SlideShare una empresa de Scribd logo
1 de 23
Descargar para leer sin conexión
EVERY INCIDENT LEAVES A TRAIL OF EVIDENCE
D3PAK KUMAR (D3)
DIGITAL FORENSICS | CYBER INTELLIGENCE
The Technology World Always has the Sharpest Brains...
There are equally sharp minds, working against you…
Src : Securus First
Cyber Threat Intelligence: Medium D3PAK KUMAR (D3)
DIGITAL FORENSICS | CYBER INTELLIGENCE
DISCLAIMER
The views / opinions / assumptions expressed in this presentation/resource is for educational & research
purposes only. Do not attempt to violate the law with anything contained here. Neither the author of this
material, nor anyone else affiliated in any way, is liable for your actions.
The purpose of this presentation is to share what is happening in cyber and what is possible...
D3PAK KUMAR (D3)
DIGITAL FORENSICS | CYBER INTELLIGENCE
ONCE THE DOCUMENTS HAVE BEEN POSTED
ONLINE, THE
GENIE IS OUT OF THE BOTTLE
D3PAK KUMAR (D3)
DIGITAL FORENSICS | CYBER INTELLIGENCE
Cyber Threat Intelligence: Medium
We live in the digital age
Actors/Criminals do too
What are the top cyber threats ?
Think Adversarial Perspective
D3PAK KUMAR (D3)
DIGITAL FORENSICS | CYBER INTELLIGENCE
Cyber Threat Intelligence: Medium
D3PAK KUMAR (D3)
DIGITAL FORENSICS | CYBER INTELLIGENCE
CRITICAL INFRASTRUCTURE
GOVERNMENT
MANUFACTURING
BANKING
FINANCIAL SERVICES & MOBILE MONEY RETAIL
STRATEGIC & PUBLIC ENTERPRISES. PROFESSIONAL SERVICES
HOSPITALITY
INSURANCE
TELECOMMUNICATIONS
Cyber Threat Intelligence: Medium
D3PAK KUMAR (D3)
DIGITAL FORENSICS | CYBER INTELLIGENCE
CYBER of THINGS
C Factor and all are interrelated
CYBER
CRIME
CYBER
SECURITY
CYBER
TERRORISM
Cyber Threat Intelligence: Medium
D3PAK KUMAR (D3)
DIGITAL FORENSICS | CYBER INTELLIGENCE
Example: RANSOMWARE Now Crypto
Hackers Mindset : Too much risk......but the target is too sweet
Cyber Threat Intelligence: Medium
D3PAK KUMAR (D3)
DIGITAL FORENSICS | CYBER INTELLIGENCE
Anything Likely to cause damage or danger
+
Ability to acquire and apply knowledge and skills
=
Threat Intelligence
Another Buzz
Cyber Threat Intelligence: Medium
D3PAK KUMAR (D3)
DIGITAL FORENSICS | CYBER INTELLIGENCE
Cyber Threat Intelligence: Medium
D3PAK KUMAR (D3)
DIGITAL FORENSICS | CYBER INTELLIGENCE
OSINT ≠ Actionable Intelligence
What exactly : OSINF Open Source Information
Players are Firewalls, Endpoint Detection & Response, Endpoint protection platform, Anti-Virus Intel Stakeholders & OPSEC Firms
Online Social media : Sentiments, Statistics, Trends
Threat Intel firms:
Good intel
No Responsible Disclosure Policy; No verification
Shift towards Data breach and Free media PR
Defacement Days gone… APT , Malware, Ransomware, Honeypots, Bots, Watering Hole etc.
Present Scenario
Cyber Threat Intelligence: Medium
D3PAK KUMAR (D3)
DIGITAL FORENSICS | CYBER INTELLIGENCE
34% of
respondents
didn't have any
prior experience
with OSINT-
related research;
85% reported
they received
little or no
training in OSINT
techniques and
risk prevention
from their current
employer;
55% are
venturing into
the Dark Web as
part of their
OSINT activity 10
or more times
per month;
38% do not use
managed
attribution tools
to mask or hide
their online
identities or
personas;
29% report no
oversight
procedures to
ensure that tools
are not being
abused by
analysts;
83% of cyber
threat
intelligence
analysts use a
web browser as
their primary
tool.
Cyber Threat Intelligence: Analysts Undertrained, Unsupported
Cyber Threat Intelligence: Medium
Source: Authentic8
D3PAK KUMAR (D3)
DIGITAL FORENSICS | CYBER INTELLIGENCE
i. Hypothesis Driven: Data Leak/Breach, IOC, TTPS (Post incident)
ii. Analytics and Machine Learning : Data set, Signatures, Anomalies, Historical repo, UEBA, SOAR etc.
iii. Manual Interventions: Customised sensors, crawlers, parsers, API
iv. Human Intelligence always Win : Expertise, SME, Coordination agencies/organisations, etc.
Types and Approaches
Cyber Threat Intelligence: Medium
Strategic: Broader threat trends typically meant for a non technical audience
Tactical: Outlines of tactics, techniques, and procedures (TTP) of threat actors
for a more technical audience
Operational: Technical details about specific attacks and campaigns
D3PAK KUMAR (D3)
DIGITAL FORENSICS | CYBER INTELLIGENCE
• Threat Intel Cycle: Plan, Collect, Analysis, Dissemination
• Capacity building: Detailed subject training as Ramayana can't be finished in 1 hour
• PPT factor with proper effective coordination
• Proactive Threat Hunting required : Data and Patience
• Understand the Threat and Actor and what to hunt
REQUIRED ACTION
Cyber Threat Intelligence: Medium
D3PAK KUMAR (D3)
DIGITAL FORENSICS | CYBER INTELLIGENCE
