Threat Intel not working 2.4.6

I need help with the Treat Intel plugin, it just doesn’t work for me, I created a similar thread before: Testing Theat Intel plugin not working, but was extra busy in that time period and wanted to test on the newest version (if that helped).

I’m now running the latest version of Graylog as well as the plugin (confirmed by browsing to the /plugins folder).

I’m testing the Ransomware domain blocklist: in particular with (IP

I visit the site and the the DestinationIp_threat_indicated is false:

The plugin is enabled:

Lookup Tables seem to fine:

As well as Data Adapters:

This is what I see in the current log (nothing related to Threat Intel if I’m looking correctly):
2018-08-02_08:24:56.81994 at ~[graylog.jar:?]
2018-08-02_08:24:56.81994 at org.graylog2.alerts.AlertConditionFactory.createAlertCondition( ~[graylog.jar:?]
2018-08-02_08:24:56.81994 at org.graylog2.alerts.AlertServiceImpl.fromPersisted( ~[graylog.jar:?]
2018-08-02_08:24:56.81995 at org.graylog2.streams.StreamServiceImpl.getAlertConditions( [graylog.jar:?]
2018-08-02_08:24:56.81995 at org.graylog2.periodical.AlertScannerThread.doRun( [graylog.jar:?]
2018-08-02_08:24:56.81995 at [graylog.jar:?]
2018-08-02_08:24:56.81995 at java.util.concurrent.Executors$ [?:1.8.0_172]
2018-08-02_08:24:56.81996 at java.util.concurrent.FutureTask.runAndReset( [?:1.8.0_172]
2018-08-02_08:24:56.81996 at java.util.concurrent.ScheduledThreadPoolExecutor$ScheduledFutureTask.access$301( [?:1.8.0_172]
2018-08-02_08:24:56.81996 at java.util.concurrent.ScheduledThreadPoolExecutor$ [?:1.8.0_172]
2018-08-02_08:24:56.81997 at java.util.concurrent.ThreadPoolExecutor.runWorker( [?:1.8.0_172]
2018-08-02_08:24:56.81997 at java.util.concurrent.ThreadPoolExecutor$ [?:1.8.0_172]
2018-08-02_08:24:56.81997 at [?:1.8.0_172]
2018-08-02_08:24:56.82020 ERROR [StreamServiceImpl] Skipping alert condition.
2018-08-02_08:24:56.82021 java.lang.IllegalArgumentException: Unknown alert condition type: Aggregates Alert
2018-08-02_08:24:56.82021 at ~[graylog.jar:?]
2018-08-02_08:24:56.82021 at org.graylog2.alerts.AlertConditionFactory.createAlertCondition( ~[graylog.jar:?]
2018-08-02_08:24:56.82021 at org.graylog2.alerts.AlertServiceImpl.fromPersisted( ~[graylog.jar:?]
2018-08-02_08:24:56.82022 at org.graylog2.streams.StreamServiceImpl.getAlertConditions( [graylog.jar:?]
2018-08-02_08:24:56.82022 at org.graylog2.periodical.AlertScannerThread.doRun( [graylog.jar:?]
2018-08-02_08:24:56.82022 at [graylog.jar:?]
2018-08-02_08:24:56.82022 at java.util.concurrent.Executors$ [?:1.8.0_172]
2018-08-02_08:24:56.82022 at java.util.concurrent.FutureTask.runAndReset( [?:1.8.0_172]
2018-08-02_08:24:56.82023 at java.util.concurrent.ScheduledThreadPoolExecutor$ScheduledFutureTask.access$301( [?:1.8.0_172]
2018-08-02_08:24:56.82023 at java.util.concurrent.ScheduledThreadPoolExecutor$ [?:1.8.0_172]
2018-08-02_08:24:56.82023 at java.util.concurrent.ThreadPoolExecutor.runWorker( [?:1.8.0_172]
2018-08-02_08:24:56.82025 at java.util.concurrent.ThreadPoolExecutor$ [?:1.8.0_172]
2018-08-02_08:24:56.82025 at [?:1.8.0_172]

The Graylog server has unrestricted access to the internet.

Please assist.

how did you run those thread intel lookups? Are you using a processing pipeline?

What is the content of the rules? Did you checked if the rules run on the messages?

I tested by visiting the site in the browser, didn’t know to do much more.

The rules are as follows:

rule “Threat Intelligence Lookups: domain”
set_fields(threat_intel_lookup_domain(to_string($message.DestinationHostname), “DestinationHostname”));

rule “Threat Intelligence Lookups: dst_addr”
set_fields(threat_intel_lookup_ip(to_string($message.DestinationIp), “DestinationIp”));

rule “Threat Intelligence Lookups: src_addr”
set_fields(threat_intel_lookup_ip(to_string($message.SourceIp), “SourceIp”));

The rules have a lot of throughput every time I check.

I’m pretty sure the rules run on these messages, since this is the only stream that has the threat_indicated entry and it is visible on the messages:

How else can I check?

Did you checked your Graylog server.log ?

Some of the external services block or throttle your request when you are above certain limits.

I posted the output of the current log above. I might add that not a single threat has been detected so far, which seems a bit odd.

you posted a few lines not a complete log - with the given information it is not possible to find a reason.

My appologies, Here’s the complete log:!Amnw_mqG-fo2s4IWWdDPuhQ7OxxiFA.

Have you perhaps found anything, I really need to get this to work not sure what’s the problem.

Is there perhaps a list of URLs, IPs that the plugin connects to, so we’d at least know if it’s making the connection at all?

This topic was automatically closed 14 days after the last reply. New replies are no longer allowed.