ExtraHop Reveal(x)

Defending The Cloud

As you migrate more business-critical workloads to the cloud, there's pressure to move security with them. However, many organizations find their existing security processes leave visibility gaps, making it difficult to defend those workloads.

ExtraHop Reveal(x) 360 network detection and response (NDR) is tailored to combat advanced attacks in the cloud with unified visibility, threat detection, and response capabilities available in a single management pane.

ExtraHop Reveal(x)

Defending The Cloud

Here we'll show you a sophisticated attack that exfiltrates data to an AWS S3 bucket. The attack will run to completion in this scenario, but in reality, someone using Reveal(x) 360 would be able to stop the attack at any stage.

Note: This is a slideshow adaption of a scenario found on ExtraHop's live, interactive cloud demo. To experience the fully functional demo, visit extrahop.com/demo/ on any laptop or desktop device and choose Secure the Cloud.

In this instance, Reveal(x) 360 has detected an exploitation attempt on an IMDS proxy. Now, analysts can quickly gather more information by clicking Investigate This Detection.

Detection

In this instance, Reveal(x) 360 has detected an exploitation attempt on an IMDS proxy. Now, analysts can quickly gather more information by clicking Investigate This Detection.

Blue Team

Detection

This detection catches a server-side request forgery (SSRF) technique.

The IMDS is an internal AWS service that provides sensitive data and credentials to most EC2 instances.

The SSRF technique enables the attacker to gain access to an environment with credentials obtained from IMDS.

The Attack Begins

This detection catches a server-side request forgery (SSRF) technique.

The IMDS is an internal AWS service that provides sensitive data and credentials to most EC2 instances.

The SSRF technique enables the attacker to gain access to an environment with credentials obtained from IMDS.

Blue Team

The Attack Begins

The attacker was successful and ambitious. The timeline shows that with the first set of stolen credentials, the attacker was able to gain additional credentials for access through a remote SSH session.

To learn more about the scale and scope of the attack, analysts can click into related detections. In this instance, we'll investigate the Remote Control SSH Traffic detection.

Check the Timeline

The attacker was successful and ambitious. The timeline shows that with the first set of stolen credentials, the attacker was able to gain additional credentials for access through a remote SSH session.

To learn more about the scale and scope of the attack, analysts can click into related detections. In this instance, we'll investigate the Remote Control SSH Traffic detection.

Blue Team

Check the Timeline

The stolen credentials granted the attacker access to a bastion server inside the perimeter.

Attacker in Control

The stolen credentials granted the attacker access to a bastion server inside the perimeter.

Blue Team

Attacker in Control

The bastion server becomes the offender in the next detection as the attacker moves laterally through the network.

By clicking on the AWS Cloud Service Enumeration detection, analysts can quickly investigate that aspect of the attack.

Role Reversed

The bastion server becomes the offender in the next detection as the attacker moves laterally through the network.

By clicking on the AWS Cloud Service Enumeration detection, analysts can quickly investigate that aspect of the attack.

Blue Team

Role Reversed

With control of the bastion server, the attacker begins to enumerate AWS services for a target to exploit.

Lateral Movement

With control of the bastion server, the attacker begins to enumerate AWS services for a target to exploit.

Blue Team

Lateral Movement

The attacker found a potentially valuable asset: an RDS instance. The attacker then pivots to a separate EC2 instance to get around the security policies.

By investigating the detection, an analyst can quickly determine what the attacker is up to in real time.

Target Acquired

The attacker found a potentially valuable asset: an RDS instance. The attacker then pivots to a separate EC2 instance to get around the security policies.

By investigating the detection, an analyst can quickly determine what the attacker is up to in real time.

Blue Team

Target Acquired

The writing is on the wall: The data is being moved to the attacker's S3 bucket.

By clicking into the Data Exfiltration to S3 Bucket detection, an analyst can continue gathering information about the attack.

Back to the Timeline

The writing is on the wall: The data is being moved to the attacker's S3 bucket.

By clicking into the Data Exfiltration to S3 Bucket detection, an analyst can continue gathering information about the attack.

Blue Team

Back to the Timeline

The data is finally moved to an S3 bucket that is outside of the perimeter and can be examined at the attacker's leisure.

Attack Complete

The data is finally moved to an S3 bucket that is outside of the perimeter and can be examined at the attacker's leisure.

Blue Team

Attack Complete

Explore the Reveal(x) 360

Fully Functional Demo

Now that you've seen how Reveal(x) 360 helps you detect and respond to threats in real time, use the link we sent to your inbox to explore the fully working product demo from your desktop or laptop. Or take it a step further and request a free 15-day trial of Reveal(x) 360, SaaS-based NDR.

ExtraHop Logo

Defending the Cloud

ExtraHop Logo

Turn your device to landscape orientation to view the demo!

Phone in Landscape Mode