Automating Ransomware Intelligence: Feed ransomware.live
文章介绍了一种通过Azure Logic Apps自动化获取并分析勒索软件攻击数据的方法,并将其发布到Microsoft Teams中为SOC团队提供实时情报。 2025-9-24 23:59:10 Author: infosecwriteups.com(查看原文) 阅读量:9 收藏

Usama Saleem

Press enter or click to view image in full size

Ransomware attacks continue to evolve, and SOC teams need timely intelligence to stay ahead. Public feeds like ransomware.live provide near real-time information on ransomware victims and groups. By using Azure Logic Apps, you can automatically retrieve this data, transform it into a human-readable format, and post it directly to a Microsoft Teams chat or channel giving your SOC team actionable insights without manual effort.

🛠 Prerequisites

Before you start, ensure you have:

  • An Azure subscription with permission to create Logic Apps.
  • Access to a Microsoft Teams account with permission to post to a group chat or channel.
  • A Ransomware.live API endpoint (e.g.,https://ransomware.live/api/recent).
  • Basic familiarity with Logic Apps designer and Teams connectors.

Workflow Architecture

The Logic App will:

  1. Trigger on a schedule (e.g., every 24 hours).
  2. Retrieve the latest ransomware victim data via HTTP GET.
  3. Parse the JSON response into structured fields.

文章来源: https://infosecwriteups.com/automating-ransomware-intelligence-feed-ransomware-live-504970b8e08a?source=rss----7b722bfd1b8d---4
如有侵权请联系:admin#unsafe.sh