Sophisticated actors penetrating networks using "publicly" available
information demonstrate they don’t need to develop advanced malware/tactics
when the vulnerabilities are sitting in plain sight. Using open-source
information (OSINF) to assess publicly available information is somehow
sufficient to serve the purpose
Cyber Threat Intelligence: Medium
The best defence start with good OSINF
GOOD THINGS OF TECHNOLOGY
D3PAK KUMAR (D3)
DIGITAL FORENSICS | CYBER INTELLIGENCE
DEEP-WEB / REDDIT
LEAD (SOCIAL NETWORKING)
IOT / Sync
COOKIES INTELLIGENCE
Cyber Threat Intelligence: Medium
CTI COMMUNITIES
GOOGLE
D3PAK KUMAR (D3)
DIGITAL FORENSICS | CYBER INTELLIGENCE
SOCMINT
• Disseminate to Concern
• Need to add
Output
COTS
Twitter
iMessengers
Maltego
Etc.
Processing
There are three main steps in
analysing social media:
• Data identification,
• Data analysis, and
• Information interpretation.
Gather actionable insights in raw
form concerning to Subject, etc.
Input
Cyber Threat Intelligence: Medium
D3PAK KUMAR (D3)
DIGITAL FORENSICS | CYBER INTELLIGENCE
Cyber Kill Chain
MITRE ATT&CK MATRIX
Recon Weaponise Delivery Exploitation Installation C2
Actions &
Objectives
 Task: Identify the Attackers’ Step by Step Process
 Goal: Disrupting Attackers’ operations
 Motivation
 Preparation
 SE
 OSINT
 Configuration
 Packaging
 Powershell
 Add
 Mechanism
of Delivery
 Infection
Vector
 Phishing
 Technical or
human?
 Applications
affected
 Method &
Characteristics
 Persistence
 Characteristic
s of change
 Self0signed
Driver
 Communication
between victim
& adversary
 VPN
 What the adversary
does when they
have control of the
system
 Data Exfil
 APT
MITRE ATT&CK:
 Active Scanning
 Passive Scanning
 Determine Domain
& IP Address Space
 Analyze Third-Party
IT Footprint
MITRE ATT&CK:
 Malware
 Scripting
 Service
Execution
MITRE ATT&CK:
 Spearphishing
Attachment/Link
 Exploit Public-
Facing
Application
 Supply Chain
Compromise
MITRE ATT&CK:
 Local Job
Scheduling
 Scripting
 Rundll32
MITRE ATT&CK:
 Application
Shimming
 Hooking
 Login Items
MITRE ATT&CK:
 Data
Obfuscation
 Domain
Fronting
 Web Service
MITRE ATT&CK:
 Email Collection
 Data from Local
System/Network
Share
 Surveillance
Cyber Threat Intelligence: Medium
D3PAK KUMAR (D3)
DIGITAL FORENSICS | CYBER INTELLIGENCE
CYBER SECURITY PREPAREDNESS
LEGALMEASURES
• Measures the
legal
framework of a
country that
streamlines
basic response
mechanisms to
breaching of
cyber law
TECHNICAL
• Measures the
adequacy of
technical
measures and
the strength of
capabilities
based on the
number of
existing
technical
institutions
and
frameworks
dealing with
cybersecurity
ORGANISATIONAL
• Measures the
organisational
strategy of a
countries
cybersecurity
imitative. This
is based on
the number of
institutions
and strategies
organizing
cybersecurity
development
at national
level
CAPACITYBUILDING
• Measures the
awareness
campaign and
the availability
of resources
for each
country. (
Includes the
existence of
research and
development
education and
training
programs and
certified
professionals
and public
sector
agencies.
COOPERATION
• Measures the
active
engagement
of different
sectors and
stakeholders in
preventing
threats and
combating
cyber-attacks.
Cyber Threat Intelligence: Medium
D3PAK KUMAR (D3)
DIGITAL FORENSICS | CYBER INTELLIGENCE
i. OSINT Tools and Framework : Domain Based, Searching, Clustering, Grouping etc.
ii. OSINT Services websites: osint, start.me, midasearch, toddington, osintgeek, intel technique etc.
iii. Commercial vendors: Feeds, Alerts
iv. Government off-the-shelf Tools : In-House, Integrated APIs and Data Lake
v. Common Sense
Tools
Cyber Threat Intelligence: Medium
CIA Director: We kill people based on metadata
Open Network
Top OTT platforms, Social media domains Twitter,
Facebook, YouTube, Instagram, Parler, 4chan, 8chan,
Stream, Kiwi, countries specific search engine
Close Network
Encrypted channels keybase, chirpwire, signal, Kirk,
FaceTime, Riot, discord, gaming platform etc.
invitation /participation basis
D3PAK KUMAR (D3)
DIGITAL FORENSICS | CYBER INTELLIGENCE
Cyber Threat Intelligence: Medium
D3PAK KUMAR (D3)
DIGITAL FORENSICS | CYBER INTELLIGENCE
Don't believe marketing hype regarding Cyber Threat Safety
"oh, we spent $$$ in $Vendor product, so we are safe"
Any "tool", regardless of the price, is still a "tool“
Take a Break
Cyber Threat Intelligence: Medium
D3pak@Protonmail.com
Resources : D3pakblog.wordpress.com
D3PAK KUMAR (D3)
DIGITAL FORENSICS | CYBER INTELLIGENCE
Thank You
References
o Cyber Threat Intelligence Command Centre - SC3
o GitHub/SANS/Lockheed Martin Corporation
Cyber Threat Intelligence: Medium

