DragonFly as defined by MITRE "Dragonfly is a cyber espionage group that has been attributed to Russia's Federal Security Service (FSB) Center 16. Active since at least 2010, Dragonfly has targeted defense and aviation companies, government entities, companies related to industrial control systems, and critical infrastructure sectors worldwide through supply chain, spearphishing, and drive-by compromise attacks"
TTPs:
Schedule Tasks Creation
Brute Force Attack
Phishing Email
Detection and Prevention:
Schedule Task Creation:
Installing Sysmon:
Windows:
Download Sysmon at this link:
Download the sysmon XML config file:
Now in the downloads folder run in an admin Powershell prompt
On the Wazuh server add the lines below into /var/ossec/etc/rules/local_rules.xml inside the <group name="windows,sysmon,">
<rule id="115008" level="10">
<decoded_as>json</decoded_as>
<field name="ScheduledTaskAR.Arguments" type="pcre2" negate="yes">^null$</field>
<field name="TaskName" type="pcre2">(.|\s)*\S(.|\s)*</field>
<description>A new scheduled task "$(TaskName)" has been created on "$(ScheduledTaskAR.CimSystemProperties.ServerName)". The task will execute the command - "$(ScheduledTaskAR.Execute) $(ScheduledTaskAR.Arguments)".</description>
<mitre>
<id>T1053</id>
</mitre>
</rule>
<rule id="115009" level="10">
<decoded_as>json</decoded_as>
<field name="ScheduledTaskAR.Arguments" type="pcre2">^null$</field>
<field name="TaskName" type="pcre2">(.|\s)*\S(.|\s)*</field>
<description>A new scheduled task "$(TaskName)" has been created on "$(ScheduledTaskAR.CimSystemProperties.ServerName)". The task will execute the command - "$(ScheduledTaskAR.Execute)".</description>
<mitre>
<id>T1053</id>
</mitre>
</rule>
Now restart wazuh manager on the wazuh server
systemctl restart wazuh-manager
Finished Product
In the webui it should show up as below:
Brute Force Attacks:
Wazuh Server setup:
In the /var/ossec/etc/ossec.conf file make sure the lines below are not commented
Now in the same file add the lines. There is a section towards the middle of the file that has <active-response> commented out and you can add this right below that.