Turn Threat Data Into Threat Intelligence

Threat intelligence has now been a favorite of the information security industry now for some time.

It is a powerful concept, let someone else deal with an attack or exposure, and use their experience to prevent the same problem in your organization. Since there are free sources for a tremendous amount of such data, it seems like a great deal.

The great deal is not always as good as it seems, however. Threat intelligence information is quite often wrong or misleading. As has been mentioned, "These are the threats that keep me awake at night," a Vermont electric utility, responding to intelligence information in a US government joint forces statement, called in the FBI to investigate what turned out to be an employee’s innocent attempt to read their email on Yahoo.

Unvetted threat intel is a bit like getting raw data feeds about the stock market. Responding to such data, you may be the next investment millionaire, or you could completely lose your shirt. You need to filter through it to eliminate the useless portions, and carefully weigh the balance.

As Malcovery Security said in a blog some months ago, most of what the industry refers to as threat intelligence is really just threat data. It is just a list of data elements, full of noise and false positives. Until the intelligence part is applied to this data feed, it is fairly useless, or even worse, may lead to false conclusions.

According to Mark Orlando in his presentation to the RSA Security Conference in 2015, raw threat intel data is highly commoditized, has poor quality control, a short shelf life, and promotes a false sense of awareness.

So, with so many negatives about threat intel, why does anyone bother?

The answer is simple, threat intel data properly filtered, vetted, and reviewed by a team with appropriate skills and experience can be of greater value than any other security tool in our arsenal. The operational security team at a large medical organization I work with has been able regularly to use a number of threat intel data points to identify active but unknown threats and vulnerabilities.

The following are some ideas to help turn threat data into true threat intelligence:

Get the right people looking at it

Much of the value from threat intel data results from its review by qualified and experienced professionals, who have learned by experience what to ignore, and what to focus on.

Make it industry specific

In the past few years, many information security threats have often been stratified by industry. While some threats are strictly random, many are targeted to a specific area of business. As an example, the medical industry has experienced a number of targeted ransomware threats in recent months. We can take advantage of this stratification by seeking sources of intelligence data specific to our industry. This approach accomplishes much of the necessary filtering up front. Organisations exist for many industries that can provide some of this intelligence.

Keep it timely

Unlike the early days in information security, where the casual hacker ruled, we now deal with sophisticated and adaptable professional criminals. Typically, as soon as they recognize that their campaigns have been discovered, they quickly pivot their attacks. As such, dated threat intel information is, if you will excuse the expression, so last week. To properly use threat data, stay focused on reviewing and acting on it shortly after receipt.

Use realizable sources

Coming off of a contentious elections season, we have all learned the term "fake news," with certain news outlets seeming to have more reliable news items than others. The same distinction applies to threat intelligence. There are good sources and bad ones, and it is not always obvious which is which. It takes careful observation over a period of time to learn what sources you can rely on, and which you would be better off without.

Review it against your activities in your environment

Threat data is especially useful when you can apply it against recent activity data from your own organization. If someone in your industry reports that a bad actor is using a particular exploit, reviewing it against your organisation's recent activity can quickly help you discover that the same exploit is being used against you. This approach does require a centralised repository of log information from across your company. Log consolidation systems such as Splunk, include features that allow you to import threat intel data, and quickly review it against your recent activity.

Automate it

Taking the above comparison to logs of your recent activities one step further, it is often possible to automate the receipt and processing of threat data, such that an alert is generated when a high value match has been found.

Stay on top of it

It is easy to get mired in a large amount of inbound data. Recognise its potential value, and stay with it. Constantly refine your processes so that you can use the data more effectively with fewer man hours.

The bottom line? Threat intelligence data can be your best friend, or can use up all of your free time to no avail. It is a great tool, but you must learn to use it effectively in a way that supports your environment.

Computerworld

 

« Facebook’s Shifting Attitude To Controversy
Technology Will Demolish Slow Internet Speeds »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Qualitèsoft Technology

Qualitèsoft Technology

Qualitèsoft Technology is a leading Software Development and Quality Assurance organization. We specialize in Custom Development, Mobile Application, Software Testing and Quality Assurance.

Cyber Base

Cyber Base

Cyber Base is an Information Technology company based in Uganda providing software and hardware solutions to clients.

Mvine

Mvine

Mvine's primary business is authoring and selling Cyber-Secure Platforms for Collaboration Portals and for Identity Management as well as delivering cloud support services.

Deep Mirror Automotive Cybersecurity

Deep Mirror Automotive Cybersecurity

Deep Mirror Automotive Cybersecurity make Cars & Infrastructures Cybersecure.

Madrona Venture Group

Madrona Venture Group

Madrona Venture Group invests in seed and early-stage technology companies in areas including cybersecurity.

Netgo

Netgo

Netgo group meet the requirements of a complex, digitized world with IT consulting, IT solutions & services, managed & cloud services and software products & development.

AdronH

AdronH

AdronH is a company of Cyber Security consultants. We support companies and public institutions with their digital transformation to new and secure business platforms.

Computacenter

Computacenter

Computacenter is a leading independent technology partner, trusted by large corporate and public sector organisations. We help our customers to source, transform and manage their IT infrastructure.

Obscure Technologies

Obscure Technologies

Obscure Technologies is a firm of experts, specialised in brokering the best security solutions to market.

Purple Team

Purple Team

Purple Team is an expert cybersecurity and managed security service provider focused on arming your IT infrastructure with both red team and blue team services.

Eleos Labs

Eleos Labs

Eleos Labs' suite of security tools prevent Web3 cyber attacks, reduce economic risks, and protect digital assets.

Semgrep

Semgrep

Semgrep is a fast, open-source, static analysis tool for profoundly improving software security and reliability.

2021.AI

2021.AI

2021.AI serves the growing business need for full oversight and management of applied AI.

Sunnic

Sunnic

Sunnic is a leading provider of comprehensive digital data security technology.

Simbian

Simbian

Simbian, with its hardened TrustedLLM system, is the first to accelerate security by empowering every member of a security team from the C-Suite to frontline practitioners.

Lithuanian Cyber Command (LTCYBERCOM)

Lithuanian Cyber Command (LTCYBERCOM)

The Lithuanian Cyber Command is responsible for planning and execution of operations in cyberspace and installation of strategic and operational communications and information systems.