https://store-images.s-microsoft.com/image/apps.27512.1da7a87f-83b4-4db0-b90b-380f35e784c4.e4aae9c7-86fa-4560-9e42-4ab9982e3158.4097675d-deac-4413-ad4b-4a3da613f334

ZINC Open Source Threat Protection

Microsoft Sentinel, Microsoft Corporation

ZINC Open Source Threat Protection

Microsoft Sentinel, Microsoft Corporation

ZINC Open Source Threat Protection

Microsoft security research teams have detected a wide range of social engineering campaigns using weaponized legitimate open-source software by an actor tracked as ZINC. ZINC employed traditional social engineering tactics by initially connecting with individuals on LinkedIn, followed by communication over WhatsApp, which acted as the means of delivery for their malicious payloads. ZINC was found weaponizing a wide range of open-source software including PuTTY, KiTTY, TightVNC, Sumatra PDF Reader etc. For more technical and in-depth information about the attack, please read the Microsoft Security blog post.This solution provides content to detect and investigate signals related to the attack in Microsoft Sentinel.

Pre-requisites:

This is a domain solution and does not include any data connectors. The content in this solution supports the connectors listed below. Install one or more of the listed solutions, to unlock the value provided by this solution.

1.Windows Security Events

2.Microsoft 365 Defender

3.Microsoft Windows DNS

4.F5 Advanced WAF

5.Cisco ASA

6.Palo Alto Networks

7.Common Event Format

8.Fortinet FortiGate

9.Check Point

10.Microsoft 365

11.Azure Firewall

12.Microsoft Windows Firewall

13.Windows Forwarded Events

Keywords: Zinc, Open Source, ZetaNile , Putty, Kitty, TightVNC , EventHorizon, FoggyBrass, PhantomStar, threat actor, Adversary.

Analytic Rules: 3

Learn more about Microsoft Sentinel | Learn more about Solutions