SlideShare a Scribd company logo
1 of 56
Download to read offline
SESSION ID:
IOCs are Dead - Long Live
IOCs!
AIR-F03
Ryan Kazanciyan
Chief Security Architect
Tanium

@ryankaz42
Yours truly, circa 2010
2
https://buildsecurityin.us-cert.gov/sites/
default/files/RyanKazanciyan-APTPanel.pdf
IOCs as advertised
3
Human-readable, machine-
consumable
Capture a broad set of forensic
artifacts
Foster information sharing
Provide context around threats
Do better than “signatures”
Five years later…
4
IOC quality and sharing in 2016
5
My own point of reference
2009 - 2015: Investigator
Large-scale, targeted
attacks
Designed, tested, and
applied IOCs for
proactive and reactive
hunting
6
2015 - Present: Builder
Designing an EDR platform
that includes IOC detection
Helping orgs build self-
sustaining, scalable
“hunting” capabilities
The erosion of indicator-based
detection
7
Brittle indicators - short shelf-life
Poor quality control in threat data feeds
Hard to build effective homegrown IOCs
Indicator detection tools are inconsistent
IOCs applied to limited scope of data
“IOCs” vs. “threat data” vs.
“intelligence”
IOCs are structured threat data
Threat data != threat intelligence
Threat intelligence provides context and and analysis
Threat intelligence is ineffective without quality threat data
8
#RSAC
IOCs are brittle
Verizon DBIR 2015: Most shared IOC
types
10
Source: Verizon DBIR 2015
IOCs in the APTnotes data set
11
0
2500
5000
7500
10000
141
5,083
9,096
2,237
6,639
2,512
350248
CVE E-Mail URL Hosts IP Hashes RegistryFile Name
Derived from over 340 threat reports (2006 - 2015) archived on https://github.com/kbandla/APTnotes
This will never keep pace…
12
Source:	Verizon	DBIR	2015
Short lifespan of C2 IPs
and domains
Malicious sites co-
located on virtual host
server IPs
Low barrier to host
malicious content on
legitimate providers
13
The problem extends beyond file
hashes
Sheer volume does not solve the
problem
2007: Bit9 FileAdvisor tracked 4 billion unique files, catalog
grew by 50 million entries per day
2009: McAfee Global Threat Intelligence tracked reputation
data for 140 million IP addresses, handling 50 million file
lookups per day
2011: Symantec Insight tracked tens of billions of linkages
between users, files, web sites
14
Seven years of progress?
15
“…an intelligence-led approach to
security will be key in detecting the most
sophisticated threats and responding to
them quickly and effectively.”
“…innovating to provide predictive security.
This approach comprises interconnected
security technology at multiple layers in the
technology stack, backed by global threat
intelligence. Predictive security will allow
security products to intelligently block attacks
much sooner than is currently possible…”
#RSAC
Paid IOCs != quality IOCs
Have you assessed your feeds?
17
Jon Oltsik / ESG, http://www.networkworld.com/article/2951542/cisco-subnet/measuring-the-quality-of-commercial-threat-intelligence.html
My (incredibly scientific) methodology
Chose two top-tier paid threat feed services
Retrieved the most recent ~20 indicators from each
Spent 15 minutes eyeballing their contents
18
What are you paying for?
19
Too specific - malware hash AND’d with a filename
(Real IOC from a commercial feed)
What are you paying for?
20
Too specific - LNK files are unique per-system
(Real IOC from a commercial feed)
What are you paying for?
21
Too noisy - matches component of legitimate software
(Real IOC from a commercial feed)
#RSAC
Building good IOCs is hard
Challenges with IOC development
23
Easy to build high-fidelity IOCs
(may yield high false-negatives)
Hard to build robust IOCs
(may yield higher false-
positives)
Easy to build IOCs that don’t
evaluate properly
(tools have inconsistent
matching logic)
“Pyramid of Pain”, David Bianco

http://detect-respond.blogspot.co.uk/2013/03/the-pyramid-of-pain.html
Running aground on a robust IOC
24
Too broad - may match
on uncommon but
legitimate binaries
How much time do your
analysts have to
continuously build, test,
and refine IOCs like this?
Inconsistencies in IOC detection tools
25
FileItem
TaskItem
ServiceItem
EventLogItem
...
✅
❌
❌
✅
?
{…}
{…}
OR
AND
{…}
{…}
AND
OR
{…}
{…}
✅
❌
✅
?
✅
Supported Observables Logic Handling Data Normalization
x86 or x64?
HKEY_CURRENT_USER
%SYSTEMROOT%
HKEY_USERS{SID}
system32
SysWoW64
WoW6432Node
Windows
STIX & CybOX have a few tools to help with this:
maec-to-stix
python-cybox/normalize.py
Issues specific to OpenIOC
What happens when you try to turn a proprietary tool’s
unique output schema into a “standard”…
26
ProcessItem/PortList/PortItem/process
“File PE Detected Anomali
FileItem/PEInfo/DetectedEntryPointSignature/Name
“Process Port Process”
FileItem/PEInfo/DetectedAnomalies/string
“File EntryPoint Sig Name”
Issues specific to OpenIOC
Example: Registry evidence in OpenIOC
27
Key: HKLMSOFTWAREMicrosoftWindowsCurrentVersionRun
Value: Backdoor
Data: C:pathtomalware.exe
RegistryItem/Path: HKLMSOFTWAREMicrosoftWindowsCurrentVersionRunBackdoor
RegistryItem/KeyPath: SOFTWAREMicrosoftWindowsCurrentVersionRun
RegistryItem/Value: C:pathtomalware.exe
RegistryItem/ValueName: Backdoor
RegistryItem/Text: C:pathtomalware.exe
#RSAC
Broadening the scope of
endpoint indicator usage
Focusing on scope of data, not tools
What are you
matching your
endpoint IOCs
against?
What’s your cadence
of detection?
Where are your
gaps?
29
Data at Rest

