{"id":103626,"date":"2019-12-11T06:00:46","date_gmt":"2019-12-11T14:00:46","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=103626"},"modified":"2020-03-12T14:36:02","modified_gmt":"2020-03-12T21:36:02","slug":"cortex-busted-by-xdr","status":"publish","type":"post","link":"https:\/\/www2.paloaltonetworks.com\/blog\/2019\/12\/cortex-busted-by-xdr\/","title":{"rendered":"Busted by Cortex XDR: AI Catches Former Employee Using Backdoor"},"content":{"rendered":"<p><b>This is based on a true story. \u201cFred\u201d <\/b><b>did not depart from his employer with good intent: For years, he kept coming back and exfiltrating the company\u2019s intellectual property. The moment of truth came four years later, when the company deployed Cortex XDR.<\/b><\/p>\n<p><img loading=\"lazy\" decoding=\"async\"  class=\"alignleft wp-image-103973 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2019\/12\/XDR.jpg\" alt=\"A conceptual illustration of how Cortex XDR by Palo Alto Networks can help companies identify insider threats.\" width=\"576\" height=\"290\" srcset=\"https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2019\/12\/XDR.jpg 1999w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2019\/12\/XDR-230x116.jpg 230w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2019\/12\/XDR-500x252.jpg 500w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2019\/12\/XDR-768x387.jpg 768w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2019\/12\/XDR-1536x775.jpg 1536w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2019\/12\/XDR-510x257.jpg 510w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2019\/12\/XDR-79x40.jpg 79w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2019\/12\/XDR-595x300.jpg 595w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2019\/12\/XDR-874x441.jpg 874w\" sizes=\"auto, (max-width: 576px) 100vw, 576px\" \/><\/p>\n<p><span style=\"font-weight: 400;\">An IT admin for a large multinational American corporation, Fred had been let go four years prior. Knowing the IT group inside and out, he suspected that his ex-colleagues forgot to disable his VPN account. To test it, he used his VPN credentials from his private computer and surprise: He successfully logged in!<\/span><\/p>\n<p><span style=\"font-weight: 400;\">He knew his company\u2019s network very well. He also knew what he was looking for and where to find it. So, for the next four years, he kept coming back to exfiltrate the latest source code from the company\u2019s Git repositories.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><span style=\"font-weight: 400;\">Moving from VPN to Source Repositories via an SSH Tunnel<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Logging in through VPN, he gained access to the VPN subnet. He now needed to get into a different subnet to access the Git repositories with the latest source code. He knew that an old Windows PC used for testing was still running and could provide a way to get there. Fred accessed the workstation with Microsoft\u2019s Remote Desktop and set up a PuTTY SSH tunnel to the Git server. He could now pass Git traffic from one subnet to another using the Windows PC as a proxy. He started to exfiltrate source code from the protected subnet, back to a server he\u2019d set up on the internet.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><span style=\"font-weight: 400;\">AI Wakes Up<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">When <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2019\/11\/cortex-announcing-cortex-xdr-2\/\">Cortex XDR\u2019s<\/a> machine learning (ML) engine was deployed, it was trained on network, cloud and endpoint events for a period of time to establish a baseline and identify the behavioral limits beyond which an alert is raised.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">As soon as this initial training period was over, Cortex XDR\u2019s analytics confidently identified the uncommon tunneling process, declaring that the tunneling and RDP processes were abnormal behavior patterns on this network. Even though this behavior had been happening over the past four years, it was still recognized as suspicious: Cortex XDR\u2019s analytics not only compared behavior with past trends of the same entity but also to its peer group (in this case, other workstations).<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><span style=\"font-weight: 400;\">Our Obsession with Data Leads to Fewer Alerts for the SOC<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Cortex XDR also noted that the PC tunneling data between the internal network and a host on the internet was an unmanaged device (i.e., no Traps agent).<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Machine learning starts with rich context. Our data science team\u2019s perspective on the topic is:\u00a0<\/span><\/p>\n<p><i><span style=\"font-weight: 400;\">\u201cIf we don\u2019t have enough data for analysis, we run the extra mile to collect it.\u201d<\/span><\/i><\/p>\n<p><span style=\"font-weight: 400;\">So, instead of alerting the SOC team prematurely at this point, Cortex XDR dispatched Pathfinder, its lightweight user-mode agent, to collect more data on the workstation and complete the partial analysis cycle. Not having an agent on the server isn\u2019t enough of an excuse to raise a half-baked alert and overload the SOC team with partial results, generating extra manual investigation tasks.