Threat Intelligence is Dead. Long Live Threat Intelligence!



Similar documents
Eight Essential Elements for Effective Threat Intelligence Management May 2015

Operational Lessons from the RSA/EMC CIRC: People, Process, & Threat Intel

Advanced Visibility. Moving Beyond a Log Centric View. Matthew Gardiner, RSA & Richard Nichols, RSA

Symantec Cyber Security Services: DeepSight Intelligence

Leading The World Into Connected Security. Dipl.-Inform., CISSP, S+ Rolf Haas Enterprise Technology Specialist Content Lead EMEA

Performing Advanced Incident Response Interactive Exercise

Cymon.io. Open Threat Intelligence. 29 October 2015 Copyright 2015 esentire, Inc. 1

Gaining and Maintaining Support for a SOC. Jim Goddard Executive Director, Kaiser Permanente

THREAT VISIBILITY & VULNERABILITY ASSESSMENT

Cyber Watch. Written by Peter Buxbaum

Enterprise Organizations Need Contextual- security Analytics Date: October 2014 Author: Jon Oltsik, Senior Principal Analyst

Cyber Threats Insights from history and current operations. Prepared by Cognitio May 5, 2015

Symantec Cyber Threat Analysis Program Program Overview. Symantec Cyber Threat Analysis Program Team

After the Attack: RSA's Security Operations Transformed

Unified Security Management and Open Threat Exchange

100 Hamilton Avenue Palo Alto, California PALANTIR CYBER. An End-to-End Cyber Intelligence Platform

Automate the Hunt. Rapid IOC Detection and Remediation WHITE PAPER WP-ATH

APT A%ribu*on and DNS Profiling. Frankie Li

Advanced Threat Protection with Dell SecureWorks Security Services

PALANTIR CYBER An End-to-End Cyber Intelligence Platform for Analysis & Knowledge Management

GETTING REAL ABOUT SECURITY MANAGEMENT AND "BIG DATA"

Missing the Obvious: Network Security Monitoring for ICS

A Primer on Cyber Threat Intelligence

FROM INBOX TO ACTION AND THREAT INTELLIGENCE:

Cloud and Critical Infrastructures how Cloud services are factored in from a risk perspective

WHITE PAPER SPLUNK SOFTWARE AS A SIEM

Applying machine learning techniques to achieve resilient, accurate, high-speed malware detection

Separating Signal from Noise: Taking Threat Intelligence to the Next Level

Compliance Guide ISO Compliance Guide. September Contents. Introduction 1. Detailed Controls Mapping 2.

WHITE PAPER: THREAT INTELLIGENCE RANKING

All about Threat Central

DYNAMIC DNS: DATA EXFILTRATION

Botnet Analysis Leveraging Domain Ratio Analysis Uncovering malicious activity through statistical analysis of web log traffic

Threat Intelligence: The More You Know the Less Damage They Can Do. Charles Kolodgy Research VP, Security Products

Comprehensive Advanced Threat Defense

Threat Intelligence Buyer s Guide

Intelligence Driven Security

Big Data in Action: Behind the Scenes at Symantec with the World s Largest Threat Intelligence Data

STRATEGIC ADVANTAGE: CONSULTING & ISIGHT INTELLIGENCE

NASCIO 2015 State IT Recognition Awards

The Role of Threat Intelligence and Layered Security for Intrusion Prevention in the Post-Target Breach Era

Integrating MSS, SEP and NGFW to catch targeted APTs

SECURITY ANALYTICS MOVES TO REAL-TIME PROTECTION

Sophisticated Indicators for the Modern Threat Landscape: An Introduction to OpenIOC

Niara Security Analytics. Overview. Automatically detect attacks on the inside using machine learning

ADVANCED KILL CHAIN DISRUPTION. Enabling deception networks

Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst

Digital Evidence and Threat Intelligence

Dealing with Big Data in Cyber Intelligence

SES / CIF. Internet2 Combined Industry and Research Constituency Meeting April 24, 2012

REVOLUTIONIZING ADVANCED THREAT PROTECTION

The Third Rail: New Stakeholders Tackle Security Threats and Solutions

The SIEM Evaluator s Guide

Defending against Cyber Attacks

Threat Intelligence Platforms: The New Essential Enterprise Software

How To Manage Security On A Networked Computer System

Rethinking Information Security for Advanced Threats. CEB Information Risk Leadership Council