Más contenido relacionado

La actualidad más candente

Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat IntelligenceMarlabs
 
OSINT: Open Source Intelligence gathering
OSINT: Open Source Intelligence gatheringOSINT: Open Source Intelligence gathering
OSINT: Open Source Intelligence gatheringJeremiah Tillman
 
Building a Next-Generation Security Operations Center (SOC)
Building a Next-Generation Security Operations Center (SOC)Building a Next-Generation Security Operations Center (SOC)
Building a Next-Generation Security Operations Center (SOC)Sqrrl
 
SOC, Amore Mio! | Security Webinar
SOC, Amore Mio! | Security WebinarSOC, Amore Mio! | Security Webinar
SOC, Amore Mio! | Security WebinarSplunk
 
Distributed Immutable Ephemeral - New Paradigms for the Next Era of Security
Distributed Immutable Ephemeral - New Paradigms for the Next Era of SecurityDistributed Immutable Ephemeral - New Paradigms for the Next Era of Security
Distributed Immutable Ephemeral - New Paradigms for the Next Era of SecuritySounil Yu
 
Splunk Phantom SOAR Roundtable
Splunk Phantom SOAR RoundtableSplunk Phantom SOAR Roundtable
Splunk Phantom SOAR RoundtableSplunk
 
Threat Hunting Report
Threat Hunting Report Threat Hunting Report
Threat Hunting Report Morane Decriem
 
Open Source Intelligence (OSINT)
Open Source Intelligence (OSINT)Open Source Intelligence (OSINT)
Open Source Intelligence (OSINT)festival ICT 2016
 
Dealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber ResilienceDealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber ResilienceDonald Tabone
 
6 Steps for Operationalizing Threat Intelligence
6 Steps for Operationalizing Threat Intelligence6 Steps for Operationalizing Threat Intelligence
6 Steps for Operationalizing Threat IntelligenceSirius
 
Cybersecurity roadmap : Global healthcare security architecture
Cybersecurity roadmap : Global healthcare security architectureCybersecurity roadmap : Global healthcare security architecture
Cybersecurity roadmap : Global healthcare security architecturePriyanka Aash
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligenceseadeloitte
 
Putting MITRE ATT&CK into Action with What You Have, Where You Are
Putting MITRE ATT&CK into Action with What You Have, Where You ArePutting MITRE ATT&CK into Action with What You Have, Where You Are
Putting MITRE ATT&CK into Action with What You Have, Where You AreKatie Nickels
 
SOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations CenterSOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations CenterMichael Nickle
 
Cyber Threat Intelligence - It's not just about the feeds
Cyber Threat Intelligence - It's not just about the feedsCyber Threat Intelligence - It's not just about the feeds
Cyber Threat Intelligence - It's not just about the feedsIain Dickson
 
