- Home
- Play books
- Cisco Duo - Bulk user deletion
Cisco Duo - Bulk user deletion
In this page
Playbook Description
This playbook investigates bulk user deletion activity by analyzing user behavior, checking for unauthorized deletion of user accounts, and evaluating the potential impact on the organization's security and operations.
MITRE ATT&CK mapping
| Tactics | Techniques | Sub-techniques |
|---|---|---|
| Defense Evasion(TA0005) | System Binary Proxy Execution(T1218) | InstallUtil(T1218.004) |
MITRE D3FEND mapping
| Tactics | Techniques | Sub-techniques |
|---|---|---|
| Model(D3-Model) | Application Hardening(D3-AH) | Process Segment Execution Prevention(D3-PSEP) |
Playbook input type
Alert
Prerequisites
- VirusTotal connection - Need to connect with VirusTotal API to check URL and file hash reputation.
- Logs360 Cloud - Connection to execute PowerShell scripts on the target Windows host for investigation and remediation actions.
- Privileges - Admin privileges on the target host are required.
Playbook creation input
- connectionName - Provide the VirusTotal connection name for executing the VirusTotal APIs
Dependencies
Extensions - VirusTotal
- virustotal_ipReputation
- virustotal_calculateRiskScore
- ciscoduo_retrieveAdministrators
- ciscoduo_retrieveUserById
- ciscoduo_modifyUser
- ciscoduo_modifyAdministrators
Extensions - Cisco Duo
- ciscoduo_retrieveAdministrators
- ciscoduo_retrieveUserById
- ciscoduo_modifyUser
- ciscoduo_modifyAdministrators
Utility functions:
- utility_compareListElements
- utility_convertToMap
- utility_extractFieldFromList
- utility_getRequiredTime
- utility_convertTimeToUTC
- utility_validateResponses
- utility_filterAndMatchEvents virustotal_extractRansomwareByHash
- utility_sendMail
Connections
VirusTotal connection - Need to connect with VirusTotal API and fetch access key to check the malware IP/URL/File details.
Cisco Duo connection - Need to connect Cisco Duo using Integration Key, Secret Key and API Hostname.
Execution workflow
Investigation:
- Fetches the user activity.
- Extracts the IP from the logs.
- Checks the IP reputation in batch.
- Checks the IP risk score in batch.
- Fetches the malicious IP list.
- Validates the IP response.
- Fetches the fallback list.
- Extracts the auth mechanism list from logs.
- Fetches the downgrade list from logs.
- Trusted list.
- Extracts the endpoint status list.
- Fetches the endpoint status list.
Decision logic:
- Proceeds to remediation based on the following conditions:
- Malicious IP addresses were identified.
- Related investigation findings are present.
- If suspicious but not confirmed malicious, sends a notification for manual review and stops further actions.
- If no malicious indicators are confirmed, the playbook ends with no further actions.
Remediation:
- Converts the Auth logs to map.
- Enriches the user.
- Checks whether user is under directory.
- Passes disable user input.
- Disables the user.
- Passes endpoint results.
- Checks if any user roles got escalated.
- Checks whether any role escalated.
- Extracts the admin list.
- Retrieves the administrators.
- Fetches the matched admin list from logs in batch.
- Extracts the admin key list in batch.
- Reverts the admin role in batch.
- Passes admin results.
- Checks if any remediation failed.
- Builds the notification email with remediation details and findings.
- Sends a notification email regarding the actions taken and required next steps.
Post execution procedure
- Assess the impact of bulk user deletion and initiate user restoration if necessary.
- Investigate whether the administrator account was compromised.
- Review Cisco Duo admin audit logs for any additional unauthorized changes.
- Consider enforcing additional authentication requirements for bulk administrative actions.
- Audit all administrator accounts in Cisco Duo for signs of compromise.