(Files on disk, registry)
Workstations Servers
Historical Activity

(Telemetry, logs, alerts,
historical data)
EXE
Current Activity

(Processes, Network 

Connections, Memory)
Matching on SIEM / centralized logging
30
Most common endpoint
data in SIEM:
Anti-virus / anti-malware
alerts (all systems)
Event log data (subset of
systems - usually servers)
Resource impact of large-
scale event forwarding &
storage limits endpoint
coverage & scope of data
Data at Rest

(Files on disk, registry)
Workstations Servers
Historical Activity

(Telemetry, logs, alerts,
historical data)
EXE
Current Activity

(Processes, Network 

Connections, Memory)
Matching on forensic telemetry
Process execution, file
events, network
connections, registry
changes
Preserves historical data,
short-lived events
Expensive to centralize in
large environments
Limited scope of data for
IOC matching
31
Workstations Servers
Historical Activity

(Telemetry, logs, alerts,
historical data)
EXE
Current Activity

(Processes, Network 

Connections, Memory)
Data at Rest

(Files on disk, registry)
Matching on live endpoints
Potentially the
broadest set of
available data
Considerations
Endpoint impact
Availability
Time-to-assess
Scalability
32
Data at Rest

(Files on disk, registry)
Workstations Servers
Historical Activity

(Telemetry, logs, alerts,
historical data)
EXE
Current Activity

(Processes, Network 

Connections, Memory)
The ideal combination
Goal: Maximize the value of brittle IOCs
Telemetry for efficiency, historical data
On-endpoint to maximize current state & at-rest data
Increase cadence as tools & resources permit
Don’t take shortcuts on scope of coverage!
33
“I only need to check important
systems”
34
Credentials can be harvested
from anywhere on a
Windows network
No need to run malicious
code on admin systems or
DCs
By the time they get to
“crown jewels”, attackers are
already authenticating with
legitimate accounts Source: https://adsecurity.org/?p=1729
An example of why this
fails:
#RSAC
Shrinking the detection gap
Doing better with what we've got
Source:

https://www.digitalshadows.com/blog-and-research/another-sans-cyber-threat-intelligence-summit-is-in-the-books/
36
"The desire to take a technical feed and simply dump it into our
security infrastructure doesn’t equate to a threat intelligence
win...
You cannot get more relevant threat intelligence than what you
develop from within your own environment. This should then be
enriched with external intelligence"
-Rick Holland, Forrester, 2016 CTI Summit
My own point of reference
As an investigator: 

Relative efficacy of IOCs vs. methodology & outlier analysis
over time
37
0
20
40
60
80
2010 2011 2012 2013 2014 2015
IOCs
Methodology 

& outlier analysis
(Rough approximation for the sake of having a pretty graph)
Resetting expectations
38
Categorize and contextualize known
threats, streamline response
Provide additional layer of automated
detection
Preventative Controls
Signature-based
detection
Undetected Threats
Threat data & intel feeds
Internal analysis
Reality
Preventative Controls


Threat data & intel feeds


Signature-based
detection
Undetected Threats
Expectation
Tell you what’s normal in your own
environment
Exceed the benefits of well-
implemented preventative controls
Close the gap of undetected threats
...but it cannot...
High-quality threat data and
intelligence can help you…
Looking inward to hunt
Derive intelligence from what’s “normal”
Build repeatable analysis tasks
Combine with automated use of IOCs
and threat data
More is not always better!
Easy to overwhelm yourself
Take on discrete, high-value data sets
one at a time
39
Aligning to the attack lifecycle
40
What are the "lowest
common denominators"
across targeted intrusions?
What readily-available
evidence do they leave
behind?
What easily-observable
outlier conditions do they
create?
Conduct
Reconnaissance
Steal
Credentials & Move Laterally
Establish &
Retain
Example: Hunting for Duqu 2.0
41
“In addition to creating services to infect other computers in the LAN,
attackers can also use the Task Scheduler to start ‘msiexec.exe’ remotely.
The usage of Task Scheduler during Duqu infections for lateral movement
was also observed with the 2011 version...”
Source:	
https://securelist.com/files/2015/06/The_Mystery_of_Duqu_2_0_a_sophisticated_cyber
espionage_actor_returns.pdf
What was the shared IOC?
42
How could we do better?
43
We could just add a specific TaskItem to the IOC...
…but what about other variants?
How can we find evidence of other malicious activity that
abuses the same (incredibly common) lateral movement
technique?
Example: Lateral command execution
44
Scheduled
Tasks
WinRM &
PowerShell
PsEx
Attacker
Other forensic
artifacts
E
Logon &
service events
Process
history
Sources of
Evidence
Accounts used
Executed
commands,
dropped files, etc.
Time & frequency
Where?
When?
What?
Who?
Source &
target systems
Analysis Criteria
Assess outliers
Resulting stack analysis
45
Resulting stack analysis
46
Resulting stack analysis
47
Resulting stack analysis
48
For additional examples
49
“Hunting in the Dark”
https://speakerdeck.com/ryankaz
Includes coverage of:
More task analysis
ShimCache and process history
Service Events
WMI event consumers
Alternative authentication
mechanisms
#RSAC
Closing thoughts and takeaways
Platforms
MISP

