Automating Cyber Threat Intelligence: A Practical Approach to Managing Emerging Vulnerabilities
�Fred Baguelin & Andy Giron
Agenda
2
01
Whoami
02
Background
03
Excel meets Workflow
04
Bash meets CI/CD
05
Hunting across telemetry
06
Takeaways
07
Questions
Whoami
Frederic Baguelin
Senior Security Researcher
Andy Giron
Senior Security Researcher
Background
Threat Research at Datadog
Vulnerability
Vulnerabilities are flaws in a computer system
that weaken the overall security of the device/system.
So What?!
CVE Statistics
7
https://www.cvedetails.com/
NVD Backlog
https://nvd.nist.gov/general/news/nvd-program-transition-announcement
CVE Gone Viral
Emerging Vulnerabilities
Enters the chat
Excel Meets Workflow
What we want
12
From (repetitive and boring) Manual Process…
13
14
… To Automated Workflow
15
How?
Score >= High
16
Rely on NVD API
JSON format with CVSS metrics and more
Alternative to consider
CIRCL cve-search public API http://cve.circl.lu
wget "https://services.nvd.nist.gov/rest/json/cves/2.0?cveId=CVE-2023-22515" -q -O - | jq ".vulnerabilities.[].cve.metrics.cvssMetricV31"
trending == True
17
Rely on search engines results
More advanced parsing: https://github.com/jarun/googler
Rely on Feedly CVE trends
Requires a paid subscription
Social network mentions
Twitter was great before Elon
Mastodon instances need indexing
PoC == True
18
Rely on Github API search
Let’s be careful with the results
Social network mentions
Twitter was great before Elon
19
Advanced CVE AI powered scoring
Emerging vulnerability detected!
20
Create a case management
Include stakeholders, keep track of actions, lessons learned, …
Reproduce the vulnerability
Help us to build accurate detection, share with community
Monitor
Detect in the wild activity
Bash�
Meet CI/CD�
honeypots
Intelligence Collection via Honeypots
22
Cloud Setup
Honeypot Setup
Manual Deployment
Ansible
Terraform
PoC that turns into production
23
Infrastructure as Code
24
Body, �24pt Normal
Body, �24pt Normal
CI/CD
Ansible
Terraform
Cloud Setup
Honeypot Setup
Auto-deployment
HASH (HTTP Agnostic Software Honeypot)
25
HASH is a framework for creating and launching low interactive honeypots.
https://github.com/DataDog/HASH
Honeynet
26
HASH (HTTP Agnostic Software Honeypot)
27
Hunting Across Telemetry
Jupyter
29
Sharable and reproducible
Rapid prototyping
Connect data from different services
Live data analysis and visualisations with Python!
IoC and payloads
30
IP addresses
Payloads
Stagers
Trends
https://securitylabs.datadoghq.com/articles/confluence-vulnerability-cve-2023-22515-overview-and-remediation/
31
Store vulnerability entities
Link observables
Telemetry to TIP
https://github.com/yeti-platform/yeti
CVE Search
32
Internal IR / Security team
Impacted customers
Takeaways
Run Forrest Run
34
Publish Faster
35
https://securitylabs.datadoghq.com/
Timeline XZ
36
03-29
Discovery
Issue discovered by Andres Freund
CVE
CVE assignment CVE-2024-3094
03-29
Datadog Notifies
Security Research Team at Datadog publishes a Security Center advisory to its CSM customers
03-29
Datadog Rule
Datadog Product Detection Engineers release a detection rule
04-01
Datadog Publishes
Datadog publishes a blog post detailing the vulnerability and detection
04- 03
https://securitylabs.datadoghq.com/articles/xz-backdoor-cve-2024-3094/
Digest
37
Built a process around emerging vulnerabilities
Developed a process around deploying honeypots
Integrated an automated process for hunting
Thank you