SlideShare a Scribd company logo
1 of 13
Download to read offline
Security Automation
for Malware Alerts
Introduction
Automating the triage and incident response for malware alerts. Here we
will discuss the steps to automate some of the most common SOC
processes.
Why Malware?
Malware makes our list for two main reasons. First, malware alerts have
inherently low fidelity, especially in large organizations. The sheer volume
of malware-related alerts can easily inundate SOC teams, who need to
correlate data from various sources/alerts to gain context but are faced
with low signal-to-noise ratios.
Malware Infections
Because some malware infections
can contaminate several systems in
a very short period of time, quick
response is an absolute necessity. If
the malware has worm-like
attributes, it can spread through you
network, and even to adjoining
networks, in just a matter of hours.
Automation For Malware
Security automation can take care of the entire data collection process
and present analysts with actionable information in a fraction of the time
it would take them to manually aggregate the necessary details. Instead of
spending a lot of time on a swivel-chair interface for data
integration/correlation, analysts can view all the information they need
through a single pane of glass and go straight to decision-making.
Data Gathering
Before SOC teams can respond to a
malware alert, they need to go through a
time-consuming and tedious process that
begins with data gathering and user or
host enrichment. Raw data from a single
or even a handful of malware alerts is not
enough to provide actionable
information.
Threat Intelligence Data
You’ll also need to compare the data you just gathered with your threat
intelligence and web intelligence. What do they say about the hash you
just obtained? Is it associated with a known malware? What do they say
about the URL you discovered the suspected malware was connecting to?
Is it a known C&C server?
Security Integrations
To get all that information and obtain the best context, you’ll have to run
the suspected malware through a series of scans, tests and a host of other
procedures on security orchestration integration.
● VirusTotal for a hash
● SEP (Symantec Endpoint Protection) for additional context
● Nessus for vulnerability information
● SSCM to get context from asset information
● And so on
Automated Analysis
As not all malware (zero-day threats in particular) can be detected through
signature and basic heuristic-based scans, you’ll often need to send the file
to a sandbox like Cuckoo for further analysis.
Security automation and orchestration can save time by taking charge of
sending the suspicious files to the sandbox environment, obtaining the
results, and delivering them to your screen in a concise report.
First-level Determination
First-level determination refers to that stage wherein analysts make an
initial assessment based on the information gathered from the previous
two stages and then arrive at a decision. Although some organizations
might opt to do this manually, i.e. leaving the decision-making to the
analyst, it’s also something that can be completely delegated to
automation solutions that leverage machine learning-powered analytics
platforms.
Deeper Investigation
Some cases require deeper investigation. This would typically entail things
like looking into your endpoint tools to obtain other pieces of information
● What were the other hosts (if any) in the organization where the hash
in question manifested?
● What were the activities going on in those endpoints over the last 10
minutes when that specific alert was generated?
● Who were the end users logged in?
● What network connections were involved?
Feedback/Remediation
Last but not the least is the feedback/remediation stage. At this stage, SOC
teams typically perform a series of tasks that improve the organization’s
security posture - blacklisting the hash or URL, performing an intelligence
update, updating security sensors, re-imaging systems, and so on. All these
- you guessed it - can be partially or fully automated, depending on the
policies within your organization.
Conclusion
Analysts devote so much time processing malware alerts. But a substantial
portion of that time is consumed by mundane tasks such as data
collection, basic analysis, forwarding of files, and several others that can
actually be delegated to malware security automation.

More Related Content

More from Siemplify

MSSP - Security Orchestration & Automation
MSSP - Security Orchestration & AutomationMSSP - Security Orchestration & Automation
MSSP - Security Orchestration & AutomationSiemplify
 
Cyber Security Vulnerabilities
Cyber Security VulnerabilitiesCyber Security Vulnerabilities
Cyber Security VulnerabilitiesSiemplify
 
Building A Security Operations Center
Building A Security Operations CenterBuilding A Security Operations Center
Building A Security Operations CenterSiemplify
 
Cyber Security & Cyber Security Threats
Cyber Security & Cyber Security ThreatsCyber Security & Cyber Security Threats
Cyber Security & Cyber Security ThreatsSiemplify
 
Need Of Security Operations Over SIEM
Need Of Security Operations Over SIEMNeed Of Security Operations Over SIEM
Need Of Security Operations Over SIEMSiemplify
 
Need of SIEM when You have SOAR
Need of SIEM when You have SOARNeed of SIEM when You have SOAR
Need of SIEM when You have SOARSiemplify
 
Security Operations Strategies
Security Operations Strategies Security Operations Strategies
Security Operations Strategies Siemplify
 
Incident Response Test
Incident Response TestIncident Response Test
Incident Response TestSiemplify
 
Security Automation and Machine Learning
Security Automation and Machine LearningSecurity Automation and Machine Learning
Security Automation and Machine LearningSiemplify
 
CyberSecurity Automation
CyberSecurity AutomationCyberSecurity Automation
CyberSecurity AutomationSiemplify
 
Security Orchestration Made Simple
Security Orchestration Made SimpleSecurity Orchestration Made Simple
Security Orchestration Made SimpleSiemplify
 
Security automation system
Security automation systemSecurity automation system
Security automation systemSiemplify
 
Automated incident response
Automated incident responseAutomated incident response
Automated incident responseSiemplify
 
Introducing Siemplify V4.25 - Security Orchestration, Automation And Response...
Introducing Siemplify V4.25 - Security Orchestration, Automation And Response...Introducing Siemplify V4.25 - Security Orchestration, Automation And Response...
Introducing Siemplify V4.25 - Security Orchestration, Automation And Response...Siemplify
 