http://www.misp-project.org
Hubs and exchanges
Facebook ThreatExchange

https://threatexchange.fb.com
Standards
CybOX 3.0 refactoring and simplification
Evolving standards & platforms
51
Few efforts to-date - this is difficult!
Threat Intelligence Quotient Test (tiq-test)
Statistical analysis of IPs and domains in threat feeds
References:

https://github.com/mlsecproject



https://defcon.org/images/defcon-22/dc-22-presentations/Pinto-
Maxwell/DEFCON-22-Pinto-and-Maxwell-Measuring-the-IQ-of-
your-threat-feeds-TIQtest-Updated.pdf
Quantitative assessment of threat feeds
52
Ask your threat feed vendor
53
Where’s the intel coming
from?
Professional services
Managed security services
Partners
Honeypots
“Open source” data
gathering
Auto-generated sandbox
data

What’s the breakdown of
observable types?
What QC is in place?
Test-cases
Documentation
Spot-checking
Maximize your IOCs & threat data
54
Where are your gaps in endpoint & network visibility?
Can you expand the scope of data made available for
endpoint IOC matching in your environment?
Are your tools and threat data sources fully compatible?
How quickly are you consuming new threat data? At what
scale?
Even the best sources of
threat data will never keep
pace with emerging attacks
Know your network above
all
Invest in attack surface
reduction and “hygiene”. It
really does make a
difference.
Have your investments made you more
secure?
55
SESSION ID:
Thank you!
AIR-F03
Ryan Kazanciyan
Chief Security Architect
Tanium

@ryankaz42

More Related Content

What's hot

Confusion and deception new tools for data protection
Confusion and deception new tools for data protectionConfusion and deception new tools for data protection
Confusion and deception new tools for data protectionPriyanka Aash
 
Actionable Threat Intelligence
Actionable Threat IntelligenceActionable Threat Intelligence
Actionable Threat IntelligenceOWASP Delhi
 
Sans cyber-threat-intelligence-survey-2015
Sans cyber-threat-intelligence-survey-2015Sans cyber-threat-intelligence-survey-2015
Sans cyber-threat-intelligence-survey-2015Roy Ramkrishna
 
Threat Hunting - Moving from the ad hoc to the formal
Threat Hunting - Moving from the ad hoc to the formalThreat Hunting - Moving from the ad hoc to the formal
Threat Hunting - Moving from the ad hoc to the formalPriyanka Aash
 
Applied cognitive security complementing the security analyst
Applied cognitive security complementing the security analyst Applied cognitive security complementing the security analyst
Applied cognitive security complementing the security analyst Priyanka Aash
 
How to Normalize Threat Intelligence Data from Multiple Sources - Tech Talk T...
How to Normalize Threat Intelligence Data from Multiple Sources - Tech Talk T...How to Normalize Threat Intelligence Data from Multiple Sources - Tech Talk T...
How to Normalize Threat Intelligence Data from Multiple Sources - Tech Talk T...AlienVault
 
Bsides 2019 - Intelligent Threat Hunting
Bsides 2019 - Intelligent Threat HuntingBsides 2019 - Intelligent Threat Hunting
Bsides 2019 - Intelligent Threat HuntingDhruv Majumdar
 
Tracking Noisy Behavior and Risk-Based Alerting with ATT&CK
Tracking Noisy Behavior and Risk-Based Alerting with ATT&CKTracking Noisy Behavior and Risk-Based Alerting with ATT&CK
Tracking Noisy Behavior and Risk-Based Alerting with ATT&CKMITRE ATT&CK
 
The Rise of the Purple Team
The Rise of the Purple TeamThe Rise of the Purple Team
The Rise of the Purple TeamPriyanka Aash
 
Security Strategy and Tactic with Cyber Threat Intelligence (CTI)
Security Strategy and Tactic with Cyber Threat Intelligence (CTI)Security Strategy and Tactic with Cyber Threat Intelligence (CTI)
Security Strategy and Tactic with Cyber Threat Intelligence (CTI)Priyanka Aash
 
MITRE ATT&CKcon Power Hour - November
MITRE ATT&CKcon Power Hour - NovemberMITRE ATT&CKcon Power Hour - November
MITRE ATT&CKcon Power Hour - NovemberMITRE - ATT&CKcon
 
Cyber Threat Hunting with Phirelight
Cyber Threat Hunting with PhirelightCyber Threat Hunting with Phirelight
Cyber Threat Hunting with PhirelightHostway|HOSTING
 
The Cyber Threat Intelligence Matrix
The Cyber Threat Intelligence MatrixThe Cyber Threat Intelligence Matrix
The Cyber Threat Intelligence MatrixFrode Hommedal
 
Applied machine learning defeating modern malicious documents
Applied machine learning defeating modern malicious documentsApplied machine learning defeating modern malicious documents
Applied machine learning defeating modern malicious documentsPriyanka Aash
 
Cyber threat intelligence: maturity and metrics
Cyber threat intelligence: maturity and metricsCyber threat intelligence: maturity and metrics
Cyber threat intelligence: maturity and metricsMark Arena
 
Threat Intelligence in Cyber Risk Programs
Threat Intelligence in Cyber Risk ProgramsThreat Intelligence in Cyber Risk Programs
Threat Intelligence in Cyber Risk ProgramsRahul Neel Mani
 
Threat hunting in cyber world
Threat hunting in cyber worldThreat hunting in cyber world
Threat hunting in cyber worldAkash Sarode
 
