From 0 to Hero Actionable Threat Intelligence
Raffaele Di Taranto – Vito Lucatorto Our Journey in CTI : Problems & Solutions in Critical Infrastructure
From 0 to Hero Actionable Threat Intelligence Raffaele Di Taranto - - PowerPoint PPT Presentation
From 0 to Hero Actionable Threat Intelligence Raffaele Di Taranto Vito Lucatorto Our Journey in CTI : Problems & Solutions in Critical Infrastructure Vito Lucatorto Cyber Security Engineer @ FS Holding Experience in Banking
From 0 to Hero Actionable Threat Intelligence
Raffaele Di Taranto – Vito Lucatorto Our Journey in CTI : Problems & Solutions in Critical Infrastructure
APT and Aviation World
and cyber attack techniques
Vito Lucatorto
vitolucatorto@gmail.com https://www.linkedin.com/in/vlucatorto/
1/41
architectures, monitor and automate where possible
Raffaele Di Taranto
raf.ditaranto@gmail.com https://www.linkedin.com/in/rditaranto/
2/41
Threat Intelligence: what is it?
Context Tactics Resources Informed decisions Attack prevention Knowledge of the «threat»
3/41
Threat Intelligence Idea
How our friends see us How we see ourselves How society see us Just to be clear…this is our myth
4/41
Threat Intelligence as a Process
Hypotesis Collect Processing Analysis Dissemination Feedback
5/41
Operational Threat Intelligence
Ongoing cyberattacks, events and campaigns Incident response teams insights on attacks Speed up processes and make informed decisions
6/41
Operational Threat Intelligence Output
Indicators of Compromise (IoC)
7/41
Operational Threat Intelligence Output
Filename MD5 SHA1 SHA256 Email src Email subject IP address Domain URL
represents technical «clues»
actor
less waste of time in security monitoring
Financial Data Certificate
8/41
Operational Threat Intelligence in SOC
TI Team
RTSM Team SDM Team MA Team IR Team
9/41
Bla bla bla … Where Is the experience?
10/41
Employees
Our Big Farm
Companies
Monitored IoCs
Dati aggiornati al 08/07/2020 11/41
Tons of IoC…
Malware Analysis Team Closint Feed Threat Hunting Team
THREAT INTELLIGENCE PLATFORM
Manual
PREVENTION TECHNOLOGIES
Manual Manual
12/41
Grow UP!
Defend the companies Give value at single IoC Avoid false positives Improve Incident Response Automate and define all processes
13/41
1 2 3 4 5
Mind the Gap
14/41
GAP
Choose a Threat Intelligence Platform
1 2 3 4 5
15/41
MISP GAP
Choose a Threat Intelligence Platform
+ Various data import modes + Tag management + Organizations management + API Availability + IoC Decay feature + Sighthing + Whitlisting
MISP
Support but NO SLA - Time-consuming customizations - Experimental 3° parties integrations -
PRO CONS
16/41
Improve the FORCE
1 2 3 4 5
17/41
MISP FORCE GAP
Improve the FORCE
FORCE
18/41
Improve the FORCE - Big Brain at Work
Malware Team SOC Team Threat Hunting Team Upload Upload Check Whitelist
1 2 3
Upload
MA Team IR Team
4
19/41
Improve the FORCE - Example of Whitelisting
Check Whitelist
4
google.ae TO_IDS = FALSE
MA Team IR Team
REST API TO_IDS = TRUE
20/41
Improve the FORCE - Big Brain at Work
Malware Analyst Team SOC Team Threat Hunting Team Upload Upload IoC Enrichment Check Whitelist
1 2 6 5 3
Automatic Tag Upload
MA Team IR Team
4
21/41
Improve the FORCE - Example of Automatic Tag
6
URSNIF Automatic Tag APT28
22/41
Improve the FORCE - Big Brain at Work
Malware Analyst Team SOC Team Threat Hunting Team Upload Upload IoC Enrichment Check Whitelist
1 2 6 5 3 8
Automatic Tag Upload SOC Team
