Cyber threat Intelligence and Incident Response by:-Sandeep Singh

Security Researcher at Adobe, Chapter Leader at OWASP & null
Feb. 3, 2016
Cyber threat Intelligence and Incident Response by:-Sandeep Singh
Cyber threat Intelligence and Incident Response by:-Sandeep Singh
Cyber threat Intelligence and Incident Response by:-Sandeep Singh
Cyber threat Intelligence and Incident Response by:-Sandeep Singh
Cyber threat Intelligence and Incident Response by:-Sandeep Singh
Cyber threat Intelligence and Incident Response by:-Sandeep Singh
Cyber threat Intelligence and Incident Response by:-Sandeep Singh
Cyber threat Intelligence and Incident Response by:-Sandeep Singh
Cyber threat Intelligence and Incident Response by:-Sandeep Singh
Cyber threat Intelligence and Incident Response by:-Sandeep Singh
Cyber threat Intelligence and Incident Response by:-Sandeep Singh
Cyber threat Intelligence and Incident Response by:-Sandeep Singh
Cyber threat Intelligence and Incident Response by:-Sandeep Singh
Cyber threat Intelligence and Incident Response by:-Sandeep Singh
Cyber threat Intelligence and Incident Response by:-Sandeep Singh
Cyber threat Intelligence and Incident Response by:-Sandeep Singh
Cyber threat Intelligence and Incident Response by:-Sandeep Singh
Cyber threat Intelligence and Incident Response by:-Sandeep Singh
Cyber threat Intelligence and Incident Response by:-Sandeep Singh
Cyber threat Intelligence and Incident Response by:-Sandeep Singh
Cyber threat Intelligence and Incident Response by:-Sandeep Singh
Cyber threat Intelligence and Incident Response by:-Sandeep Singh
Cyber threat Intelligence and Incident Response by:-Sandeep Singh
Cyber threat Intelligence and Incident Response by:-Sandeep Singh
Cyber threat Intelligence and Incident Response by:-Sandeep Singh
Cyber threat Intelligence and Incident Response by:-Sandeep Singh
Cyber threat Intelligence and Incident Response by:-Sandeep Singh
Cyber threat Intelligence and Incident Response by:-Sandeep Singh
Cyber threat Intelligence and Incident Response by:-Sandeep Singh
Cyber threat Intelligence and Incident Response by:-Sandeep Singh
Cyber threat Intelligence and Incident Response by:-Sandeep Singh
Cyber threat Intelligence and Incident Response by:-Sandeep Singh
Cyber threat Intelligence and Incident Response by:-Sandeep Singh
1 of 33

More Related Content

Slideshows for you

Cyber Threat Hunting with PhirelightCyber Threat Hunting with Phirelight
Cyber Threat Hunting with PhirelightHostway|HOSTING
Effective Threat Hunting with Tactical Threat IntelligenceEffective Threat Hunting with Tactical Threat Intelligence
Effective Threat Hunting with Tactical Threat IntelligenceDhruv Majumdar
6 Steps for Operationalizing Threat Intelligence6 Steps for Operationalizing Threat Intelligence
6 Steps for Operationalizing Threat IntelligenceSirius
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat IntelligencePrachi Mishra
Threat HuntingThreat Hunting
Threat HuntingSplunk
Building a Cyber Threat Intelligence Knowledge Management System (Paris Augus...Building a Cyber Threat Intelligence Knowledge Management System (Paris Augus...
Building a Cyber Threat Intelligence Knowledge Management System (Paris Augus...Vaticle

Viewers also liked

The Cyber Threat Intelligence MatrixThe Cyber Threat Intelligence Matrix
The Cyber Threat Intelligence MatrixFrode Hommedal
Windows privilege escalation by Dhruv ShahWindows privilege escalation by Dhruv Shah
Windows privilege escalation by Dhruv ShahOWASP Delhi
Introduction to Threat SharingIntroduction to Threat Sharing
Introduction to Threat SharingDavid Sweigert
MISP 2020 OverviewMISP 2020 Overview
MISP 2020 OverviewAngus Hobson
bsides NOVA 2017 So You Want to Be a Cyber Threat Analyst eh?bsides NOVA 2017 So You Want to Be a Cyber Threat Analyst eh?
bsides NOVA 2017 So You Want to Be a Cyber Threat Analyst eh?Anthony Melfi
MISP EcoSystem - Threat Intelligence, VMRay, MISPMISP EcoSystem - Threat Intelligence, VMRay, MISP
MISP EcoSystem - Threat Intelligence, VMRay, MISPKoen Van Impe

