ReaQta-Hive Monitoring Methodology
ReaQta-Hive Monitoring Methodology
ReaQta-Hive Monitoring
Methodology
29 Jul 2021
ReaQta-Hive Concept
The basic element in the ReaQta-Hive solution is event. An event is a behaviour exhibited.
Some events may trigger incidents because of the potentially malicious nature.
An incident triggered does not equate to a real threat (security incident). An analyst triaging
the incident should be the person determining whether it's a security incident or false
positive. If it's a false positive, it is the duty of the analyst to create the necessary whitelist.
To set the expectations right, it is important for analysts to understand that ReaQta-Hive’s AI
engines and NanoOS detect behaviours of malwares as part of the kill chain.
ReaQta-Hive :-
1. detects threats based on behaviours only. Hence, you may copy a malware into a machine
(PC) and if it is executed - but if it is not malicious or if it's inactive, ReaQta-Hive will not
trigger any incident. There is no business impact to the user in such a scenario. But if you
run/execute the malware, there will be event logs (regardless of whether suspicious or not)
so threat hunting allows you to find information about the suspicious application.
2. does not detect exploits but rather the malwares delivered via exploitation. The malware
that runs after it has been delivered via an exploitation will be detected the same way as
point 1.
3. is an A.I. powered solution which is agnostic to signatures, hence there will be bound to
have some detections on applications which users verified as legit. This is because a non
signature based solution like ReaQta-Hive looks at malicious behaviours / techniques used
by malwares and some legit applications use the same techniques. Hence Whitelisting is
necessary to reduce the false positives and this is an ongoing process.
Visibility
● Look at the widgets to discover suspicious applications and behaviours
● Manually trigger incidents of suspicious behaviour to ascertain if there is a threat
● Understand from threat news and active threat hunt for the known IOCs
Detection
● Whenever the incident is triggered, analyst should handle the incident asap
Triaging
● Whenever an incident is triggered, clicking on the incident brings the analyst to the
incident details page. The main view will be the behavioural tree where the analyst
Response
● If its a false positive, analyst should create the appropriate white list
● If its a real threat, analysts should
○ if necessary, isolate the endpoint to prevent the threat from spreading and/or
exfiltrating sensitive data
○ terminate the threat and its related malicious process
○ remediate to remove the threat
○ hunt the threat within the organization to determine if the threat or variants
of the threat has spread to other machines
● Close the incident indicating whether its a security incident or false positive
Protection
● Creating the necessary blacklist to prevent the threat from happening again
Example 1
There may be scenarios where you need to create whitelists to prevent anti-ransomware
engines to cause a spike in endpoint resources or slowness in user PC experience. If they
have a protection enabled for a specific group and you want to whitelist something for that
trigger condition, you have to create a policy for the group(s) because otherwise, if you are
going to create a Global whitelist, the Group Protection policy still has a priority over it, and
in the anti-ransomware engine check still happen and the slowness remains.
Example 2
When creating a whitelist, we want the whitelist to be future-proof. As such, an analyst may
consider creating a Trusted App whitelist, where the qualifiers are the Original Filename of
the app and the Signer name. Any future upgrades of the software will also be covered by the
same whitelist since its Original Filename never changes and the Signer is the same.
As organizations evolve with their business, the software used within the organization
changes as well. As such, it is important for customers to understand that creation of
whitelists is an on-going process. In the case of a ransomware protection policy when
enabled, any app not whitelisted (in accordance with policy priority) and exhibits the
behaviour or ransomware (detected by ReaQta A.I. engine) will be blocked automatically.
This may result in the organization’s business operation.