Sandfly 5.4 - Cisco and Juniper Network Device Support
S
Steve Busko
started a topic
about 5 hours ago
Sandfly 5.4 is introducing an industry-first new feature: Agentless EDR support for Cisco and Juniper networking gear. This new feature gives customers full Linux EDR coverage of these critical devices combined with Sandfly's proven speed, stability, and safety. Sandfly continues to have the widest Linux-based server, embedded, network appliance and device support in the industry.
In addition to protecting edge devices like Juniper and Cisco, Sandfly 5.4 has these new features as well:
Webhook integrations for notifications to Slack and others.
Threat feed integration for public and private hash databases.
Expanded detection for Salt Typhoon Chinese nation-state tactics and related activity.
Cisco and Juniper Network Device Support
Sandfly's full functionality has been extended to routers and switches from Juniper and Cisco running Linux-based operating systems. This includes:
Cisco IOS XR network operating system for routers.
Cisco Nexus NX-OS data center operating system for switches and related hardware.
Sandfly's full feature set is available to any of these devices we can access. This means customers running Cisco and Juniper network gear get the following:
Full Linux EDR detection coverage from Sandfly.
Drift detection for any unauthorized changes, new processes, new users, new SSH keys, or related alterations to the device.
Full SSH key tracking and SSH Security Zone protections.
Password auditing of existing user accounts to find weak and default passwords.
Total device visibility into what processes it is running, network ports operating, users present, systemd services, kernel modules, and more.
Custom threat hunting for incident response.
Instant agentless coverage that is fast, safe, and stable that will not impact operations.
Salt Typhoon Threats
The recently disclosed attacks by Chinese nation state threat actors against telcos, dubbed Salt Typhoon, targeted critical networking gear from Cisco and Juniper. Once on these devices, the attackers can maintain persistence for extended periods and access extremely sensitive information about customers and network operations. The main reason they were able to persist for so long was because there was no effective way to monitor these devices before now.
Details of their attack patterns are available in several sources, but the main thrust of their attacks consisted of:
Gain access to critical router and network switching gear through various exploits or stolen credentials.
Maintain persistence using built-in mechanisms.
Activating remote access through enabling SSH on alternate ports.
Deploying backdoors for further stealthy access and persistence.
Grabbing sensitive network traffic, such as unencrypted credentials, to move further into critical infrastructure.
Detecting Cisco and Juniper Threats
Sandfly's agentless security platform has EDR combined with drift detection. Both of these functions would make the actions of Salt Typhoon and others considerably more difficult.
For instance, our drift detection feature can be easily configured to lock down known-good profiles of devices and alert on any new process started, files changed, new users added and more. Our EDR can find threats running on systems, or as part of an incident response to check existing systems for signs of compromise. Finally, our ability to track SSH keys means new access added to devices can be seen immediately limiting lateral movement risks.
Configuring Cisco & Juniper Network Gear
Juniper and Cisco both have special requirements to enable Sandfly SSH access. Juniper Evolved OS requires a signed binary to run which is accomplished with the instructions below. Cisco equipment also requires configuration to allow SSH access along with other special considerations. Please see the documentation for more details:
We have added in webhook support to send alerts to applications like Slack and others. The new notifications allow you to customize alert templates for other platforms as well. Webhook activation can be done by following the below instructions:
Sandfly can now access a list of hashes for known Linux malware from places such as Malware Bazaar, and other threat feeds. The hash lists will alert on any of the following:
Process hash matches
File hash matches
SSH key hash matches
The threat feed feature can also pull from a custom list of hashes maintained by security teams at a URL provided by the customer.
Threat feeds can be added by following our documentation below:
We expanded coverage to make a broader net for tactics used by Salt Typhoon plus other new threats. The new detections find more backdoor activity, suspicious processes, unusual network processes and related exploits. This expands our already extensive industry-leading Linux coverage. The new detections feature some of the following:
process_injector_memfd_*_network_operating - New detections to find network processes running from memfd sockets as used by fileless malware backdoors.
process_masquerade_cmdline_overwrite - Detects binary masquerading techniques that overwrite the command line used to start the process with an imposter name.
policy_process_ssh_port_non_standard_tcp_port - Finds SSH daemons running on non-standard ports (e.g. not TCP port 22).
