How to monitor encrypted traffic in Sycope?

Due to the prevalence of encrypted traffic in organizations, monitoring it as a technique can be particularly advantageous.

Author: Paweł Drzewiecki
Cyber Threat Intelligence is a fundamental functionality in Network Security Monitoring systems that enables the detection of suspicious activities based on reputation indicators of compromise.

These indicators may include IP addresses, hostnames, URLs, file hashes, geolocations (ASNs, countries), e-mail accounts, user agents, and many others. Among the commonly used indicators, one deserves special attention: JA3 TLS fingerprint. JA3 is a tool for fingerprinting TLS connections based on options specified during the negotiation of TLS sessions. Based on these fingerprints, specific applications as well as malware can be detected.

This method is especially useful, as most traffic in organizations is typically encrypted, meaning that network packet analysis systems such as IPS are strongly limited without traffic decryption. Numerous IoCs with malicious TLS fingerprints, such as https://sslbl.abuse.ch/ja3-fingerprints/, can be found on the Internet.

JA3 fingerprints are available to customers who have purchased the Performance license of the Sycope NSM system.

Figure 1. Example of enriching NetFlow with JA3 fingerprints

In Sycope NSM there is a build-in rule to detect malicious JA3 fingerprints, but below is a simple query to discover this activity.

Figure 2. Example of query to find malicious traffic based on JA3 fingerprints.
Figure 3. Example of lookup with suspicious JA3 fingerprints

FAQ

What is JA3 TLS fingerprint?

JA3 is a tool for fingerprinting TLS connections based on options specified during the negotiation of TLS sessions. It helps in detecting specific applications and malware.

Why is JA3 fingerprinting important in network security?

JA3 fingerprinting is important because it allows detection of applications and malware in encrypted traffic, which is typically difficult to analyze without decryption.

Where can malicious TLS fingerprints be found?

Numerous Indicators of Compromise (IoCs) with malicious TLS fingerprints can be found online, such as at https://sslbl.abuse.ch/ja3-fingerprints/.

Does Sycope NSM offer functionality related to JA3 fingerprints?

Yes, Sycope NSM provides a built-in rule to detect malicious JA3 fingerprints and offers JA3 fingerprints to customers with the Performance license.

How can JA3 fingerprints be used in traffic analysis?

JA3 fingerprints can be used to enrich NetFlow data and create queries to discover malicious activity in encrypted network traffic.

This week top knowledge
This site is registered on wpml.org as a development site. Switch to a production site key to remove this banner.