More from Siemplify (14)

MSSP - Security Orchestration & Automation
MSSP - Security Orchestration & AutomationMSSP - Security Orchestration & Automation
MSSP - Security Orchestration & Automation
 
Cyber Security Vulnerabilities
Cyber Security VulnerabilitiesCyber Security Vulnerabilities
Cyber Security Vulnerabilities
 
Building A Security Operations Center
Building A Security Operations CenterBuilding A Security Operations Center
Building A Security Operations Center
 
Cyber Security & Cyber Security Threats
Cyber Security & Cyber Security ThreatsCyber Security & Cyber Security Threats
Cyber Security & Cyber Security Threats
 
Need Of Security Operations Over SIEM
Need Of Security Operations Over SIEMNeed Of Security Operations Over SIEM
Need Of Security Operations Over SIEM
 
Need of SIEM when You have SOAR
Need of SIEM when You have SOARNeed of SIEM when You have SOAR
Need of SIEM when You have SOAR
 
Security Operations Strategies
Security Operations Strategies Security Operations Strategies
Security Operations Strategies
 
Incident Response Test
Incident Response TestIncident Response Test
Incident Response Test
 
Security Automation and Machine Learning
Security Automation and Machine LearningSecurity Automation and Machine Learning
Security Automation and Machine Learning
 
CyberSecurity Automation
CyberSecurity AutomationCyberSecurity Automation
CyberSecurity Automation
 
Security Orchestration Made Simple
Security Orchestration Made SimpleSecurity Orchestration Made Simple
Security Orchestration Made Simple
 
Security automation system
Security automation systemSecurity automation system
Security automation system
 
Automated incident response
Automated incident responseAutomated incident response
Automated incident response
 
Introducing Siemplify V4.25 - Security Orchestration, Automation And Response...
Introducing Siemplify V4.25 - Security Orchestration, Automation And Response...Introducing Siemplify V4.25 - Security Orchestration, Automation And Response...
Introducing Siemplify V4.25 - Security Orchestration, Automation And Response...
 

Recently uploaded

Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Hyundai Motor Group
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetEnjoy Anytime
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 

Recently uploaded (20)

Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 

Security Automation For Malware Alerts

  • 2. Introduction Automating the triage and incident response for malware alerts. Here we will discuss the steps to automate some of the most common SOC processes.
  • 3. Why Malware? Malware makes our list for two main reasons. First, malware alerts have inherently low fidelity, especially in large organizations. The sheer volume of malware-related alerts can easily inundate SOC teams, who need to correlate data from various sources/alerts to gain context but are faced with low signal-to-noise ratios.
  • 4. Malware Infections Because some malware infections can contaminate several systems in a very short period of time, quick response is an absolute necessity. If the malware has worm-like attributes, it can spread through you network, and even to adjoining networks, in just a matter of hours.
  • 5. Automation For Malware Security automation can take care of the entire data collection process and present analysts with actionable information in a fraction of the time it would take them to manually aggregate the necessary details. Instead of spending a lot of time on a swivel-chair interface for data integration/correlation, analysts can view all the information they need through a single pane of glass and go straight to decision-making.
  • 6. Data Gathering Before SOC teams can respond to a malware alert, they need to go through a time-consuming and tedious process that begins with data gathering and user or host enrichment. Raw data from a single or even a handful of malware alerts is not enough to provide actionable information.
  • 7. Threat Intelligence Data You’ll also need to compare the data you just gathered with your threat intelligence and web intelligence. What do they say about the hash you just obtained? Is it associated with a known malware? What do they say about the URL you discovered the suspected malware was connecting to? Is it a known C&C server?
  • 8. Security Integrations To get all that information and obtain the best context, you’ll have to run the suspected malware through a series of scans, tests and a host of other procedures on security orchestration integration. ● VirusTotal for a hash ● SEP (Symantec Endpoint Protection) for additional context ● Nessus for vulnerability information ● SSCM to get context from asset information ● And so on
  • 9. Automated Analysis As not all malware (zero-day threats in particular) can be detected through signature and basic heuristic-based scans, you’ll often need to send the file to a sandbox like Cuckoo for further analysis. Security automation and orchestration can save time by taking charge of sending the suspicious files to the sandbox environment, obtaining the results, and delivering them to your screen in a concise report.
  • 10. First-level Determination First-level determination refers to that stage wherein analysts make an initial assessment based on the information gathered from the previous two stages and then arrive at a decision. Although some organizations might opt to do this manually, i.e. leaving the decision-making to the analyst, it’s also something that can be completely delegated to automation solutions that leverage machine learning-powered analytics platforms.
  • 11. Deeper Investigation Some cases require deeper investigation. This would typically entail things like looking into your endpoint tools to obtain other pieces of information ● What were the other hosts (if any) in the organization where the hash in question manifested? ● What were the activities going on in those endpoints over the last 10 minutes when that specific alert was generated? ● Who were the end users logged in? ● What network connections were involved?
  • 12. Feedback/Remediation Last but not the least is the feedback/remediation stage. At this stage, SOC teams typically perform a series of tasks that improve the organization’s security posture - blacklisting the hash or URL, performing an intelligence update, updating security sensors, re-imaging systems, and so on. All these - you guessed it - can be partially or fully automated, depending on the policies within your organization.
  • 13. Conclusion Analysts devote so much time processing malware alerts. But a substantial portion of that time is consumed by mundane tasks such as data collection, basic analysis, forwarding of files, and several others that can actually be delegated to malware security automation.