process_backdoor_bindshell_login_mode - Finds system shells being used in login mode commonly associated with backdoor activity.
process_backdoor_bindshell_interactive_mode - Finds system shells being used in interactive mode commonly associated with backdoor activity.
process_backdoor_bindshell_pseudo_master - Finds suspicious use of the Linux pseudo terminal master/slave commonly seen with backdoor activity.
process_backdoor_bindshell_parent_static_binary - Looks for shells spawned by statically built network process binaries commonly seen with backdoor activity.
process_masquerade_sshd - Finds SSH daemon processes running under another name to hide their presence.
process_running_ping_sweep_operating - Finds signs that a ping sweep process is being run on the system.
process_running_port_scanner_operating_nmap - Finds instances of nmap and related port scanning activity running on a system.
process_network_port_operating_static_binary - Finds statically built network binaries running on a system which is common with C2 payloads and backdoors.
process_masquerade_cmdline_proc_dir - Finds processes using /proc as their command line value to execute and hide.
Process maps forensic data has been converted to maps_list to significantly reduce the size and duplicate data present.
Expansion of existing checks, wider coverage of process threats, and more.
Microsoft Sentinel Host and SSH Data
We have added more support for Microsoft Sentinel, including sending Host and SSH key data we collect to the platform. This data can be used for additional threat hunting and correlation by security teams inside Sentinel. The host data can be used to build out host asset inventory data for security teams inside the Sentinel platform as well to help with device discovery.
Try Sandfly Today
Cisco and Juniper device support is a critical new feature for many companies and we urge customers to check their edge devices for compromise as they are frequently targeted by nation-state attackers. Sandfly allows you to protect these devices simply and safely without endpoint agents. As always, Sandfly has free trials available for all license tiers. Please see below for more information:
All customers are encouraged to upgrade to see our expanded coverage and protection options for Linux. We are here to help with any questions. Please see our documentation on the new features and capabilities:
Steve Busko
Sandfly 5.4 is introducing an industry-first new feature: Agentless EDR support for Cisco and Juniper networking gear. This new feature gives customers full Linux EDR coverage of these critical devices combined with Sandfly's proven speed, stability, and safety. Sandfly continues to have the widest Linux-based server, embedded, network appliance and device support in the industry.
In addition to protecting edge devices like Juniper and Cisco, Sandfly 5.4 has these new features as well:
Webhook integrations for notifications to Slack and others.
Threat feed integration for public and private hash databases.
Expanded detection for Salt Typhoon Chinese nation-state tactics and related activity.
Cisco and Juniper Network Device Support
Sandfly's full functionality has been extended to routers and switches from Juniper and Cisco running Linux-based operating systems. This includes:
Cisco IOS XR network operating system for routers.
Cisco Nexus NX-OS data center operating system for switches and related hardware.
Juniper Evolved OS for routers and switches.
Sandfly's full feature set is available to any of these devices we can access. This means customers running Cisco and Juniper network gear get the following:
Full Linux EDR detection coverage from Sandfly.
Drift detection for any unauthorized changes, new processes, new users, new SSH keys, or related alterations to the device.
Full SSH key tracking and SSH Security Zone protections.
Password auditing of existing user accounts to find weak and default passwords.
Total device visibility into what processes it is running, network ports operating, users present, systemd services, kernel modules, and more.
Custom threat hunting for incident response.
Instant agentless coverage that is fast, safe, and stable that will not impact operations.
Salt Typhoon Threats
The recently disclosed attacks by Chinese nation state threat actors against telcos, dubbed Salt Typhoon, targeted critical networking gear from Cisco and Juniper. Once on these devices, the attackers can maintain persistence for extended periods and access extremely sensitive information about customers and network operations. The main reason they were able to persist for so long was because there was no effective way to monitor these devices before now.
Details of their attack patterns are available in several sources, but the main thrust of their attacks consisted of:
Gain access to critical router and network switching gear through various exploits or stolen credentials.
Maintain persistence using built-in mechanisms.
Activating remote access through enabling SSH on alternate ports.
Deploying backdoors for further stealthy access and persistence.
Grabbing sensitive network traffic, such as unencrypted credentials, to move further into critical infrastructure.
