A new version of the Hashr tool has been released.

Summary:

CERT-AGID has released version 2.0.1 of the hashr tool, a free and open-source software designed to detect malicious files by comparing their hash values with known hashes. Public administrations can access real-time Indicators of Compromise (IoC) to enhance cybersecurity efforts.

Keypoints:

  • New version of hashr (v.2.0.1) released by CERT-AGID.
  • Tool designed for detecting malicious files through hash comparison.
  • Available for free download and open-source under EUPL license.
  • Public administrations can access a real-time feed of IoCs from CERT-AGID.
  • Enhances cybersecurity investigations and file integrity verification.
  • Supports compliance with the 2024-2026 Digital Plan for Public Administration.

  • MITRE Techniques

  • Indicator of Compromise (T1203): Utilizes known malicious file hashes to identify compromised files within a system.
  • Malware Analysis (T1040): Analyzes malware campaigns to derive IoCs for proactive threat detection.
  • File Integrity Monitoring (T1070): Monitors file integrity by comparing current file hashes against known good hashes.

  • CERT-AGID has recently released a new version of the hashr tool (v.2.0.1) as free and open-source software under the EUPL license. This tool, available for free download from the dedicated page, is designed for the detection of malicious files within a filesystem by comparing the hash values of found files with a list of known hash fingerprints. Hashr can be used with custom search lists or, for public administrations accredited to the CERT-AGID IoC feed, with hashes derived from recorded malicious campaigns that impact the Italian territory.

    hashr in action

    All Public Administrations can register for the CERT-AGID IoC feed to access a real-time stream of Indicators of Compromise (IoC), which lists and shares data on detected malware and phishing campaigns during daily monitoring and prevention activities, such as the IP addresses used for fraudulent activities, URLs of malicious sites, hashes of harmful files, and other information. This service, offered for free, is intended exclusively for Public Administrations.

    Example of IoCs issued by CERT-AGID in easylist format

    In synergy with the IoC Feed, hashr allows for searching files with hashes related to known malicious campaigns or APTs analyzed by CERT-AGID, enabling quick identification of compromised files. The use of hashr is particularly useful for cybersecurity investigations, forensic analysis, and file integrity verification on large filesystems.

    The combined use of hashr and the IoC feed significantly enhances the ability to prevent and detect cyber threats, increasing the overall security of digital infrastructures.

    These two tools provided by AGID represent an opportunity for administrations to improve the security of their IT systems, while also complying with the guidelines of the 2024-2026 Digital Plan for Public Administration and strengthening the overall digital resilience of Public Administration.

    Useful Links:

    Source: Original Post