Lumu collects threat intelligence from various sources to detect and confirm instances of compromise within the network. However, organizations may sometimes need to investigate specific domains or IPs of interest for threat hunting. There may also be cases where an IoC has not yet been added to Lumu’s knowledge base or situations where organizations want to manage the lifecycle of their own IoCs. In these cases, organizations can submit their own intelligence to Lumu.
Bear in mind that any IoCs reported using the BYOTI feature will be processed by Lumu according to the list they are added to: if they are added to the blacklist and Lumu matches an IoC with a contact, it will be reported as an incident and sent to any corresponding integrations to be processed and automatically responded as such. If added to a whitelist, it will be excluded from analysis and no incidents from that IoC will be reported as incidents.
You can provide your own TI for analysis through our support team. You can do so from the Lumu Portal by clicking on the help widget on the bottom of the portal to your right.
Then, click on Support.
This will open a ticket form where you must provide all required contact information and details of your request. There are two main use cases for BYOTI: Whitelisting and Blacklisting. We will take a look at both use cases and how to properly provide the required threat Intelligence.
You can make use of Lumu BYOTI to prevent Lumu from creating any incidents for specific IoCs. This can be useful in cases such as:
Lumu carefully curates and maintains its whitelist to prevent false positives as much as possible, especially when it comes to popular hosting services such as Google, Amazon, and Dropbox, for example. By adding or removing elements from your private lists, you can adjust how Lumu functions and performs within your organization.
Lumu will only receive the provided IoCs and either present them as incidents or exclude them from analysis depending on your request, this means that the data that you deliver must be properly examined by the organization to ensure that any operation actions taken as a consequence are appropriate. Determining whether a provided IoC is malicious or not is the responsibility of the organization’s cybersecurity team.
To send a whitelist BYOTI request, carry out the following steps:
1. Start creating a support ticket by following the previously mentioned steps.
2. Use an appropriate and descriptive subject. This will make it easier for our support team to process it.
3. Enter all the necessary information in the ticket’s description. Below, you will find a useful template to do so. Bear in mind that using the template properly will ensure that Lumu receives the information correctly. The template is structured as follows:
It can be found in the top corner to the left of the portal as seen in the following screenshot:
If you see example parameters such as IoC_Public_IP_Address, replace them with the real public IP address you want to provide as an IoC in the correct format. E.g.: 1.1.1.1
Bear in mind that, if you provide a domain such as .domain.com, any subdomains under it, such as good.domain.com and suspicious.domain.com, will be whitelisted as well. To whitelist only particular subdomains, make sure to provide them specifically.
You can use Lumu BYOTI to provide your own IoCs and have Lumu treat them as adversaries to show them as incidents in the Lumu Portal. If you have any threat intelligence of domains or IPs that you want to have reported, include them using this feature.
To send a blacklist BYOTI request, carry out the following steps:
1. Start creating a support ticket by following the previously mentioned steps.
2. Use an appropriate and descriptive subject. This will make it easier for our support team to process it.
3. Enter all the necessary information in the ticket’s description. Below, you will find a useful template to do so. Bear in mind that using the template properly will ensure that Lumu receives the information correctly. The template is structured as follows:
These are some examples of data that can be provided as IoCs that you can use for reference purposes. Remember that this is only an example and these are not real IoCs.
By default, if no port is specified, the system matches on ports 443 and 80.
Get in touch with our support team to learn more about BYOTI automation.
After you submit the ticket, our support team will contact you promptly. Once the threat intelligence is processed in Lumu, you will either stop seeing incidents from the provided IoCs (for whitelist requests) or see any contacts with the specified domains/IPs appear as incidents in the Lumu Portal (for blacklist requests).