Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
51 views22 pages

Day 5 Ccet

Threat intelligence provides evidence-based knowledge about existing or emerging threats. It includes different types of information collection, knowledge analysis, and intelligence consumption. Cyber threats can include any malicious attacks that seek to unlawfully access data, disrupt operations, or damage information. The cyber threat landscape is always shifting as attack vectors, technologies, and the weakest links change. Critical infrastructures like education, water, and telecommunications are important targets.

Uploaded by

Dhamini Gowda
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
51 views22 pages

Day 5 Ccet

Threat intelligence provides evidence-based knowledge about existing or emerging threats. It includes different types of information collection, knowledge analysis, and intelligence consumption. Cyber threats can include any malicious attacks that seek to unlawfully access data, disrupt operations, or damage information. The cyber threat landscape is always shifting as attack vectors, technologies, and the weakest links change. Critical infrastructures like education, water, and telecommunications are important targets.

Uploaded by

Dhamini Gowda
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 22

DR DEEPAK KUMAR

DATA AND CYBER INTELLIGENCE

Threat intelligence is evidence-

based knowledge (e.g., context,

mechanisms, indicators,

implications and action-oriented

advice) about existing or emerging

menaces or hazards to assets.

– Gartner
TYPES OF THREAT INTELLIGENCE

Threat intelligence dissent in terms

of information assortment,

knowledge analysis, intelligence

consumption.
CYBER THREATS

Any possible malicious attack that

seeks to unlawfully access data,

disrupt digital operations or damage

information.
THE CYBER THREAT LANDSCAPE AND ATTACK SURFACE
• Industry Reliance on the Cloud
• Overhead of constantly patching critical software
vulnerabilities
• Emerging New Technologies Mature – AI and
Ab(use) of New Machine Learning
• Rise in Ransomware & DDOS Technology
• Evolving Zero-Day APTs
• Advanced ‘Undetectable’
Malware
• Larger Data Breaches • Endless (Spear) Phishing
Evolving Cyber The • Rise in Insider Threats – The
• (Possible) Targeting of Critical
THE CYBER THREAT LANDSCAPE
Infrastructure Attack
Vectors
IS ALWAYS
Threat SHIFTING AND THE
Weakest
Link
Enemy Within
Landscape • Skills Shortage
ATTACK SURFACE IS ALWAYS CHANGING

• Cheap and readily available


• Cyber Resilience
malicious services
• Fines for PII Breaches

Bad Guys
New • Disguised campaign attack
• Crypto Currency Regulation
Geo Political
Regulation • Tracking of adversaries
CYBER THREATS COME FROM

Cyber threats come from numerous


threat actors including:
PHASES OF CTI LIFECYCLE

A fundamental framework

for all fraud, physical, and

cybersecurity programs

whether mature and

sophisticated in their

operations, or merely

aspiring.

Image Source: https://hackersterminal.com/


IMPORTANCE OF CTI

Threat intelligence is actionable - it’s timely, provides context, and is able to be understood by the people in
charge of making decisions

Boosts the organization’s


Predictive analysis & Speeds up incident Leverages key insights and
and Critical National Strengthen internal alerts
enable better incident investigations, analyses context to prioritize
Infrastructure (CNI) and Policies
prioritization and remediation's vulnerabilities
cyber defense capabilities
IMPORTANCE OF CTI
ATTRIBUTION

Behind every attack is a “who,” “why,” and “how.”


The “who” is called attribution. The “why” is called
motivation or intent. The “how” is made up of the TTPs
the threat actor employs.
FUTURISTIC CYBER THREAT IDENTIFICATION

When it comes to detecting and mitigating Collection from Conducting Red and Skilled Malware &
Various TI Sources Blue Team Exercise Forensics Team
threats, speed is crucial. Security programs

must be able to detect threats quickly and


Data Intelligence Setting Honeypots, Collaboration with
efficiently so attackers don’t have enough and Predictive Sinkhole Sensors & International
Analysis Traps Organizations
time to root around in sensitive data.

There are several methods available in the Establishment of


Analysing user and
Strengthening the Secure Information
attacker Behaviour
Human Intelligence Sharing and Analysis
defender's arsenal: analytics
Centre (ISAC)
Cyber Threat Intelligence: Medium DR. D3PAK KUMAR (D3)
DIGITAL FORENSICS | CYBER INTELLIGENCE

CRITICAL INFORMATION INFRASTRUCTURES (CII)

Critical infrastructure is a term used by governments to describe assets that are essential for the functioning of a society
and economy. Most commonly associated with the term are facilities for:

EDUCATION WATER DEFENCE TELECOMMUNICATION FINANCIAL

GOVERNMENT HOSPITAL INDUSTRY ENERGY TRANSPORTATION

• Don’t assume that you’re not a target. Draw up battle plans. Learn from the mistakes of others
• Amateurs hack systems, professionals hack people. — Bruce Schneier
DR. D3PAK KUMAR (D3)
DIGITAL FORENSICS | CYBER INTELLIGENCE

HYBRID ATTACK & TECHNOLOGIES


Debugging port open by default, allowing
attackers to gain root access in the system

INTERNET OF THINGS -
LAUNCHERS

UAV - DRONES

AUTONOMOUS DRIVING

AI/ML USED

ROBOTICS

5G NETWORK • Control subverting of traffic signals


• breaking VIP security protocol chains
MULTIPLAYER GAMING
• Create congestion to specific routes
CRYPTOCURRENCY – ILLEGAL • altering police patrolling, etc.
PAYMENT/PURCHASE
• May utilize compromised traffic control system to
attack associated system, for example CCTV
Cyber Threat Intelligence: Medium DR. D3PAK KUMAR (D3)
DIGITAL FORENSICS | CYBER INTELLIGENCE

TRUST, TLP and IOC

• To Defend your Data, You need Knowledge – Threat Intelligence


• Trust is one of the most challenging attributes of cyber threat intelligence sharing.

