-0.4 C
United States of America
Sunday, April 6, 2025

SOC within the Community Operations Middle


Cellular World Congress 2025 in Barcelona delivered on each promise – a record-breaking occasion with 109,000 attendees from 205 nations, with over 2,900 exhibitors, sponsors, and companions showcasing a powerful array of slicing‐edge matters, from 5G and IoT to Unified Safety for the AI-driven Future.

As at all times, Cisco’s presence showcased a set of improvements, similar to the most recent safe connectivity options, demonstrated subsequent‐gen wi-fi improvements, and made a number of high-profile media bulletins that underscored our dedication to shaping the way forward for digital communications.

Cisco’s One Cisco technique was on full show, integrating networking, safety, observability, and Splunk options to ship unparalleled outcomes. This holistic method showcases how our clients can obtain AI-ready information facilities, future-proofed workplaces, and digital resilience.

Cisco at MWC 2025: A Powerhouse of Innovation

In true Cisco style, our sales space wasn’t only a area however reasonably a hub of innovation and collaboration. Dwell Demo Highlights included:

Alberto Torralba, Cisco, Presenting to Alberto Núñez Feijóo, Member of the Congress of Deputies of Spain
Fig. 1: Alberto Torralba, Cisco, Presenting to Alberto Núñez Feijóo, Member of the Congress of Deputies of Spain

Classes From Earlier Occasions

Constructing on our experiences at Black Hat, NFL Tremendous Bowl, RSA Convention and others the Workforce introduced the identical power and technical rigor to MWC 2025. Our SNOC group leveraged the operational excellence honed at these occasions, mixing state-of-the-art safety instruments with real-time community monitoring to make sure seamless occasion operations.

The Splunk Cloud was used as the info platform, including Apps for information ingestion:

With these integrations, our SOC group was capable of construct a CISO degree SNOC dashboard for crucial telemetry from all community and safety sources.

CISO-level SNOC dashboard
Fig. 2: CISO-level SNOC dashboard

We additionally had SOC Supervisor degree dashboards for XDR Incidents, Firewall Occasions and DNS Safety.

SOC manager-level dashboard
Fig. 3: SOC manager-level dashboard

We additionally related the integrations with Cisco XDR, for Dashboard visibility and Incident investigation.

Dashboard view of integrations connected to Cisco XDR
Fig. 4: Dashboard view of integrations related to Cisco XDR

We had XDR Automate workflows to advertise menace detections in Splunk to XDR Incidents, and the XDR integration again into Splunk.

Automated XDR workflows
Fig. 5: Automated XDR workflows

The Incidents empowered the SNOC group to prioritize investigations.

Cisco XDR incident list
Fig. 6: Cisco XDR incident checklist

Moreover, at this yr’s Cellular World Congress in Barcelona, Cisco’s ThousandEyes dashboard was instrumental in offering strong community assurance. Attendees benefited from real-time monitoring and insights into community efficiency, guaranteeing a seamless expertise from begin to end. With the aptitude to trace crucial elements just like the occasion homepage and login processes, ThousandEyes ensured that contributors might entry important sources swiftly and with out interruption. This degree of detailed visibility and management helped preserve the integrity and reliability of the community all through the occasion.

Cisco ThousandEyes dashboard
Fig. 7: Cisco ThousandEyes dashboard

Day 1: A Check of Scale

Day 1 was all about dealing with large community exercise seamlessly. From only some workers gadgets to 1000’s of gadgets connecting concurrently, our firewall and community monitoring techniques carried out flawlessly, processing a excessive quantity of site visitors whereas sustaining pinpoint visibility. The strong efficiency of our Cisco safety options reaffirmed that, whether or not in a managed lab setting or amidst a vibrant convention, community resilience is just not negotiable.

Fira Network Security architecture
Fig. 8: Fira Community Safety structure

Day 2: When a Russian Menace Tried to Crash the Social gathering

Simply as you suppose the one surprises at MWC 2025 are the revolutionary tech and spontaneous demos, our firewall logs gave us an surprising twist. On Day 2, our vigilant monitoring detected an anomalous occasion: a privilege escalation occasion coming from a Russian supply.

Firewall Management Center (FMC) Intrusion Events
Fig. 9: Firewall Administration Middle (FMC) Intrusion Occasions

 

Firewall Management Center (FMC) Intrusion Events, detailed view
Fig. 10: Firewall Administration Middle (FMC) Intrusion Occasions, detailed view

Our technical maestro, Jorge Quintero, instantly flagged this as a possible high-risk occasion – a scenario the place an endpoint could be compromised. The logs confirmed a sample according to C2 communications, prompting a fast investigation and swift remediation measures. In true SNOC model, we ensured that any unwelcome visitor was proven the door earlier than it might wreak havoc. (It appears even at MWC, cyber adversaries can’t resist the attract of the get together!)

Firewall Management Center (FMC) Intrusion Event, event packet capture
Fig. 11: Firewall Administration Middle (FMC) Intrusion Occasion, occasion packet seize

What actually stood out on this IDS occasion was a crafted plain-text script working on port 80 with Web Explorer (sure – nonetheless in use).

Intrusion Event Packet Capture, details
Fig. 12: Intrusion Occasion Packet Seize, particulars

The Snort signature that was triggered additionally highlighted two principal methods getting used:

Firewall Management Center (FMC) Intrusion Event, MITRE ATT&CK mappings
Fig. 13: Firewall Administration Middle (FMC) Intrusion Occasion, MITRE ATT&CK mappings

Utilizing public generative AI instruments, the evaluation of the payload yielded the next outcomes, revealing constant patterns of malicious exercise — together with makes an attempt to establish anti-malware instruments (possible for elimination to keep up persistence) and probably escalate privileges additional.