Threat Intelligence: An Essential Component of Cyber Incident Response. Jeanie M Larson, CISSP-ISSMP, CISM, CRISC

Find the needle in the security haystack

Secure Because Math: Understanding ML- based Security Products (#SecureBecauseMath)

The principle of Network Security Monitoring[NSM]

Vulnerability Management

Security Analytics for Smart Grid

Defending Against Data Beaches: Internal Controls for Cybersecurity

Fighting Advanced Threats

Network Security Deployment (NSD)

Next Generation IPS and Reputation Services

Domain Hygiene as a Predictor of Badness

Innovative Security for an Accelerating World New Approaches for Chief Security Officers

Getting Ahead of Malware

The Need for Intelligent Network Security: Adapting IPS for today s Threats

Cyber Adversary Characterization. Know thy enemy!

Defending Against. Phishing Attacks

Threat Intelligence: What is it, and How Can it Protect You from Today s Advanced Cyber-Attacks A Webroot publication featuring analyst research

LEVERAGING PROACTIVE DEFENSE TO DEFEAT MODERN ADVERSARIES. Jared Greenhill RSA Incident Response. September 17 th, 2015

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.

Evolution Of Cyber Threats & Defense Approaches

Take the Red Pill: Becoming One with Your Computing Environment using Security Intelligence

Palo Alto Networks. October 6

Fidelis XPS Tech Talk: Preventing Cyber Attacks With Real-Time Threat Intelligence. June 2010 Version 1.0 PAGE 1 PAGE 1

How To Prevent Hacker Attacks With Network Behavior Analysis

Critical Security Controls

JUNIPER NETWORKS SPOTLIGHT SECURE THREAT INTELLIGENCE PLATFORM

Breach Found. Did It Hurt?

SHARING THREAT INTELLIGENCE ANALYTICS FOR COLLABORATIVE ATTACK ANALYSIS

Network Security Monitoring: Looking Beyond the Network

THE EVOLUTION OF SIEM

EEI Business Continuity. Threat Scenario Project (TSP) April 4, EEI Threat Scenario Project

Data Driven Assessment of Cyber Risk:

ESG Brief. Overview by The Enterprise Strategy Group, Inc. All Rights Reserved.

Transcription:

SESSION ID: STR-R02 Threat Intelligence is Dead. Long Live Threat Intelligence! Mark Orlando Director of Cyber Operations Foreground Security

Background

Threat Intelligence is Dead. Long Live Threat Intelligence! Defining and Discussing Threat Intel Market Offerings Concerns, Considerations Mainly Quality and Utility Types of Indicators, What s Good and Bad Case Studies and What Works Applying What You ve Learned Q&A

What is Threat Intelligence? Many different kinds; we re talking about cyber threat intelligence - more specifically, indicator-based intelligence services IP addresses, email addresses, strings, FQDNs, mutex, URLs, hashes Subscription services, products, hybrid model

Why the Hype? It makes us feel less like this and more like this.

The Market 7

Threat Intel is Dead Highly commoditized it s the new IDS signature Poor quality control Short shelf life Promotes false sense of awareness

Or is it? If processed and applied properly, an invaluable resource Gets us closer to the adversary s tactics and infrastructure Informs defensive posture

The Reality Cyber threat intelligence is another tool in the defender s toolbox Must be collected, vetted, applied, and automated for better and more timely detection without exponentially increasing workload or sacrificing the fundamentals: Robust instrumentation Awareness of one s own environment Solid analytic processes

Market Offerings

Considerations What are your monitoring goals? Protection Detection Attribution and Prosecution

Considerations What are your monitoring goals? Protection good! Detection good! Attribution and Prosecution maybe YOU?

Considerations What are your monitoring capabilities? Tools ingest XML/CSV/JSON, web site content, vendor provided indicators, community or industry reports Staff to collect, vet, curate, and apply Awareness threats and countermeasures within your environment, likely targets

Ok, we have our intel. What now? 17

Quality and Utility Scenario: good indicators versus bad indicators Malware calls out to http://infect.p0wned.de/clickme/fool.php User agent observed: Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.2; Trident/6.0; 6F8D132A4C9F Which would you pivot from?