Similar to Cyber threat Intelligence and Incident Response by:-Sandeep Singh

Threat Intelligence: State-of-the-art and Trends - Secure South West 2015Threat Intelligence: State-of-the-art and Trends - Secure South West 2015
Threat Intelligence: State-of-the-art and Trends - Secure South West 2015Andreas Sfakianakis
Cyber security talks 2019 by theko moimaCyber security talks 2019 by theko moima
Cyber security talks 2019 by theko moimaTheko Moima
Cyber Threat Hunting Workshop.pdfCyber Threat Hunting Workshop.pdf
Cyber Threat Hunting Workshop.pdfssuser4237d4
Cyber Threat Hunting Workshop.pdfCyber Threat Hunting Workshop.pdf
Cyber Threat Hunting Workshop.pdfssuser4237d4
Jd sherry howard a. schmidt   cyber crime, cyberspy, cyberwar - taking the le...Jd sherry howard a. schmidt   cyber crime, cyberspy, cyberwar - taking the le...
Jd sherry howard a. schmidt cyber crime, cyberspy, cyberwar - taking the le...Graeme Wood
Cyber Security Beyond 2020 – Will We Learn From Our Mistakes?Cyber Security Beyond 2020 – Will We Learn From Our Mistakes?
Cyber Security Beyond 2020 – Will We Learn From Our Mistakes?Raffael Marty

Similar to Cyber threat Intelligence and Incident Response by:-Sandeep Singh(20)

More from OWASP Delhi

Getting Started With Hacking Android & iOS Apps? Tools, Techniques and resourcesGetting Started With Hacking Android & iOS Apps? Tools, Techniques and resources
Getting Started With Hacking Android & iOS Apps? Tools, Techniques and resourcesOWASP Delhi
Securing dns records from subdomain takeoverSecuring dns records from subdomain takeover
Securing dns records from subdomain takeoverOWASP Delhi
Effective Cyber Security Report WritingEffective Cyber Security Report Writing
Effective Cyber Security Report WritingOWASP Delhi
Data sniffing over Air GapData sniffing over Air Gap
Data sniffing over Air GapOWASP Delhi
UDP HunterUDP Hunter
UDP HunterOWASP Delhi
Demystifying Container EscapesDemystifying Container Escapes
Demystifying Container EscapesOWASP Delhi

Recently uploaded

dvss.pptdvss.ppt
dvss.pptSaikrishnaCheruvu1
AI and ML Series - Generative Extraction and Classification of Documents in S...AI and ML Series - Generative Extraction and Classification of Documents in S...
AI and ML Series - Generative Extraction and Classification of Documents in S...DianaGray10
Stanford AI Report 2023Stanford AI Report 2023
Stanford AI Report 2023Kapil Khandelwal (KK)
INASLA_AI and Landscape Architecture.pptxINASLA_AI and Landscape Architecture.pptx
INASLA_AI and Landscape Architecture.pptxJonathon Geels
OpenFOAM benchmark for EPYC server -Influence of coarsestLevelCorr in GAMG so...OpenFOAM benchmark for EPYC server -Influence of coarsestLevelCorr in GAMG so...
OpenFOAM benchmark for EPYC server -Influence of coarsestLevelCorr in GAMG so...takuyayamamoto1800
Artificial Intelligence (AI).pptxArtificial Intelligence (AI).pptx
Artificial Intelligence (AI).pptxSharifulShishir

Cyber threat Intelligence and Incident Response by:-Sandeep Singh

  1. Cyber Threat Intelligence Sandeep Singh OWASP Delhi & null Delhi 30 January 2015

  2.  I am not an intelligence analyst but would love to be   The topic is close to my heart  Do not expect any FM (Freakin Magic )  The objective is to help attendees get familiar with the world of threat intel Disclaimer

  3.  Overview of Threat Intel  Understanding Threat Intel  What is Cyber Threat Intelligence  Types of Threat Intel  Intelligence Lifecycle  Threat Intel – Classification & Vendor Landscape  Threat Intel – Standards  Open Source Threat Data/Intel Sources  Bonus Agenda Agenda

  4. What is Threat Intelligence?

  5. • Buzzword • Growing field - $250M in 2013 - $1.5B in 2018 • Lots of new service providers entering the market • and still maturing Overview

  6. Risk = Vulnerability * Threat * Impact Threat = Intent * Capability We like the term "Threat Actor". May be any of: • Cybercrime • State-sponsored • Hacktivism • Insider • Industry competition Threat

  7. Intelligencea.k.a. Renseignement, ré-enseignement • Environment → Data → Information → Intelligence • Intelligence is a cyclic process • Analysis and contextualization • Models help counter diversity with abstraction

