Skip to main content

USTA Account Takeover Prevention

This Integration is part of the USTA Cyber Threat Intelligence Platform Pack.#

Supported versions

Supported Cortex XSOAR versions: 6.10.0 and later.

USTA Account Takeover Prevention is designed to collect compromised credentials sourced from stealer malware attacks, helping organizations identify potential account takeovers and enhance their security posture. Provided by PRODAFT. This integration was integrated and tested with version 4.1.0 of USTA Account Takeover Prevention.

Configure USTA Account Takeover Prevention on Cortex XSOAR#

  1. Navigate to Settings > Integrations > Servers & Services.

  2. Search for USTA Account Takeover Prevention.

  3. Click Add instance to create and configure a new integration instance.

    ParameterDescriptionRequired
    Your server URLTrue
    API KeyThe API Key to use for connectionTrue
    Fetch incidents by statusFalse
    Trust any certificate (not secure)False
    Use system proxy settingsFalse
    Fetch incidentsFalse
    First Fetch TimeThe time range to consider for the initial data fetch. Warning: Fetching a large time range may cause performance issues!True
  4. Click Test to validate the URLs, token, and connection.

Commands#

You can execute these commands from the Cortex XSOAR CLI, as part of an automation, or in a playbook. After you successfully execute a command, a DBot message appears in the War Room with the command details.

usta-atp-search-username#


Search for compromised credentials by username

Base Command#

usta-atp-search-username

Input#

Argument NameDescriptionRequired
usernameUsername to search.Required
page_sizeNumber of result that should appear on each page.Optional
page1-indexed page number to get a particular page of results.Optional

Context Output#

PathTypeDescription
USTA.AccountTakeoverPrevention.idNumberThe ID of the alert
USTA.AccountTakeoverPrevention.usernameStringThe username of the compromised credential
USTA.AccountTakeoverPrevention.passwordStringThe password of the compromised credential
USTA.AccountTakeoverPrevention.urlStringThe URL of the compromised credential
USTA.AccountTakeoverPrevention.is_corporateBooleanWhether the compromised credential is corporate
USTA.AccountTakeoverPrevention.createdStringThe creation date of the compromised credential
USTA.AccountTakeoverPrevention.victim_detail.ipStringThe IP address of the victim
USTA.AccountTakeoverPrevention.victim_detail.countryStringThe country of the victim
USTA.AccountTakeoverPrevention.victim_detail.phone_numberStringThe phone number of the victim
USTA.AccountTakeoverPrevention.victim_detail.computer_nameStringThe computer name of the victim computer
USTA.AccountTakeoverPrevention.victim_detail.victim_osStringThe OS of the victim computer
USTA.AccountTakeoverPrevention.victim_detail.languageStringThe language of the victim computer
USTA.AccountTakeoverPrevention.victim_detail.memoryStringThe memory of the victim computer
USTA.AccountTakeoverPrevention.victim_detail.cpuStringThe CPU of the victim computer
USTA.AccountTakeoverPrevention.victim_detail.gpuStringThe GPU of the victim computer
USTA.AccountTakeoverPrevention.victim_detail.malwareStringThe family of the malware that infected the victim computer
USTA.AccountTakeoverPrevention.victim_detail.infection_dateStringThe infection date of the victim computer

Command Example#

!usta-atp-search-username username=user123456 page_size=1 page=1

Context Example#

{
"USTA" : {
"AccountTakeoverPrevention": [
{
"id": 1234567,
"status": "open",
"username": "user123456",
"password": "******",
"url": "https://example.com/login",
"is_corporate": "False",
"created": "2024-11-18T00:00:00.000000Z",
"victim_detail": {
"username": "anonymous",
"ip": "0.0.0.0",
"country": "Unknown",
"phone_number": "N/A",
"computer_name": "DESKTOP-XXXXX",
"victim_os": "OS x64",
"language": "N/A",
"memory": "XXXX MB",
"cpu": "Generic CPU",
"gpu": "Generic GPU",
"malware": "Unknown",
"infection_date": "N/A",
"created": "2024-11-18T00:00:00.000000Z"
}
}
]
}
}