MITRE ATT&CKcon 2.0: Prioritizing ATT&CK Informed Defenses the CIS Way; Phili...
MITRE ATT&CKcon 2.0: Prioritizing ATT&CK Informed Defenses the CIS Way; Phili...MITRE ATT&CKcon 2.0: Prioritizing ATT&CK Informed Defenses the CIS Way; Phili...
MITRE ATT&CKcon 2.0: Prioritizing ATT&CK Informed Defenses the CIS Way; Phili...MITRE - ATT&CKcon
 

What's hot (20)

Confusion and deception new tools for data protection
Confusion and deception new tools for data protectionConfusion and deception new tools for data protection
Confusion and deception new tools for data protection
 
Actionable Threat Intelligence
Actionable Threat IntelligenceActionable Threat Intelligence
Actionable Threat Intelligence
 
Sans cyber-threat-intelligence-survey-2015
Sans cyber-threat-intelligence-survey-2015Sans cyber-threat-intelligence-survey-2015
Sans cyber-threat-intelligence-survey-2015
 
Threat Hunting - Moving from the ad hoc to the formal
Threat Hunting - Moving from the ad hoc to the formalThreat Hunting - Moving from the ad hoc to the formal
Threat Hunting - Moving from the ad hoc to the formal
 
TiC
TiCTiC
TiC
 
Applied cognitive security complementing the security analyst
Applied cognitive security complementing the security analyst Applied cognitive security complementing the security analyst
Applied cognitive security complementing the security analyst
 
How to Normalize Threat Intelligence Data from Multiple Sources - Tech Talk T...
How to Normalize Threat Intelligence Data from Multiple Sources - Tech Talk T...How to Normalize Threat Intelligence Data from Multiple Sources - Tech Talk T...
How to Normalize Threat Intelligence Data from Multiple Sources - Tech Talk T...
 
Bsides 2019 - Intelligent Threat Hunting
Bsides 2019 - Intelligent Threat HuntingBsides 2019 - Intelligent Threat Hunting
Bsides 2019 - Intelligent Threat Hunting
 
Tracking Noisy Behavior and Risk-Based Alerting with ATT&CK
Tracking Noisy Behavior and Risk-Based Alerting with ATT&CKTracking Noisy Behavior and Risk-Based Alerting with ATT&CK
Tracking Noisy Behavior and Risk-Based Alerting with ATT&CK
 
Pulling our-socs-up
Pulling our-socs-upPulling our-socs-up
Pulling our-socs-up
 
The Rise of the Purple Team
The Rise of the Purple TeamThe Rise of the Purple Team
The Rise of the Purple Team
 
Security Strategy and Tactic with Cyber Threat Intelligence (CTI)
Security Strategy and Tactic with Cyber Threat Intelligence (CTI)Security Strategy and Tactic with Cyber Threat Intelligence (CTI)
Security Strategy and Tactic with Cyber Threat Intelligence (CTI)
 
MITRE ATT&CKcon Power Hour - November
MITRE ATT&CKcon Power Hour - NovemberMITRE ATT&CKcon Power Hour - November
MITRE ATT&CKcon Power Hour - November
 
Cyber Threat Hunting with Phirelight
Cyber Threat Hunting with PhirelightCyber Threat Hunting with Phirelight
Cyber Threat Hunting with Phirelight
 
The Cyber Threat Intelligence Matrix
The Cyber Threat Intelligence MatrixThe Cyber Threat Intelligence Matrix
The Cyber Threat Intelligence Matrix
 
Applied machine learning defeating modern malicious documents
Applied machine learning defeating modern malicious documentsApplied machine learning defeating modern malicious documents
Applied machine learning defeating modern malicious documents
 
Cyber threat intelligence: maturity and metrics
Cyber threat intelligence: maturity and metricsCyber threat intelligence: maturity and metrics
Cyber threat intelligence: maturity and metrics
 
Threat Intelligence in Cyber Risk Programs
Threat Intelligence in Cyber Risk ProgramsThreat Intelligence in Cyber Risk Programs
Threat Intelligence in Cyber Risk Programs
 
Threat hunting in cyber world
Threat hunting in cyber worldThreat hunting in cyber world
Threat hunting in cyber world
 
MITRE ATT&CKcon 2.0: Prioritizing ATT&CK Informed Defenses the CIS Way; Phili...
MITRE ATT&CKcon 2.0: Prioritizing ATT&CK Informed Defenses the CIS Way; Phili...MITRE ATT&CKcon 2.0: Prioritizing ATT&CK Informed Defenses the CIS Way; Phili...
MITRE ATT&CKcon 2.0: Prioritizing ATT&CK Informed Defenses the CIS Way; Phili...
 

Similar to Broadening the Scope of Endpoint Indicator Usage

Road map for actionable threat intelligence
Road map for actionable threat intelligenceRoad map for actionable threat intelligence
Road map for actionable threat intelligenceabhisheksinghcs
 
Threat intel- -content-curation-organizing-the-path-to-successful-detection
Threat intel- -content-curation-organizing-the-path-to-successful-detectionThreat intel- -content-curation-organizing-the-path-to-successful-detection
Threat intel- -content-curation-organizing-the-path-to-successful-detectionPriyanka Aash
 
Splunk Discovery Day Hamburg - Security Session
Splunk Discovery Day Hamburg - Security SessionSplunk Discovery Day Hamburg - Security Session
Splunk Discovery Day Hamburg - Security SessionSplunk
 
Splunk für Security
Splunk für SecuritySplunk für Security
Splunk für SecuritySplunk
 
