enhanced Security and Transparency

  • Applications
  • Culture
  • Deals
  • Events
  • How-to
  • Roundups
  • Startups
No Result
View All Result
Tech News
No Result
View All Result

Network Visibility Module and Zeek Detections in Secure Network Analytics

April 2, 2025
in Cloud Computing
Home Cloud Computing

Our mission is to provide unbiased product reviews and timely reporting of technological advancements. Covering all latest reviews and advances in the technology industry, our editorial team strives to make every click count. We aim to provide fair and unbiased information about the latest technological advances.
Share on FacebookShare on Twitter

Secure Network Analytics version 7.5.2 has been released, offering exciting new features such as the Network Visibility Module (NVM) and Zeek detections. We are expanding our detections across existing and new sources, and our detections engine now ingests NVM telemetry and Zeek logs, introducing nine new alerts prominently displayed in Analytics. These alerts are also aligned with the widely recognized MITRE ATT&CK framework.

By integrating a more diverse range of telemetry sources, Secure Network Analytics significantly enhances network visibility and provides deeper insights into network activities. This release and its detections represent an advanced approach to broadening detection sources and capabilities. Users utilizing the Data Store architecture with Analytics enabled can upgrade to version 7.5.2 to immediately access these new capabilities.

The Secure Network Analytics version 7.5.2 software updates can be downloaded from Cisco Software Central.

New Network Visibility Module (NVM) Alerts

Network Visibility Module is a component of Cisco Secure Client that records and reports on network activity from an endpoint device and ties in endpoint style information with those network details. If you are used to collecting NetFlow or IPFIX in your environment, the Network Visibility Module will provide the same details about a network connection, but will also include things like hostname, process name, user information, operating system, interface details, and more. This helps speed up investigations and provides additional context about who and what host took an action on the network. The detections engine processes the Network Visibility Module telemetry and alerts on four new detections.

ADVERTISEMENT

You can check out the Network Visibility Module Configuration Guide.

Network Visibility Module (NVM) Alert Names and Descriptions

Potential Gamaredon C2 Callout

A command line utility was used to contact a URL associated with the command-and-control servers of a threat actor known as Gamaredon. Gamaredon (also known as Armageddon, Primitive Bear, and ACTINIUM) is an APT active since 2013 known to leverage spearphishing to infect victims with custom malware.

Suspicious Curl Behavior

The system utility curl exhibited suspicious behavior that may be indicative of exploitation of CVE-2023-38545.

Suspicious MSHTA Activity

The built-in Windows application MSHTA.exe was executed interactively by a non-system user and utilized to make a network connection. While typically legitimate when run automatically by the system, it is also known to be utilized by threat actors including Advanced Persistent Threats (APTs).

Suspicious Process Path

A process was executed on an endpoint from a directory that should not have executables.

New alerts from NVM telemetry in analyticsFig. 1 – New alerts from Network Visibility Module (NVM) telemetry in Analytics

New Zeek Alerts

Zeek is a popular, free, and open-source network traffic analysis tool. It monitors and inspects traffic and generates log files of witnessed activity. Those Zeek log files can be sent to Secure Network Analytics as a telemetry source. The detections engine reads the Zeek logs and alerts on five new detections.

Check out the Zeek Configuration Guide.

Zeek Alert Names and Descriptions

DNS Traffic to Tor Proxy

A device sent DNS query traffic for a known Tor proxy. This may indicate that an application is preparing to establish a connection via a Tor proxy. It could be a botnet attempting to contact other devices for command-and-control. Adversaries are known to leverage it for command-and-control and defense evasion. Even if utilized by a legitimate user, it can circumvent some security controls.

PetitPotam Attack Via EFS RPC Calls

A device sent a Remote Procedure Call (RPC) using the Encrypting File System Remote Protocol (EFSRPC) Protocol library. The PetitPotam attack is known to be related to this type of RPC traffic. PetitPotam is a tool that can exploit this library. It is also known as an NTLM relay attack. Since most organizations don’t use this library at all, or limit the usage of it, any use is uncommon enough to indicate a possible PetitPotam attack.

Possible Impacket SecretDump Activity

A device is attempting a secrets dump using an impact tool such as secretdump.py, which allows dumping credentials from an Active Directory (AD) server. This is also referred to as a secrets-dump HKTL.

