Skip to content
Threat Feed
medium advisory

CrowdStrike Agentic MDR and SOC Transformation Services

CrowdStrike introduces agentic MDR and SOC Transformation Services to enhance breach prevention through machine-speed execution and expert oversight, while SOC Transformation Services aim to modernize security operations by focusing on SIEM, data pipelines, workflows, talent models, and governance.

CrowdStrike has announced agentic MDR and SOC Transformation Services to improve the effectiveness of security operations centers (SOCs). The agentic MDR solution is designed to leverage machine-speed execution with expert accountability to stop breaches more efficiently. This involves combining deterministic automation with expert-defined guardrails, adaptive AI agents, and human oversight to ensure rapid and precise responses to threats. SOC Transformation Services aim to modernize the foundational aspects of SOC operations, including SIEM systems, data pipelines, workflows, talent models, and governance frameworks. These services are designed to help organizations establish the necessary operating conditions for agentic SOC operations, enabling them to evolve their security practices safely and deliberately. This addresses the challenge organizations face in scaling agentic security due to a lack of clean data foundations, modern workflows, and governance structures.

Attack Chain

Given the nature of this announcement focusing on services rather than specific attacks, the following represents a generalized attack chain that CrowdStrike’s Agentic MDR and SOC Transformation Services aim to disrupt and mitigate.

  1. Initial Access: An attacker gains initial access to a system or network through various means, such as phishing, exploiting vulnerabilities, or using stolen credentials.
  2. Execution: The attacker executes malicious code on the compromised system, often using scripting languages like PowerShell or Python.
  3. Persistence: The attacker establishes persistence mechanisms to maintain access to the system, such as creating scheduled tasks or modifying registry keys.
  4. Privilege Escalation: The attacker attempts to escalate privileges to gain higher-level access to the system and network.
  5. Lateral Movement: The attacker moves laterally within the network, compromising additional systems and expanding their control.
  6. Data Exfiltration: The attacker identifies and exfiltrates sensitive data from the compromised systems to an external location.
  7. Impact: The attacker achieves their final objective, which could include data theft, ransomware deployment, or disruption of services.

Impact

The potential impact of successful attacks on organizations without adequate security measures can be significant. This includes data breaches, financial losses, reputational damage, and disruption of critical services. Organizations lacking modern security operations capabilities may struggle to detect and respond to advanced threats, leading to prolonged incidents and increased damage. CrowdStrike’s agentic MDR and SOC Transformation Services aim to mitigate these risks by providing faster detection, automated response, and expert guidance to improve overall security posture.

Recommendation

  • Evaluate your current SIEM and logging architecture and create a migration plan to a modern SIEM solution like CrowdStrike Falcon Next-Gen SIEM, focusing on log source onboarding, parsing, normalization, and retention strategy.
  • Redesign your triage, escalation, containment, and recovery workflows to align with your team structure, staffing model, and business risk tolerance, as described in the “SOC Transformation Services” section.
  • Prioritize the development and deployment of detection rules and automation, incorporating AI use case development and guardrails for safe response actions, leveraging the capabilities outlined in the “SOC Transformation Services” section.

Detection coverage 2

Detect PowerShell Execution via Command Line

medium

Detects PowerShell execution via command line, commonly used by attackers for various malicious activities.

sigma tactics: execution techniques: T1059.001 sources: process_creation, windows

Detect Persistence via Scheduled Task Creation

medium

Detects the creation of scheduled tasks, which can be used by attackers to establish persistence.

sigma tactics: persistence techniques: T1053.005 sources: process_creation, windows

Detection queries are kept inside the platform. Get full rules →