Cyber threat Intelligence and Incident Response by:-Sandeep Singh

33
Cyber Threat Intelligence Sandeep Singh OWASP Delhi & null Delhi 30 January 2015

Transcript of Cyber threat Intelligence and Incident Response by:-Sandeep Singh

Page 1: Cyber threat Intelligence and Incident Response by:-Sandeep Singh

Cyber Threat Intelligence

Sandeep SinghOWASP Delhi & null Delhi30 January 2015

Page 2: Cyber threat Intelligence and Incident Response by:-Sandeep Singh

I am not an intelligence analyst but would love to be The topic is close to my heart Do not expect any FM (Freakin Magic ) The objective is to help attendees get familiar with the

world of threat intel

Disclaimer

Page 3: Cyber threat Intelligence and Incident Response by:-Sandeep Singh

Overview of Threat Intel Understanding Threat Intel What is Cyber Threat Intelligence Types of Threat Intel Intelligence Lifecycle Threat Intel – Classification & Vendor Landscape Threat Intel – Standards Open Source Threat Data/Intel Sources Bonus Agenda

Agenda

Page 4: Cyber threat Intelligence and Incident Response by:-Sandeep Singh

What is Threat Intelligence?

Page 5: Cyber threat Intelligence and Incident Response by:-Sandeep Singh

• Buzzword• Growing field- $250M in 2013- $1.5B in 2018

• Lots of new service providers entering the market

• and still maturing

Overview

Page 6: Cyber threat Intelligence and Incident Response by:-Sandeep Singh

Risk = Vulnerability * Threat * ImpactThreat = Intent * Capability

We like the term "Threat Actor". May be any of:• Cybercrime• State-sponsored• Hacktivism• Insider• Industry competition

Threat

Page 7: Cyber threat Intelligence and Incident Response by:-Sandeep Singh

Intelligencea.k.a. Renseignement, ré-enseignement

• Environment → Data → Information → Intelligence • Intelligence is a cyclic process• Analysis and contextualization• Models help counter diversity with abstraction

Page 8: Cyber threat Intelligence and Incident Response by:-Sandeep Singh

Accurate Relevant Timely Aligned Predictive Integrated

Actionable Intel

Page 9: Cyber threat Intelligence and Incident Response by:-Sandeep Singh

Cyber Area of interest/ of collection

Threat Subject of interest

Intelligence Process

Cyber Threat Intelligence

Page 10: Cyber threat Intelligence and Incident Response by:-Sandeep Singh

Key Elements of Threat Intel

Page 11: Cyber threat Intelligence and Incident Response by:-Sandeep Singh

Types of Threat Intel

Page 12: Cyber threat Intelligence and Incident Response by:-Sandeep Singh

• Target audience: decision-makers• Focus on changing risks, high level topics• Geopolitics• Foreign markets• Cultural background

• Vision timeframe: years

Note: You may never have heard of this; could be explained by lack of maturity in orgs

Strategic TI

Page 13: Cyber threat Intelligence and Incident Response by:-Sandeep Singh

• Target audience: defenders• Focus on current & future attacks:• Who, what, when?• Early warning on incoming attacks• Social media activity

• Vision timeframe: months, weeks, hours

Operational TI

Note: Hard for private companies to obtain on advanced attackers; traditionally collected through HUMINT / SIGINT

Page 14: Cyber threat Intelligence and Incident Response by:-Sandeep Singh

• Target audience: architects & sysadmins• Focus on "TTPs":• Attacker modus operandi• Blue team / red team tools• Exfiltration / C2 methods• Persistence / stealth / deception mechanisms

• Vision timeframe: weeks to a year

Note: The most common form of threat intel (and marketing ) produced today; easy to obtain

Tactical TI

Page 15: Cyber threat Intelligence and Incident Response by:-Sandeep Singh

Technical TIa.k.a. Data

• Target audience: SOC, IR people• Focus on raw observables:• Indicators of compromise• Host and network artifacts• Yara, Snort, OpenIOC rules

• Vision timeframe: hours to years

Note: Man-hours are valuable. Technical TI is abundant. Processing should be as automated as possible.

Page 16: Cyber threat Intelligence and Incident Response by:-Sandeep Singh

Strategic Will feed SWOT, risk assessments, Porter Diamond model...

Tactical Cyber Kill-chain, Diamond model, ACH

Operational OODA Loop, Pyramid of Pain

Technical F3EAD, CIF, FIR, MISP, Malcom, Maltego,….

