Skip to content

Contextualize honeypot alerts automatically with GreyNoise, runZero, Thinkst Canary, and Tines

This is the very first post in our new runZero practitioner’s series. We’ve invited Justin Varner, who has been in the security industry for the past 17 years, to share his thoughts on the importance of asset inventory and how it can be leveraged alongside SOAR, threat intelligence, and detection technologies. He is currently part of the Thinkst Canary Partner Program and is an active speaker on the security conference circuit.

Better Use of Your Tines: How to map Canary alerts to assets in runZero

As a Principal Solutions Architect, my job is to improve security programs and recommend ways companies can improve their breach detection capabilities.

One of use cases that comes up quite often is reducing operational overhead on incident response teams. These teams are usually overwhelmed with the number of alerts they’re getting and spend a ton of time chasing down false positives. In my role, I am constantly look for new ways to approach breach detection, and breaking away from the traditional paradigm of finding needles in a haystack. I often think about how teams can leverage automation to triage alerts more effectively and focus on the issues that are really going to impact them. How can I take a process, that is usually complex and manual, and streamline it so teams can stay on top of emerging threats?

There are an incredible number of tools out there that are in position to help teams who want to save time, and zero in on the critical issues affecting them. Some of these tools are changing the game in the asset inventory, threat intelligence, SOAR (security, orchestration, automation, and response), and detection technology space. Based on my experience using these tools, I am going to share how you can use Tines, a SOAR platform, to automate sending alerts generated by Thinkst Canary to GreyNoise for context. Then, extracting the metadata used by Greynoise to tag runZero assets, so that you can continuously maintain a comprehensive inventory with rich, full details.

Benefits of asset inventory and automation

Here are some of the reasons why these tools and this approach will help you:

  • Maintaining an accurate asset inventory is critical to managing your attack surface. As the old saying goes, “You can’t protect what you don’t know.” runZero excels at making sure you know what you need to protect. It’s the first product that can accurately identify assets and continuously update them in real-time.

  • Canary alerts are typically some of the most important alerts that your organization will receive. It’s imperative to quickly understand the full context of the alert to determine the severity of the threat (this is where GreyNoise comes in) and respond accordingly.

  • A variety of emerging threats loom every day that could directly impact your organization in a significant way. Solarwinds and Log4J are two recent examples of major threats that wrecked a multitude of organizations. If you happened to use GreyNoise and runZero back then, you had the benefit of the most current threat intelligence from GreyNoise coupled with the ability for runZero to dynamically check assets that were potentially vulnerable by searching for the Apache logging framework across your inventory.

  • Once you add Tines to the mix, you have the ability to stay on top of these emerging threats and respond swiftly to mitigate the potential impact to your organization. Tines is a powerful security automation platform, but you don’t need to understand advanced programming concepts to use it like most of the other SOAR products out there. This makes a previously complex task of integrating multiple services with disparate APIs easy with Tines.

Set up all the tools

The following walk-through shows how you can use Tines to automate sending alerts generated by Thinkst Canary to Greynoise to gather threat intelligence. Then, you’ll learn how to extract the metadata used by Greynoise to automatically tag runZero assets.

Let’s get everything ready.

Step 1: Create your Tines account

Start by creating a free Tines community account, which provides a generous allotment of resources.

Tines uses the concept of stories that consist of a variety of actions used to automate various routine tasks that people shouldn’t have to do. You have more important work to do. Let Tines handle the mundane and error prone tasks.

Learn more about Stories, Actions, and the other elements of Tines.

Step 2: Create your Thinkst Canary account

You’ll need a paid subscription to Thinkst Canary and the API must be enabled. Send an email to their amazing support team using support@canary.tools and they’ll get you sorted.

Step 3: Create a resource for Thinkst Canary in Tines

In your Canary console, navigate to the API section under global settings to retrieve the domain hash and auth token. You’ll need to add these values to Tines in order to successfully run the story.

In Tines, create a resource named canary_tools_tenant_id with the value of your domain hash and a credential named canary_tools_api_key with the value of your auth token.

Step 4: Create your GreyNoise account

GreyNoise provides a community API for free, but this particular story requires the GreyNoise enterprise API due to the metadata that we need to extract from the assets. Find your API key. You can start a 30 day trial to obtain a temporary API key.

Step 5: Set up a credential for Greynoise in Tines

Create a credential in Tines named greynoise_api_key with the value of your Enterprise API key.

Step 6: Create a runZero account

And finally you’ll need a runZero Professional or Enterprise account. You can start a 21-day trial of runZero Enterprise for access to all the features runZero has to offer, including the necessary API access needed for this tutorial.

Step 7: Set up a credential for runZero in Tines

Go to the runZero console, generate an API token for your organization by navigating to Organizations. Click your organization name, scroll down to the API tokens sections, and click Generate API Key. Copy the API token.

Then, in Tines, create a credential named runzero_organization_api_key with the value of your organization’s API token from runZero.

Pull everything together with Tines

Now, everything is in place to construct a Tines story that will orchestrate sending IPs from Thinkst Canary alerts to GreyNoise for context and tagging, and then finally, to runZero to build your asset inventory.

