Circl eco

Dec. 15, 2014
Circl eco
Circl eco
Circl eco
Circl eco
Circl eco
Circl eco
Circl eco
Circl eco
Circl eco
Circl eco
Circl eco
Circl eco
Circl eco
1 of 13

More Related Content

Viewers also liked

Sandbox kievSandbox kiev
Sandbox kievuisgslide
OWASP 2013 Limerick - ZAP: Whats even newerOWASP 2013 Limerick - ZAP: Whats even newer
OWASP 2013 Limerick - ZAP: Whats even newerSimon Bennetts
OWASP 2012 AppSec Dublin ZAP IntroOWASP 2012 AppSec Dublin ZAP Intro
OWASP 2012 AppSec Dublin ZAP IntroSimon Bennetts
JoinSEC 2013 London - ZAP IntroJoinSEC 2013 London - ZAP Intro
JoinSEC 2013 London - ZAP IntroSimon Bennetts
Download Indexed CacheDownload Indexed Cache
Download Indexed CacheChristian Heinrich
How to Use OWASP Security LoggingHow to Use OWASP Security Logging
How to Use OWASP Security LoggingMilton Smith

Similar to Circl eco

0-misp-introduction-to-information-sharing_handout.pdf0-misp-introduction-to-information-sharing_handout.pdf
0-misp-introduction-to-information-sharing_handout.pdfThiagoHenrique751166
misp-training.pdfmisp-training.pdf
misp-training.pdf9905234521
IDS+Honeypots Making Security SimpleIDS+Honeypots Making Security Simple
IDS+Honeypots Making Security SimpleGregory Hanis
Global Cyber Threat IntelligenceGlobal Cyber Threat Intelligence
Global Cyber Threat IntelligenceNTT Innovation Institute Inc.
European Cyber Security Perspectives 2016European Cyber Security Perspectives 2016
European Cyber Security Perspectives 2016Omer Coskun
Cyber Crime Multi-State Information Sharing and Analysis CenterCyber Crime Multi-State Information Sharing and Analysis Center
Cyber Crime Multi-State Information Sharing and Analysis Center- Mark - Fullbright

Similar to Circl eco(20)

More from uisgslide

Стандарт верифікації безпеки веб-додатків ASVS 3.0Стандарт верифікації безпеки веб-додатків ASVS 3.0
Стандарт верифікації безпеки веб-додатків ASVS 3.0uisgslide
Коментарі до концепції інформаційної безпекиКоментарі до концепції інформаційної безпеки
Коментарі до концепції інформаційної безпекиuisgslide
Кращи практики з аудиту та підтвердження довіри до інформаційних системи (ITA...Кращи практики з аудиту та підтвердження довіри до інформаційних системи (ITA...
Кращи практики з аудиту та підтвердження довіри до інформаційних системи (ITA...uisgslide
Необхідність реформи галузі захисту інформації в УкраїніНеобхідність реформи галузі захисту інформації в Україні
Необхідність реформи галузі захисту інформації в Україніuisgslide
Comments glib pakharenkoComments glib pakharenko
Comments glib pakharenkouisgslide
War between Russia and Ukraine in cyber spaceWar between Russia and Ukraine in cyber space
War between Russia and Ukraine in cyber spaceuisgslide

Recently uploaded

《美国留学生文凭证书》哪里购买挂科美国加州大学欧文分校毕业证成绩单《美国留学生文凭证书》哪里购买挂科美国加州大学欧文分校毕业证成绩单
《美国留学生文凭证书》哪里购买挂科美国加州大学欧文分校毕业证成绩单udxab
PPTx Infographics-Dark.pptxPPTx Infographics-Dark.pptx
PPTx Infographics-Dark.pptxLinaMMoralesBernal
Richard - IFIP Networking 2021 - Panel.pdfRichard - IFIP Networking 2021 - Panel.pdf
Richard - IFIP Networking 2021 - Panel.pdfRichard Renwei Li
Richard - MedComNet Panel - Final Version.pdfRichard - MedComNet Panel - Final Version.pdf
Richard - MedComNet Panel - Final Version.pdfRichard Renwei Li
【澳洲毕业证】澳大利亚天主教大学毕业证学位证购买【澳洲毕业证】澳大利亚天主教大学毕业证学位证购买
【澳洲毕业证】澳大利亚天主教大学毕业证学位证购买ufmek
澳洲文凭证书快速办理维多利亚大学毕业证学位证书澳洲文凭证书快速办理维多利亚大学毕业证学位证书
澳洲文凭证书快速办理维多利亚大学毕业证学位证书dadot2

