Network Security

Silverfort Open Sources Lateral Movement Detection Tool

Silverfort has released the source code for its lateral movement detection tool LATMA, to help identify and analyze intrusions.

Silverfort has released the source code for its lateral movement detection tool LATMA, to help identify and analyze intrusions.

Identity protection provider Silverfort has announced the open source release of a lateral movement detection tool.

Called LATMA (Lateral Movement Analyzer), the tool was designed to collect authentication logs from domain and Active Directory (AD) environments and to deliver a report on the identified patterns.

The tool consists of two modules, namely a collector, which gathers logs from domain controllers and endpoints, and an analyzer, which outputs a report with diagrams, based on the collected logs.

LATMA, Silverfort says, has significantly improved its ability to detect lateral movement, providing a 95% accuracy in flagging suspicious behavior.

The tool’s collector module scans for NTLM authentication logs on domain controllers and for Kerberos authentication logs on endpoints, and harvests sign-in logs from Azure AD. For that, it requires specific port access and necessary permissions.

The analyzer module is fed the authentication data as a spreadsheet and starts searching for suspicious activity using a defined lateral movement algorithm.

LATMA, Silverfort explains, uses the collected information to build a graph representing the network, which depicts endpoints and authentication events. After analyzing the authentication patterns, it builds a sub-graph depicting the abnormal behavior, and generates alerts.

At first, LATMA monitors normal behavior of the users and machines, so it can differentiate between normal and suspicious behavior once the learning period has ended. No alerts are issued during this period.

Advertisement. Scroll to continue reading.

The tool also generates indicators of compromise (IoCs) associated with the identified suspicious behavior, such as a user account that authenticates to multiple machines in a short period of time, or which authenticates from one machine to another, in sequence.

“LATMA generates an alert when at least two of these patterns happen in sequence. For example, if the attacker searches for a target machine to advance to and then successfully advances to it, the algorithm generates an alert,” Silverfort explains.

Related: Google Open Sources Binary File Comparison Tool BinDiff

Related: MITRE and CISA Release Open Source Tool for OT Attack Emulation

Related: NCC Group Releases Open Source Tools for Developers, Pentesters

Related Content

Cloud Security

The CloudGrappler open source tool can detect the presence of known threat actors in cloud environments.

Application Security

Concluding a two-day OSS security summit, CISA details key actions to help improve open source security.

ICS/OT

Cisco has released an open source PoC tool named Badgerboard designed for improved backplane network visibility for OT. 

Fraud & Identity Theft

The open source platform Tazama provides cost-effective monitoring of digital financial transactions to prevent fraud in real time.

Threat Intelligence

Open source is a great way to test the waters and define requirements. But when looking at putting a platform into production, an enterprise-ready...

Application Security

Google has released its fuzzing framework in open source to boost the ability of developers and researchers to identify vulnerabilities.

Supply Chain Security

Two new products aim to secure the traditional OSS supply chain, and the new AI model software supply chain.

ICS/OT

A new project aims to make it easier for PLC programmers to implement secure coding practices by cataloging useful files and functions from each...

Copyright © 2024 SecurityWeek ®, a Wired Business Media Publication. All Rights Reserved.

Exit mobile version