What's New
Release highlights for recent CICADA IR versions. Current version: 1.58.0
1.58.0
PCAP pipeline overhaul — wireless analyzer, IOC promotion, performance
- Wireless (802.11) forensics — captures that previously reported “no IP traffic” now produce a full breakdown: SSID inventory, BSSID tracking, client MAC sightings, deauth-flood detection, WPA 4-way handshake capture, and open-AP detection. Surfaced on the Timeline › Network tab and a new Wireless Overview card on the Sources › PCAP summary.
- Wireless intel promoted to first-class IOCs — deauth-flood attacker MAC, WPA-handshake client MACs, and observed SSIDs now flow through the same enrichment and unified IOC store as IP / URL / hash indicators. Indicators filter adds MAC and SSID types.
- Invalid-PCAP diagnostics — helpful error messages identifying Microsoft NetMon, Windows .etl, plain-text log files misnamed as .pcap, and unknown formats.
- Threat-intel enrichment 30× faster — 10-way parallel gather replaces the sequential loop. Non-routable IPs (RFC1918, link-local, multicast, broadcast) hard-filtered before they hit external providers. Per-provider timeouts tuned.
- PCAP queue reliability — analyze route no longer returns HTTP 429 when the semaphore is full. Rows mark as “queued” and wait for a worker slot. UI polling fallback recovers from dropped WebSocket progress events.
- Active Directory collection no longer capped at exactly 2000 events — active ADs collect ~20k events per DC per run instead of 1000.
- Dashboard and Timeline fixes — “Configured Sources” count now reflects wired-up integrations, not just agents that have reported status. Critical alert count on Timeline now matches Dashboard (both paths share a single severity resolver).
1.57.0
PCAP parser rewrite, Dashboard fixes, AD collection fix
- PCAP parser — full per-link-type support. Raw 802.11, radiotap, Linux cooked (SLL/SLL2), BSD null/loopback, PPP, and raw-IP captures now decode correctly. Previously every non-Ethernet capture silently produced 0 flows with no diagnostic. 8 link types now have explicit, unit-tested branches.
- PCAP completion now explains 0-flow results. Wireless auth captures surface “No IP traffic found — capture contains only 802.11 management/control frames, EAPOL/802.1X handshakes, or encrypted data frames”; wired L2-only captures note possible ARP/STP/LLDP-only content.
- Dashboard “Configured Sources” count fixed. The card now reflects the analyst’s wired-up integrations the moment credentials are saved, not only after agents have emitted a status update.
- Timeline Critical alert count matches Dashboard. Previously IOCs promoted to critical via TI reputation showed on Dashboard but stayed at base severity on Timeline. Both paths now share a single severity-resolver helper.
- Active Directory collection no longer capped at exactly 2000 events. The cross-channel page_size cap was starving every channel after Security:auth. Each of the 16 event log channels now honors its own cap independently — active ADs collect ~20k events per DC per run.
1.56.0
Tiered IOC engine overhaul — 63 fixes, 8 new AD detections, YAML pattern library
- 8 new AD attack patterns — Zerologon, DCShadow cleanup, AdminSDHolder modification, pre-auth-disabled (ASREPRoast prep), medium-window brute force, hour-scale password spray, Silver Ticket, and interactive admin logon.
- Kill-chain aggregator — Detected sequences now assemble into per-actor attack narratives ordered by MITRE tactic: Recon → Credential Access → Lateral → Persistence. Severity rolls up by tactic breadth.
- Detection feedback loop — Analyst confirm / clear decisions feed a system-wide calibration table. Patterns with chronic false-positive rates can be auto-disabled.
- Pattern library as YAML — All Tier 2 detections now live in
cicada/data/detections/tier2/patterns.yaml. Adding or tuning a detection no longer requires a code release. Per-tenant overrides supported via overlay files. - Rescore API — Replay the scoring engine against past investigations with the current pattern library. Surfaces newly-confirmed or newly-cleared IOCs after signature updates.
- DC-aware detection — The known-DC list gates DCSync and workstation-to-DC patterns. Strict fallback regex eliminates false positives on hostnames like
predcache,sandcastle,fpdcsvr. - New Tier 1 signatures — COMSVCS MiniDump (fileless LSASS dump), MiniDumpWriteDump API, Invoke-DCSync / secretsdump.py / Invoke-NTLMRelay, legacy dumpers (WCE, pwdump, fgdump), KRBTGT password reset.
- Timezone correctness — All event timestamps normalized to UTC at ingest, fixing mixed-tz crashes in sequence windows, Tier 3 hour-binning errors, and impossible-travel miscalculations.
- Categorizer improvements — Responder “likely malicious” flag now auto-confirms. New
blocked_byfield explains exactly which thresholds held an IOC in suspected state. - Performance — Event index projects specific columns (~5× memory reduction on 100k-event investigations). IOC extractor cache is now a bounded LRU.
