Read the Gartner® Competitive Landscape: Network Detection and Response Report
Read the Gartner® Competitive Landscape: Network Detection and Response Report
START HERE
WHY CORELIGHT
SOLUTIONS
CORELIGHT LABS
Close your ransomware case with Open NDR
SERVICES
ALLIANCES
USE CASES
Find hidden attackers with Open NDR
Corelight announces cloud enrichment for AWS, GCP, and Azure
Corelight's partner program
10 Considerations for Implementing an XDR Strategy
December 11, 2024 by Christopher Sather
Malicious files continue to be a significant threat to organizations; SonicWall reported more than six billion malware attacks in 2023. To help organizations prepare for and stay ahead of these threats, we’re introducing an integration with YARA that offers a deeper level of inspection for files across enterprise networks while helping security teams consolidate their toolset in the process.
The idea for this integration began when a Corelight customer told us they wanted to move away from their existing file analysis tool and consolidate the required capabilities within Corelight sensors. Our subsequent confirmed the value of file analysis on the network. By delivering static file analysis capabilities powered by YARA through our Corelight sensors, we will help our customers improve their detection rates.
YARA is an open-source file analysis tool that analyzes binary patterns, behaviors, and other characteristics. Threat hunters can create descriptions of malware families–YARA rules–and trigger alerts when files match those characteristics. YARA rules inspect the content of files, not just hashes, making them more resilient to changes malware authors make in an effort to evade hash-based detection mechanisms. YARA rules can be uploaded to a Corelight sensor and applied against files observed in the network traffic.
Similar to Zeek® and Suricata®, two foundational elements of our Open NDR solution, YARA is an open-source technology that leans on a broad research community that builds and shares rules in an effort to help secure organizations from cyber threats. YARA perfectly complements our solutions and aligns with our core philosophy and open-source strategy.
With YARA, Corelight customers will be able to increase detection rates by gaining visibility into files and the ability to inspect the contents of the files for known threats at scale. Integrated with additional evidence that Corelight delivers – including Zeek and Suricata logs – security teams gain better visibility into the activity within their network and can reduce false positives.
A unique capability among NDR vendors, the Corelight Open NDR Platform and YARA integration helps security teams:
Corelight transforms network and cloud activity into evidence that security teams use to proactively hunt for threats, accelerate response to incidents, gain complete network visibility, and create powerful analytics. The Corelight Open NDR Platform combines dynamic network detections, AI, intrusion detection (IDS), network security monitoring (NSM), and packet capture (PCAP) in a single security tool that’s powered by proprietary and open-source technologies Zeek and Suricata.
Integrating the Corelight Open NDR Platform with YARA enables security teams to create YARA rules for pattern-based detection that quickly analyze large amounts of files to aid in malware identification, proactive threat hunting via IoCs, and automated malware analysis–helping security teams stay ahead of the pervasive threats to their organizations.
To learn more about the benefits of this integration, read our solution brief.