Keeping One Step Ahead of Black Friday Cyber Threats
DevSecOps / Digital Shadows and XSOAR Powering Automation

Digital Shadows and XSOAR Powering Automation

Digital Shadows and XSOAR Powering Automation
Davitt Potter
Read More From Davitt Potter
April 26, 2021 | 5 Min Read

So you’ve got some threat intelligence here, firewall logs, XDR logs, logs from there, alerts from there, digital risk information from over there, and basically, a giant mess of alerts, notifications, and data from vectors you didn’t even know you had. Along with 250 other alerts.  Monday, once again.

“ALERT:  Exposed Credential from RaidForums”

“ALERT:  Phishing Site at”

“So what, Davitt?” I hear you saying. You probably know where I’m going with this. Enrichment, Playbooks, and Automation. (I mean, it’s up there in the title, right?) Some of you are doing quite a lot of it, and we are extending that ability into SearchLight. The power of adding curated threat intelligence from Digital Shadows allows you to get more from your XSOAR playbooks – not only from a SOC investigation perspective but also to “operationalize” it. Finding ways to automate repetitive, error-prone tasks and ensure the proper actions are taken each and every time is critical in a fast-moving security landscape with limited resources.

Introducing Automatic Playbooks in XSOAR

The Digital Shadows SearchLight™ platform has several automated functions already in place, but we’re taking some steps with Palo Alto Networks’ XSOAR platform to make your life a little easier, workflows a little faster, and using SearchLight even easier. To do that, we’ve developed our first playbook on the XSOAR platform. Named “Digital Shadows Retrieve Exposed Credentials,” the playbook does exactly what you’d expect. 

In the XSOAR marketplace, it will look like this:

Digital Shadows ‘Retrieve Exposed Credentials Playbook’ in XSOAR

To use it, enable the Digital Shadows integration (to current Digital Shadows clients, email me if you don’t have an API key; happy to set it up for you) in XSOAR.

To start, go to “Settings”, then “Integrations”.  Search for Digital Shadows:

Search for “Digital Shadows” in the Integrations section of XSOAR

On the gear icon of the Content Pack, you’ll enter your API credentials. Again, contact me or the Digital Shadows team for assistance. 

Once that’s done, in a matter of moments (depending on your XSOAR installation), you’ll have incidents pulled into XSOAR.

Digital Shadows alerts automatically populated into Cortex XSOAR

From here, you can either use the default Digital Shadows playbook, or link it/integrate it into your existing workflows.

I created a very basic playbook, which extracts the Indicators (the email addresses) into the Intelligence Incident:

Digital Shadows playbook in XSOAR to extract Indicators into the Intelligence Incident

This will then allow you to dive into the incident and execute some of the basic Digital Shadows commands. For example:

Command to find Data Breach Records within XSOAR

Will Return:

Hundreds of Breach Records from Digital Shadows Threat Intelligence in XSOAR for ‘molnet’

( is our faux company, so I’m not letting any real secrets out of the bag here).

You can see the email address, the domain names affected, as well as the password if it’s contained in the breach record. You can also pivot on the email address to see where else it’s recorded in incidents, or, if you have other automation/enrichment sources (Active Directory, etc.), you can pull that information in as well.

From the command line in XSOAR:

Automatically pivot to evidence- view using a Digital Shadows command in XSOAR

You can execute many of the Digital Shadows commands and have them return results.  For example:

 < !ds-find-vulnerabilities >

Will return something like:

Vulnerabilities returned from the Digital Shadows command within XSOAR

Now, you can see SearchLight pushed that alert into XSOAR, and if that was one of my IP addresses, from there, I could pivot into a playbook to do some enrichment/investigation on it, with things like !IPtoHost, or IPReputation, or any other playbook or integration I may have.

For example, this quick playbook (which I just linked together from the defaults) displays the email addresses in the breach, queries for more information from Active Directory, checks if there is an active email address, and then displays this in the War Room.

Whew! Not bad for a couple quick “out of the box” integrations.

In the Future…

Along with the credential enrichment, Digital Shadows have other playbooks on the horizon, including enhancement around vulnerability information, domain intelligence/reputation, and searching the Shadow Search database for events/strings/values that XSOAR may bring to your attention.

Digital Shadows is also developing the Automation pieces to go along with these; if you are able to retrieve something with XSOAR, you can automate it. You could potentially use the Digital Shadows FIND feature, then use the Block IP automation script.  

Keep an eye on this space! We’re excited about XSOAR, and we know you are too. If you have questions, or want to see SearchLight in action, get a free trial or request a demo here.

Related Blog Posts

Dark Web Recruitment: Malware, Phishing, and Carding

Dark Web Recruitment: Malware, Phishing, and Carding

November 10, 2022 | 12 Min Read

In our first blog in this series, we covered how...
2023 Cyber Threat Predictions

2023 Cyber Threat Predictions

November 1, 2022 | 14 Min Read

As we move towards the end of 2022, now is the...
Q3 2022 Vulnerability Roundup

Q3 2022 Vulnerability Roundup

October 26, 2022 | 5 Min Read

The curtain has fallen on the third quarter (Q3)...