TIG / Infocyte: Proactive Cybersecurity for State and Local Government
TIG / Infocyte: Proactive Cybersecurity for State and Local GovernmentTIG / Infocyte: Proactive Cybersecurity for State and Local Government
TIG / Infocyte: Proactive Cybersecurity for State and Local GovernmentInfocyte
 
SFBA_SUG_2023-08-02.pdf
SFBA_SUG_2023-08-02.pdfSFBA_SUG_2023-08-02.pdf
SFBA_SUG_2023-08-02.pdfBecky Burwell
 
Lessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Lessons Learned Fighting Modern Cyberthreats in Critical ICS NetworksLessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Lessons Learned Fighting Modern Cyberthreats in Critical ICS NetworksAngeloluca Barba
 
How to protect your corporate from advanced attacks
How to protect your corporate from advanced attacksHow to protect your corporate from advanced attacks
How to protect your corporate from advanced attacksMicrosoft
 
Infosecurity Europe 2016: Operationalizing Threat Intelligence
Infosecurity Europe 2016: Operationalizing Threat IntelligenceInfosecurity Europe 2016: Operationalizing Threat Intelligence
Infosecurity Europe 2016: Operationalizing Threat IntelligenceSplunk
 
FireEye: Seamless Visibility and Detection for the Cloud
FireEye: Seamless Visibility and Detection for the CloudFireEye: Seamless Visibility and Detection for the Cloud
FireEye: Seamless Visibility and Detection for the CloudAmazon Web Services
 
AI for Cybersecurity Innovation
AI for Cybersecurity InnovationAI for Cybersecurity Innovation
AI for Cybersecurity InnovationPete Burnap
 
Splunk for Security Breakout Session
Splunk for Security Breakout SessionSplunk for Security Breakout Session
Splunk for Security Breakout SessionSplunk
 
The Role of Threat Intelligence and Layered Securiy for Intrusion Prevention ...
The Role of Threat Intelligence and Layered Securiy for Intrusion Prevention ...The Role of Threat Intelligence and Layered Securiy for Intrusion Prevention ...
The Role of Threat Intelligence and Layered Securiy for Intrusion Prevention ...JoAnna Cheshire
 
Overall Security Process Review CISC 6621Agend.docx
Overall Security Process Review CISC 6621Agend.docxOverall Security Process Review CISC 6621Agend.docx
Overall Security Process Review CISC 6621Agend.docxkarlhennesey
 
Orchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
Orchestrate Your Security Defenses to Optimize the Impact of Threat IntelligenceOrchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
Orchestrate Your Security Defenses to Optimize the Impact of Threat IntelligenceIBM Security
 
Splunk for security
Splunk for securitySplunk for security
Splunk for securityGreg Hanchin
 
NTXISSACSC2 - The Role of Threat Intelligence and Layered Security for Intrus...
NTXISSACSC2 - The Role of Threat Intelligence and Layered Security for Intrus...NTXISSACSC2 - The Role of Threat Intelligence and Layered Security for Intrus...
NTXISSACSC2 - The Role of Threat Intelligence and Layered Security for Intrus...North Texas Chapter of the ISSA
 
OSB50: Operational Security: State of the Union
OSB50: Operational Security: State of the UnionOSB50: Operational Security: State of the Union
OSB50: Operational Security: State of the UnionIvanti
 
SplunkLive Auckland 2015 - Splunk for Security
SplunkLive Auckland 2015 - Splunk for SecuritySplunkLive Auckland 2015 - Splunk for Security
SplunkLive Auckland 2015 - Splunk for SecuritySplunk
 

Similar to Broadening the Scope of Endpoint Indicator Usage (20)

Road map for actionable threat intelligence
Road map for actionable threat intelligenceRoad map for actionable threat intelligence
Road map for actionable threat intelligence
 
Cybersecurity - Jim Butterworth
Cybersecurity - Jim ButterworthCybersecurity - Jim Butterworth
Cybersecurity - Jim Butterworth
 
Threat intel- -content-curation-organizing-the-path-to-successful-detection
Threat intel- -content-curation-organizing-the-path-to-successful-detectionThreat intel- -content-curation-organizing-the-path-to-successful-detection
Threat intel- -content-curation-organizing-the-path-to-successful-detection
 
Splunk Discovery Day Hamburg - Security Session
Splunk Discovery Day Hamburg - Security SessionSplunk Discovery Day Hamburg - Security Session
Splunk Discovery Day Hamburg - Security Session
 
Splunk für Security
Splunk für SecuritySplunk für Security
Splunk für Security
 
TIG / Infocyte: Proactive Cybersecurity for State and Local Government
TIG / Infocyte: Proactive Cybersecurity for State and Local GovernmentTIG / Infocyte: Proactive Cybersecurity for State and Local Government
TIG / Infocyte: Proactive Cybersecurity for State and Local Government
 
SFBA_SUG_2023-08-02.pdf
SFBA_SUG_2023-08-02.pdfSFBA_SUG_2023-08-02.pdf
SFBA_SUG_2023-08-02.pdf
 
Lessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Lessons Learned Fighting Modern Cyberthreats in Critical ICS NetworksLessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Lessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
 
How to protect your corporate from advanced attacks
How to protect your corporate from advanced attacksHow to protect your corporate from advanced attacks
How to protect your corporate from advanced attacks
 
Infosecurity Europe 2016: Operationalizing Threat Intelligence
Infosecurity Europe 2016: Operationalizing Threat IntelligenceInfosecurity Europe 2016: Operationalizing Threat Intelligence
Infosecurity Europe 2016: Operationalizing Threat Intelligence
 
FireEye: Seamless Visibility and Detection for the Cloud
FireEye: Seamless Visibility and Detection for the CloudFireEye: Seamless Visibility and Detection for the Cloud
FireEye: Seamless Visibility and Detection for the Cloud
 
AI for Cybersecurity Innovation
AI for Cybersecurity InnovationAI for Cybersecurity Innovation
AI for Cybersecurity Innovation
 
Splunk for Security Breakout Session
Splunk for Security Breakout SessionSplunk for Security Breakout Session
Splunk for Security Breakout Session
 
The Role of Threat Intelligence and Layered Securiy for Intrusion Prevention ...
The Role of Threat Intelligence and Layered Securiy for Intrusion Prevention ...The Role of Threat Intelligence and Layered Securiy for Intrusion Prevention ...
The Role of Threat Intelligence and Layered Securiy for Intrusion Prevention ...
 
