Lumu Discover

Lumu Discover

Lumu has an array of collectors and integrations that allow you to monitor your internal assets; however, every organization has exposed systems, services and resources that have unique vulnerabilities and require specialized analysis. For this purpose, we have Lumu Discover which will provide vital intelligence so you can understand the cybersecurity state of your external surface and start addressing vulnerabilities and compromise.

Key Benefits of Lumu Discover

  • Provides visibility into the state of your Exposed Attack Surface, which, due to its nature, tends to remain outside the field of view of your cybersecurity team.
  • Supplies intelligence on the cybersecurity state of exposed assets, how they are connected with vital infrastructure, and the pathways the adversary may take through them to enter your network.
  • Stay informed regarding the presence of infostealer-type malware within your organization to react accordingly and protect your data.
  • Gain access to vital intelligence on exfiltrated data in the aftermath of an incident. Lumu Discover sifts through millions of lines of leaked data to find any entries specifically related to your organization.

How to enter the Lumu Discover Module?

If your Lumu account has access to Lumu Discover, upon logging in to the Lumu Portal, a banner will appear at the bottom of the left side panel which you can use to enter the module as seen in the screenshot below.

Info
To learn how to gain access to Lumu Discover, contact your Customer Success Representative for detailed information.

Once you click the banner, you will be taken to the Lumu Discover summary.

If your company has more than one domain (e.g. Third party domains) registered, you can easily switch between them using the drop-down menu on the top right section of the module.

Here, you will find a summary of the external exposure of your organization. The section is divided into the following sections.

Dark Web Exposure

The Dark Web Exposure section offers insights into data leaks involving user information associated with your organization’s domain. This section has 3 panels:

  • Overview panel (1): This panel gives you a rundown of your domain’s situation in three specific indicators: similar domains, exposed email addresses, and data leaks. We will learn more about each of these in a later section.
  • Data Exposed Over Time (2): This panel provides you with a graph showing the frequency and amount of exposed data leaks (red) and emails (orange) of your organization.
  • Data Leak Exposure (3): This panel provides you with a radial graph so you can get a quick look into the types of data from your organization that has been leaked out.

Infostealers Exposure

The Infostealers Exposure section gives you a quick look into your domain’s situation regarding infostealer type malware. It is composed of three panels:

  • Overview panel (1): This panel gives you a rundown of how your domain is dealing with infostealers through three specific indicators :compromised employees, compromised credentials, and threat actors detected. We will learn more about each of these in a later section.
  • Infostealers Exposed Over Time (2): This panel provides you with a graph showing the frequency and amount of Infostealer type malware detected in employee devices.
  • Top Infostealers (3): This panel gives you a breakdown of the infostealers that have been detected in your network. It will display them in order based on the number of cases detected and the percentage they make up of the total number of infostealer type incidents detected.

DNS Recon and Intelligence

This section provides you with vital intelligence regarding the external exposure and vulnerabilities of your network. This is how it is divided:

DNS Recon Mapping


This section consists of an interactive map that gives you a graphical representation of your exposed assets, and what their vulnerabilities are.

This can allow you to better understand the ways an adversary can get into your exposed infrastructure, and how information can be exfiltrated.

You can use the buttons on the left side of the map to zoom in and out, and to prevent interactivity to lock the map in position.

Vulnerabilities/External IP

This panel shows a graph that allows you to quickly understand which external IPs have presented the most vulnerabilities in your network.

Vulnerability Risk Distribution

This panel shows you how the detected vulnerabilities are distributed among different levels of risk between low and critical so you can quickly grasp your network’s situation in that regard.

Now, let’s take a more detailed look at each of the sections of the module and how you can use them to proactively protect your network and organization.

Compromised Employees

Filtering information from massive data leaks can be daunting, as a 1GB leak may contain millions of entries. Searching for the email addresses of compromised employees can be a time-consuming task. However, the Compromised Employees section of Lumu Discover streamlines this process, saving your team time and effort.

The Compromised Employees section provides information about the email accounts and credentials belonging to employees of your organization that have been compromised and shared in data leaks. You can find it by opening the External Attack Surface drop-down menu and clicking on the Compromised Employees option.

By clicking on each entry, you will find a radial graph and additional information.

The radial graph will allow you to get a quick look into the types of data that has been compromised for this user. Below, you will find three tabs: the Data Leak tab (1) contains information regarding the data leaks where the user’s information is present; the Credentials tab (2) will let you know which of the user’s credentials is compromised to address it promptly; and the Contact Information tab (3) will tell you what contact information from the user has been leaked to cybercriminals so you can take action preemptively.

You can also export the data displayed in this view to a .CSV spreadsheet using the provided Export option.:


Infostealers

This section provides detailed insights regarding the presence of infostealer type malware in your organization’s and personal devices. You will find which elements of your exposed area surface have shown presence of infostealers, which family of infostealer has been detected, the site where the user’s credentials have been compromised, the compromised user, and the cookies stored in the compromised device. You can find it by opening the External Attack Surface drop-down menu and clicking on the Infostealers option..


Using this drop-down, you can filter compromised employee and user accounts. User accounts refer to your clients, and this information can help you mitigate cybersecurity risks within your user base. 

