New Open Source Tool Hunts for APT Activity in the Cloud

New Open Source Tool Hunts for APT Activity in the Cloud

March 11, 2024 at 06:51AM

Permiso Security has released CloudGrappler, an open source tool to detect cloud environment intrusions by advanced persistent threat (APT) actors. CloudGrappler specializes in querying for activity by known threat actors and provides detailed reports in JSON format. The tool is available on GitHub for users to access and utilize.

The meeting notes provided summarize the release of an open source tool called CloudGrappler by threat intelligence firm Permiso Security. CloudGrappler is designed to help organizations detect cloud environment intrusions by known advanced persistent threat (APT) actors. It is built upon Cado Security’s cloudgrep open source tool, with support for log file searching in AWS, Azure, and Google Cloud Storage.

CloudGrappler specializes in detecting suspicious and malicious activity in popular cloud environments, based on the tactics, techniques, and procedures (TTPs) of known threat actors. It can analyze single events and provide a granular view of security incidents, allowing for fast anomaly identification. The tool includes files for defining the scope of a scan and predefined TTPs commonly used by threat actors, and provides a detailed JSON format report upon completion of the scanning process.

The notes also mention that CloudGrappler’s usage can be optimized by using short time ranges when querying for results. The tool is available on GitHub along with usage instructions.

Let me know if you need any further assistance or clarification.

Full Article