MITRE ATT&CKcon 2.0: Prioritizing ATT&CK Informed Defenses the CIS Way; Phili...
MITRE ATT&CKcon 2.0: Prioritizing ATT&CK Informed Defenses the CIS Way; Phili...MITRE ATT&CKcon 2.0: Prioritizing ATT&CK Informed Defenses the CIS Way; Phili...
MITRE ATT&CKcon 2.0: Prioritizing ATT&CK Informed Defenses the CIS Way; Phili...MITRE - ATT&CKcon
 
Overview of Data Loss Prevention (DLP) Technology
Overview of Data Loss Prevention (DLP) TechnologyOverview of Data Loss Prevention (DLP) Technology
Overview of Data Loss Prevention (DLP) TechnologyLiwei Ren任力偉
 
Threat Intelligence Workshop
Threat Intelligence WorkshopThreat Intelligence Workshop
Threat Intelligence WorkshopPriyanka Aash
 

La actualidad más candente (20)

Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
 
OSINT: Open Source Intelligence gathering
OSINT: Open Source Intelligence gatheringOSINT: Open Source Intelligence gathering
OSINT: Open Source Intelligence gathering
 
Building a Next-Generation Security Operations Center (SOC)
Building a Next-Generation Security Operations Center (SOC)Building a Next-Generation Security Operations Center (SOC)
Building a Next-Generation Security Operations Center (SOC)
 
SOC, Amore Mio! | Security Webinar
SOC, Amore Mio! | Security WebinarSOC, Amore Mio! | Security Webinar
SOC, Amore Mio! | Security Webinar
 
Distributed Immutable Ephemeral - New Paradigms for the Next Era of Security
Distributed Immutable Ephemeral - New Paradigms for the Next Era of SecurityDistributed Immutable Ephemeral - New Paradigms for the Next Era of Security
Distributed Immutable Ephemeral - New Paradigms for the Next Era of Security
 
Global Cyber Threat Intelligence
Global Cyber Threat IntelligenceGlobal Cyber Threat Intelligence
Global Cyber Threat Intelligence
 
Splunk Phantom SOAR Roundtable
Splunk Phantom SOAR RoundtableSplunk Phantom SOAR Roundtable
Splunk Phantom SOAR Roundtable
 
Threat Hunting Report
Threat Hunting Report Threat Hunting Report
Threat Hunting Report
 
Open Source Intelligence (OSINT)
Open Source Intelligence (OSINT)Open Source Intelligence (OSINT)
Open Source Intelligence (OSINT)
 
Dealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber ResilienceDealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber Resilience
 
6 Steps for Operationalizing Threat Intelligence
6 Steps for Operationalizing Threat Intelligence6 Steps for Operationalizing Threat Intelligence
6 Steps for Operationalizing Threat Intelligence
 
Cybersecurity roadmap : Global healthcare security architecture
Cybersecurity roadmap : Global healthcare security architectureCybersecurity roadmap : Global healthcare security architecture
Cybersecurity roadmap : Global healthcare security architecture
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
 
Putting MITRE ATT&CK into Action with What You Have, Where You Are
Putting MITRE ATT&CK into Action with What You Have, Where You ArePutting MITRE ATT&CK into Action with What You Have, Where You Are
Putting MITRE ATT&CK into Action with What You Have, Where You Are
 
SOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations CenterSOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations Center
 
Cyber Threat Intelligence - It's not just about the feeds
Cyber Threat Intelligence - It's not just about the feedsCyber Threat Intelligence - It's not just about the feeds
Cyber Threat Intelligence - It's not just about the feeds
 
MITRE ATT&CKcon 2.0: Prioritizing ATT&CK Informed Defenses the CIS Way; Phili...
MITRE ATT&CKcon 2.0: Prioritizing ATT&CK Informed Defenses the CIS Way; Phili...MITRE ATT&CKcon 2.0: Prioritizing ATT&CK Informed Defenses the CIS Way; Phili...
MITRE ATT&CKcon 2.0: Prioritizing ATT&CK Informed Defenses the CIS Way; Phili...
 