Overall Security Process Review CISC 6621Agend.docx
Overall Security Process Review CISC 6621Agend.docxOverall Security Process Review CISC 6621Agend.docx
Overall Security Process Review CISC 6621Agend.docx
 
Orchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
Orchestrate Your Security Defenses to Optimize the Impact of Threat IntelligenceOrchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
Orchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
 
Splunk for security
Splunk for securitySplunk for security
Splunk for security
 
NTXISSACSC2 - The Role of Threat Intelligence and Layered Security for Intrus...
NTXISSACSC2 - The Role of Threat Intelligence and Layered Security for Intrus...NTXISSACSC2 - The Role of Threat Intelligence and Layered Security for Intrus...
NTXISSACSC2 - The Role of Threat Intelligence and Layered Security for Intrus...
 
OSB50: Operational Security: State of the Union
OSB50: Operational Security: State of the UnionOSB50: Operational Security: State of the Union
OSB50: Operational Security: State of the Union
 
SplunkLive Auckland 2015 - Splunk for Security
SplunkLive Auckland 2015 - Splunk for SecuritySplunkLive Auckland 2015 - Splunk for Security
SplunkLive Auckland 2015 - Splunk for Security
 

More from Priyanka Aash

Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsPriyanka Aash
 
Verizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdfVerizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdfPriyanka Aash
 
Top 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdfTop 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdfPriyanka Aash
 
Simplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdfSimplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdfPriyanka Aash
 
Generative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdfGenerative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdfPriyanka Aash
 
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdfEVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdfPriyanka Aash
 
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdfCyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdfPriyanka Aash
 
Cyber Crisis Management.pdf
Cyber Crisis Management.pdfCyber Crisis Management.pdf
Cyber Crisis Management.pdfPriyanka Aash
 
CISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdfCISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdfPriyanka Aash
 
Chennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdfChennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdfPriyanka Aash
 
Cloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdfCloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdfPriyanka Aash
 
Stories From The Web 3 Battlefield
Stories From The Web 3 BattlefieldStories From The Web 3 Battlefield
Stories From The Web 3 BattlefieldPriyanka Aash
 
Lessons Learned From Ransomware Attacks
Lessons Learned From Ransomware AttacksLessons Learned From Ransomware Attacks
Lessons Learned From Ransomware AttacksPriyanka Aash
 
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)Priyanka Aash
 
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)Priyanka Aash
 
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)Priyanka Aash
 
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow LogsCloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow LogsPriyanka Aash
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security GovernancePriyanka Aash
 

More from Priyanka Aash (20)

Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOs
 
Verizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdfVerizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdf
 
Top 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdfTop 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdf
 
Simplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdfSimplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdf
 
Generative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdfGenerative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdf
 
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdfEVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
 
DPDP Act 2023.pdf
DPDP Act 2023.pdfDPDP Act 2023.pdf
DPDP Act 2023.pdf
 
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdfCyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
 
Cyber Crisis Management.pdf
Cyber Crisis Management.pdfCyber Crisis Management.pdf
Cyber Crisis Management.pdf
 
CISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdfCISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdf
 
Chennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdfChennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdf
 
Cloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdfCloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdf
 
Stories From The Web 3 Battlefield
Stories From The Web 3 BattlefieldStories From The Web 3 Battlefield
Stories From The Web 3 Battlefield
 
Lessons Learned From Ransomware Attacks
Lessons Learned From Ransomware AttacksLessons Learned From Ransomware Attacks
Lessons Learned From Ransomware Attacks
 
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
 
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
 
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
 
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow LogsCloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security Governance
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 

Recently uploaded

My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 

Recently uploaded (20)

