Microsoft Sentinel Analytic Rules
cloudbrothers.infoAzure Sentinel RepoToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeBack to homepage

Cyble Vision Alerts Darkweb Ransomware Leak

Back
Id6deaf986-a25b-47b4-afbe-667901aa313b
RulenameCyble Vision Alerts Darkweb Ransomware Leak
DescriptionA ransomware threat actor has posted victim data on the dark web. This alert includes leaked documents, threat actor name, victim organization, timestamps, and extracted text content for SOC triage.
SeverityLow
TacticsImpact
Exfiltration
Reconnaissance
TechniquesT1486
T1657
Required data connectorsCybleVisionAlerts
KindScheduled
Query frequency30m
Query period30m
Trigger threshold0
Trigger operatorGreaterThan
Source Urihttps://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Cyble Vision/Analytic Rules/Alerts_darkweb_ransomware_rule.yaml
Version1.0.0
Arm template6deaf986-a25b-47b4-afbe-667901aa313b.json
Deploy To Azure
Alerts_darkweb_ransomware
| where Service == "darkweb_ransomware"
| extend MappedSeverity = Severity
name: Cyble Vision Alerts Darkweb Ransomware Leak
alertDetailsOverride:
  alertDisplayNameFormat: Darkweb Ransomware Leak {{Victim}} by {{ThreatActor}}
  alertDescriptionFormat: |
    A ransomware group has posted data belonging on the dark web. A document leak has been detected, including text extracted from the file.
    **Victim:** {{Victim}}
    **Threat Actor:** {{ThreatActor}}
    **Leaked File:** {{FileName}}    
id: 6deaf986-a25b-47b4-afbe-667901aa313b
enabled: true
entityMappings:
- fieldMappings:
  - columnName: DW_Victim_Nested
    identifier: Name
  - columnName: DW_ThreatActor_Nested
    identifier: FullName
  entityType: Account
version: 1.0.0
triggerOperator: GreaterThan
query: |
  Alerts_darkweb_ransomware
  | where Service == "darkweb_ransomware"
  | extend MappedSeverity = Severity  
description: |
    'A ransomware threat actor has posted victim data on the dark web. This alert includes leaked documents, threat actor name, victim organization, timestamps, and extracted text content for SOC triage.'
kind: Scheduled
queryfrequency: 30m
triggerThreshold: 0
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Cyble Vision/Analytic Rules/Alerts_darkweb_ransomware_rule.yaml
severity: Low
incidentConfiguration:
  createIncident: true
  groupingConfiguration:
    lookbackDuration: PT5H
    reopenClosedIncident: false
    matchingMethod: AllEntities
    enabled: false
queryPeriod: 30m
requiredDataConnectors:
- dataTypes:
  - CybleVisionAlerts_CL
  connectorId: CybleVisionAlerts
status: Available
customDetails:
  FileName: DW_FileName
  MappedSeverity: Severity
  CompanyLeak: DW_CompanyLeak
  OriginalFileName: DW_OriginalFileName
  AlertID: AlertID
  Service: Service
  DocumentYear: DW_DocumentYear
  ContentText: DW_Text
  ThreatActor: DW_ThreatActor_Nested
  Victim: DW_Victim_Nested
  Status: Status
  UpdatedDate: DW_UpdatedDate_Nested
eventGroupingSettings:
  aggregationKind: AlertPerResult
relevantTechniques:
- T1486
- T1657
tactics:
- Impact
- Exfiltration
- Reconnaissance