Recently uploaded(20)

Circl eco

  1. National CERT, a interesting way to integrate cyber-security into the economical sector Raphael Vinot - TLP:GREEN November 24, 2014

  2. Luxembourg - CERT collaborative landscape 2 of 14

  3. CIRCL, national CERT of Luxembourg CIRCL1 is composed of 6 full-time incident handlers + 2 FTE backup operators. Private organisation, publicly funded (Finance ministry) The team is operating as an autonomous technical team relying on its own infrastructure. Operators competencies include reverse engineering, malware analysis, network and system forensic, software engineering and data mining. CIRCL, the national CERT, is part of SMILE2 gie (a publicly funded organization to promote information security in Luxembourg). In 2014, CIRCL handled more than 83000 security events and conducted more than 3000 technical investigations. 1http://www.circl.lu/ 2http://www.smile.public.lu/ 3 of 14

  4. Importance of a non-pro

  5. t organisation Reassure companies willing to start a business in Luxembourg Make it clear that IT Security is important for the Luxemburgian government Hard/impossible to bill events are also handled Small websites compromised (CMS, extensions...) Potentially vulnerables systems connected to the internet (SCADA) Information leaks Services availability to organizations/citizen located in Luxembourg 4 of 14

  6. Main goals Globally improving the IT Security of pivate companies based in Luxembourg Providing

  7. rebrigade-like support to companies in case of IT Security related incident Default contact point for international contacts Incident management for national and international cases Vulnerability handling and responsible vulnerability disclosure Widely trusted and well known in all the sectors of activities 5 of 14

  8. Building the trust As open as possible in our activities Public and annonimised reports on our activities Presentations to conferences Contributions to open source projects Having clear and strict con

  9. dentiality rules with the requestor our work is on behalf of the victim no third party is informed without a written statement of the initial victim Information sharing 6 of 14

  10. MISP - Statistics and Platform Usage 3 MISP instances operated by CIRCL National CERTs MISP (26 members) Connected to NATO, CERTs MISP (CERT.at, CERT-EU, MISP.be...) Less than 20% of the members fetch from the API to feed on their systems Private sector MISP3 (60+ members) 25% of the AV are on the platform Connected to Deloitte CTISRP and private organizations having their own instances Ephemeral MISP 3http: //www.circl.lu/services/misp-malware-information-sharing-platform/ 7 of 14

  11. Bridging MISP Communities Central position between governments, private companies and civil society Synchronization works for common community (National CERTs or NATO members community) But when you need to connect communities, validation and review of events usually need to be performed Experience is key CIRCL developed a Python Library to access MISP: PyMISP4 for that purpose Operators see the update from a speci

  12. c community and then decide to push events or not to the other community (guid are preserved) 4https://github.com/MISP/PyMISP 8 of 14

  13. 9 of 14

  14. Other tools Passive DNS A database storing historical DNS records from various resources including malware analysis or partners BGP Ranking Correlation of a large variety of private/public datasets including IP, pre

  15. xes or ASN forsuspicious activities. Metrics on internet providers worldwide Dynamic Malware Analysis Platform (DMA) A platform operated by CIRCL, which allows the analysis of potential malicious software or suspicious documents in a secure and virtualized environment Based on Cuckoo 10 of 14

  16. CIRCL Services - Dynamic Malware Analysis 11 of 14

  17. CIRCL Services - BGP Ranking 12 of 14

  18. Conclusion Do you want to share IOCs? Help others and bene

  19. t? ! info@circl.lu CA57 2205 C002 4E06 BA70 BE89 EAAD CFFC 22BD 4CD5 13 of 14