Remote Task Creation via ATSVC Named Pipe

A device is attempting to create a remote task using ATSVC named pipes, which could be a malicious attempt to use at.exe for performing task scheduling for initial or recurring execution of malicious code. The at.exe utility has been deprecated in current versions of Windows in favor of schticks.

Suspicious PsExec Execution

A device other than a Windows Sysinternal device is using psexec with a renamed service name, which could indicate a threat actor attempting to perform a remote execution.

Alerts from Zeek logs in analyticsFig. 2 – Alerts from Zeek Logs in Analytics

Conclusion

Users of the Secure Network Analytics Data Store with Analytics will want to upgrade their instance to version 7.5.2 to gain access to nine new detections – four based on Network Visibility Module telemetry and five based on Zeek logs. These new detections are immediately available in Analytics. Configure the sources to export and expand your detection coverage today.

References

We’d love to hear what you think. Ask a Question, Comment Below, and Stay Connected with Cisco Secure on social!

Cisco Security Social Channels

InstagramFacebookTwitterLinkedIn

Share:

Tags: AnalyticsDetectionsmodulenetworkSecurevisibilityZeek

Denial of responsibility! tech-news.info is an automatic aggregator around the global media. All the content are available free on Internet. We have just arranged it in one platform for educational purpose only. In each content, the hyperlink to the primary source is specified. All trademarks belong to their rightful owners, all materials to their authors. If you are the owner of the content and do not want us to publish your materials on our website, please contact us by email – abuse@tech-news.info. The content will be deleted within 24 hours.
Previous Post

Apple CEO Tim Cook Sells Stock Worth $24 Million

Next Post

UK solar-to-hydrogen innovation uses organic materials | Envirotec

RelatedPosts

Global Volunteer Month shines spotlight on Cisco DNA
Cloud Computing

Global Volunteer Month shines spotlight on Cisco DNA

April 3, 2025
Spring Training for Success: What Sports Taught Me About Customer-Focused Partner Readiness
Cloud Computing

Spring Training for Success: What Sports Taught Me About Customer-Focused Partner Readiness

April 3, 2025
Mobile World Congress 2025: SOC in the Network Operations Center
Cloud Computing

Mobile World Congress 2025: SOC in the Network Operations Center

April 3, 2025
Cisco Meraki Add-on for Splunk, New and Improved!
Cloud Computing

Cisco Meraki Add-on for Splunk, New and Improved!

April 3, 2025
ADVERTISEMENT
Galaxy Ring wireless charging upgrade could ditch the case – Phandroid

Galaxy Ring wireless charging upgrade could ditch the case – Phandroid

April 5, 2025

Nikon’s Z5 II is the cheapest full-frame camera yet with internal RAW video

April 5, 2025

Mechanistic understanding could enable better fast-charging batteries

April 5, 2025

Apple users are ditching the AirTag for this $30 alternative… but why?

April 5, 2025

Grab the 2nd Gen Google Nest for Less than 100 Bucks! – Phandroid

April 5, 2025

How to use the new, easier Guest Mode on Vision Pro

April 5, 2025

The Morning After: Let’s talk Switch 2 pricing

April 5, 2025

Charging electric vehicles 5x faster in subfreezing temps

April 5, 2025

Deals: Moto Edge 60 Fusion and Pixel 9a arrive, iPhone 16  and 15 series are £100 off

April 5, 2025

iPhones Could Cost Up to $2,300 in the U.S. Due to Tariffs, Analyst Says

April 5, 2025

Categories

Select Category

    Archives

    Select Month
      May 2025
      MTWTFSS
       1234
      567891011
      12131415161718
      19202122232425
      262728293031 
      « Apr    
      • California Consumer Privacy Act (CCPA)
      • Contact Us
      • Cookie Privacy Policy
      • DMCA
      • Privacy Policy
      • Tech News
      • Terms of Use

      © 2015-2024 Tech-News.info
      DMCA.com Protection Status

      No Result
      View All Result
      • California Consumer Privacy Act (CCPA)
      • Contact Us
      • Cookie Privacy Policy
      • DMCA
      • Privacy Policy
      • Tech News
      • Terms of Use

      © 2015-2024 Tech-News.info
      DMCA.com Protection Status

      This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.
      Go to mobile version