
Recommendations:
In July 2020, Microsoft released patches for the vulnerability.
We strongly recommend users to patch their Windows DNS Servers in order to prevent the exploitation of this vulnerability.
Link to the MSRC library for downloading the KB:
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1350
Download:
Our packages are available on the following links.
We are regularly updating the package with new resources to enrich the SIEM detection methods for this attack.
Download from GitHub:
https://github.com/cybersiem/CyberSIEM-IR/tree/master/CVE-2020-1350_SigRed
Or download from this site:
ArcSight:
https://www.cybersiem.com/download/sigred-arcsight
Requirements:
Collection for any on these event types:
- DNS Debug Log
- Firewall Logs – Bytes-in value is needed
QRadar:
https://www.cybersiem.com/download/sigred-qradar
Requirements:
- DNS Debug Log
ArcSight Package Overview:
We’ve created an ArcSight package that detects suspicious DNS requests over the FW and the DNS debug log.
The Package recognizes large DNS response packets over TCP protocol.
QRadar Package Overview:
Rule:
Action: Dispatch New Event
Search:
Custom Properties:
Important – These packages will work properly in optimized environments only. Make sure the event collection is configured properly – without any data loss or delays.
You are welcome to contact us for any further details.
Emily Dubnik – [email protected]
Yarin Zaddik – [email protected]
Maayan Shlomo – [email protected]
Michael Vashinsky – [email protected]