Lumu has an array of collectors and integrations that allow you to monitor your internal assets; however, every organization has exposed systems, services and resources that have unique vulnerabilities and require specialized analysis. For this purpose, we have Lumu Discover which will provide vital intelligence so you can understand the cybersecurity state of your external surface and start addressing vulnerabilities and compromise.
If your Lumu account has access to Lumu Discover, upon logging in to the Lumu Portal, a banner will appear at the bottom of the left side panel which you can use to enter the module as seen in the screenshot below.
If your company has more than one domain (e.g. Third party domains) registered, you can easily switch between them using the drop-down menu on the top right section of the module.
Here, you will find a summary of the external exposure of your organization. The section is divided into the following sections.
The Dark Web Exposure section offers insights into data leaks involving user information associated with your organization’s domain. This section has 3 panels:
The Infostealers Exposure section gives you a quick look into your domain’s situation regarding infostealer type malware. It is composed of three panels:
This section provides you with vital intelligence regarding the external exposure and vulnerabilities of your network. This is how it is divided:
DNS Recon Mapping
This can allow you to better understand the ways an adversary can get into your exposed infrastructure, and how information can be exfiltrated.
You can use the buttons on the left side of the map to zoom in and out, and to prevent interactivity to lock the map in position.
Vulnerabilities/External IP
This panel shows a graph that allows you to quickly understand which external IPs have presented the most vulnerabilities in your network.
Vulnerability Risk Distribution
This panel shows you how the detected vulnerabilities are distributed among different levels of risk between low and critical so you can quickly grasp your network’s situation in that regard.
Now, let’s take a more detailed look at each of the sections of the module and how you can use them to proactively protect your network and organization.
Filtering information from massive data leaks can be daunting, as a 1GB leak may contain millions of entries. Searching for the email addresses of compromised employees can be a time-consuming task. However, the Compromised Employees section of Lumu Discover streamlines this process, saving your team time and effort.
The Compromised Employees section provides information about the email accounts and credentials belonging to employees of your organization that have been compromised and shared in data leaks. You can find it by opening the External Attack Surface drop-down menu and clicking on the Compromised Employees option.
By clicking on each entry, you will find a radial graph and additional information.
The radial graph will allow you to get a quick look into the types of data that has been compromised for this user. Below, you will find three tabs: the Data Leak tab (1) contains information regarding the data leaks where the user’s information is present; the Credentials tab (2) will let you know which of the user’s credentials is compromised to address it promptly; and the Contact Information tab (3) will tell you what contact information from the user has been leaked to cybercriminals so you can take action preemptively.
You can also export the data displayed in this view to a .CSV spreadsheet using the provided Export option.:
This section provides detailed insights regarding the presence of infostealer type malware in your organization’s and personal devices. You will find which elements of your exposed area surface have shown presence of infostealers, which family of infostealer has been detected, the site where the user’s credentials have been compromised, the compromised user, and the cookies stored in the compromised device. You can find it by opening the External Attack Surface drop-down menu and clicking on the Infostealers option..
This way, it will be easier to pinpoint any specific accounts of interest. By filtering user accounts only, you will be able to create and direct training campaigns tailored to the cybersecurity needs of your users.
By clicking on a specific entry, regardless of the category, you will find additional details about each of these items.
You will be able to look for incidents related to that specific infostealer family in the Lumu Portal by clicking the provided link (1). This view also has two tabs, the Credentials tab (2) shows you the URL of the resource where the compromised credentials were detected, as well as the compromised user email address. The SaaS Applications tab (3) will show you the cookies of SaaS applications stored in the affected device.
You can also export the data displayed in this view to a .CSV spreadsheet using the provided Export option.:
The Data Leaks section contains a list of data leaks where data related to your organization has been detected. It will show you the date the record was detected in the data leak, the data leak’s size, relevant tags and the number of records in it that involve your organization. High-priority leaks will be easy to spot as they are marked with an exclamation point. You can find it by opening the External Attack Surface drop-down menu and clicking on the Data Leaks option.
By clicking on a specific entry, you will gain access to more detailed information regarding the leak. You can use the search bar at the top to look for known data leaks.
Sifting through data leaks can be a colossal endeavor as they can comprise millions of entries; however, Lumu Discover will take on that task for you and provide only the entries relevant to your organization.
You will find the name and release date of the leak, all the relevant tags so you have a better idea of the type of data contained in the leak, as well as the 20 latest entries in the data leak that are related to users of your organization.
The IPs and Vulnerabilities section shows you a list of exposed IPs from your network that have shown vulnerabilities. You will be able to see the affected IPs, the domains that have been entered from those IPs, the detected open ports and the total number of detected vulnerabilities.
You can find it by opening the External Attack Surface drop-down menu and clicking on the IPs and Vulnerabilities option.
You can use the search bar at the top to look for specific IPs.
By clicking on a specific entry, you will be able to find a full list of the domains contacted by the vulnerable IP.
As well as a full list of open ports, and detected vulnerabilities that you can scroll through to gain a better understanding of your organization’s situation. You can use this data to adopt a proactive approach and tend to those vulnerabilities and mitigate their impact.
The Similar Domains section contains a list of potentially fraudulent URLs that seem to be attempting to impersonate your organization’s public domain. These fraudulent sites are commonly set up by cybercriminals to steal data from unsuspecting customers and users. You will also find additional details such as DNS records, related mail servers, and the hosting server service where the site is hosted. You can find this section by opening the External Attack Surface drop-down menu and clicking on the Similar Domains option.
By clicking on a specific entry, you will be able to find additional details, including research links in different intelligence sources and databases to better understand the risk a fraudulent site can represent.
You also have the option to download your domain’s Lumu Discovery report if you want to have a document with the module’s information to share with stakeholders. To do so, click on the Reports option on the side panel, and click on Generate Report.
Then, a menu will pop up. If you have more than one registered domain, select the domain you want to generate the report for, and click on Generate Report.
Lumu Discovery will let you know that your report is benign generated and you will receive it via email.
Below, you will see an example of the email you will be receiving from Lumu with the report attached.
You will find all your registered domains in the settings section. You can get there by selecting the Settings option from the side panel. You will be able to sync their data manually to update the domain’s exposed attack surface information in the module by clicking the sync button for each domain. By default domains sync on a weekly basis.