Skip to main content
Skip table of contents

2812 - Stopping Exfiltration with Security Insights in Threat Defense

Scenario

You’ve been tasked with testing Threat Insight’s data exfiltration detection and prevention abilities, and your organization is getting ready to deploy the feature soon. Investigate the feeds required for Data Exfiltration to be detected, then observe Threat Insight’s default behavior in detecting Data Exfiltration using a script imitating an exfiltration attack. Finally, change Threat Insight’s behavior to stop exfiltration attempts using security policies and test your changes by running the same script again.

Estimate Completion Time

  • 25 - 30 minutes

Prerequisites


Tasks

  • Investigate Threat Insight Data Exfiltration rules in the Default Global Policy and their default actions.

  • Start an Exfiltration attack simulation and investigate Threat Insight’s response.

  • Change the default security rule actions in the Default Global Policy.

  • Test if Threat Insight blocked the attack after re-configuring the rules.

Task 1: Investigate Threat Insight Data Exfiltration rules in the Default Global Policy

Using your lab’s jump-desktop, use the Education Infoblox Portal credentials to log in to the Infoblox Portal. Investigate if data exfiltration threat insight rules are added to the Default Global Policy and what action is assigned to them by default if present.

Task 2: Observing Data Exfiltration Attacks with Threat Insight

NIOS-X servers must be connected to Threat Defense with the DFP service running on them. Please review the prerequisites section.

  • Start an exfiltration attack against 10.100.0.110 and investigate Threat Insight behaviour.

    • Use the command exfiltration-client 10.100.0.110 to start the attack.

      • NOTE: 10.100.0.110 is the IP address for the NIOS-X server NX-1 running the DFP service DFP-OPH1.

Task 3: Configure Threat Insight to stop Data Exfiltration

NIOS-X servers must be connected to Threat Defense with the DFP service running on them. Please review the prerequisites section.

  • Log in to the Infoblox Portal using the Education Infoblox Portal credentials. Change the Data Exfiltration rule actions in the Default Global Policy to Block—No Redirect.

    • NOTE: Please allow 3-5 minutes for the rule changes to be synced with the NIOS-X server.

Task 4: Verify Exfiltration attempts are blocked

The output of the script should indicate that exfiltrated data has been received for the first 30 to 50 requests but should stop getting responses after.

  • Start a new exfiltration attack against 10.100.0.110 and investigate if Threat Insight is blocking it.

    • Use the command exfiltration-client 10.100.0.110 to start the attack.

      • NOTE: 10.100.0.110 is the IP address for the NIOS-X server NX-1 running the DFP service DFP-OPH1.


Solutions

Task 1 Solution: Investigate Threat Insight Data Exfiltration rules in the Default Global Policy

In this step, we are investigating if data exfiltration threat insight rules are added to the Default Global Policy and what action is assigned to them by default if present.

  1. Log into your lab’s jump-desktop.

  2. Use your Education Infoblox Portal Credentials to log into the Infoblox Portal.

  3. Navigate to Configure → Security → Policies → Security Policies

  4. Select Default Global Policy and click Edit.

    1. Click on Policy Rules.

    2. Verify that Threat Insight - Data Exfiltration and Threat Insight - Notational Data Exfiltration rules exist and their action is Allow - With Log.

    3. Click Finish, then Save&Close.

      image-20250124-140341.png

Task 2 Solution: Observing Data Exfiltration Attacks with Threat Insight

In this task, we aim to start an exfiltration attack against OPH1 (10.100.0.110) and observe Threat Insight behavior. Based on our investigation in the previous step, we know that the rules will allow traffic while keeping logs. So, when running the exfiltration script, we should be able to verify this behavior through the script’s output and security logs.

  1. Open a terminal window and enter the command exfiltration-client 10.100.0.110.

    • NOTE: 10.100.0.110 is the IP address for the NIOS-X server NX-1 running the DFP service DFP-OPH1.

  2. The output of the script should indicate that exfiltrated data has been received.

    image-20250124-142801.png
  3. Leave the script to run for 4-5 minutes to allow for security reports to be generated.

  4. In the Infoblox Portal, Navigate to Monitor → Reports → Security → Security Activity.

    • Under the Threat Insight tab, you should be able to see logs from a subdomain of shopping.ddi.ninja.

      • NOTE: The output might look different than the screenshot, We are looking for at least one sub-domain of shopping.ddi.ninja

        image-20250124-140955.png
    • Under the Security Events tab, you should be able to see some of the data exfiltration attempts listed with the action taken and the source of traffic.

      image-20250124-143120.png

Task 3 Solution: Stopping Data Exfiltration Attacks with Threat Insight

In this task, we will change the default action for both data exfiltration rules to Block—No redirect. This will stop the exfiltration attempts from completing.

  1. Navigate to Configure → Security → Policies → Security Policies

  2. Select Default Global Policy and click Edit.

    • Click on Policy Rules.

    • Click on the action column for Threat Insight - Data Exfiltration and Threat Insight - Notational Data Exfiltration rule actions and select Block - No Redirect from the list.

    • Click Finish then Save&Close.

      image-20250124-141804.png
  3. Allow 3-5 minutes to pass for the rule changes to be synced with the NIOS-X server.

Task 4 Solution: Verify Exfiltration attempts are blocked

In this task, we will start a new exfiltration attack against OPH1 (10.100.0.110) and observe how Threat Insight will behave. We changed our rules to block exfiltration attempts and keep logs. So, when running the exfiltration script, we should be able to verify this behavior through the script’s output and security logs.

  1. Open a terminal window and enter the command exfiltration-client 10.100.0.110.

    • NOTE: 10.100.0.110 is the IP address for the NIOS-X server NX-1 running the DFP service DFP-OPH1.

  2. The output of the script should indicate that exfiltrated data has been received for the first 30 to 50 requests but should stop getting responses after.

    image-20250124-142201.png
  3. In the Infoblox Portal, Navigate to Monitor → Reports → Security → Security Activity.

    • Under the Threat Insight tab, you should be able to see logs from a new subdomain of shopping.ddi.ninja.

      image-20250124-143303.png
    • Under the Security Events tab, you should be able to see some of the data exfiltration attempts listed with the action taken and the source of traffic.

      image-20250124-142334.png

JavaScript errors detected

Please note, these errors can depend on your browser setup.

If this problem persists, please contact our support.