My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 

Broadening the Scope of Endpoint Indicator Usage

  • 1. SESSION ID: IOCs are Dead - Long Live IOCs! AIR-F03 Ryan Kazanciyan Chief Security Architect Tanium
 @ryankaz42
  • 2. Yours truly, circa 2010 2 https://buildsecurityin.us-cert.gov/sites/ default/files/RyanKazanciyan-APTPanel.pdf
  • 3. IOCs as advertised 3 Human-readable, machine- consumable Capture a broad set of forensic artifacts Foster information sharing Provide context around threats Do better than “signatures”
  • 5. IOC quality and sharing in 2016 5
  • 6. My own point of reference 2009 - 2015: Investigator Large-scale, targeted attacks Designed, tested, and applied IOCs for proactive and reactive hunting 6 2015 - Present: Builder Designing an EDR platform that includes IOC detection Helping orgs build self- sustaining, scalable “hunting” capabilities
  • 7. The erosion of indicator-based detection 7 Brittle indicators - short shelf-life Poor quality control in threat data feeds Hard to build effective homegrown IOCs Indicator detection tools are inconsistent IOCs applied to limited scope of data
  • 8. “IOCs” vs. “threat data” vs. “intelligence” IOCs are structured threat data Threat data != threat intelligence Threat intelligence provides context and and analysis Threat intelligence is ineffective without quality threat data 8
  • 10. Verizon DBIR 2015: Most shared IOC types 10 Source: Verizon DBIR 2015
  • 11. IOCs in the APTnotes data set 11 0 2500 5000 7500 10000 141 5,083 9,096 2,237 6,639 2,512 350248 CVE E-Mail URL Hosts IP Hashes RegistryFile Name Derived from over 340 threat reports (2006 - 2015) archived on https://github.com/kbandla/APTnotes
  • 12. This will never keep pace… 12 Source: Verizon DBIR 2015
  • 13. Short lifespan of C2 IPs and domains Malicious sites co- located on virtual host server IPs Low barrier to host malicious content on legitimate providers 13 The problem extends beyond file hashes
  • 14. Sheer volume does not solve the problem 2007: Bit9 FileAdvisor tracked 4 billion unique files, catalog grew by 50 million entries per day 2009: McAfee Global Threat Intelligence tracked reputation data for 140 million IP addresses, handling 50 million file lookups per day 2011: Symantec Insight tracked tens of billions of linkages between users, files, web sites 14
  • 15. Seven years of progress? 15 “…an intelligence-led approach to security will be key in detecting the most sophisticated threats and responding to them quickly and effectively.” “…innovating to provide predictive security. This approach comprises interconnected security technology at multiple layers in the technology stack, backed by global threat intelligence. Predictive security will allow security products to intelligently block attacks much sooner than is currently possible…”
  • 16. #RSAC Paid IOCs != quality IOCs
  • 17. Have you assessed your feeds? 17 Jon Oltsik / ESG, http://www.networkworld.com/article/2951542/cisco-subnet/measuring-the-quality-of-commercial-threat-intelligence.html
  • 18. My (incredibly scientific) methodology Chose two top-tier paid threat feed services Retrieved the most recent ~20 indicators from each Spent 15 minutes eyeballing their contents 18
  • 19. What are you paying for? 19 Too specific - malware hash AND’d with a filename (Real IOC from a commercial feed)
  • 20. What are you paying for? 20 Too specific - LNK files are unique per-system (Real IOC from a commercial feed)
  • 21. What are you paying for? 21 Too noisy - matches component of legitimate software (Real IOC from a commercial feed)
  • 23. Challenges with IOC development 23 Easy to build high-fidelity IOCs (may yield high false-negatives) Hard to build robust IOCs (may yield higher false- positives) Easy to build IOCs that don’t evaluate properly (tools have inconsistent matching logic) “Pyramid of Pain”, David Bianco
 http://detect-respond.blogspot.co.uk/2013/03/the-pyramid-of-pain.html
  • 24. Running aground on a robust IOC 24 Too broad - may match on uncommon but legitimate binaries How much time do your analysts have to continuously build, test, and refine IOCs like this?
  • 25. Inconsistencies in IOC detection tools 25 FileItem TaskItem ServiceItem EventLogItem ... ✅ ❌ ❌ ✅ ? {…} {…} OR AND {…} {…} AND OR {…} {…} ✅ ❌ ✅ ? ✅ Supported Observables Logic Handling Data Normalization x86 or x64? HKEY_CURRENT_USER %SYSTEMROOT% HKEY_USERS{SID} system32 SysWoW64 WoW6432Node Windows STIX & CybOX have a few tools to help with this: maec-to-stix python-cybox/normalize.py
  • 26. Issues specific to OpenIOC What happens when you try to turn a proprietary tool’s unique output schema into a “standard”… 26 ProcessItem/PortList/PortItem/process “File PE Detected Anomali FileItem/PEInfo/DetectedEntryPointSignature/Name “Process Port Process” FileItem/PEInfo/DetectedAnomalies/string “File EntryPoint Sig Name”
  • 27. Issues specific to OpenIOC Example: Registry evidence in OpenIOC 27 Key: HKLMSOFTWAREMicrosoftWindowsCurrentVersionRun Value: Backdoor Data: C:pathtomalware.exe RegistryItem/Path: HKLMSOFTWAREMicrosoftWindowsCurrentVersionRunBackdoor RegistryItem/KeyPath: SOFTWAREMicrosoftWindowsCurrentVersionRun RegistryItem/Value: C:pathtomalware.exe RegistryItem/ValueName: Backdoor RegistryItem/Text: C:pathtomalware.exe
  • 28. #RSAC Broadening the scope of endpoint indicator usage
  • 29. Focusing on scope of data, not tools What are you matching your endpoint IOCs against? What’s your cadence of detection? Where are your gaps? 29 Data at Rest
 (Files on disk, registry) Workstations Servers Historical Activity
 (Telemetry, logs, alerts, historical data) EXE Current Activity
 (Processes, Network 
 Connections, Memory)
  • 30. Matching on SIEM / centralized logging 30 Most common endpoint data in SIEM: Anti-virus / anti-malware alerts (all systems) Event log data (subset of systems - usually servers) Resource impact of large- scale event forwarding & storage limits endpoint coverage & scope of data Data at Rest
 (Files on disk, registry) Workstations Servers Historical Activity
 (Telemetry, logs, alerts, historical data) EXE Current Activity
 (Processes, Network 