1.55.0
Investigation export auth fix & production readiness audit
- Investigation export — Encrypted
.cicada-invbackups now correctly send session cookies with the backup request (credentials: ‘same-origin’), fixing export failures on deployments using cookie-based local auth. - Production readiness audit — Full security and code-quality review completed across the analysis engine, API layer, licensing, integrations, reporting, and frontend. Critical and High findings are being tracked for the upcoming hardening release.
1.54.0
Dashboard UX & NIST framework reference
- Dashboard cards — “Active Sources” renamed to “Configured Sources” (integration sources only, excludes uploaded PCAPs/logs). New card order: Configured Sources | Evidence | Alerts | Actions Taken.
- Response actions counter — Updates within 10 seconds (was 30s). Timeline quick-actions now immediately refresh the counter.
- Guided IR — Panel now references the NIST SP 800-61r2 Computer Security Incident Handling Guide framework.
1.53.0
Observability, support bundle & UX fixes
- Support bundle — Generate a downloadable diagnostic ZIP from Settings > Support. Logs are automatically sanitised (IPs, emails, UUIDs redacted) so you can inspect before sharing with our support team.
- Runtime log level toggle — Change log verbosity from the API without restarting the service.
- Log rotation — Automated daily log rotation (7 days retained, 50 MB max per file) to prevent disk fill on long-running deployments.
- Timeline quick-actions fixed — Block/Isolate/Disable buttons now correctly detect available adapters and show a picker when multiple are configured.
- Setup wizard no longer flashes on backend restart. Logout button added to header. TLS upload now shows accepted certificate formats before upload.
1.52.0
Local user authentication
- Username/password authentication — Air-gapped and LAN deployments no longer require Cloudflare Access. Create local users with username and password directly in the platform.
- Setup wizard admin account — First admin user is now created during initial setup (new step 3 in the wizard).
- User management UI — Settings > Users tab with add, edit, delete, disable users, and password resets.
- Seat enforcement — User count limited by the seats field in your product key. Managed via your licence tier.
- Security hardening — OWASP ASVS Level 2 reviewed with 16 security controls including peppered bcrypt hashing, JWT fingerprinting, refresh token rotation with theft detection, and exponential backoff on failed logins.
1.50.0
Feature gating, tiered reporting & community trial
- Tiered reporting — Investigation reports (executive summary, technical, MITRE mapping, blast radius, attack path, AI-enhanced) available at Professional tier. Compliance & legal reports (NDB, insurance, legal hold, regulatory, client exposure, executive briefing, IR playbook, post-incident review) available at Enterprise tier.
- Community trial — 14-day free trial with download link delivered by email. No credit card required.
- Active Directory moved to the free tier — all users can now connect to on-prem AD out of the box.
- Source connectors and LLM providers are now gated by tier — locked features show a clear disabled state with upgrade prompts.
1.49.0
Behavioral engine hardening
- Major accuracy improvements to the deterministic behavioral scoring engine — fewer false positives from service accounts, SYSTEM log operations, and correlated weak signals.
- PowerShell deobfuscation — detects encoded commands, backtick escapes, and character array obfuscation before pattern matching.
- New detection patterns: WinRM lateral movement, slow-and-low brute force, slow lateral movement campaigns.
- Validated against a 16-scenario test suite covering true positives, false positives, and evasion techniques.
1.48.0
Ubiquiti UCG firewall integration & source selection redesign
- Ubiquiti UniFi Console Gateway integration — collect firewall logs, block/unblock IPs via CICADA-BLOCKLIST firewall group. Supports API key and session-based authentication.
- Source selection at investigation creation — when creating a new investigation, you now choose which data sources to import upfront. No more sources appearing automatically.
1.47.0
Correlation engine & detection coverage expansion
- Correlation engine — individual detections now aggregate into entity-level correlated findings. Risk-based alerting escalates severity when multiple MITRE tactics are observed for the same entity.
- 12 attack chain templates — temporal sequence matching for common attack flows: credential dump → lateral movement, brute force → compromise, full kill chain, DCSync + Golden Ticket, ransomware precursors, and more.
- 17 new Windows Event IDs — domain policy changes, Zerologon/Netlogon, LSASS dump via SilentProcessExit, PowerShell pipeline, MSSQL xp_cmdshell, BITS persistence, Credential Manager, and more.
- Evidence Events tab — search by entity name to see all normalised evidence events where they appear as actor or target.
- Improved Defender alert parsing — process command lines, URL evidence, and registry evidence now extracted from alerts.
- Noise reduction — successful auth IPs no longer create spurious IOCs, SHA1/MD5 duplicates removed, system accounts filtered from blast radius.
For the full changelog including all bug fixes and technical details, contact support@cicada-ir.ai.