Overview of Data Loss Prevention (DLP) Technology
Overview of Data Loss Prevention (DLP) TechnologyOverview of Data Loss Prevention (DLP) Technology
Overview of Data Loss Prevention (DLP) Technology
 
Threat Intelligence Workshop
Threat Intelligence WorkshopThreat Intelligence Workshop
Threat Intelligence Workshop
 
Threat Intelligence
Threat IntelligenceThreat Intelligence
Threat Intelligence
 

Similar a Cyber Threat Intel : Overview

The Hacker Playbook: How to Think like a Cybercriminal to Reduce Risk
The Hacker Playbook: How to Think like a Cybercriminal to Reduce RiskThe Hacker Playbook: How to Think like a Cybercriminal to Reduce Risk
The Hacker Playbook: How to Think like a Cybercriminal to Reduce RiskBeyondTrust
 
Achieving Caribbean Cybersecuirty
Achieving Caribbean CybersecuirtyAchieving Caribbean Cybersecuirty
Achieving Caribbean CybersecuirtyShiva Bissessar
 
2015 Cyber Security
2015 Cyber Security2015 Cyber Security
2015 Cyber SecurityAllen Zhang
 
Cybersecurity PowerPoint Presentation
Cybersecurity PowerPoint PresentationCybersecurity PowerPoint Presentation
Cybersecurity PowerPoint PresentationRitik Kumar
 
Cyber security with ai
Cyber security with aiCyber security with ai
Cyber security with aiBurhan Ahmed
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hackingijtsrd
 
Cybercrime Bill 2014: Due Diligence
Cybercrime Bill 2014:   Due DiligenceCybercrime Bill 2014:   Due Diligence
Cybercrime Bill 2014: Due DiligenceShiva Bissessar
 
C4I cyber secuirty by Eric Eifert - Keynote 9.pptx
C4I cyber secuirty by Eric Eifert - Keynote 9.pptxC4I cyber secuirty by Eric Eifert - Keynote 9.pptx
C4I cyber secuirty by Eric Eifert - Keynote 9.pptxbakhtinasiriav
 
Fall2015SecurityShow
Fall2015SecurityShowFall2015SecurityShow
Fall2015SecurityShowAdam Heller
 
Module 1Introduction to cyber security.pptx
Module 1Introduction to cyber security.pptxModule 1Introduction to cyber security.pptx
Module 1Introduction to cyber security.pptxSkippedltd
 
Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network Insights
Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network InsightsNowhere to Hide: Expose Threats in Real-time with IBM QRadar Network Insights
Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network InsightsIBM Security
 
ACS Talk (Melbourne) - The future of security
ACS Talk (Melbourne) - The future of securityACS Talk (Melbourne) - The future of security
ACS Talk (Melbourne) - The future of securitysiswarren
 
CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]
CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]
CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]APNIC
 
CLASS 2018 - Palestra de Denis Prado (Security Intelligence Sales Leader Lati...
CLASS 2018 - Palestra de Denis Prado (Security Intelligence Sales Leader Lati...CLASS 2018 - Palestra de Denis Prado (Security Intelligence Sales Leader Lati...
CLASS 2018 - Palestra de Denis Prado (Security Intelligence Sales Leader Lati...TI Safe
 
Cyber security for Developers
Cyber security for DevelopersCyber security for Developers
Cyber security for Developerstechtutorus
 

Similar a Cyber Threat Intel : Overview (20)

Cyber of things 2.0
Cyber of things 2.0Cyber of things 2.0
Cyber of things 2.0
 
The Hacker Playbook: How to Think like a Cybercriminal to Reduce Risk
The Hacker Playbook: How to Think like a Cybercriminal to Reduce RiskThe Hacker Playbook: How to Think like a Cybercriminal to Reduce Risk
The Hacker Playbook: How to Think like a Cybercriminal to Reduce Risk
 
Achieving Caribbean Cybersecuirty
Achieving Caribbean CybersecuirtyAchieving Caribbean Cybersecuirty
Achieving Caribbean Cybersecuirty
 
2015 Cyber Security
2015 Cyber Security2015 Cyber Security
2015 Cyber Security
 
Cybersecurity PowerPoint Presentation
Cybersecurity PowerPoint PresentationCybersecurity PowerPoint Presentation
Cybersecurity PowerPoint Presentation
 
Cyber security with ai
Cyber security with aiCyber security with ai
Cyber security with ai
 
Cyber Forensics
Cyber Forensics Cyber Forensics
Cyber Forensics
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Cybercrime Bill 2014: Due Diligence
Cybercrime Bill 2014:   Due DiligenceCybercrime Bill 2014:   Due Diligence
Cybercrime Bill 2014: Due Diligence
 
C4I cyber secuirty by Eric Eifert - Keynote 9.pptx
C4I cyber secuirty by Eric Eifert - Keynote 9.pptxC4I cyber secuirty by Eric Eifert - Keynote 9.pptx
C4I cyber secuirty by Eric Eifert - Keynote 9.pptx
 
Fall2015SecurityShow
Fall2015SecurityShowFall2015SecurityShow
Fall2015SecurityShow
 
Resiliency-Part One -11-3-2015
Resiliency-Part One -11-3-2015Resiliency-Part One -11-3-2015
Resiliency-Part One -11-3-2015
 