Example from Public Generative AI Application Prompt Response
Fig. 14: Instance from Public Generative AI Software Immediate Response

Lastly, what confirmed our suspicions (in the event that they weren’t already) got here from Talos and AlienVault menace intelligence. This IP deal with (belonging to the Russian Federation) had already been flagged for malicious exercise.

Threat Intelligence Information
Fig. 15: Menace Intelligence Data

Day 3: Cryptomining — The Story of the Good and the Evil

Day 3 introduced an fascinating matter to our consideration — cryptomining. From its humble beginnings to the multi-billion-dollar business, it’s at the moment, we’ve got witnessed the rise of crypto — now extending past simply cryptocurrency to revolutionary makes use of within the fintech area, together with NFTs and extra.

Nevertheless, we’ve got additionally seen how this expertise has been leveraged by malicious actors, particularly to compromise endpoints and hijack computing sources for cryptomining.

Firewall Management Center (FMC), intrusion event details
Fig. 16: Firewall Administration Middle (FMC), intrusion occasion particulars

 

Intrusion event packet capture details
Fig. 17: Intrusion occasion packet seize particulars

Utilizing public generative AI instruments to decode plain textual content, we recognized mining software program (XMRig) making RPC calls to the Monero cryptocurrency community. Now, it’s price highlighting that, though suspicious, this might nonetheless be a legit case of an endpoint working mining software program.

Example from Public Generative AI Application Prompt Response
Fig. 18: Instance from Public Generative AI Software Immediate Response

Nevertheless, the illegitimate nature of this exercise was confirmed once more by Talos and AlienVault intelligence. The general public IP deal with in use had already been flagged for involvement in malicious cryptomining operations.

Threat intelligence information
Fig. 19: Menace intelligence data

Day 4: Slowdown and Occasion Wrap-Up!

Day 4 confirmed a slowdown in exercise, making it a threat-free day and giving us time to research and combination your complete dataset from the occasion. Listed below are a few key takeaways from the firewall evaluation:

1. EVE (Encrypted Visibility Engine): Paving the best way for encrypted site visitors evaluation.

Cisco’s Encrypted Visibility Engine (EVE) has confirmed that the innovation of latest years is important. Monitoring at Fira was performed completely utilizing IDS (Intrusion Detection System) with passive evaluation. Even with out decryption capabilities, we have been capable of establish threats inside encrypted site visitors, in addition to the processes producing these site visitors stream.

Firewall Management Center (FMC) dashboard, Encrypted Visibility Engine statistics
Fig. 20: Firewall Administration Middle (FMC) dashboard, Encrypted Visibility Engine statistics

2. Occasion-driven analytics, powered by Splunk

The Cisco + Splunk story is a match made in heaven. With Cisco’s depth and breadth in safety and a powerful portfolio, mixed with Splunk’s world-class observability and adaptability, we have been capable of construct highly effective, actionable dashboards for simple consumption by the SNOC group.

Under is the aggregated information for your complete occasion — protecting the whole lot from connection occasions, file occasions, and intrusion occasions to a prioritized set of incidents recognized all through the conference.

Secure Firewall Splunk app in Splunk
Fig. 20: Safe Firewall Splunk app in Splunk

This included DNS safety blocks, defending Fira’s Community attendees at MWC, from malicious web sites. Over 14,400 apps have been seen on the MWC community.

Umbrella DNS in Splunk dashboard
Fig. 22: Umbrella DNS in Splunk dashboard

Wanting Forward

The surprising incident on Day 2 solely bolstered one important lesson: in at the moment’s hyper-connected world, innovation should at all times be matched with rigorous safety. As we replicate on the successes of MWC 2025, we’re already planning enhancements to our menace detection and incident response capabilities, drawing on each our MWC, Black Hat, and NFL experiences.

Cisco’s SNOC Workforce stays dedicated to staying one step forward, turning each problem into a chance to innovate and defend. Whether or not it’s managing tens of 1000’s of connections or intercepting a rogue C2 sign, we’re prepared to make sure that the digital future is as safe as it’s sensible.

Whereas expertise was on full show, the actual stars of the Safety Sales space have been the devoted people who introduced these demos and operations to life. A heartfelt thanks to: Alberto Torralba, Filipe Lopes, Jorge Quintero, Jervis Hui, Nirav Shah, John Cardani-Trollinger, and Emile Antone. Their experience and dedication ensured that each demo ran flawlessly and captured the eye of each attendee. Particular appreciation to Ivan Padilla Ojeda, who was our liaison with the community group to attach the whole lot within the SNOC.

Additionally, thanks to those that helped us put together for the SNOC: Ivan Berlinson, Ryan Maclennan, Aditya Sankar, Seyed Khadem, Tony Iacobelli, Dallas Williams, Nicholas Carrieri and Jessica Oppenheimer.

Wrapping Up

Cellular World Congress 2025 was not nearly showcasing the following wave of technological innovation; it was additionally a robust demonstration of how built-in, resilient safety measures can safeguard even essentially the most bustling, high-stakes environments. The comparative insights from Day 1 and Day 2 underscore the significance of staying one step forward, continually adapting, and constantly enhancing our protection methods.

Mobile World Congress 2025 team photo

Thanks for becoming a member of us on this journey by MWC 2025 and keep tuned for extra insights and behind-the-scenes tales from MWC 2025. In spite of everything, on the earth of tech, it’s by no means simply one other day on the workplace!  


 

We’d love to listen to what you suppose. Ask a Query, Remark Under, and Keep Linked with Cisco Safe on social!

Cisco Safety Social Channels

Instagram 

Fb 

Twitter 

LinkedIn

Share:



Related Articles

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Latest Articles