<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: gabriel de oliveira chaves</title>
    <description>The latest articles on DEV Community by gabriel de oliveira chaves (@gabrieloc).</description>
    <link>https://dev.to/gabrieloc</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1180249%2Faeca1f5f-4a0b-4f9b-a1c3-149a2a1f6f60.jpeg</url>
      <title>DEV Community: gabriel de oliveira chaves</title>
      <link>https://dev.to/gabrieloc</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/gabrieloc"/>
    <language>en</language>
    <item>
      <title>From Alert to Action: Investigating a Possible Phishing URL</title>
      <dc:creator>gabriel de oliveira chaves</dc:creator>
      <pubDate>Tue, 31 Dec 2024 00:28:52 +0000</pubDate>
      <link>https://dev.to/gabrieloc/from-alert-to-action-investigating-a-possible-phishing-url-1e7p</link>
      <guid>https://dev.to/gabrieloc/from-alert-to-action-investigating-a-possible-phishing-url-1e7p</guid>
      <description>&lt;p&gt;When working in a SOC (Security Operations Center), you may have a lot of alerts popping up in your queue, but not all of them are true positives. Let's dive into an alert of a possible phishing URL and analyze it to discover if it is a true positive or not.&lt;/p&gt;

&lt;p&gt;First of all, we will take a look at the alert itself, then progress in its investigation:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F7dmgfe41662ex7pdfzj7.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F7dmgfe41662ex7pdfzj7.png" alt="Image description" width="800" height="230"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;As we can see, there's a URL of a WordPress plugin with a Russian domain. Let's not jump to conclusions but take a look at this URL using VirusTotal.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fwdse5ewlvcz8mqejplhy.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fwdse5ewlvcz8mqejplhy.png" alt="Image description" width="800" height="361"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;With this, we already have confirmation that it is indeed a phishing URL, but let's investigate it a little further to gather more artifacts and have a more solid analysis document.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fes0pea2y0oghp8ir75ty.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fes0pea2y0oghp8ir75ty.png" alt="Image description" width="800" height="586"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;After checking the IP address that we got from VirusTotal and looking into it with AbuseIPDB, we can see that someone has reported it once for phishing. If not for the VirusTotal hits, I wouldn't be certain that this is a phishing URL.&lt;/p&gt;

&lt;p&gt;With this in mind, we can start our case and follow the playbook:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fxgqma5uujk5wpd8r4kxf.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fxgqma5uujk5wpd8r4kxf.png" alt="Image description" width="757" height="403"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;As we know, the URL is malicious, so we just continue the process.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fjf5t2jjoahob3vtn18t6.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fjf5t2jjoahob3vtn18t6.png" alt="Image description" width="740" height="439"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Now we check if someone on our network has actually accessed this URL.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fujhn1zcbh3vm9nm5plf8.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fujhn1zcbh3vm9nm5plf8.png" alt="Image description" width="800" height="155"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Now we know that someone did access it, and we also got an IP address that the URL connected to. When we search for it in AbuseIPDB, we can see that it has been used for phishing several times.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ftwrurcc7cvtw3medr225.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ftwrurcc7cvtw3medr225.png" alt="Image description" width="800" height="614"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;So we must go to our EDR and contain the machine that accessed these URLs as a security measure. After that, we can close our alert as a true positive.&lt;/p&gt;

</description>
      <category>cybersecurity</category>
    </item>
  </channel>
</rss>
