Query Details
// https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-093a let FastFlux = ThreatIntelIndicators | where TimeGenerated > ago(365d) | where now() between (ValidFrom .. ValidUntil) | where isnotempty(Data.labels) | mv-expand Data.labels | where Data_labels has "mitre" | extend MitreID = parse_json(tostring(Data_labels)).Alias | where MitreID == "T1568.001" | project ObservableValue; DeviceNetworkEvents | where TimeGenerated > ago(1h) | where ActionType == "DnsConnectionInspected" | where AdditionalFields.direction == "Out" | where AdditionalFields.query has_any (FastFlux)
This query is designed to identify potential cybersecurity threats related to a specific MITRE ATT&CK technique (T1568.001) known as "Fast Flux." Here's a simplified breakdown of what the query does:
Threat Intelligence Indicators Extraction:
365 days).now() is between ValidFrom and ValidUntil).Device Network Events Monitoring:
In summary, this query is used to detect outgoing DNS queries from devices that match known Fast Flux threat indicators, helping to identify potential malicious activity related to this technique.

Steven Lim
Released: April 28, 2025
Tables
Keywords
Operators