  8.  Accurate  Relevant  Timely  Aligned  Predictive  Integrated Actionable Intel

  9. Cyber Area of interest/ of collection Threat Subject of interest Intelligence Process Cyber Threat Intelligence

  10. Key Elements of Threat Intel

  11. Types of Threat Intel

  12. • Target audience: decision-makers • Focus on changing risks, high level topics • Geopolitics • Foreign markets • Cultural background • Vision timeframe: years Note: You may never have heard of this; could be explained by lack of maturity in orgs Strategic TI

  13. • Target audience: defenders • Focus on current & future attacks: • Who, what, when? • Early warning on incoming attacks • Social media activity • Vision timeframe: months, weeks, hours Operational TI Note: Hard for private companies to obtain on advanced attackers; traditionally collected through HUMINT / SIGINT

  14. • Target audience: architects & sysadmins • Focus on "TTPs": • Attacker modus operandi • Blue team / red team tools • Exfiltration / C2 methods • Persistence / stealth / deception mechanisms • Vision timeframe: weeks to a year Note: The most common form of threat intel (and marketing ) produced today; easy to obtain Tactical TI

  15. Technical TI a.k.a. Data • Target audience: SOC, IR people • Focus on raw observables: • Indicators of compromise • Host and network artifacts • Yara, Snort, OpenIOC rules • Vision timeframe: hours to years Note: Man-hours are valuable. Technical TI is abundant. Processing should be as automated as possible.

  16. Strategic Will feed SWOT, risk assessments, Porter Diamond model... Tactical Cyber Kill-chain, Diamond model, ACH Operational OODA Loop, Pyramid of Pain Technical F3EAD, CIF, FIR, MISP, Malcom, Maltego,…. Weaponry

  17. Intelligence Cycle

  18. Intelligence Cycle applied to CTI in orgs • Planning • What are you looking for? • Collection • OSINT/HUMINT • Logs/Data points inside the org • Honeypots/nets/docs, social networks • FM-5 • Processing • Synthesizing the collected data so that intelligence analyst can work • Analysis • Finished Intelligence • Dissemination • Present to the right audience

  19. ThreatIntel Threat Intel Platform Threat Intel Enrichment Threat Intel Integration Open Source Intel (OSINT) Human Intel (HUMINT) Technical Intel Adversary Intel Vulnerability Intel Strategic Intel Threat Intel - Classification

  20. Vendors

  21. Can you guess the price of commercial threat Intel?

  22.  Symantec's 12-month retail subscription to its reputation feed costs $95,300 (INR 6100000 approx.)  FireEye threat intelligence appliances cost around $17000 at starting price and increase upto $175000 per unit

  23. Managing Threat Intel As tough as it sounds

  24. • MISP - Event-based indicator sharing • FIR - Incident management platform + indicator correlation • CRITS - Platform to store threat-related information • Malcom - Correlation of network traffic with maliciousness feeds • CIF - Query indicators + variety of output formats • Grr, osquery - Endpoint hunting not mature …but lots of stuff is going on

  25. What’s so nice about “standards” • MITRE - STIX, TAXII, CybOX, MAEC • IETF - IODEF • Mandiant - OpenIOC • VERIS • MANTIS

  26. Black List IP Address Sources • emergingthreats.net • binarydefense.com • zeustracker.abuse.ch • palevotracker.abuse.ch • feodotracker.abuse.ch • sslbl.abuse.ch • spamhaus Phishing URL Sources • openphish.com Vulnerability Database Sources • scip.ch • cxsecurity.com • exchange.xforce.ibmcloud.com • packetstormsecurity.com Honeypots/Honeynets Open Source Threat Data Sources

  27. Bonus Agenda

  28. • Developed by REN-ISAC • http://csirtgadgets.org/collective-intelligence-framework/ • Does not generate data, simply takes sources normalizes it and then outputs by given types • Limited in the types of data it can handle – URLs – Domains – IPs – MD5s • Certainly more to threat intel than this, but it’s a start CIF: Collective Intelligence Framework

  29. CIF Architecture

  30. • A target-centric approach to intelligence analysis • Bridge between operations and intelligence • a.k.a. “Hunting” F3EAD

  31. • TI is closely related to traditional intelligence • Models help but have limitations • The quality of your TI directly influences the quality of your response • Tools to store, analyze, and share intelligence exist, but there's room for improvement Conclusion

  32.  http://sroberts.github.io  http://direct.tomchop.me/slides  http://frodehommedal.no/presentations/first-tc-oslo- 2015  https://www.mwrinfosecurity.com/system/assets/909/ original/Threat_Intelligence_Whitepaper.pdf  Google References:

  33. Thank you, Sandeep Singh – Chapter Leader, OWASP Delhi & null Delhi sandeep.singh@owasp.org san@null.co.in @Sandy1sm Q & A