Codecov Breach - Bash Uploader
Rapid Breach Response Pack.#
This Playbook is part of theSupported versions
Supported Cortex XSOAR versions: 5.5.0 and later.
This playbook includes the following tasks:
- Search for the Security Notice email sent from Codecov.
- Collect indicators to be used in your threat hunting process.
- Query network logs to detect related activity.
- Search for the use of Codecov bash uploader in GitHub repositories
- Query Panorama to search for logs with related anti-spyware signaturesNote: This is a beta playbook, which lets you implement and test pre-release software. Since the playbook is beta, it might contain bugs. Updates to the pack during the beta phase might include non-backward compatible features. We appreciate your feedback on the quality and usability of the pack to help us identify issues, fix them, and continually improve.
More information: Codecov Security Notice
#
DependenciesThis playbook uses the following sub-playbooks, integrations, and scripts.
#
Sub-playbooks- Splunk Indicator Hunting
- Panorama search thread-ids in threat logs
- QRadar Indicator Hunting V2
- Palo Alto Networks - Hunting And Threat Detection
#
IntegrationsThis playbook does not use any integrations.
#
ScriptsThis playbook does not use any scripts.
#
Commands- extractIndicators
- GitHub-search-code
- ews-search-mailbox
#
Playbook InputsName | Description | Default Value | Required |
---|---|---|---|
KnownRelatedIOCs | Known related IOCs to the Codecov Bash Uploader breach to hunt. | 104.248.94.23 | Optional |
CustomIOCs | Add your own custom Codecov Bash Uploader breach IOCs to hunt. | Optional | |
EWSSearchQuery | The EWS query to find the Codecov security notice email | From:security@codecov.io AND Subject:Bash Uploader Security Notice AND Received:three months | Optional |
EWSSearchQuery_Limit | The limit of results to return from the search | 50 | Optional |
Github_Code_Search_query | Github query to search for Codecov bash uploader use. | https://codecov.io/bash+in:file | Optional |
InternalRange | A list of internal IP ranges to check IP addresses against. The comma-separated list should be provided in CIDR notation. For example, a list of ranges would be: "172.16.0.0/12,10.0.0.0/8,192.168.0.0/16" (without quotes). | lists.PrivateIPs | Optional |
#
Playbook OutputsThere are no outputs for this playbook.