Quality and Utility http://infect.p0wn3d.de/clickme/fool.php broken down: FQDN: infect.p0wn3d.de Domain name: p0wn3d.de URL path: /clickme/fool.php Resolved IP: 123.80.123.80

Quality and Utility Useful: http://www.cnn.com/adhome/malicious_ad.js Not as useful: www.cnn.com

Network Indicators How can you vet network indicators? FQDN/Domain: Age of domain Registrant info (name, email, address) Page rank Reputation Malware history Sources: WHOIS, Domaintools, Alexa, AV/web proxy vendors, VirusTotal

Network Indicators How can you vet network indicators? IP Address: Netblock owner # domains hosted on that IP Malware history Sources: WHOIS, Domaintools, VirusTotal

Host Indicators Host-based indicators require closer inspection Careful! Watch community contributed and auto-gen content Generic filenames should be noted, probably not useful System paths alone aren t very useful Generate regex for generated names/hashes if possible

Email Indicators Spoofed sender addresses are interesting but not indicators Attachment names and subject lines are similarly interesting, but often tweaked or used in a single campaign only so not indicators in themselves Indicators derived from malicious attachments and links are better

Bad Indicators BAD! 127.0.0.1 RFC 1918 reserved addresses like 10.0.0.0/8 Well known domains like google.com Blank values like 0.0.0.0

Case Studies 27

Case Study 1: Commercial Feed XML feed of domains, IP addresses, mutex, URLs, and user agent strings Collected and vetted by a global team of analysts Approximately 730 unique indicators a month

Indicator Types, Descriptions EXPLOIT STAGE 2 DL INITIAL INFECTION C&C DOMAIN IP URL USER AGENT MUTEX

Analytic Value IP addresses and domains are useful, but easily modified by the attacker and are often specific to campaign or variant Good indicators, but indicator!= incident Most of these come in late in the attack chain; read about David J. Bianco s Pyramid of Pain (http://detect-respond.blogspot.com/)

Lessons Learned Track hit rate, vet in advance if possible One bad indicator resulted in 108,000+ hits Bonus for defenders: what does this remind you of?? Remember the part about knowing your IT? Be mindful of where you apply indicators!

Case Study 2: Community Feed Unstructured but context-rich reports Distributed among defenders within a specific community of interest Approximately 460 unique indicators a month

Analytic Value Great context, provides use cases and approximate expiration timeframes for indicators Generally more relevant given community focus Fewer indicators simplifies vetting

Lessons Learned Manual report review can be very time consuming Automated indicator extraction from Word or PDF can be challenging Indicators have shorter shelf lives; possibly more campaignspecific infrastructure

Putting It All Together 35

What Works Cast a wide net Automate! Collection Normalization Vetting remember this? Tagging Ingestion Lots of sample scripts out there

What Works Curating: tag, classify, or annotate intel-based events Collect metrics such as: Reuse: How many overlaps between commercial, community, open source? Utility: How many investigations has a given source supported? Applicability: How relevant is an intel product to your business or sector? Data-driven analysis

What Works Understand technical capabilities Many tools can t process contextual data; in some cases, not even the entire indicator (see bad indicators ) APIs are great, present performance and capability challenges Look at previously mentioned description and transmission standards Build workflows for better critical thinking, not just alerting

What Works NSM Data Pivot Anomaly Hypothesis Intel, Corollary Data

What Doesn t Work Intel Pivot Hypothesis

Apply What You ve Learned Identify likely objectives like your user base and critical IT assets Brush up on NSM and Intel Analysis: The Practice of Network Security Monitoring, by Richard Bejtlich Practical Network Security Monitoring, by Chris Sanders Psychology of Intelligence Analysis, by Richards Heuer, Jr. https://www.cia.gov/library/center-for-the-study-of-intelligence/csipublications/books-and-monographs/psychology-of-intelligenceanalysis/psychofintelnew.pdf

Apply What You ve Learned In the next few months: Vet and measure your intelligence independently of detection efforts Look for patterns and overlaps Track hit rates Evaluate indicator quality Weave these efforts into your NSM infrastructure management processes

Questions?