September 4 2013. The dashboard now has several additional daily summaries of the events generated by your sensors. You can click on any of the entries to see the details.
Category: Product Updates
Time Zones and Assets
August 30 2013. We released two new features.
1. Assets. From the Historical menu you can open the Assets page, which lists all assets on your network by host. You can search all assets by string or regex queries, filter records with no data for specific columns (check the checkbox in the column’s header), and export all asset data in CSV, XML, and JSON formats (Adobe Flash 10 or higher required).
2. Time Zones. We have added a new option in the Account->Preferences menu to set your preferred timezone by location, rather than using UTC by default. Note that the events will still be stored as Unix timestamps (UTC), but all time strings on NSM will use your selected time zone.
AutoUpdate
June 14 2013. We have added a new option to automatically download and restart software components that need an update. The autoupdate has been designed to minimize loss of security event data while it is being applied. If you want this feature (we highly recommend it), edit your sensor configuration(s) and click on Autoupdate, Save, and reload your sensor.
Mandiant Report Sensor Update
Last week, Mandiant published a report identifying a working group executing sophisticated, long-term attacks against targets in the United States. If you want to see if your network is the target of such attacks, follow the instructions below to update your sensor(s).
Add Packet Stash’s FQDN Snort Rules
APT-1 uses at least 3,000 known FQDNs (Fully Qualified Domain Names) to deliver its payloads (see the Mandiant report for more details on how APT-1’s backdoor software works). Packet Stash quickly followed up on the Mandiant data release with a ruleset containing the FQDNs used in these attacks, and then released this ruleset under the GNU General Public License. These rules are a good first step for identifying known APT-1 attack vectors.
To merge the Packet Stash APT-1 FQDN Rules into your ruleset, do the following steps
- Download the PacketStash ruleset from https://github.com/packetstash/packetstash-rules/blob/master/APT1/apt1.rules.
- Log in on https://nsm.metaflows.com. Click on the Rules item on the top menu. If you have multiple sensors in your domain, you will be asked to select the sensor you want to modify.
- Click on Merge Rules in the middle of the secondary menu for the Rules page.
- Select the file with the rules you saved in Step 1.
- After the rules file finishes uploading, click on the “Save” button on the secondary menu for the Rules page. When the rules finish saving, click the “Close” button.
- The Rules page will reload. After the page reloads, a text panel will appear in the upper-right corner with the buttons “Reload” and “Not Now”. Clicking “Reload” will make the sensor software restart and reload the new Snort Rules. Clicking “Not Now” will cause the sensor to not reload.
Add the MetaFlows APT-1 IP Addresses Classification
APT-1 also uses a known range of IP addresses comprising at least 40 Class B networks (see Table 8 on page 40 of the Mandiant report for the list). One other step MetaFlows customers can take to identify potential APT-1 attack vectors is to leverage our existing Classification tools to identify flows to or from the addresses in these networks. To do this, do the following steps:
- Log in to your MetaFlows account at https://nsm.metaflows.com.
- After you log in, download the APT-1 IP Addresses classification file.
- Enter the Real Time or Historical view. Click on the Classifications icon on the bottom menu bar. This will open the classifications list. Click the Classification Import icon at the top of this window. Select the apt1ips.json classification file you downloaded in Step 2.
- Once the classification file is uploaded, the Edit Classification window will open. You can modify the classification further with other markers available from Mandiant, or you can just click “Save Classification” at the top of the page to use the classification as-is. The classification will be imported into your existing classifications and you can start using it to identify any addresses from the known APT-1 networks by filtering Real Time and Historical data with the classification, which will be listed under the Mandiant APT-1 classification category.
We have discovered several APT-1 hosts acting on our global network of honeypots with this classification, so it is feasible that our customers could be experiencing attacks involving these addresses as well. If you have any comments, questions, or suggestions, please contact us at support@metaflows.com.
Mandiant APT1 Rules
How to add Mandiant Rules to your sensors
- Go to https://github.com/packetstash/packetstash-rules/blob/master/APT1/apt1.rules and save the rules on your desktop
- Login into nsm.metaflows.com. Click on Rules on the top menu, then click on Merge Rules in the middle of the top menu.
- Upload the rules you saved in step 1
- Click on Save Rules
- Click Ok
- Click on restart sensor
Real Time File Transmission Analysis
We can now reassemble interesting files being transmitted on your network (both inbound and outbound) on ports 25,80,110 and port 143. These are the ports through which most Malware is propagated with Browser-Based Attacks, Phishing, or Email Spam.
Real Time File transmission Logging
By default, all dangerous file transmissions (exe, dll, MS Office, pdf, zip, etc.) are logged and correlated whether or not they are malicious. This allows you to see what content your users are downloading or uploading (these informational messages can be disabled if this is too much information for you). See the screenshot below where several file transfers are logged.

Real Time File Scanning
Importantly, the files that contain malicious code as reported by Virus Total are ranked 100 and flagged as high-priority events for your analysis. Usually, any of these events need to be taken very seriously and appropriate remediation should be taken quickly. See the screenshot below where Snort events and File-inbound events are correlated to show you an ongoing infection.

In order to access this great new feature:
- Go to your Sensor Configuration page
- Enable the File Monitoring plugin by clicking on the check box labeled “File Monitoring” toward the bottom of the page
- Enter an optional Virus Total Key (if you do not have one, we highly recommend registering with Virus Total and obtaining a free key at https://www.virustotal.com/)
- Save the sensor configuration
- Execute /nsm/etc/mss.sh restart on your sensor
BotHunter 1.7 Update
We’ve updated BotHunter to the latest version from the SRI Malware Threat Center. This new version has an updated rule set to help catch the latest threats as well as improved detection of false positives that are often associated with Peer-to-Peer and file-sharing traffic.
Current customers will receive this update automatically when their sensor is restarted/reloaded, and it will be bundled into the installation package for all new deployments.
MetaFlows Is Now on AWS Marketplace
You can now deploy MetaFlows sensors on Amazon EC2 though the new AWS Marketplace. It is extremely easy to setup and you will be billed hourly as part of your EC2 instance subscription. You can use your existing MetaFlows account (or one will be automatically created for you), and monitor EC2 instances together with your existing physical sensors through a Browser. This is true innovation!

Vulnerability Scanning
The MSS now allows to perform vulnerability scans. Right-click on a record and choose the host/port combination to scan. A report will be created in real time once the scan is done and the results will also be stored as Log events to be retrieved through the historical queries. The scans can be slow, so be patient once you initiate a scan.
Improved Correlation
Our event analysis interface was improved to provide more correlation between Flow, IDS, and Log events. Snort events are blue, Service discovery and User discovery events are yellow and Log event are red. Each of these categories can be under the source or destination IP address or the Event column. If the events are under the source or destination addresses it means that they have been associated with that address (or group of addresses) only. If the events appear in the Event column, it means that they have been associated with that flow or group of flows (both source and destination addresses were associated with that event).