Microsoft Sentinel Analytic Rules
cloudbrothers.infoAzure Sentinel RepoToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeBack to homepage

Cyble Vision Alerts Hacktivism

Back
Id6649e5a0-0365-452f-84b3-448a0aec7a59
RulenameCyble Vision Alerts Hacktivism
DescriptionDetects hacktivist activity (Telegram posts, defacements, site takedowns, etc.) using the Alerts_Hacktivism parser. Extracts post content, attacker/team,domains, links, IPs, media and metadata for triage.
SeverityLow
TacticsReconnaissance
Impact
ResourceDevelopment
TechniquesT1595
T1491
T1498
T1585
Required data connectorsCybleVisionAlerts
KindScheduled
Query frequency30m
Query period30m
Trigger threshold0
Trigger operatorGreaterThan
Source Urihttps://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Cyble Vision/Analytic Rules/Alerts_hacktivism.yaml
Version1.0.0
Arm template6649e5a0-0365-452f-84b3-448a0aec7a59.json
Deploy To Azure
Alerts_hacktivism 
| where Service contains "hacktivism" 
| extend Mappedseverity = Severity
name: Cyble Vision Alerts Hacktivism
alertDetailsOverride:
  alertDynamicProperties: []
  alertDisplayNameFormat: CybleVision Hacktivism {{HK_ChannelName}} / {{HK_AttackerTeam}}
  alertDescriptionFormat: |
        Hacktivism activity detected. Attacker/Team {{HK_AttackerTeam}} Post excerpt {{HK_PostData}} Domains/Links {{HK_All_Domains}}
query: |
  Alerts_hacktivism 
  | where Service contains "hacktivism" 
  | extend Mappedseverity = Severity  
id: 6649e5a0-0365-452f-84b3-448a0aec7a59
enabled: true
entityMappings:
- fieldMappings:
  - columnName: HK_AttackerTeam
    identifier: Name
  entityType: Account
- fieldMappings:
  - columnName: HK_All_URLs
    identifier: Url
  entityType: URL
- fieldMappings:
  - columnName: HK_All_Domains
    identifier: DomainName
  entityType: DNS
- fieldMappings:
  - columnName: HK_IP
    identifier: Address
  entityType: IP
version: 1.0.0
triggerOperator: GreaterThan
suppressionDuration: PT5H
description: |
    'Detects hacktivist activity (Telegram posts, defacements, site takedowns, etc.) using the Alerts_Hacktivism parser. Extracts post content, attacker/team,domains, links, IPs, media and metadata for triage.'
kind: Scheduled
queryFrequency: 30m
triggerThreshold: 0
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Cyble Vision/Analytic Rules/Alerts_hacktivism.yaml
severity: Low
incidentConfiguration:
  createIncident: true
  groupingConfiguration:
    lookbackDuration: PT5H
    reopenClosedIncident: false
    matchingMethod: AllEntities
    enabled: false
subTechniques: []
queryPeriod: 30m
requiredDataConnectors:
- dataTypes:
  - CybleVisionAlerts_CL
  connectorId: CybleVisionAlerts
status: Available
customDetails:
  ChannelName: HK_ChannelName
  MappedSeverity: Severity
  ChannelLink: HK_ChannelLink
  PostID: HK_PostID
  Tags: HK_Tags
  WebsiteURL: HK_WebsiteURL
  SourceWebsite: HK_SourceWebsite
  Emails: HK_Emails
  AlertID: AlertID
  Service: Service
  PostText: HK_PostData
  Phones: HK_Phones
  PostedAt: HK_PostedAt
  Attacker: HK_Attacker
  Source: HK_SourceWebsite
  Status: Status
  Server: HK_Server
  TargetDomain: HK_Domain
eventGroupingSettings:
  aggregationKind: AlertPerResult
relevantTechniques:
- T1595
- T1491
- T1498
- T1585
tactics:
- Reconnaissance
- Impact
- ResourceDevelopment