Sandfly 5.7 - Performance Upgrade
好的,用户让我用中文总结这篇文章,控制在100字以内,而且不需要特定的开头。我先看看文章内容。 文章主要讲Sandfly 5.7版本的更新,包括扫描速度提升、内存使用减少、跨文件系统扫描优化、SSH跳转主机增强、防火墙配置漂移检测、登录UID攻击检测、ICMP后门检测扩展、UI支持更大主机和结果视图、Syslog集成增强、服务器配置改进以及对Claude AI的支持。 我需要把这些关键点浓缩到100字以内。首先强调性能提升,比如扫描速度提升50%以上,内存使用减少。然后提到新增的功能,比如登录UID检测和ICMP后门检测扩展。最后提到UI和AI支持的改进。 这样组织起来应该可以控制在100字左右。 </think> Sandfly 5.7 提升了扫描速度和性能,减少了系统资源占用,并增强了对 Linux 系统的取证能力。新增功能包括跨文件系统扫描优化、SSH 跳转主机性能提升、防火墙配置漂移检测以及针对登录 UID 的攻击检测。此外,扩展了 ICMP 后门检测,并改进了 UI 和 Syslog 集成。支持 Anthropic 的 Claude AI 模型,适用于大规模安全管理和分析需求。 2026-3-26 01:6:6 Author: sandflysecurity.com(查看原文) 阅读量:7 收藏

Sandfly Blog

Speed and visibility are everything during a security investigation. With the release of Sandfly 5.7, we’ve drastically reduced scan times, expanded our threat detection to catch stealthy backdoors, and made it easier than ever to scale your Linux forensics

Faster Scans with Lower System Impact

With Sandfly 5.7 we have carefully reviewed our scanning engines for performance bottlenecks and have increased scan speeds by 50% or more. This has resulted in less time running on a host, less memory used when running, and even lower overall impacts during scans.

The performance boost affects most of our scanning process. While you may not see it yourself, know that under the covers significant speedups were made where it counts to ensure Linux forensics data is collected more quickly and accurately than ever.

Cross File System Mount Scan Blocking

We now have checks to prevent crossing file system mounts such as NFS. This prevents Sandfly from scanning potentially slow network links on remotely mounted file systems which can cause the scan to time out waiting for data. This feature can be disabled on custom sandflies for customers that want to maintain scanning across mount points.

Scale Securely with SSH Jump Host Enhancements

For customers running Sandfly across jump hosts, we have made big improvements to how they are handled, resulting in large performance gains here as well. A single jump host can now carry many more connections without overloading and scan times have been dropped dramatically when doing large host count scanning behind jump hosts.

Drift Detection for Firewall Configurations

We have added a new reconnaissance module recon_file_attributes_in_etc_firewall which is disabled by default, but provides a mechanism for customers to enable and start capturing file attributes for critical firewall configuration areas. This module would be useful for those using our agentless drift detection feature to find firewall rules that may have been modified on disk. This means if an attacker silently alters a firewall rule to open a backdoor port, you'll know immediately.

Login UID Attack Detection

Linux provides a process value called loginuid which is the User ID (UID) of the original owner that started a process. This value will remain set to the original owner even if the process forks or is taken over by the systemd process (PID 1) if a user logs out and keeps the binary running.

Why should you care? Well, it means that if someone starts a malicious process on a host, and it changes owner to root, for instance, the loginuid will show the UID of the user that originally started it. This means security teams can find out what user initially started a binary even if it is masked by how it was spawned on the host.

For example, the webserver spawns an attack that pivots to root. The loginuid value will show the process was started by the webserver, and not root. This helps investigators rapidly get to the bottom of where and how an intrusion may have happened.

We have leveraged this to add several new detections as well:

process_backdoor_shell_no_loginuid_network - Looks for shell processes with no audit login trail (login UID unset) that have active network connections. These are typically bind shell backdoors trying to hide who or what started them.

process_deleted_loginuid_set - Looks for processes with deleted binaries that were started by a logged-in user (login UID set). These are processes likely started by an interactive session that then deleted the process binary from disk to hide evidence.

process_deleted_root_loginuid_nonroot - Looks for deleted binaries running as root where the audit login UID shows a non-root user originally authenticated. Typically it's a non-root user starting a process and then removing it from the disk after privilege escalation to hide.

process_running_hidden_loginuid_set - Looks for hidden processes that have a valid audit login UID set. Generally spawned processes from stealth rootkits.

ICMP Backdoor Detection Expanded

We expanded our ability to spot ICMP backdoors, including more magic packet type variants. New detections were added to spot the raw ICMP port activity that is suspicious. This builds upon our other detections that find sniffing and raw socket malware backdoor activity across multiple protocols.

100,000 Host and Result Views

To support larger Sandfly deployments, we have enhanced the UI to allow listing 100,000 hosts and results at a time. Customers can select view sizes at the bottom of the Hosts and Result screens.

Richer Syslog Integration for Better Alerting

We have added the ability to send not just alerts like we have in the past, but also error and audit log events to syslog. We also enabled the ability to set facility values for customers that manage log data using them.

Server Config Updates

We have consolidated and improved our server configurations page. All server settings are better organized and visible to admins.

AI Analyst LLM Support For Claude

We have added Anthropic's Claude AI LLM support along with existing OpenAI, Google Gemini, xAI, Digital Ocean, and OpenAI API compatible settings.

We are vendor-agnostic when it comes to AI LLMs and find that all the frontier LLM systems work pretty well. Use what your organization provides and our accurate forensics data will give you good results. You can even use on-prem models with the OpenAI API-compatible setting which works well with Ollama and other local model hosting platforms.

Sandfly 5.7 Performance

Whether you are hunting for stealthy rootkits or managing security across 100,000 nodes, Sandfly 5.7 gives you the speed and visibility you need without the burden of endpoint agents.

Please see our documentation on the new features and capabilities:

Sandfly Documentation →

Customers wishing to upgrade can follow the instructions here:

Upgrading Sandfly →



文章来源: https://sandflysecurity.com/blog/sandfly-57-performance-upgrade
如有侵权请联系:admin#unsafe.sh