Weaponry

Page 17: Cyber threat Intelligence and Incident Response by:-Sandeep Singh

Intelligence Cycle

Page 18: Cyber threat Intelligence and Incident Response by:-Sandeep Singh

Intelligence Cycle applied to CTI in orgs

• Planning• What are you looking for?

• Collection• OSINT/HUMINT• Logs/Data points inside the org• Honeypots/nets/docs, social networks• FM-5

• Processing• Synthesizing the collected data so that intelligence analyst can

work• Analysis

• Finished Intelligence• Dissemination

• Present to the right audience

Page 19: Cyber threat Intelligence and Incident Response by:-Sandeep Singh

Thre

at In

tel

Threat Intel Platform

Threat Intel Enrichment

Threat Intel Integration

Open Source Intel (OSINT)

Human Intel (HUMINT)

Technical Intel

Adversary Intel

Vulnerability Intel

Strategic Intel

Threat Intel - Classification

Page 20: Cyber threat Intelligence and Incident Response by:-Sandeep Singh

Vendors

Page 21: Cyber threat Intelligence and Incident Response by:-Sandeep Singh

Can you guess the price of commercial threat Intel?

Page 22: Cyber threat Intelligence and Incident Response by:-Sandeep Singh

Symantec's 12-month retail subscription to its reputation feed costs $95,300 (INR 6100000 approx.)

FireEye threat intelligence appliances cost around $17000 at starting price and increase upto $175000 per unit

Page 23: Cyber threat Intelligence and Incident Response by:-Sandeep Singh

Managing Threat IntelAs tough as it sounds

Page 24: Cyber threat Intelligence and Incident Response by:-Sandeep Singh

• MISP - Event-based indicator sharing• FIR - Incident management platform + indicator correlation• CRITS - Platform to store threat-related information• Malcom - Correlation of network traffic with maliciousness feeds• CIF - Query indicators + variety of output formats• Grr, osquery - Endpoint hunting

not mature…but lots of stuff is going on

Page 25: Cyber threat Intelligence and Incident Response by:-Sandeep Singh

What’s so nice about “standards”

• MITRE - STIX, TAXII, CybOX, MAEC• IETF - IODEF• Mandiant - OpenIOC• VERIS• MANTIS

Page 26: Cyber threat Intelligence and Incident Response by:-Sandeep Singh

Black List IP Address Sources • emergingthreats.net• binarydefense.com• zeustracker.abuse.ch• palevotracker.abuse.ch• feodotracker.abuse.ch• sslbl.abuse.ch• spamhaus

Phishing URL Sources• openphish.com

Vulnerability Database Sources• scip.ch• cxsecurity.com• exchange.xforce.ibmcloud.com• packetstormsecurity.com

Honeypots/Honeynets

Open Source Threat Data Sources

Page 27: Cyber threat Intelligence and Incident Response by:-Sandeep Singh

Bonus Agenda

Page 28: Cyber threat Intelligence and Incident Response by:-Sandeep Singh

• Developed by REN-ISAC• http://csirtgadgets.org/collective-intelligence-framework/• Does not generate data, simply takes sources normalizes it and

then outputs by given types• Limited in the types of data it can handle

– URLs– Domains– IPs – MD5s

• Certainly more to threat intel than this, but it’s a start

CIF: Collective Intelligence Framework

Page 29: Cyber threat Intelligence and Incident Response by:-Sandeep Singh

CIF Architecture

Page 30: Cyber threat Intelligence and Incident Response by:-Sandeep Singh

• A target-centric approach to intelligence analysis

• Bridge between operations and intelligence• a.k.a. “Hunting”

F3EAD

Page 31: Cyber threat Intelligence and Incident Response by:-Sandeep Singh

• TI is closely related to traditional intelligence• Models help but have limitations• The quality of your TI directly influences the quality of your

response• Tools to store, analyze, and share intelligence exist, but

there's room for improvement

Conclusion

Page 32: Cyber threat Intelligence and Incident Response by:-Sandeep Singh

http://sroberts.github.io http://direct.tomchop.me/slides http://frodehommedal.no/presentations/first-tc-oslo-

2015 https://www.mwrinfosecurity.com/system/assets/

909/original/Threat_Intelligence_Whitepaper.pdf Google

References:

Page 33: Cyber threat Intelligence and Incident Response by:-Sandeep Singh

Thank you,Sandeep Singh – Chapter Leader, OWASP Delhi & null [email protected]@null.co.in@Sandy1sm

Q & A