The following story is available in the Tines Story Library. Here is what the story will look like:

Tines story

The story consists of the following events:

  • [WEBHOOK] – An incoming webhook receives events from Canary whenever an alert fires
  • [HTTP REQUEST] – The webhook activates a call to the Canary API to pull down the relevant incident details
  • [EVENT TRANSFORMATION] – The IP is deduplicated to prevent redundant events from triggering
  • [HTTP REQUEST] – The public IP is extracted from the Canary incident and sent to GreyNoise for context
  • [HTTP REQUEST] – Asset metadata from GreyNoise is extracted and sent to runZero
  • [HTTP REQUEST] – runZero updates the tags associated with the asset based on the classification field reported by GreyNoise.

If the asset has not been seen in the wild then no tag is added. You can optionally send these alerts to a third-party endpoint of your choice like Slack or Jira.

Test this story by generating a web bug token and then pasting the URL in your browser and hit enter. The Canary alert will look similar to the following:

Canary trigger

And now we see the corresponding asset in runZero added and tagged with the data from Greynoise. Now, you’ve automatically added data from Greynoise into runZero, all orchestrated by Tines. Next time an alert triggers for this asset, your runZero inventory will automatically be updated. Automation FTW!

runZero asset

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About runZero
runZero, a network discovery and asset inventory solution, was founded in 2018 by HD Moore, the creator of Metasploit. HD envisioned a modern active discovery solution that could find and identify everything on a network–without credentials. As a security researcher and penetration tester, he often employed benign ways to get information leaks and piece them together to build device profiles. Eventually, this work led him to leverage applied research and the discovery techniques developed for security and penetration testing to create runZero.

Celebrating 30 years of continuous progress and innovation

“Nothing is as constant as change,” as the saying goes. It is therefore all the more remarkable when companies today operate successfully on the market for many decades. And this happens even more rarely in the IT industry, which feels like it is in a permanent a state of transformation. Many famous brands and products from the early days of the Internet have since disappeared. Not ESET. The company from Bratislava, Slovakia, has skillfully and innovatively maneuvered through the storms of the digital sea. In the process, the security manufacturer grew continuously from year to year. We take a look back at the milestones in ESET’s history.

35 years ago: The first antivirus software
Did you know that the founding of ESET is closely linked to the name Vienna? However, despite the city’s  proximity to ESET headquarters in Bratislava, the connection between the two is more digital in nature.

At the beginning of ESET’s corporate history in 1987, the Iron Curtain separated Austria from what is now Slovakia, where the antivirus manufacturer was founded and still has its headquarters. At that time, young programmers Peter Paško and Miroslav Trnka discovered one of the first computer viruses, a member of the Vienna family – at the Bohunice nuclear power plant. The two programmers then wrote a program to detect it. This laid the foundation for the NOD antivirus product line. Incidentally, the acronym NOD stands for “Nemocnica na Okraji Disku”, translated as “The Hospital on the Edge of the Disk”, which is an allusion to the then popular Czechoslovakian hospital series “The Hospital on the Edge of Town”. Speaking of allusions: The company name is no accident either, but refers to the Egyptian spelling of the goddess Isis.

But before ESET became ESET, a few more years passed and brought political changes. Although NOD was a very advanced program for the time, when computer viruses were largely harmless gimmicks and could only spread to a limited extent via physical media such as floppy disks without the Internet, distribution was limited at the beginning. The company headquarters was a private garage, where the floppy disks were formatted and packaged. Social and economic changes took hold in 1990, when NOD was sold in Austria for the first time. However, under the name Stopvir.

30 years ago: Founding of the ESET company
In 1992, ESET was founded in Bratislava, then still part of the former Czechoslovakia. And in 1995, the first retail version of NOD32, called NOD iCE, was launched.

With Slovakia joining the European Union in 2004, ESET also became the European company as it has always felt itself to be. The clear commitment to European values and the General Data Protection Regulation (GDPR), as well as the written guarantee to refrain from backdoors of any kind, gives today’s customers peace of mind more than ever.

Present
Today, ESET is better and bigger than ever before. Well over 2,000 employees now work for ESET worldwide: at the headquarters in Bratislava, in the 30 regional offices and branches, and at its 13 globally distributed research and development centers. In 2021, the company once again achieved record sales and is heading for new highs in 2022. The portfolio now includes around 60 different products and caters to the needs of private customers, businesses of all sizes and government and non-governmental organizations. The company has long since evolved from a pure antivirus manufacturer into a broad-based IT security solutions provider, and is now considered the largest and most successful provider in the European Union.

With the construction of the ESET Campus in Bratislava, the company founders continue forward with their vision. Built sustainably, working with the future in mind: the new headquarters will serve as a center for technology and innovation. The site covers a total of 55,000 m², with the designed work supplied by the world-renowned architectural firm BIG-Bjarke Ingels Group.

Follow our Progress, stay Protected.

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

New Insights into GhostSec Attacks on Iran’s Infrastructure

Multiple factions of the hacker group known as “Anonymous” have banded together to carry out coordinated cyber attacks targeting Iran as retaliation for the deaths of multiple young women in Iran who were protesting the circumstances surrounding the death of Mahsa Amini.

Continue reading