HubSpot CRM
Customer Relationship Management (CRM) :
HubSpot - CRM platform with marketing, sales, and customer service tools.
Detection Rules for HubSpot CRM
These detection rules will focus on various aspects of HubSpot such as marketing,sales,& customer service tools.
Provider: HubSpot
App: HubSpot | MITRE Tactic | MITRE Technique | Criticality | ||||||
---|---|---|---|---|---|---|---|---|---|
Suspicious Login Activity (Abnormal Geolocation/IP) | Initial Access, Credential Access | T1078: Valid Accounts | High | ||||||
|
|||||||||
Unauthorized Data Export | Exfiltration | T1537: Transfer Data to Cloud Account | High | ||||||
|
|||||||||
Suspicious API Access | Credential Access, Discovery | T1078: Valid Accounts, T1087: Account Discovery | High | ||||||
|
|||||||||
Creation of Suspicious Workflows/Automation Rules | Privilege Escalation | T1546.003: Event Triggered Execution | Medium | ||||||
|
|||||||||
Suspicious Modification of CRM Records | Impact | T1485: Data Destruction | Medium | ||||||
|
|||||||||
Email Campaign Phishing Attempts | Initial Access | T1566.001: Spearphishing Attachment | High | ||||||
|
|||||||||
Excessive API Token Generation | Credential Access | T1078: Valid Accounts | High | ||||||
|
|||||||||
Suspicious Email Bounce Rate | Initial Access | T1566.002: Spearphishing Link | Medium | ||||||
|
|||||||||
Mass Export of CRM Data | Exfiltration | T1020: Automated Exfiltration | High | ||||||
|
|||||||||
Account Takeover Attempts | Credential Access | T1078: Valid Accounts | High | ||||||
|
|||||||||
Suspicious Access to Customer Information by Unusual Users | Collection | T1056.001: Keylogging | Medium | ||||||
|
|||||||||
Login from Known Malicious IP Addresses | Credential Access | T1071: Application Layer Protocol | High | ||||||
|
|||||||||
Unauthorized Role/Permission Changes | Privilege Escalation | T1069: Permission Groups Discovery | High | ||||||
|
|||||||||
Suspicious Use of API Keys by Third-Party Integrations | Credential Access, Persistence | T1098: Account Manipulation | High | ||||||
|
|||||||||
Multiple Failed Login Attempts (Brute Force) | Credential Access | T1110.001: Password Guessing | Medium | ||||||
|
|||||||||
OAuth Abuse via Suspicious Third-Party Apps | Persistence | T1098: Account Manipulation | High | ||||||
|
APIs and Their Scopes
App: HubSpot | API Required | Scope Required | Usage |
---|---|---|---|
Suspicious Login Activity (Abnormal Geolocation/IP) | HubSpot Audit Logs API | crm.audit.read | Retrieve login attempts and user activity logs for analysis of geolocation and IP addresses. |
Unauthorized Data Export | HubSpot CRM API | crm.objects.contacts.read | Check for export events and verify whether data exports are authorized. |
Suspicious API Access | HubSpot API Logs API | api.logs.read | Access API usage logs to detect unusual patterns of access to sensitive data. |
Creation of Suspicious Workflows/Automation Rules | HubSpot Workflows API | automation.workflows.read | Audit workflow creation logs and analyze user permissions related to workflow modifications. |
Suspicious Modification of CRM Records | HubSpot CRM API | crm.objects.contacts.read | Retrieve modification logs to analyze unauthorized changes to CRM records. |
Email Campaign Phishing Attempts | HubSpot Email API | email.read | Analyze email campaign statistics and content for phishing attempts. |
Mass Email Deletion | Microsoft Graph API | Account Takeover Attempts | HubSpot Login API |
Account Takeover Attempts | HubSpot Login API | users.read | Monitor failed login attempts and analyze successful logins for suspicious behavior. |
Mass Export of CRM Data | HubSpot CRM API | crm.objects.contacts.read | Monitor data export activities and assess user permissions related to data access. |
Unauthorized Role/Permission Changes | HubSpot User Management API | users.read | Retrieve logs of role changes and permissions for user accounts. |
Multiple Failed Login Attempts (Brute Force) | HubSpot CRM API | users.read | Track failed login attempts to detect patterns indicating brute force attacks. |
OAuth Abuse via Suspicious Third-Party Apps | HubSpot OAuth API | oauth.tokens.read | Monitor OAuth token usage and check for unauthorized third-party access. |
Reports and Widgets for CISO
Report Name | Widgets | Description |
---|---|---|
User Access and Authentication Logs | Successful Logins | Overview of user login attempts, including successes and failures, to identify suspicious activities. |
Failed Login Attempts Geolocation of Logins |
||
Data Export Activity Report | Total Data Exports | Summary of all data exports, including user details and time stamps to monitor unauthorized access. |
Exports by User Export Attempts by Date |
||
Workflow Change Audit | Recent Workflow Changes | Log of all modifications to automation workflows to detect unauthorized changes. |
Users Making Changes Workflows Affected |
||
API Usage and Access Report | API Call Volume | Analysis of API calls to identify unusual access patterns or excessive use of certain endpoints. |
Top API Consumers Unusual API Access Attempts |
||
Email Campaign Security Report | Email Opens | Review of email campaigns sent, including open rates and bounces to spot potential phishing attempts. |
Bounced Emails Phishing Alerts |
||
User Permission Changes | Recent Permission Changes | Log of role and permission changes for users to ensure compliance with access controls. |
Users Affected Changes by Date |
||
Account Takeover Attempts | Failed Login Attempts | Summary of potential account takeover attempts based on failed logins and location changes. |
Geolocation Analysis Users Affected |
||
Role & Permission Changes | Changes in User Roles | Monitors any role or permission changes, especially focusing on elevated permissions granted. |
Permissions Granted to External Users Elevated Permissions Changes |
||
CRM Anomalies Report | Unusual Customer Data Changes | Identifies unusual CRM activity, including sudden data deletions or duplicate record creation anomalies. |
CRM Record Deletion Spike Duplicate Records Creation |