Features and capabilities
The stack that forms the unified platform
BluSapphire has agentless architecture which consist of sensor, master and ODP. The stack sensors sit right behind the firewall or any other channel you want to tap in looking at the copy of traffic which is SPAN/MIRROR. We not are sitting in live or causing any production issue, we are just sitting on SPAN port, observing copy of the files for any malicious activity and the master is sitting inside of your system or console it is taking care of flow data.
At the sensor, we look at static and deep packet inspection, which comprises of looking for intrusions, anomalous communications like tunneling over plain text protocols, looking for command and control traffic. while we do that, we also extract the several file type of interest that we believe could be malicious and feed them for further analysis to our master console.
BluSapphire is bundled with an "Open Data Platform" that leverage the new age Big Data technologies providing horizontal scalability, flexibility and raw on-demand analytical capabilities. Our ODP provides Instant search results, even across terabytes of data. It also enables infinite storage capabilities with near zero maintenance and management.
Fig 3: BluSapphire process flow
BluSapphire can respond to these threats in seconds and take automated actions like Quarantine, Suspend Process, Clean and collect forensics, using agentless response module, that does not require any prior deployment. It can also hunt across your environment for threat indicators and locate dormant stealth malware that has not been activated yet. BluSapphire’s Intelligent Cyber Defense Platform, does the heavy lifting for you by detecting threats early, and responding using automation methods without disrupting your normal operations, reducing your operational costs and improving your efficacy
BluSapphire operates across entire cyber defense stack I.e. detect, analyze, respond and remediate into one unified platform while being completely agent less.
Deep packet Inspection means different things to different vendors. BluSapphire uses DPI to detect C&C activity and pick up botnet activity without relying on Threat Intelligence. This helps detect threat actors C&C even if they use valid sites like Google or Amazon. Detection relies heavily on Signal Intelligence techniques to pick patterns of activity.
BluSapphire performs real time static analysis on the packets, which includes IDS, signature matching, looking for indicators of compromise, command and control network traffic and environment traffic.
BluSapphire platform comprises of advance behavior analysis module, which is similar to sandbox, but built in house from the scratch. Behavior analytics module focus on understanding attacker activity to revile the payload.
Looking at the behavior really helps us understand the attacker techniques eg:
- Memory for credentials
- Stealing tokens
- Becoming admin
- Escalating its privileges
- Process Injection
- Disk Persistence
- Download stage 2, 3 etc.,
- Command control traffic – maintain control
- Registry Hiding and Persistence
- DLL injections
- Anomalous traffic
- Misused protocols
- File system changes
- Abnormal data transfers
- Abnormal account activity
- Irregularities in the processes
Please check out the MITRE ATT&CK Whitepaper for full list of detections.
Multiple machine learning models we will identify malicious activity; our machine learning models go beyond conventional models. Threat detection at faster rate.
Our model has high detection rate of 99.8% of detection rate which is highest in the industry because of our feature. Currently we monitor over 40 different file type looking for malicious activity. The result organizations to detect with accuracy and, hence reducing false positives.
Akin to Reverse Malware Engineering on the fly at wire speed, BluSapphire enables rapid detection of malicious zero-day malwares or Ransomwares even without ever executing them. What usually takes days and weeks can now be achieved at wire-speed.
Whether its data exfiltration over DNS, SSH or HTTP(S) or an attacker looking for vulnerabilities, BluSapphire’s advanced machine learning models can detect these network anomalies immediately and contain the threat using native agentless response and remediation. BluSapphire can also immediately enquire the endpoint that is causing the behavior and gather context around the suspicious activity in seconds. Armed with activity and context, BluSapphire can quickly identify and remediate these threats in real-time.
One of the very important features of BluSapphire is its capability to respond and remediate etc. Response usually is in the form of quarantine the end point, suspending the processes or cleaning up the affected end points.
BluSapphire can also work with Industry standard tools to orchestrate a response based on customer requirements.
BluSapphire empowers Level I analysts to extend their scope of work and operate at the efficiencies of Level III Analysts giving then super cow powers, thanks to the advanced ML and threat response automation it provides. Our Easy-to-Use interfaces, and simple analysis layouts enable rapid adoption by your Level I analysts – without the need for additional training in most cases.
BluSapphire supports agentless Threat Hunting across the enterprise. Threat Hunt, Pro-Active by nature enables Analysts to find specific artifacts that he is made aware of either due to Threat Intel sources or something Analysts notices on client’s network.
BluSapphire performs Live (Real-Time) Agentless Threat Hunt, instead of just hunting through logs. Problem with hunting the logs, is that NOT all data is logged. There are many artifacts that are never logged by any SIEM. Live Hunting overcomes these limitations and enables Analysts to get better insight into the environment.
BluSapphire consolidates threat intelligence from the sources mentioned in Appendix B, de-duplicates and disseminates the Threat Intel to all its customers on customizable schedule. The default schedule is every hour.
Currently used Open Threat Intel feeds are listed in Appendix A. Apart from that MISP and any STIX, TAXII and CSV formatted threat intel sources are supported.
BluSapphire use agentless approach for collecting forensics from endpoint systems. By default, BluSapphire collects
- Currently active process names, hashes and path
- Current services list
- Current startup locations (including hidden ones like registry, Roaming Cache, many more
- Current Scheduled tasks list with execution path and hashes
- Current network connections
- OS version and patch details
- Recently executed process/files.
- USB devices used.
BluSapphire’s agentless forensics also supports gathering of random artifacts on the fly.
Open Data Platform (ODP) is an integral part of the BluSapphire platform and is its USP. It can augment or replace your existing log management, SIEM and UEBA systems with a highly efficient Big Data Platform. It is built on top of elastic search and enables response automation, machine learning and advanced data analytics, all within a self-contained Big Data Platform.
ODP provides all the functionalities of a traditional SIEM, and augments it with ML based detection models, Predictive Analytics, ATT&CK Matrix mapping and more, transforming it into a Next Gen SIEM platform.