Detecting Cisco and Juniper Threats
Sandfly's agentless security platform has EDR combined with drift detection. Both of these functions would make the actions of Salt Typhoon and others considerably more difficult.
For instance, our drift detection feature can be easily configured to lock down known-good profiles of devices and alert on any new process started, files changed, new users added and more. Our EDR can find threats running on systems, or as part of an incident response to check existing systems for signs of compromise. Finally, our ability to track SSH keys means new access added to devices can be seen immediately limiting lateral movement risks.
Configuring Cisco & Juniper Network Gear
Juniper and Cisco both have special requirements to enable Sandfly SSH access. Juniper Evolved OS requires a signed binary to run which is accomplished with the instructions below. Cisco equipment also requires configuration to allow SSH access along with other special considerations. Please see the documentation for more details:
Cisco NX-OS Application Notes
Cisco IOS-XR Application Notes
Juniper Evolved OS Application Notes
Slack and Other Webhook Notifications
We have added in webhook support to send alerts to applications like Slack and others. The new notifications allow you to customize alert templates for other platforms as well. Webhook activation can be done by following the below instructions:
Activating Webhooks
Threat Feeds
Sandfly can now access a list of hashes for known Linux malware from places such as Malware Bazaar, and other threat feeds. The hash lists will alert on any of the following:
Process hash matches
File hash matches
SSH key hash matches
The threat feed feature can also pull from a custom list of hashes maintained by security teams at a URL provided by the customer.
Threat feeds can be added by following our documentation below:
Threat Feed Configuration
Expanded Tactics Detection
We expanded coverage to make a broader net for tactics used by Salt Typhoon plus other new threats. The new detections find more backdoor activity, suspicious processes, unusual network processes and related exploits. This expands our already extensive industry-leading Linux coverage. The new detections feature some of the following:
process_injector_memfd_*_network_operating - New detections to find network processes running from memfd sockets as used by fileless malware backdoors.
process_masquerade_cmdline_overwrite - Detects binary masquerading techniques that overwrite the command line used to start the process with an imposter name.
policy_process_ssh_port_non_standard_tcp_port - Finds SSH daemons running on non-standard ports (e.g. not TCP port 22).
process_backdoor_bindshell_login_mode - Finds system shells being used in login mode commonly associated with backdoor activity.
process_backdoor_bindshell_interactive_mode - Finds system shells being used in interactive mode commonly associated with backdoor activity.
process_backdoor_bindshell_pseudo_master - Finds suspicious use of the Linux pseudo terminal master/slave commonly seen with backdoor activity.
process_backdoor_bindshell_parent_static_binary - Looks for shells spawned by statically built network process binaries commonly seen with backdoor activity.
process_masquerade_sshd - Finds SSH daemon processes running under another name to hide their presence.
process_running_ping_sweep_operating - Finds signs that a ping sweep process is being run on the system.
process_running_port_scanner_operating_nmap - Finds instances of nmap and related port scanning activity running on a system.
process_network_port_operating_static_binary - Finds statically built network binaries running on a system which is common with C2 payloads and backdoors.
process_masquerade_cmdline_proc_dir - Finds processes using /proc as their command line value to execute and hide.
Process maps forensic data has been converted to maps_list to significantly reduce the size and duplicate data present.
Expansion of existing checks, wider coverage of process threats, and more.
Microsoft Sentinel Host and SSH Data
We have added more support for Microsoft Sentinel, including sending Host and SSH key data we collect to the platform. This data can be used for additional threat hunting and correlation by security teams inside Sentinel. The host data can be used to build out host asset inventory data for security teams inside the Sentinel platform as well to help with device discovery.
Try Sandfly Today
Cisco and Juniper device support is a critical new feature for many companies and we urge customers to check their edge devices for compromise as they are frequently targeted by nation-state attackers. Sandfly allows you to protect these devices simply and safely without endpoint agents. As always, Sandfly has free trials available for all license tiers. Please see below for more information:
Get Sandfly
Upgrading Sandfly
All customers are encouraged to upgrade to see our expanded coverage and protection options for Linux. We are here to help with any questions. Please see our documentation on the new features and capabilities:
Sandfly Documentation
Customers wishing to upgrade can follow the instructions here:
Upgrading Sandfly
If you have any questions, please reach out to us.
Thank you for using Sandfly.