Trustwave's 2024 Retail Report Series Highlights Alarming E-Commerce Threats and Growing Fraud Against Retailers. Learn More
Get access to immediate incident response assistance.
Get access to immediate incident response assistance.
Trustwave's 2024 Retail Report Series Highlights Alarming E-Commerce Threats and Growing Fraud Against Retailers. Learn More
Threat Intelligence, or just TI, is sometimes criticized for possibly being inaccurate or outdated. However, there are compelling reasons to incorporate it into your cybersecurity defense strategy. Let’s present some ways to use TI effectively as part of your security operations lifecycle.
Within the scope of this discussion, Threat Intelligence is a knowledgebase of tactical information about threat actors. That information may include IP addresses, domain names, URLs, and filenames—just to name a few. Some TI information may be time-sensitive, such as the most recent time a known threat group used a specific IP address or file to perform an attack.
Image 1: Microsoft Sentinel Threat Intelligence Dashboard. Courtesy Microsoft
When discussing Threat Intelligence, it helps to know a few acronyms commonly used, such as TTPs, IOCs and APTs:
There are many ways to use TI data within the context of security operations workflows. Some common ways include:
SIEM Correlations
SIEM (Security Information and Event Management) can correlate logged events with lists of information, such as suspicious IP addresses from a TI list. So, if one of the IP addresses in the logs matches one of the IPs from the TI list, an alert can be generated. This feature is a common example used with Firewall and EDR logs, as well as many other log sources.
Threat Hunting
A common threat hunt method is to compare the information in security logs with known bad actor information provided by TI. This task is performed in a similar manner to the SIEM example above, matching logged information with TI lists.
Reporting
Running several different reports is a good way to present a variety of perspectives on logged events that match TI information. Reporting can provide a broader perspective on suspicious activity that was not detected by SIEM or threat hunting. An example would be to search ALL firewall logs from the past week for ANY matches to IP addresses in a TI list. If a match is found, then a threat hunt may be the next step to determine if additional suspicious behavior has occurred around the matching IP.
Situational Awareness Dashboards
When Russia invaded Ukraine, there was an increase in concern around cyberactivity initiated from Russian IP addresses. A situational awareness dashboard is one or more reports that represents activity from a known entity, such as a country’s IP range or other information provided by Threat Intelligence lists.
Mitre ATT&CK
Mitre is a US Government funded organization that researches ‘known threat actors’ and provides information to which other Threat Intelligence providers can map their data. This data provides for richer content. For example, if an IP address is known to be associated with ATT&CK’s threat actor group APT32, then that information can be included in the TI results.
Planning
Understanding your attack surface and knowing where attackers might focus their attention are important strategies when planning how to monitor and protect your network.
TI provides research details that can help identify threat groups targeting your organization or industry. This information can help to pre-emptively prepare for an attack by simulating known security incidents by those threat groups and performing attack simulations to test defenses.
Attackers may not use an IP address more than once, in which case TI information associated with that attacker becomes immediately useless. As such, TI data can be very much hit and miss.
If TI data is pulled from a free source, it's less likely to be well maintained than a paid source. Also, some or all of a paid vendor's TI information can be based on free sources, so it's up to the user to validate the information provided by TI.
When creating correlations in SIEM, try to add additional conditions that don't depend solely on TI. For example, "EDR alert AND TI match OUTBOUND AND suspicious user activity."
Although not always the most precise tool for detecting threats, using TI as a part of your security defense strategy can provide useful pre-emptive insights.
References
About This Blog Series
Follow the full series here: Building Defenses with Modern Security Solutions
This series discusses a list of key cybersecurity defense topics. The full collection of posts and labs can be used as an educational tool for implementing cybersecurity defenses.
Labs
For quick walkthrough labs on the topics in this blog series, check out the story of “ZPM Incorporated” and their steps to implementing all the solutions discussed here.
Compliance
All topics mentioned in this series have been mapped to several compliance controls here.
David Broggy is Senior Solutions Architect, Implementation Services at Trustwave with over 21 years of experience. He holds multiple security certifications and won Microsoft's Most Valuable Professional (MVP) Award for Azure Security. Follow David on LinkedIn.
Trustwave is a globally recognized cybersecurity leader that reduces cyber risk and fortifies organizations against disruptive and damaging cyber threats. Our comprehensive offensive and defensive cybersecurity portfolio detects what others cannot, responds with greater speed and effectiveness, optimizes client investment, and improves security resilience. Learn more about us.
Copyright © 2024 Trustwave Holdings, Inc. All rights reserved.