Module 1Introduction to cyber security.pptx
Module 1Introduction to cyber security.pptxModule 1Introduction to cyber security.pptx
Module 1Introduction to cyber security.pptx
 
Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network Insights
Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network InsightsNowhere to Hide: Expose Threats in Real-time with IBM QRadar Network Insights
Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network Insights
 
ACS Talk (Melbourne) - The future of security
ACS Talk (Melbourne) - The future of securityACS Talk (Melbourne) - The future of security
ACS Talk (Melbourne) - The future of security
 
CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]
CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]
CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]
 
CLASS 2018 - Palestra de Denis Prado (Security Intelligence Sales Leader Lati...
CLASS 2018 - Palestra de Denis Prado (Security Intelligence Sales Leader Lati...CLASS 2018 - Palestra de Denis Prado (Security Intelligence Sales Leader Lati...
CLASS 2018 - Palestra de Denis Prado (Security Intelligence Sales Leader Lati...
 
Cybersecurity - Sam Maccherola
Cybersecurity - Sam MaccherolaCybersecurity - Sam Maccherola
Cybersecurity - Sam Maccherola
 
Case Study.pdf
Case Study.pdfCase Study.pdf
Case Study.pdf
 
Cyber security for Developers
Cyber security for DevelopersCyber security for Developers
Cyber security for Developers
 

Más de Deepak Kumar (D3) (20)

Dark Web Forensics
Dark Web Forensics Dark Web Forensics
Dark Web Forensics
 
THINK
THINKTHINK
THINK
 
Cyber Security Tips
Cyber Security TipsCyber Security Tips
Cyber Security Tips
 
CISSP INFORGRAPH MINDMAP
CISSP INFORGRAPH MINDMAPCISSP INFORGRAPH MINDMAP
CISSP INFORGRAPH MINDMAP
 
Cyber Forensics & Challenges
Cyber Forensics & ChallengesCyber Forensics & Challenges
Cyber Forensics & Challenges
 
Cyber Crime Types & Tips
Cyber Crime Types & TipsCyber Crime Types & Tips
Cyber Crime Types & Tips
 
Cyber Security India & Cyber Crime
Cyber Security India & Cyber CrimeCyber Security India & Cyber Crime
Cyber Security India & Cyber Crime
 
21st Century Cyber Forensics
21st Century Cyber Forensics21st Century Cyber Forensics
21st Century Cyber Forensics
 
Phishing
PhishingPhishing
Phishing
 
IoT
IoTIoT
IoT
 
C3 Cyber
C3 CyberC3 Cyber
C3 Cyber
 
Bitcoin
BitcoinBitcoin
Bitcoin
 
Ransomware
Ransomware Ransomware
Ransomware
 
Success Mantra
Success MantraSuccess Mantra
Success Mantra
 
Facebook Security Tips
Facebook Security TipsFacebook Security Tips
Facebook Security Tips
 
DDOS
DDOS DDOS
DDOS
 
Registry Registrar Registrant
Registry Registrar RegistrantRegistry Registrar Registrant
Registry Registrar Registrant
 
Whatsapp
WhatsappWhatsapp
Whatsapp
 
How to social/official network
How to social/official networkHow to social/official network
How to social/official network
 
Sexting
SextingSexting
Sexting
 

Último

Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibitjbellavia9
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxEsquimalt MFRC
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...ZurliaSoop
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxVishalSingh1417
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfSherif Taha
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdfVishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdfssuserdda66b
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfNirmal Dwivedi
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024Elizabeth Walsh
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 

Último (20)

Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdfVishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 