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Pathfinder swiftly arrived, deployed and performed its data collection on the workstation. It took a snapshot of all running processes, all active incoming and outgoing network sessions, users logged in to the computer and uncommon domains in communication. As it collected data, it streamed the results to <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2019\/09\/cortex-data-lake\/\">Cortex Data Lake<\/a> for Cortex XDR to finish up its analysis. It didn't take long for the ML engine to raise the flag:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Local process socket usage information showed both internal and external (proxy) open sockets to an uncommon domain.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">This proxy detection model compared the process initiating the VPN connection, the tunneling behavior, the destination IP address and over 10 other factors with the rest of the organization, and found the behavior to be suspicious. It was now apparent that the organization was facing a threat.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Cortex XDR issued an alert to the SOC, accompanied by all important details to explain what had been happening.<\/span><\/li>\n<\/ul>\n<p><img loading=\"lazy\" decoding=\"async\"  class=\"alignleft size-full wp-image-103986 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2019\/12\/image1.png\" alt=\"This screenshot shows Cortex XDR by Palo Alto Networks\" width=\"1999\" height=\"697\" srcset=\"https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2019\/12\/image1.png 1999w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2019\/12\/image1-230x80.png 230w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2019\/12\/image1-500x174.png 500w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2019\/12\/image1-768x268.png 768w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2019\/12\/image1-1536x536.png 1536w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2019\/12\/image1-510x178.png 510w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2019\/12\/image1-115x40.png 115w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2019\/12\/image1-650x227.png 650w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2019\/12\/image1-874x305.png 874w\" sizes=\"auto, (max-width: 1999px) 100vw, 1999px\" \/><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">We heard this story shortly after the organization\u2019s SOC received the first alert from their brand-new Cortex XDR proof-of-concept. <\/span><span style=\"font-weight: 400;\">And that is how this article was born.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><span style=\"font-weight: 400;\">ML and Holistic Thinking Wins<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Beyond displaying Cortex XDR's ML models that adapt to each customer\u2019s environment, this story emphasizes how crucial rich data collection is across the network and endpoint. Cortex XDR\u2019s obsession with collecting missing data, combined with its holistic approach of stitching network and endpoint events together for rich context, results in better detection and deeper insight as well as ensures that our customers only see the alerts that matter.<\/span><\/p>\n<p><b>The Cortex Data Science team's pledge to reduce your alert fatigue keeps driving us to create a world where each day is safer and more secure than the one before. Learn more about <\/b><a href=\"https:\/\/www.paloaltonetworks.com\/cortex\/cortex-xdr\"><b>Cortex XDR<\/b><\/a><b>.<\/b><\/p>\n<p><i><span style=\"font-weight: 400;\">Read more stories in the <\/span><\/i><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/tag\/ai-stories\/\"><i><span style=\"font-weight: 400;\">Busted by Cortex XDR<\/span><\/i><\/a><i><span style=\"font-weight: 400;\"> series.<\/span><\/i><\/p>\n","protected":false},"excerpt":{"rendered":"<p>For years, \u201cFred\u201d exfiltrated his former employer\u2019s intellectual property. The moment of truth came when the company deployed Cortex XDR.<\/p>\n","protected":false},"author":663,"featured_media":103973,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[6770],"tags":[6900,3898,6737,4321],"coauthors":[6848],"class_list":["post-103626","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-secure-the-future","tag-ai-stories","tag-artificial-intelligence","tag-cortex-xdr","tag-machine-learning"],"jetpack_featured_media_url":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2019\/12\/XDR.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/103626","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/663"}],"replies":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=103626"}],"version-history":[{"count":9,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/103626\/revisions"}],"predecessor-version":[{"id":107779,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/103626\/revisions\/107779"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/103973"}],"wp:attachment":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=103626"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=103626"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=103626"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=103626"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}