heroui logo

Cisco Secure Firewall - Blacklisted SSL Certificate Fingerprint

Splunk Security Content

View Source
Summary
This threat detection rule identifies the use of SSL certificates that are blacklisted due to their association with malicious activities, such as malware distribution or command-and-control operations. Utilizing logs generated by Cisco Secure Firewall, the rule specifically checks the SHA1 fingerprint of SSL certificates against a maintained blacklist. By doing this, it can detect potentially harmful encrypted sessions, even when the corresponding domains or IPs vary. This is of particular concern as attackers frequently use self-signed or reused certificates across various malicious infrastructures. Successful detection could indicate ongoing beaconing activities, unauthorized malware downloads, or potential data exfiltration over secured channels like TLS/SSL.
Categories
  • Network
  • Cloud
  • Endpoint
Data Sources
  • Pod
  • Container
  • Web Credential
ATT&CK Techniques
  • T1587.002
  • T1588.004
  • T1071.001
  • T1573.002
Created: 2025-04-02