jerome_itable Lv2Posted 28 Dec 2023 09:45
  
I can give you some ideas and advice on how to address the NGAF attack, incorporating insights from your information and best practices:

Understanding the Attack:

    NGAF Attack: A type of attack that targets Next-Generation Application Firewalls (NGAFs) to bypass security measures.
    Internal IP Public Outgoing: Your network's publicly routable IP address used for outgoing traffic.
    Internal IP Private: A non-routable IP address used within your internal network.
    Internal VM Linux: A Linux virtual machine running on your internal network.
    Attack from another URL: The attack originates from a different URL, suggesting a compromised internal system or a malicious actor within your network.

Steps to Identify the Attacker:

    Review NGAF Logs:
        Scrutinize NGAF logs for detailed information about the attack, including:
            Time and date of attack
            Source IP address (likely the internal VM Linux)
            Destination IP address or URL
            Attack type
            Any logged MAC addresses

    Check Network Device Logs:
        Examine logs from routers, switches, and firewalls for additional clues, such as:
            MAC address to IP address mappings
            Traffic patterns
            Any anomalies or suspicious activity

    Analyze VM Logs:
        Inspect logs within the suspected VM for signs of compromise or malicious activity, including:
            Unusual processes
            Unexpected network connections
            System modifications

    Utilize Network Monitoring Tools:
        Employ tools like Wireshark or tcpdump to capture and analyze network traffic in real-time.
        Filter traffic to isolate the VM's activity and identify the target URL.

    Correlate Information:
        Piece together information from various sources to pinpoint the attacker's MAC address and identity.
        Cross-reference MAC addresses with VM inventory and user assignments.

Additional Recommendations:

    Isolate the Compromised VM: Disconnect the suspected VM from the network to prevent further damage.
    Preserve Evidence: Secure logs and any relevant data for forensic analysis.
    Engage Security Experts: Consult with IT security professionals for comprehensive investigation and remediation.
    Implement Strong Security Measures:
        Regularly update NGAF and other security software.
        Enforce strict access controls and password policies.
        Monitor network activity for anomalies.
        Educate users on cybersecurity best practices.

I Can Help:

Change

Moderator on This Board

0
2
4

Started Topics

Followers

Follow

67
14
3

Started Topics

Followers

Follow

3
0
2

Started Topics

Followers

Follow

1
131
3

Started Topics

Followers

Follow

Board Leaders