Skip to content

Latest commit

 

History

History
120 lines (108 loc) · 4.25 KB

Ransomware - LeaksiteMontitoring.md

File metadata and controls

120 lines (108 loc) · 4.25 KB

Monitor ransomwarelive for companies of interest on ransowmare data leak sites (DLS)

Query Information

This query can support monitoring for supply chain risk or companies of interest being present on ransowmare data leak sites (DLS) sites

MITRE ATT&CK Technique(s)

Technique ID Title Link
T1486 Data Encrypted for Impact https://attack.mitre.org/techniques/T1486/
T1657 Financial Theft https://attack.mitre.org/techniques/T1657

Description

This allows you to monitor the ransomware.live dataset for possible companies of interest being breached and posted by ransomware groups on data leak sites (DLS).

Risk

Relevant third parties, suppliers, or clients could be compromised and present an indiretc or direct risk to your organisation.

Author

References

Defender XDR & Sentinel

//basic KQL to query recentvictims API
let victims = externaldata(country:string,
        activity:string,
        description:string,
        discovered:string,
        group_name:string,
        post_title:string,
        post_url:string,
        published:string,
        screenshot:string,
        website:string,
        infostealer:dynamic)
[h@"https://api.ransomware.live/recentvictims"]
with(format="multijson",ignoreFirstRecord=false);
victims
//query to detect possible third party compromise via leak site data
let clientkeyword = datatable(name:string)["client1","client2","client3","axip","elutia"]; //add clients
let supplierkeyword = datatable(supplier:string)["supplier1","supplier2","supplier3","merchant.id"]; //add suppliers
let thirdpartykeyword = datatable(supplier:string)["thirdparty1","thunderbirdcc"]; //add third parties
let victims = externaldata(country:string,
        description:string,
        Country:string,
        discovered:string,
        discovered:datetime,
        group_name:string,
        post_title:string,
        post_url:string,
        published:string,
        published:datetime,
        screenshot:string,
        website:string)
        website:string,
        infostealer:dynamic)
[h@"https://api.ransomware.live/recentvictims"]
with(format="multijson",ignoreFirstRecord=false);
victims
| where post_title has_any (clientkeyword) or post_title has_any (supplierkeyword) or post_title has_any (thirdpartykeyword)
//Query to bring back all victims data from ransomware.live
let all_victims = externaldata(["date"]:datetime,
        victim:string,
        domain:string,
        country:string,
        summary:string,
        title:string,
        url:string,
        added:datetime)
[h@"https://api.ransomware.live/allcyberattacks"]
with(format="multijson",ignoreFirstRecord=false);
all_victims
//Query to bring back all victims data from ransomware.live
let all_victims = externaldata(["date"]:datetime,
        victim:string,
        domain:string,
        country:string,
        summary:string,
        title:string,
        url:string,
        added:datetime)
[h@"https://api.ransomware.live/allcyberattacks"]
with(format="multijson",ignoreFirstRecord=false);
all_victims
// Query group information
let groups = externaldata(
    name: string,
    captcha: bool,
    javascript_render: string,
    parser: bool,
    profile: dynamic,
    locations: dynamic,
    meta: string,)
    [h@"https://api.ransomware.live/groups"]
    with(format="multijson", ignoreFirstRecord=false);
groups
| where name contains "abyss"
| mv-expand locations
| project name, locations.["title"], locations.available, locations.fqdn, ["url"]=locations.slug, locations.updated, locations.version, profile