https://store-images.s-microsoft.com/image/apps.27512.1da7a87f-83b4-4db0-b90b-380f35e784c4.e4aae9c7-86fa-4560-9e42-4ab9982e3158.4097675d-deac-4413-ad4b-4a3da613f334

ZINC Open Source Threat Protection

Microsoft Sentinel, Microsoft Corporation

ZINC Open Source Threat Protection

Microsoft Sentinel, Microsoft Corporation

ZINC Open Source Threat Protection

Note: Please refer to the following before installing the solution:

• Review the solution Release Notes

• There may be known issues pertaining to this Solution, please refer to them before installing.

Microsoft security research teams have detected a wide range of social engineering campaigns using weaponized legitimate open-source software by an actor tracked as ZINC. ZINC employed traditional social engineering tactics by initially connecting with individuals on LinkedIn, followed by communication over WhatsApp, which acted as the means of delivery for their malicious payloads. ZINC was found weaponizing a wide range of open-source software including PuTTY, KiTTY, TightVNC, Sumatra PDF Reader etc. For more technical and in-depth information about the attack, please read the Microsoft Security blog post.This solution provides content to detect and investigate signals related to the attack in Microsoft Sentinel.

Pre-requisites:

This is a domain solution and does not include any data connectors. The content in this solution supports the connectors listed below. Install one or more of the listed solutions, to unlock the value provided by this solution.

1. Windows Security Events

2. Microsoft Defender XDR

3. Windows Server DNS

4. F5 Advanced WAF

5. Cisco ASA

6. Palo Alto Networks

7. Common Event Format

8. Fortinet FortiGate

9. Check Point

10. Microsoft 365

11. Azure Firewall

12. Microsoft Windows Firewall

13. Windows Forwarded Events

Keywords: Zinc, Open Source, ZetaNile , Putty, Kitty, TightVNC , EventHorizon, FoggyBrass, PhantomStar, threat actor, Adversary.

Analytic Rules: 3

Learn more about Microsoft Sentinel | Learn more about Solutions