• Traffic Light Protocol (TLP) is defined into four colors, namely, WHITE (no restrictions),
GREEN (sharing with peers and partners, not publicly), AMBER (sharing only inside own
organization on who-need-to-know basis), and RED (no sharing), and antitrust rules.

• Indicator of Compromise (IOC) in Cybercrime: Domain, URL, IP, Mobile Number, SMS
Gateway, UPI Handle, Wallet, Bank Details, Profile Handle, Emails, Modus Operandi…..
Cyber Threat Intelligence: Medium DR. D3PAK KUMAR (D3)
DIGITAL FORENSICS | CYBER INTELLIGENCE

CLOUD ATTACK VECTOR ADVERSARIES

Exploitation
Use of cloud
Abuse of of
Credential Vulnerability services for Command and
cloud service misconfigure
theft exploitation hosting control
providers d image
malware
containers
CoT : CYBER OF THINGS

Tier 1-
Collection of Threat Feeds

INPUT ANALYSIS OUTPUT

Static analysis • Advisory


• Predictive Alerts
Dynamic analysis
• Trends & Technology
Memory analysis • New Modus Operandi
• Reports
Malware & VAPT Lab
Cyber Threat Intelligence
(Sandbox)
DR. D3PAK KUMAR (D3)
DIGITAL FORENSICS | CYBER INTELLIGENCE

ATTRIBUTION

Source: Group IB Threat Intelligence

Restricted Circulation
DR. D3PAK KUMAR (D3)
DIGITAL FORENSICS | CYBER INTELLIGENCE

Restricted Circulation
DR. D3PAK KUMAR (D3)
DIGITAL FORENSICS | CYBER INTELLIGENCE

Maltego
Etc.

COTS

Twitter

iMessengers

COLLECTION PROCESS OUTPUT

There are three main steps


in analysing web media:
Gather actionable
• Data identification, • Disseminate to Concern
insights in raw form
• Data analysis, and • Investigation
concerning to Subject, etc.
• Information • Forensics
interpretation.

Restricted Circulation
THE BIG PICTURE - WORLD ECONOMIC FORUM RANKS
‘CYBERATTACKS’ AS A TOP GLOBAL RISK

4.10

Weapons of mass destruction Extreme weather


3.90
Natural disasters
Climate change
3.70 Water crisis
Biodiversity Cyberattacks
collapse
Food crisis
Impact

3.50 Infectious diseases Large scale migration


Critical info infrastructure Interstate conflict Environmental disasters
Fiscal crisis Terrorist attacks
3.30 Regional governance failure Asset bubbles Data fraud or theft
Critical infrastructure State collapse
Energy price shock Financial institution failure
3.10 Adverse technology
Urban planning failure
Illicit trade
Unmanagable inflation Deflation
2.90
2.30 2.80 3.30 3.80 4.30
Likelihood

Source: 2018 WEF survey spanning 684 respondents which assessed [likelihood] and [impact] of each risk on a scale of 1 to 5 [very unlikely / minimal impact] to [very likely / catastrophic]
DR. D3PAK KUMAR (D3)
DIGITAL FORENSICS | CYBER INTELLIGENCE

CYBER KILL CHAIN

➢ Task: Identify the Attackers’ Step by Step Process


➢ Goal: Disrupting Attackers’ operations

Actions &
Recon Weaponise Delivery Exploitation Installation C2
Objectives

Motivation ▪ Mechanism ▪ Technical or Persistence


▪ ▪ Configuration ▪ ▪ Communication ▪ What the adversary
Preparation of Delivery human? Characteristic
▪ ▪ Packaging ▪ between victim does when they
SE ▪ Infection ▪ Applications s of change
▪ ▪ Powershell & adversary have control of the
OSINT Vector affected Self0signed
▪ ▪ Add ▪ ▪ VPN system
▪ Phishing ▪ Method & Driver ▪ Data Exfil
Characteristics
▪ APT

MITRE ATT&CK: MITRE ATT&CK: MITRE ATT&CK: MITRE ATT&CK: MITRE ATT&CK: MITRE ATT&CK: MITRE ATT&CK:
▪ Active Scanning ▪ Malware ▪ Spearphishing ▪ Local Job ▪ Application ▪ Data ▪ Email Collection
▪ Passive Scanning ▪ Scripting Attachment/Link Scheduling Shimming Obfuscation ▪ Data from Local
▪ Determine Domain ▪ Service ▪ Exploit Public- ▪ Scripting ▪ Hooking ▪ Domain System/Network
& IP Address Space Execution Facing ▪ Rundll32 ▪ Login Items Fronting Share
▪ Analyze Third-Party Application ▪ Web Service ▪ Surveillance
IT Footprint ▪ Supply Chain
Compromise
Restricted Circulation
CTI SOURCES AND FEEDS

Feeds are just the raw data on threats; an


AlienVault Open
Threat Exchange
Cisco Talos
Intelligence
Group IB Recorded Future analyst extracts the intelligence from them for
creating reports

Monitoring and collection of security data on


Indicator of compromise (IoCs e.g. IP addresses,
Department of SANS Internet Google Alerts Virustotal Hash Value, Domain name etc. from various
Homeland Security Storm Center
(DHS) CISA sources.

Purpose to identify the uncommon activity and


malicious domains and IP addresses
MISP BlueLive ThreatConnect

Note: Some of the CTI tools and services are mentioned. These are not for endorsement purposes.

You might also like