Operating the Black Hat Security and Network Operations Center (NOC) presents a unique set of challenges and expectations. Unlike a typical corporate environment where any hacking activity is immediately deemed malicious, the Black Hat conference is a nexus for cybersecurity research, training, and ethical hacking. Consequently, we anticipate and even expect a significant volume of activity that, in other contexts, would be considered highly suspicious or outright hostile. This includes various forms of scanning, exploitation attempts, and other adversarial simulations, often conducted as part of official trainings or independent research.
Adding to this complexity is the Bring Your Own Device (BYOD) nature of the conference network. Attendees connect a wide array of personal devices, making traditional endpoint telemetry (like EDR solutions) a significant challenge for comprehensive monitoring. As such, our primary focus was on robust network-based telemetry for detection and threat hunting.
This writeup details a recent investigation within the Black Hat Security and Network Operations Center (NOC), highlighting the critical role of integrated security tools and early detection in mitigating potential threats, particularly when originating from within a high-profile training environment.
On August 3, 2025, multiple hosts from a Black Hat USA training class were observed conducting unauthorized port scans against external infrastructure associated with an aviation organization. This activity, detected through network telemetry and analytics tooling, was confirmed as unauthorized and in violation of Black Hat's acceptable use policies. This activity aligned with the MITRE ATT&CK framework's Reconnaissance tactic (TA0043), specifically the Active Scanning technique (T1595).
The Cisco XDR analytics incident provided the initial alert and connection flows, offering immediate visibility into the suspicious network activity. Detecting this at the reconnaissance phase is crucial, as early detection in the MITRE ATT&CK chain significantly reduces the risk of an adversary progressing to more impactful stages.
We observed 2 internal hosts from the same subnet connecting to 11 external IP addresses in the same external subnet. The alert is classified as external port scan activity by Cisco XDR.
Cisco XDR's investigate feature allowed us to further drill down into the connection flows associated with the external IP addresses, as well as searching threat intelligence for any reputation associated with the observables. The external hosts were not found to have a malicious reputation.
We utilized Cisco Umbrella (DNS resolver) to confirm that the destination IP addresses resolved to a domain that appears to be an external aviation organization.
Cisco Umbrella smart search of the domain confirmed that the domain has a low risk and classified under the "Aviation/Associations" category. It was confirmed by Cisco Umbrella to belong to a US based aviation organization.
Examining the NetFlow based alert in XDR analytics gives us an immediate insight that port scanning has likely occurred.
XDR Analytics Event Viewer shows the NetFlow data that appear to be a port scan.
To provide further validation and quantification, we then queried the Palo Alto Networks firewall logs directly within Splunk Enterprise Security.
Fig. 1: Splunk investigation querySplunk log date query of Palo Alto Networks firewall showed ports being scanned. Connection patterns observed were consistent with scanning activity, including consistent counts for destination ports. A table output from Splunk showing a consistent count of 49 connections to destination ports was examined to confirm this.
Using our team Slack Bot API integrated with Palo Alto Cortex XSIAM, we quickly identified the source machine, operating from the Black Hat training room "0-DAY UNNECESSARY: Attacking and Protecting Kubernetes, Linux and Containers."
Fig. 2: Source machine informationThe investigation confirmed unauthorized scanning originating by a student. Following this, the offender was quickly identified and made to cease the activity. The incident was closed, with continued monitoring of the training room.
Black Hat is the cybersecurity industry's most established and in-depth security event series. Founded in 1997, these annual, multi-day events provide attendees with the latest in cybersecurity research, development, and trends. Driven by the needs of the community, Black Hat events showcase content directly from the community through Briefings presentations, Trainings courses, Summits, and more. As the event series where all career levels and academic disciplines convene to collaborate, network, and discuss the cybersecurity topics that matter most to them, attendees can find Black Hat events in the United States, Canada, Europe, Middle East and Africa, and Asia. For more information, please visit the Black Hat website.
We'd love to hear what you think! Ask a question and stay connected with Cisco Security on social media.
Cisco Security Social Media
LinkedIn
Facebook
Instagram
X