Detect attackers scanning for vulnerable JBoss servers

Original Source: [splunk source]
Name:Detect attackers scanning for vulnerable JBoss servers
id:104658f4-afdc-499e-9719-17243f982681
version:3
date:2024-10-17
author:Bhavin Patel, Splunk
status:experimental
type:TTP
Description:The following analytic identifies specific GET or HEAD requests to web servers that indicate reconnaissance attempts to find vulnerable JBoss servers. It leverages data from the Web data model, focusing on HTTP methods and URLs associated with JBoss management interfaces. This activity is significant because it often precedes exploitation attempts using tools like JexBoss, which can compromise the server. If confirmed malicious, attackers could gain unauthorized access, execute arbitrary code, or escalate privileges, leading to potential data breaches and system compromise.
Data_source:
search:| tstats `security_content_summariesonly` count min(_time) as firstTime max(_time) as lastTime from datamodel=Web where (Web.http_method="GET" OR Web.http_method="HEAD") AND (Web.url="*/web-console/ServerInfo.jsp*" OR Web.url="*web-console*" OR Web.url="*jmx-console*" OR Web.url = "*invoker*") by Web.http_method, Web.url, Web.src, Web.dest
| `drop_dm_object_name("Web")`
| `security_content_ctime(firstTime)`
| `security_content_ctime(lastTime)`
| `detect_attackers_scanning_for_vulnerable_jboss_servers_filter`


how_to_implement:You must be ingesting data from the web server or network traffic that contains web specific information, and populating the Web data model.
known_false_positives:It's possible for legitimate HTTP requests to be made to URLs containing the suspicious paths.
References:
drilldown_searches:
  :
tags:
  analytic_story:
    - 'JBoss Vulnerability'
    - 'SamSam Ransomware'
  asset_type:Web Server
  confidence:50
  impact:50
  message:tbd
  mitre_attack_id:
    - 'T1082'
    - 'T1133'
  observable:
    name:'dest'
    type:'Hostname'
    - role:
      - 'Victim'
  product:
    - 'Splunk Enterprise'
    - 'Splunk Enterprise Security'
    - 'Splunk Cloud'
  required_fields:
    - '_time'
    - 'Web.http_method'
    - 'Web.url'
    - 'Web.src'
    - 'Web.dest'
  risk_score:25
  security_domain:network

tests:
  :
manual_test:None