FireEye Mandiant SunBurst Countermeasures Logo

FireEye Mandiant SunBurst Countermeasures

0
Free
Visit Website

These rules are provided freely to the community without warranty. In this GitHub repository you will find rules in multiple languages: Snort Yara IOC ClamAV The rules are categorized and labeled into two release states: Production: rules that are expected to perform with minimal tuning. Supplemental: rules that are known to require further environment-specific tuning and tweaking to perform, and are often used for hunting workflows. Please check back to this GitHub for updates to these rules. FireEye customers can refer to the FireEye Community (community.fireeye.com) for information on how FireEye products detect these threats. The entire risk as to quality and performance of these rules is with the users. Please review the FireEye blog for additional details on this threat. Please note: COSMICGALE and SUPERNOVA signatures and indicators are confirmed to detect malicious files and activity, however they have not been directly associated with the current UNC2452 Solarwinds compromise. The entire risk as to quality and performance of these rules is with the users. Please review the FireEye blog for additional details on this threat. Please note: COSMICGALE and SUPERNOVA signatures and indicators are confirmed to detect malicious files and activity, however they have not been directly associated with the current UNC2452 Solarwinds compromise.

FEATURES

ALTERNATIVES

Automated framework for collecting and processing samples from VirusTotal with YARA rule integration.

A library of event-based analytics written in EQL to detect adversary behaviors, now integrated into the Detection Engine of Kibana.

Home for rules used by Elastic Security with code for unit testing, Kibana integration, and Red Team Automation.

A modular tool for collecting intelligence sources for files and outputting in CSV format.

A tool for identifying potential security threats by fetching known URLs and filtering out URLs with open redirection or SSRF parameters.

A set of configuration files to use with EclecticIQ's OpenTAXII implementation for MISP integration.

A collection of companies that disclose adversary TTPs after being breached, useful for analysis of intrusions.

Real-time, container-based file scanning system for threat hunting and incident response.

PINNED