This query can support monitoring for supply chain risk or companies of interest being present on ransowmare data leak sites (DLS) sites
Technique ID | Title | Link |
---|---|---|
T1486 | Data Encrypted for Impact | https://attack.mitre.org/techniques/T1486/ |
T1657 | Financial Theft | https://attack.mitre.org/techniques/T1657 |
This allows you to monitor the ransomware.live dataset for possible companies of interest being breached and posted by ransomware groups on data leak sites (DLS).
Relevant third parties, suppliers, or clients could be compromised and present an indiretc or direct risk to your organisation.
- Name: Gavin Knapp
- Github: https://github.com/m4nbat
- Twitter: https://twitter.com/knappresearchlb
- LinkedIn: https://www.linkedin.com/in/grjk83/
- Website:
//basic KQL to query recentvictims API
let victims = externaldata(country:string,
activity:string,
description:string,
discovered:string,
group_name:string,
post_title:string,
post_url:string,
published:string,
screenshot:string,
website:string,
infostealer:dynamic)
[h@"https://api.ransomware.live/recentvictims"]
with(format="multijson",ignoreFirstRecord=false);
victims
//query to detect possible third party compromise via leak site data
let clientkeyword = datatable(name:string)["client1","client2","client3","axip","elutia"]; //add clients
let supplierkeyword = datatable(supplier:string)["supplier1","supplier2","supplier3","merchant.id"]; //add suppliers
let thirdpartykeyword = datatable(supplier:string)["thirdparty1","thunderbirdcc"]; //add third parties
let victims = externaldata(country:string,
description:string,
Country:string,
discovered:string,
discovered:datetime,
group_name:string,
post_title:string,
post_url:string,
published:string,
published:datetime,
screenshot:string,
website:string)
website:string,
infostealer:dynamic)
[h@"https://api.ransomware.live/recentvictims"]
with(format="multijson",ignoreFirstRecord=false);
victims
| where post_title has_any (clientkeyword) or post_title has_any (supplierkeyword) or post_title has_any (thirdpartykeyword)
//Query to bring back all victims data from ransomware.live
let all_victims = externaldata(["date"]:datetime,
victim:string,
domain:string,
country:string,
summary:string,
title:string,
url:string,
added:datetime)
[h@"https://api.ransomware.live/allcyberattacks"]
with(format="multijson",ignoreFirstRecord=false);
all_victims
//Query to bring back all victims data from ransomware.live
let all_victims = externaldata(["date"]:datetime,
victim:string,
domain:string,
country:string,
summary:string,
title:string,
url:string,
added:datetime)
[h@"https://api.ransomware.live/allcyberattacks"]
with(format="multijson",ignoreFirstRecord=false);
all_victims
// Query group information
let groups = externaldata(
name: string,
captcha: bool,
javascript_render: string,
parser: bool,
profile: dynamic,
locations: dynamic,
meta: string,)
[h@"https://api.ransomware.live/groups"]
with(format="multijson", ignoreFirstRecord=false);
groups
| where name contains "abyss"
| mv-expand locations
| project name, locations.["title"], locations.available, locations.fqdn, ["url"]=locations.slug, locations.updated, locations.version, profile