HOW TO SPOT AND STOP MALWARE?

Ertugrul Akbas
3 min readJun 12, 2019

--

Organizations still get hit with malware and ransomware in spite of that fact that antivirus and firewall solutions are in place. For this reason, a layered security approach will be more effective to catch malware infections before they start running. We will show you how SureLog SIEM can effectively identify and stop malware on the network.

Use Case: Malware on the Network

· Unusual network traffic spikes to and from sources

· Endpoints with about 8 malware threats

· Significant Network Slow down observed

· User complained INTERNET is too slow in hostels

For this use case, we will use:

1- Firewall logs,

2- Endpoint security logs

3- Threat Intelligence Feeds

With SureLog SIEM, security admins have two detection options.

1. Correlation

2. Log investigation.

Correlation

Use Case steps:

1- Collect endpoints with malware threats.

2- Calculate the total traffic between devices.

3- Check if one of those devices has eight malware threats within the last 24 hours.

Malware Device List
Rule Part 1:Collect the malware found device list
Rule Part 1.1: Fill the malware found device list
Rule Part 2: Unusual network traffic spikes to and from sources and endpoints with about 8 malware threats

Rule Description:

The first part of the rule collects log from endpoint security devices or Threat Intelligence Feeds and fill the “Malware Device List”

The second part of the rule checks if there is more than 300 MB upload and 8 malware threats

Log Investigation

First part of the investigation is to find traffic peaks.

Firewall Logs

Within firewall logs, look for peak traffic.

Total traffic within 1 hour from SourceMachine to DestinationMachine

The second part of the investigation is to look for eight or more malware threats within endpoint logs.

--

--

Ertugrul Akbas
Ertugrul Akbas

Written by Ertugrul Akbas

Entrepreneur,Security Analyst,Research.

No responses yet