 Connections, Memory)
  • 31. Matching on forensic telemetry Process execution, file events, network connections, registry changes Preserves historical data, short-lived events Expensive to centralize in large environments Limited scope of data for IOC matching 31 Workstations Servers Historical Activity
 (Telemetry, logs, alerts, historical data) EXE Current Activity
 (Processes, Network 
 Connections, Memory) Data at Rest
 (Files on disk, registry)
  • 32. Matching on live endpoints Potentially the broadest set of available data Considerations Endpoint impact Availability Time-to-assess Scalability 32 Data at Rest
 (Files on disk, registry) Workstations Servers Historical Activity
 (Telemetry, logs, alerts, historical data) EXE Current Activity
 (Processes, Network 
 Connections, Memory)
  • 33. The ideal combination Goal: Maximize the value of brittle IOCs Telemetry for efficiency, historical data On-endpoint to maximize current state & at-rest data Increase cadence as tools & resources permit Don’t take shortcuts on scope of coverage! 33
  • 34. “I only need to check important systems” 34 Credentials can be harvested from anywhere on a Windows network No need to run malicious code on admin systems or DCs By the time they get to “crown jewels”, attackers are already authenticating with legitimate accounts Source: https://adsecurity.org/?p=1729 An example of why this fails:
  • 36. Doing better with what we've got Source:
 https://www.digitalshadows.com/blog-and-research/another-sans-cyber-threat-intelligence-summit-is-in-the-books/ 36 "The desire to take a technical feed and simply dump it into our security infrastructure doesn’t equate to a threat intelligence win... You cannot get more relevant threat intelligence than what you develop from within your own environment. This should then be enriched with external intelligence" -Rick Holland, Forrester, 2016 CTI Summit
  • 37. My own point of reference As an investigator: 
 Relative efficacy of IOCs vs. methodology & outlier analysis over time 37 0 20 40 60 80 2010 2011 2012 2013 2014 2015 IOCs Methodology 
 & outlier analysis (Rough approximation for the sake of having a pretty graph)
  • 38. Resetting expectations 38 Categorize and contextualize known threats, streamline response Provide additional layer of automated detection Preventative Controls Signature-based detection Undetected Threats Threat data & intel feeds Internal analysis Reality Preventative Controls 
 Threat data & intel feeds 
 Signature-based detection Undetected Threats Expectation Tell you what’s normal in your own environment Exceed the benefits of well- implemented preventative controls Close the gap of undetected threats ...but it cannot... High-quality threat data and intelligence can help you…
  • 39. Looking inward to hunt Derive intelligence from what’s “normal” Build repeatable analysis tasks Combine with automated use of IOCs and threat data More is not always better! Easy to overwhelm yourself Take on discrete, high-value data sets one at a time 39
  • 40. Aligning to the attack lifecycle 40 What are the "lowest common denominators" across targeted intrusions? What readily-available evidence do they leave behind? What easily-observable outlier conditions do they create? Conduct Reconnaissance Steal Credentials & Move Laterally Establish & Retain
  • 41. Example: Hunting for Duqu 2.0 41 “In addition to creating services to infect other computers in the LAN, attackers can also use the Task Scheduler to start ‘msiexec.exe’ remotely. The usage of Task Scheduler during Duqu infections for lateral movement was also observed with the 2011 version...” Source: https://securelist.com/files/2015/06/The_Mystery_of_Duqu_2_0_a_sophisticated_cyber espionage_actor_returns.pdf
  • 42. What was the shared IOC? 42
  • 43. How could we do better? 43 We could just add a specific TaskItem to the IOC... …but what about other variants? How can we find evidence of other malicious activity that abuses the same (incredibly common) lateral movement technique?
  • 44. Example: Lateral command execution 44 Scheduled Tasks WinRM & PowerShell PsEx Attacker Other forensic artifacts E Logon & service events Process history Sources of Evidence Accounts used Executed commands, dropped files, etc. Time & frequency Where? When? What? Who? Source & target systems Analysis Criteria Assess outliers
  • 49. For additional examples 49 “Hunting in the Dark” https://speakerdeck.com/ryankaz Includes coverage of: More task analysis ShimCache and process history Service Events WMI event consumers Alternative authentication mechanisms
  • 51. Platforms MISP
 http://www.misp-project.org Hubs and exchanges Facebook ThreatExchange
 https://threatexchange.fb.com Standards CybOX 3.0 refactoring and simplification Evolving standards & platforms 51
  • 52. Few efforts to-date - this is difficult! Threat Intelligence Quotient Test (tiq-test) Statistical analysis of IPs and domains in threat feeds References:
 https://github.com/mlsecproject
 
 https://defcon.org/images/defcon-22/dc-22-presentations/Pinto- Maxwell/DEFCON-22-Pinto-and-Maxwell-Measuring-the-IQ-of- your-threat-feeds-TIQtest-Updated.pdf Quantitative assessment of threat feeds 52
  • 53. Ask your threat feed vendor 53 Where’s the intel coming from? Professional services Managed security services Partners Honeypots “Open source” data gathering Auto-generated sandbox data
 What’s the breakdown of observable types? What QC is in place? Test-cases Documentation Spot-checking
  • 54. Maximize your IOCs & threat data 54 Where are your gaps in endpoint & network visibility? Can you expand the scope of data made available for endpoint IOC matching in your environment? Are your tools and threat data sources fully compatible? How quickly are you consuming new threat data? At what scale?
  • 55. Even the best sources of threat data will never keep pace with emerging attacks Know your network above all Invest in attack surface reduction and “hygiene”. It really does make a difference. Have your investments made you more secure? 55
  • 56. SESSION ID: Thank you! AIR-F03 Ryan Kazanciyan Chief Security Architect Tanium
 @ryankaz42