Last updated at Fri, 21 Jul 2017 14:43:47 GMT
If you're in security, you've likely already heard about the ShellShock vulnerability (aka Bash Bug, CVE-2014-6271, and CVE-204-7169). We have reviewed how ShellShock is being exploited, and the disclosed vectors are not applicable to our UserInsight deployment, yet we're following the security community's lead around patching all of our systems.
In case other systems on your network have been compromised, you should be extra vigilant about suspicious activity on your network. Attackers who have used Shell Shock to compromise machines on your network will likely move laterally next to explore the network. Here are some of the ways Rapid7 UserInsight will detect these attackers on your network:
- Detect port scanning through production honeypots: After getting the first foothold on the network, attackers need to get the lay of the land to know what to attack next. UserInsight detects port scanning through honeypots on your network. If you are a UserInsight subscriber and you haven't deployed any honeypots so far, simply click on the Collectors menu, the Download Collectors button, and download the Honeypot OVA. Once you've started the OVA as a virtual machine and hooked it up to UserInsight, it will alert you on any portscanning activity in the subnet. Learn more about honeypots and honeyusers in UserInsight.
- Detect lateral movement through agentless endpoint visibility: Surveys show that attackers love stealing passwords and passing off credentials to move through the network. When they use domain credentials, you may see this on Domain Controller logs. However, we learned from our internal penetration testing team that they mostly use pass-the-hash using local credentials to move from endpoint to endpoint, never triggering activity on the domain controller. This type of movement can only be detected by monitoring the endpoints, which can typically only be achieved by deploying and managing an endpoint agent. UserInsight provides this endpoint visibility without an endpoint agent by leveraging the proven Nexpose scanning technology to gather Windows logs from the endpoints for analysis. That way, you're fully covered for abuse of domain and local credentials without having to deploy and manage an endpoint agent.
If you're a UserInsight subscriber and have questions about ShellShock or these detection mechanisms, please contact your Rapid7 account manager. If you're interested in seeing more about how UserInsight can help you with incident detection and response, please contact us to schedule a demo.
If you want to know more information about bashbug and how you can use Rapid7 products to detect it, we've gathered all information we've published about BashBug right here: bashbug CVE-2014-6271 (shellshock): What is it? How to Remediate | Rapid7