This way, it will be easier to pinpoint any specific accounts of interest. By filtering user accounts only, you will be able to create and direct training campaigns tailored to the cybersecurity needs of your users. 

By clicking on a specific entry,  regardless of the category, you will find additional details about each of these items. 


You will have access to the IP address of the affected device (1), its Operating System and build (2), the detected malware path (3), and the malware family the infostealer belongs to (4). You can also find the date the device was detected as compromised and the latest detection of the infection (5)
If you look below, you will find even more information regarding the threat. 

You will be able to look for incidents related to that specific infostealer family in the Lumu Portal by clicking the provided link (1). This view also has two tabs, the Credentials tab (2) shows you the URL of the resource where the compromised credentials were detected, as well as the compromised user email address. The SaaS Applications tab (3) will show you the cookies of SaaS applications stored in the affected device.

You can also export the data displayed in this view to a .CSV spreadsheet using the provided Export option.:

Data Leaks

The Data Leaks section contains a list of data leaks where data related to your organization has been detected. It will show you the date the record was detected in the data leak, the data leak’s size, relevant tags and the number of records in it that involve your organization. High-priority leaks will be easy to spot as they are marked with an exclamation point. You can find it by opening the External Attack Surface drop-down menu and clicking on the Data Leaks option.

By clicking on a specific entry, you will gain access to more detailed information regarding the leak. You can use the search bar at the top to look for known data leaks.

Sifting through data leaks can be a colossal endeavor as they can comprise millions of entries; however, Lumu Discover will take on that task for you and provide only the entries relevant to your organization.

You will find the name and release date of the leak, all the relevant tags so you have a better idea of the type of data contained in the leak, as well as the 20 latest entries in the data leak that are related to users of your organization.

IPs and vulnerabilities

The IPs and Vulnerabilities section shows you a list of exposed IPs from your network that have shown vulnerabilities. You will be able to see the affected IPs, the domains that have been entered from those IPs, the detected open ports and the total number of detected vulnerabilities.

You can find it by opening the External Attack Surface drop-down menu and clicking on the IPs and Vulnerabilities option.

You can use the search bar at the top to look for specific IPs.

By clicking on a specific entry, you will be able to find a full list of the domains contacted by the vulnerable IP.

As well as a full list of open ports, and detected vulnerabilities that you can scroll through to gain a better understanding of your organization’s situation. You can use this data to adopt a proactive approach and tend to those vulnerabilities and mitigate their impact.


Similar Domains

The Similar Domains section contains a list of potentially fraudulent URLs that seem to be attempting to impersonate your organization’s public domain. These fraudulent sites are commonly set up by cybercriminals to steal data from unsuspecting customers and users. You will also find additional details such as DNS records, related mail servers, and the hosting server service where the site is hosted. You can find this section by opening the External Attack Surface drop-down menu and clicking on the Similar Domains option.


By clicking on a specific entry, you will be able to find additional details, including research links in different intelligence sources and databases to better understand the risk a fraudulent site can represent.


Reports

You also have the option to download your domain’s Lumu Discovery report if you want to have a document with the module’s information to share with stakeholders. To do so, click on the Reports option on the side panel, and click on Generate Report.


Then, a menu will pop up. If you have more than one registered domain, select the domain you want to generate the report for, and click on Generate Report.

Lumu Discovery will let you know that your report is benign generated and you will receive it via email.


Below, you will see an example of the email you will be receiving from Lumu with the report attached.


Settings

You will find all your registered domains in the settings section. You can get there by selecting the Settings option from the side panel. You will be able to sync their data manually to update the domain’s exposed attack surface information in the module by clicking the sync button for each domain. By default domains sync on a weekly basis.


Lumu Discover Playbooks

Lumu has put a your disposal a series of playbooks that contain appropriate steps you can take to address the different types of incidents and vulnerabilities that you can find through Lumu Discover.
  1. Lumu Discover Vulnerabilities Response Playbook
  2. Lumu Discover Infostealer Playbook
  3. Lumu Discover Compromised Employees Playbook
  4. Lumu Discover New Infrastructure Playbook

        • Related Articles

        • Lumu Discover EAS Reports

          Understanding and managing your organization's external attack surface is crucial for maintaining a strong cybersecurity posture. To support this, Lumu Discover provides comprehensive downloadable reports that offer in-depth visibility into your ...
        • Lumu Discover Infostealer Playbook

          Every organization has external assets that are necessarily exposed—not only to customers and users but also, unfortunately, to malicious actors. Lumu Discover provides insights into the presence of infostealers within your external surface. However, ...
        • Lumu Discover Compromised Employee Credentials and Data Leaks Playbook

          Every organization has external assets that are necessarily exposed—not only to customers and users but also, unfortunately, to malicious actors. Lumu Discover provides insights into compromised employee credentials. However, finding and removing ...
        • Lumu Discover Similar Domains Playbook

          Lumu Discover is continuously looking for domains on the Internet that attempt to mislead your customers. Taking down these domains is of utmost importance to prevent Based on the NIST Special Publication 800-61 incident response life cycle, this ...
        • Lumu Discover New Infrastructure Playbook

          Every organization has external assets that are necessarily exposed—not only to customers and users but also, unfortunately, to malicious actors. Lumu Discover provides insights into newly discovered infrastructure in contact with your external ...