Cyber Threat Intel : Overview

  • 1. EVERY INCIDENT LEAVES A TRAIL OF EVIDENCE D3PAK KUMAR (D3) DIGITAL FORENSICS | CYBER INTELLIGENCE
  • 2. The Technology World Always has the Sharpest Brains... There are equally sharp minds, working against you… Src : Securus First Cyber Threat Intelligence: Medium D3PAK KUMAR (D3) DIGITAL FORENSICS | CYBER INTELLIGENCE
  • 3. DISCLAIMER The views / opinions / assumptions expressed in this presentation/resource is for educational & research purposes only. Do not attempt to violate the law with anything contained here. Neither the author of this material, nor anyone else affiliated in any way, is liable for your actions. The purpose of this presentation is to share what is happening in cyber and what is possible... D3PAK KUMAR (D3) DIGITAL FORENSICS | CYBER INTELLIGENCE
  • 4. ONCE THE DOCUMENTS HAVE BEEN POSTED ONLINE, THE GENIE IS OUT OF THE BOTTLE D3PAK KUMAR (D3) DIGITAL FORENSICS | CYBER INTELLIGENCE Cyber Threat Intelligence: Medium
  • 5. We live in the digital age Actors/Criminals do too What are the top cyber threats ? Think Adversarial Perspective D3PAK KUMAR (D3) DIGITAL FORENSICS | CYBER INTELLIGENCE Cyber Threat Intelligence: Medium
  • 6. D3PAK KUMAR (D3) DIGITAL FORENSICS | CYBER INTELLIGENCE CRITICAL INFRASTRUCTURE GOVERNMENT MANUFACTURING BANKING FINANCIAL SERVICES & MOBILE MONEY RETAIL STRATEGIC & PUBLIC ENTERPRISES. PROFESSIONAL SERVICES HOSPITALITY INSURANCE TELECOMMUNICATIONS Cyber Threat Intelligence: Medium
  • 7. D3PAK KUMAR (D3) DIGITAL FORENSICS | CYBER INTELLIGENCE CYBER of THINGS C Factor and all are interrelated CYBER CRIME CYBER SECURITY CYBER TERRORISM Cyber Threat Intelligence: Medium
  • 8. D3PAK KUMAR (D3) DIGITAL FORENSICS | CYBER INTELLIGENCE Example: RANSOMWARE Now Crypto Hackers Mindset : Too much risk......but the target is too sweet Cyber Threat Intelligence: Medium
  • 9. D3PAK KUMAR (D3) DIGITAL FORENSICS | CYBER INTELLIGENCE Anything Likely to cause damage or danger + Ability to acquire and apply knowledge and skills = Threat Intelligence Another Buzz Cyber Threat Intelligence: Medium
  • 10. D3PAK KUMAR (D3) DIGITAL FORENSICS | CYBER INTELLIGENCE Cyber Threat Intelligence: Medium
  • 11. D3PAK KUMAR (D3) DIGITAL FORENSICS | CYBER INTELLIGENCE OSINT ≠ Actionable Intelligence What exactly : OSINF Open Source Information Players are Firewalls, Endpoint Detection & Response, Endpoint protection platform, Anti-Virus Intel Stakeholders & OPSEC Firms Online Social media : Sentiments, Statistics, Trends Threat Intel firms: Good intel No Responsible Disclosure Policy; No verification Shift towards Data breach and Free media PR Defacement Days gone… APT , Malware, Ransomware, Honeypots, Bots, Watering Hole etc. Present Scenario Cyber Threat Intelligence: Medium
  • 12. D3PAK KUMAR (D3) DIGITAL FORENSICS | CYBER INTELLIGENCE 34% of respondents didn't have any prior experience with OSINT- related research; 85% reported they received little or no training in OSINT techniques and risk prevention from their current employer; 55% are venturing into the Dark Web as part of their OSINT activity 10 or more times per month; 38% do not use managed attribution tools to mask or hide their online identities or personas; 29% report no oversight procedures to ensure that tools are not being abused by analysts; 83% of cyber threat intelligence analysts use a web browser as their primary tool. Cyber Threat Intelligence: Analysts Undertrained, Unsupported Cyber Threat Intelligence: Medium Source: Authentic8
  • 13. D3PAK KUMAR (D3) DIGITAL FORENSICS | CYBER INTELLIGENCE i. Hypothesis Driven: Data Leak/Breach, IOC, TTPS (Post incident) ii. Analytics and Machine Learning : Data set, Signatures, Anomalies, Historical repo, UEBA, SOAR etc. iii. Manual Interventions: Customised sensors, crawlers, parsers, API iv. Human Intelligence always Win : Expertise, SME, Coordination agencies/organisations, etc. Types and Approaches Cyber Threat Intelligence: Medium Strategic: Broader threat trends typically meant for a non technical audience Tactical: Outlines of tactics, techniques, and procedures (TTP) of threat actors for a more technical audience Operational: Technical details about specific attacks and campaigns
  • 14. D3PAK KUMAR (D3) DIGITAL FORENSICS | CYBER INTELLIGENCE • Threat Intel Cycle: Plan, Collect, Analysis, Dissemination • Capacity building: Detailed subject training as Ramayana can't be finished in 1 hour • PPT factor with proper effective coordination • Proactive Threat Hunting required : Data and Patience • Understand the Threat and Actor and what to hunt REQUIRED ACTION Cyber Threat Intelligence: Medium
