Unlocking the Power of the InsightIDR Threat API, Part 2

Unlocking the Power of the InsightIDR Threat API, Part 2

This blog post is a follow-up to my previous blog on using the InsightIDR API to create and maintain threat feeds into InsightIDR.


What is InsightIDR?


InsightIDR is Rapid7’s SIEM solution that helps you centralize and unify your security data, detect behavior behind breaches, and respond to attacks targeting your modern network.


Leveraging third-party threat feeds in InsightIDR


In the previous blog, I explained how to scrape the website https://abuse.ch for possible bad actors that are part of the Feodo Tracker project. In this post, we’ll expand our options and scrape a few more sites to demonstrate how this process works for more complex indicators.


As I mentioned previously, you don’t need any programming experience to use the API. This blog explains in some detail how to write your own scripts to use the Rapid7 REST API, but you can also skip this part and scroll down to the working scripts.


For demonstration purposes, I am using Microsoft’s PowerShell, but please use the scripting language of your choice.


Getting started with the InsightIDR Threat API


You will need your platform API key for this exercise. You will also need to create some private threats and have their associated threat keys handy. If you need to get the steps on how to gather these keys, please see our previous blog.


Let’s start by looking at the next abuse.ch project, Ransomware Tracker. It contains a blocklist of ransomware C&C domains, URLs, and IPs, which you ..

Support the originator by clicking the read the rest link below.