<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Security Onion Solutions — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/vendors/security-onion-solutions/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Sat, 26 Oct 2024 18:22:34 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/vendors/security-onion-solutions/feed.xml" rel="self" type="application/rss+xml"/><item><title>OpenCanary HTTPPROXY Login Attempt Detection</title><link>https://feed.craftedsignal.io/briefs/2024-10-opencanary-httpproxy/</link><pubDate>Sat, 26 Oct 2024 18:22:34 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-10-opencanary-httpproxy/</guid><description>Detection of attempted HTTP proxy use on an OpenCanary node, indicating potential reconnaissance or lateral movement by an attacker attempting to proxy another page.</description><content:encoded><![CDATA[<p>This threat brief focuses on detecting malicious attempts to use an OpenCanary node as an HTTP proxy. OpenCanary is a low-interaction honeypot designed to detect intruders on a network. An attacker attempting to use an OpenCanary node as an HTTP proxy is a strong indicator of reconnaissance or lateral movement, as they are attempting to route their traffic through the honeypot. This activity is logged by OpenCanary and can be detected with appropriate monitoring. The default configuration of OpenCanary includes an HTTPPROXY service that listens for proxy requests. Defenders should monitor OpenCanary logs for event ID 7001, which indicates an attempted HTTP proxy login.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains initial access to a network (e.g., through phishing or exploiting a vulnerability).</li>
<li>Attacker performs network reconnaissance to identify potential targets, including the OpenCanary node.</li>
<li>Attacker attempts to configure their system or tools to use the OpenCanary node as an HTTP proxy.</li>
<li>The attacker sends HTTP requests through the configured proxy, attempting to reach other systems on the network.</li>
<li>OpenCanary logs the attempted proxy connection with event ID 7001.</li>
<li>The defender detects the suspicious HTTP proxy attempt in the OpenCanary logs.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful HTTP proxy attempt indicates that an attacker is actively exploring the network and attempting to move laterally. This could lead to further compromise of sensitive systems and data exfiltration. While the OpenCanary node itself is a honeypot and not a production asset, the detection of proxy attempts signals a breach and ongoing malicious activity within the network.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule <code>OpenCanary HTTPPROXY Login Attempt</code> to your SIEM and tune for your environment to detect unauthorized proxy attempts on OpenCanary nodes.</li>
<li>Investigate any alerts generated by the Sigma rule to determine the source and target of the attempted proxy connection.</li>
<li>Review OpenCanary configuration to ensure that the HTTPPROXY service is properly configured and secured.</li>
<li>Implement network segmentation to limit the impact of potential lateral movement by attackers.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>opencanary</category><category>honeypot</category><category>httpproxy</category><category>lateral-movement</category></item></channel></rss>