  • 15. D3PAK KUMAR (D3) DIGITAL FORENSICS | CYBER INTELLIGENCE Sophisticated actors penetrating networks using "publicly" available information demonstrate they don’t need to develop advanced malware/tactics when the vulnerabilities are sitting in plain sight. Using open-source information (OSINF) to assess publicly available information is somehow sufficient to serve the purpose Cyber Threat Intelligence: Medium The best defence start with good OSINF
  • 16. GOOD THINGS OF TECHNOLOGY D3PAK KUMAR (D3) DIGITAL FORENSICS | CYBER INTELLIGENCE DEEP-WEB / REDDIT LEAD (SOCIAL NETWORKING) IOT / Sync COOKIES INTELLIGENCE Cyber Threat Intelligence: Medium CTI COMMUNITIES GOOGLE
  • 17. D3PAK KUMAR (D3) DIGITAL FORENSICS | CYBER INTELLIGENCE SOCMINT • Disseminate to Concern • Need to add Output COTS Twitter iMessengers Maltego Etc. Processing There are three main steps in analysing social media: • Data identification, • Data analysis, and • Information interpretation. Gather actionable insights in raw form concerning to Subject, etc. Input Cyber Threat Intelligence: Medium
  • 18. D3PAK KUMAR (D3) DIGITAL FORENSICS | CYBER INTELLIGENCE Cyber Kill Chain MITRE ATT&CK MATRIX Recon Weaponise Delivery Exploitation Installation C2 Actions & Objectives  Task: Identify the Attackers’ Step by Step Process  Goal: Disrupting Attackers’ operations  Motivation  Preparation  SE  OSINT  Configuration  Packaging  Powershell  Add  Mechanism of Delivery  Infection Vector  Phishing  Technical or human?  Applications affected  Method & Characteristics  Persistence  Characteristic s of change  Self0signed Driver  Communication between victim & adversary  VPN  What the adversary does when they have control of the system  Data Exfil  APT MITRE ATT&CK:  Active Scanning  Passive Scanning  Determine Domain & IP Address Space  Analyze Third-Party IT Footprint MITRE ATT&CK:  Malware  Scripting  Service Execution MITRE ATT&CK:  Spearphishing Attachment/Link  Exploit Public- Facing Application  Supply Chain Compromise MITRE ATT&CK:  Local Job Scheduling  Scripting  Rundll32 MITRE ATT&CK:  Application Shimming  Hooking  Login Items MITRE ATT&CK:  Data Obfuscation  Domain Fronting  Web Service MITRE ATT&CK:  Email Collection  Data from Local System/Network Share  Surveillance Cyber Threat Intelligence: Medium
  • 19. D3PAK KUMAR (D3) DIGITAL FORENSICS | CYBER INTELLIGENCE CYBER SECURITY PREPAREDNESS LEGALMEASURES • Measures the legal framework of a country that streamlines basic response mechanisms to breaching of cyber law TECHNICAL • Measures the adequacy of technical measures and the strength of capabilities based on the number of existing technical institutions and frameworks dealing with cybersecurity ORGANISATIONAL • Measures the organisational strategy of a countries cybersecurity imitative. This is based on the number of institutions and strategies organizing cybersecurity development at national level CAPACITYBUILDING • Measures the awareness campaign and the availability of resources for each country. ( Includes the existence of research and development education and training programs and certified professionals and public sector agencies. COOPERATION • Measures the active engagement of different sectors and stakeholders in preventing threats and combating cyber-attacks. Cyber Threat Intelligence: Medium
  • 20. D3PAK KUMAR (D3) DIGITAL FORENSICS | CYBER INTELLIGENCE i. OSINT Tools and Framework : Domain Based, Searching, Clustering, Grouping etc. ii. OSINT Services websites: osint, start.me, midasearch, toddington, osintgeek, intel technique etc. iii. Commercial vendors: Feeds, Alerts iv. Government off-the-shelf Tools : In-House, Integrated APIs and Data Lake v. Common Sense Tools Cyber Threat Intelligence: Medium CIA Director: We kill people based on metadata Open Network Top OTT platforms, Social media domains Twitter, Facebook, YouTube, Instagram, Parler, 4chan, 8chan, Stream, Kiwi, countries specific search engine Close Network Encrypted channels keybase, chirpwire, signal, Kirk, FaceTime, Riot, discord, gaming platform etc. invitation /participation basis
  • 21. D3PAK KUMAR (D3) DIGITAL FORENSICS | CYBER INTELLIGENCE Cyber Threat Intelligence: Medium
  • 22. D3PAK KUMAR (D3) DIGITAL FORENSICS | CYBER INTELLIGENCE Don't believe marketing hype regarding Cyber Threat Safety "oh, we spent $$$ in $Vendor product, so we are safe" Any "tool", regardless of the price, is still a "tool“ Take a Break Cyber Threat Intelligence: Medium
  • 23. D3pak@Protonmail.com Resources : D3pakblog.wordpress.com D3PAK KUMAR (D3) DIGITAL FORENSICS | CYBER INTELLIGENCE Thank You References o Cyber Threat Intelligence Command Centre - SC3 o GitHub/SANS/Lockheed Martin Corporation Cyber Threat Intelligence: Medium