SOC Prime Risk Bounty —  November 2022 Outcomes | Ways Tech

PROJECT NEWS  > News >  SOC Prime Risk Bounty —  November 2022 Outcomes | Ways Tech

roughly SOC Prime Risk Bounty —  November 2022 Outcomes will cowl the newest and most present suggestion occurring for the world. admittance slowly in consequence you comprehend with out problem and accurately. will addition your data easily and reliably

November ’22 Posts

Over the previous month, members of the Risk Bounty group have submitted 433 guidelines for publication on the SOC Prime platform. A number of guidelines have been mechanically rejected on the automated checks stage because of construction, syntax, logic, or content material duplication errors and weren’t submitted for evaluate by SOC Prime consultants. In November, 123 detections handed the SOC Prime evaluate and have been printed on the Platform for monetization.

Discover detections

For extra info on the frequent cause for publication rejection and the principle acceptance standards, see the SOC TOP THREAT BOUNTY: OCTOBER 2022 RESULTS.

To make sure that your content material qualifies for publication on the Platform by way of the Risk Bounty Program, we advocate that you simply analysis present content material on the SOC Prime Platform utilizing Lucene Question Search and take note of the naming guidelines, descriptions, and references to assets, and MITER ATT&CK® related labels. Please observe that Sigma guidelines which might be totally based mostly on alerts from different safety options aren’t accepted for publication by way of the Risk Bounty Program. Additionally, when creating the rule, it’s important that the authors make the modifications and enhancements advised by the automated verification based mostly on the options supplied.

Sigma Guidelines Bot for Risk Bounty

the Sigma Guidelines Roboticactively utilized by superior Risk Bounty content material builders, it’s formally launched to the Slack app listing. With the Sigma Guidelines Bot, members of the Risk Bounty group can create guidelines immediately in Slack, check them for frequent points, together with syntax errors and uniqueness of detection logic, and submit the foundations for evaluate by SOC Prime. Whereas the SOC Prime evaluate, which is a required step to publish guidelines on the Platform for monetization, SOC Prime consultants can now talk with the content material creator through the Slack Bot by opening a chat linked to a advised Sigma rule. particular.

Sigma Guidelines Bot offers a straightforward and seamless approach to improve and monetize detection engineering abilities by publishing distinctive risk detection Sigma guidelines on the SOC Prime platform. Watch the step-by-step information for extra particulars.

fundamental authors

Risk Bounty detections printed by these authors have been ranked highest on the Risk Detection Market:

Nattatorn Chuensangarun

osman demir

Sittikorn Sangrattanapitak

Kyaw Pyiyt Htet

emir erdoğan

The typical Risk Bounty payout for November is $1,647.

high rated content material

Suspicious operation of Black Basta Ransomware from FIN7 by detection of related occasions (through Registry_key) Kyaw Pyiyt Htet (Mik0yan) Risk Searching Sigma rule detects persistent registry execution keys utilized by FIN7’s Black Basta ransomware operation.

Potential preliminary entry by Text4Shell template injection [CVE-2022-42889] (through proxy) Kyaw Pyiyt Htet’s (Mik0yan) risk searching Sigma rule detects key phrases within the URI subject of HTTP requests which might be recognized for use to take advantage of the Text4Shell vulnerability. Watch the Article for extra info.

Potential Black-Basta assault [QakBot] (November 2022) Lateral motion exercise by related course of detection (through process_creation) The Zaw Min Htun (ZETA) Risk Searching Sigma rule detects the execution of the Cobalt Strike payload with the Black Basta rundll32.exe SetVolume instructions. The risk actor leveraging Qakbot and a probably widespread marketing campaign run by Black Basta operators.

Potential Toneshell backdoor persistence by detecting related scheduled duties (through process_creation) Aytek Aytemur’s Risk Searching Sigma Rule detects the suspicious creation of scheduled duties to determine persistence utilizing Toneshell Backdoor, which partnered with Earth Preta APT Group.

Potential Qbot malware gathering information by utilizing the OpenWith course of with Follina Exploit [CVE-2022-30190] (through process_creation) Nattatorn Chuensangarun’s Risk Searching Sigma Rule detects suspicious Qbot malware exercise by utilizing the OpenWith course of to gather information through Follina Exploit Vulnerability – CVE-2022-30190.

Code the trail to your confirmed cybersecurity experience with SOC Prime Risk Bounty Program and earn cash with your personal detection guidelines printed to the detection platform as code.

I hope the article virtually SOC Prime Risk Bounty —  November 2022 Outcomes provides perception to you and is beneficial for including as much as your data

SOC Prime Threat Bounty —  November 2022 Results