7
MA Team IR Team
4
Malware Playground
9
23/41
Sandbox System Vendor 1 Sample Malware
Proxy Navigazione AntiSpam
AV System Vendor 2
COMING SOON
Company Group
SDM Team
9
Improve the FORCE - Example of Share knowledge
REST API
24/41
Explore the Farm
35/41
1 2 3 4 5
MISP FORCE DOMINO EFFECT GAP
Explore the Farm - Prevention
SDM Team curl -k -X POST -H "Content-Type: application/json" -H "Authorization: apitoken" -d '{"returnFormat": "json", "type": {"OR": ["url"]}, "published":true, "to_ids":true, "enforceWarninglist": 1, "includeEventTags":1, "tags": {"NOT": ["Only Detection"]}, "includeDecayScore": 1, "excludeDecayed":1,"modelOverrides": {"threshold": 1},"decayingModel": [21]}' https://misp/attributes/restSearch > /tmp/json/mispUrlBase
1
Data processing and normalization http://realmalicious.com/bad.php ... *//realmalicious.com/bad.php ... Sec System Vendor1 List Sec System Vendor2 List
TO_IDS = TRUE
2
26/41
Explore the Farm - Prevention
FIREWALL, WAF & PROXY OTHER COMPANIES SEC/ICT TEAMS
SDM Team
REST API Web exposed IoC lists
3
Data processing and normalization
1
TO_IDS = TRUE
2
27/41
Explore the Farm - Detection
ACTION
IoC Data Enrichment Metadata normalization Automated scheduled data preparation for SIEM ingestion
IR Team RTSM Team
28/41
Explore the Farm - Detection
TI Automated Import
3
Data processing and normalization
1
RTSM Team IR Team
2
TO_IDS = TRUE
29/41
Explore the Farm – Focus on SIEM
Sep 27 12:22:22 proxy1 CEF:0|webnavig| url=http://realmalicious.com/bad.php src_ip=10.10.10.5 src_port=6734 Sep 27 12:22:22 fw1 CEF:0|fwinternet| domain=realmalicious.com uri=bad.php srv=80 sip=10.10.10.5 sport=6734
url: http://realmalicious.com/bad.php domain: realmalicious.com ip src: 10.10.10.5 IoC list match IoC value: http://realmalicious.com/bad.php IoC type: url IoC campaign: lokibot IoC source: MA team IoC Threat type: malware IoC date: 26/09/2020
RTSM Team IR Team
30/41
Explore the Farm - Detection
ACTION RETROACTION
Real Time correlation rules for IoC detection and report sighting via API to MISP Register IoC sightings
DOMINO EFFECT
IoC Data Enrichment Metadata normalization Automated scheduled data preparation for SIEM ingestion
IR Team RTSM Team
Explore the Farm - Detection
ALERT: IoC Detected
IR Team
Data processing and normalization SOC Team
4 5
IoC sighting TI Automated Import
RTSM Team
3 1 2
TO_IDS = TRUE TO_IDS = TRUE
32/41
Explore the Farm - Detection
ALERT: IoC Detected
IR Team
SOC Team
4 5
IoC sighting
RTSM Team
curl -d "{\"source\":\"SIEM\", \"values\":"http://realmalicious.com/bad.php"}" -H "Authorization: apitoken" -H "Accept: application/json" -H "Content-type: application/json" -k -X POST "https://misp/sightings/add
33/41
Winnie the Pooh is a threat actor
Destroy the diamond…
35/41
1 2 3 4
39/41
5
MISP FORCE DOMINO EFFECT DIAMOND GAP
Destroy the diamond…
IoCs are NOT forevah !
http://realmalicious.com/bad.php
SINCE 01/01/2015
36/41
In Practice
1 2
http://realmalicious.com/bad.php
t0 ts1 t0 ts0
3
t0 ts0 t1 ts1
Sighting to MISP IoC time is
37/41
…Propagate the news
FIREWALL, WAF & PROXY OTHER COMPANIES SEC/ICT TEAMS REST API Automated email
3
Processing Decayed IoCs
1
http://realmalicious.com/bad.php
Data feed
RTSM Team SDM Team
2
38/41
From Train to Rocket
1 2 3 4 5
MISP FORCE DOMINO EFFECT DIAMOND GAP MARS
39/41
From Train to Rocket
system
roles
threat intelligence, but by themselves are not threat intelligence
MARS
40/41