Threat intelligence : Know Your Enemy
Threat intelligence is important for learning about unknown threats, making better security decisions, revealing attacker motives and tactics, techniques, and procedures (TTP), and risk assessment. It helps optimize defense capabilities,, uncover and track threat actors targeting the organization, prioritize risk levels, business continuity planning, and accelerate incident response. It is a systematic cyclic process involving the following phases.
1. Planning & Requirements
The planning stage allows security teams to set goals and methodology for threat intelligence depending on the attackers and their motivations, attack surface, and specific actions required to defend from future attacks.
2. Threat Data Collection
The team will collect data from traffic logs, public data sources, forums, social media, and industry experts to meet requirements set in the planning stage.
3. Threat Data Processing
The raw data will be fed into databases, and spreadsheets, and evaluated for relevance and reliability.
4. Threat Data Analysis
The analysis aims to create insights from data to find answers to the questions posed in the planning phase.
5. Threat Risk Dissemination
The threat intelligence team presents the results of the analysis and recommendations to the stakeholders for defensive action.
6. Feedback
This stage's aim is to determine appropriate mitigation action and guide future threat intelligence operations.
Threat Intelligence use cases are the following.
- Blocking bad IPs, URLs, domains, etc
- Using Threat Intelligence to enhance alerts
- Linking alerts into incidents
- Adjust existing security controls
- Introducing new security controls
- Seeking evidence on who/what/why/when/how of incidents
- Finding the root cause of an incident
- Determining intrusion evidence
- Reviewing reports on threat actors for detection
- Assessing the overall threat level for the organization
- Developing security roadmap
Threat intelligence is three types:
- Tactical intelligence
- Operational intelligence
- Strategic intelligence
Tactical Threat Intelligence is technical in nature hence can be automated like malware analysis. It aims to gain a broader view of threats. It tries to identify indicators of compromise (IOCs), which are known malicious IP addresses, URLs, file hashes, and domain names.
Operational Threat intelligence provides insight into how attackers plan, conduct, and execute attacks based on the attacker, motivation, and techniques of the threat. It involves both machine and human analysis and is used in a Security Operations Center(SOC).
Strategic Threat Intelligence is focused on business decisions related to global events, foreign policies, the world’s geopolitical situation, and other local and international movements that can potentially impact organization security. It helps prioritize cyber security strategies.
1. Learning the Threat Landscape
You can obtain information on the latest threats, and TTP from the following sources.
1. MITRE ATT&CK
The MITRE ATT&CK framework (Adversarial, Tactics, Techniques, & Common Knowledge) accessible at attack.mitre.org, is a comprehensive database detailing cyber-criminal TTP. This database provides a full scope of attack descriptions that can be used to improve your security posture.
2. Common Vulnerabilities and Exposures (CVE
CVE is an online database that identifies, define, and catalog publicly disclosed cyber security vulnerabilities, that are accessible at cve.org. A vulnerability is identified by a unique CVE number, and CVSS scores, for planning and prioritization of vulnerability management programs.
3. National Vulnerability Database (NVD)
The NVD is the U.S. government repository of standards-based vulnerability information (nvd.nist.gov). It includes databases of security checklist references, security-related software flaws, misconfigurations, product names, and impact metrics.
Following are some of the Threat Intelligence Tools.
- Anomali ThreatStream pulls threat intelligence data from various sources and provides tools for investigations.
- Cybernet's Argos Digital Risk Protection Platform is a SaaS platform designed to analyze an organization's attack surface and cyberattacks.
- Kaspersky Lab's Kaspersky Threat Intelligence collects petabytes of data to generate threat intelligence feeds targeting particular industries.
- PhishLabs' Digital Risk Protection monitors the web for social media threats, data leakage, brand impersonation, and account takeover.
- SOCRadar's ThreatFusion Cyber Threat Intelligence gathers data from deep and dark webs.
Niranjan Meegammana
Comments
Post a Comment