Guest blog courtesy of Flare.In a Threat Intel Workshop hosted with Senior Threat Intelligence Researcher Tammy Harper from Flare, six key insights were revealed on improving threat intel collection practices. Below are the questions asked and answered.Threat hunting: looking for specific forensic information or investigating an incident Threat intelligence gathering: looking for information on the dark web that can be linked to the organization’s IT infrastructure When security teams collect IoCs for incident response and forensics, they take a targeted, reactive approach asking questions about:What machine was compromised? Was information exfiltrated? What network(s) did an attacker traverse? What vulnerabilities did the attacker exploit? The IoC data is similarly streamlined, as it more likely focuses on evidence that the teams can observe in or collect from their systems like:Abnormal network traffic and activity detected by network monitoring tools Suspicious activity on specific computers or systems detected by Endpoint Detect and Response (EDR) tools File-based modifications indicating malicious files or malware detected from file-scanning tools Anomalous user or entity behavior detected through Identity and Access Management (IAM) or User and Entity Behavior Analytics (UEBA) tools When collecting dark web threat intelligence for red teaming, security analysts are looking for clues to identify threats proactively. With a broader purpose, the valuable information is more varied and can include:Information about attacks targeting specific individuals, organizations, industries, or geographic regions Exposed credentials linked to users or organizations, including stealer logs from initial access brokers Data about attacks targeting zero day vulnerabilities Lists of compromised devices as a part of botnets for sale In the workshop example, we reviewed a specific log belonging to a threat actor. Since the purpose was proactive identification across a system, all of the information was relevant.What does this information tell me about the potential damage the attacker can do to my organization? How does this information help me understand the likelihood of an attack against my organization? How does this information help me allocate resources required to mitigate the risks? Asking “so what?” might feel harsh, but it helps researchers stay focused on their main goal to ensure they find relevant information that furthers the investigation.What information do I need? Why do I need this information? How will this support decision-making processes? As they build out their requirements, they should consider these three essential components:Subject: What specific area of interest best fits the business objectives? Purpose: Why is this information important to the organization's strategic objectives? Justification: How does this requirement contribute to improving cybersecurity efforts in a way that makes it a priority? At Flare, we follow the same process, triggering investigations based on what customers need. To stay one step ahead of trends, we tailor our research to provide insights about meaningful dark web activities that help improve cybersecurity and strategic business outcomes, like:Changes in the ransomware ecosystem, especially as law enforcement activities interrupt large cybercriminal organizations like LockBit Ransomware trends,like the move to third extortion tactics where cybercriminals target the people whose data was stolen Evolving strategies for commodifying and monetizing attacks, like crowdsourcing a DDoS attack Use as many sources as possible Follow the evidence to reduce confirmation bias Open Source Intelligence (OSINT) is publicly available information that can be categorized as:Passive: easily, publicly available, typically on the clear web Active: Publicly but less easily available, like infiltrating dark web forums that require special access, permissions, or skills Security researchers have access to clear web OSINT that includes known:Vulnerabilities Attack tactics, techniques, and procedures (TTPs) Third-party vendor breaches Security alerts, like from the Cybersecurity Infrastructure Security Agency (CISA) or the Federal Bureau of Investigation (FBI) Dark web threat intelligence provides contextual insight into:Current illicit activities and trends New TTPs Attacker motivations By combining these different data points, security researchers can build profiles around these IPs to determine which ones are likely associated with the observed activities.How many active participants a forum, market, or illicit Telegram channel has How many transactions occur across a forum, market, or illicit Telegram channel Whether admins or mods are related to other, high profile forums, markets, or illicit Telegram channels How recent the latest activity was How often other cybercriminals discuss a new forum, market, or illicit Telegram channel
Threat Intelligence, MSP
6 Things to Know About Improving Threat Intelligence Collection

(Adobe Stock)
You can skip this ad in 5 seconds