Security professionals of all types need to fully understand threats in order to prevent them or limit their impact. In order to do this, you need threat intelligence: data about your adversaries, their motivations, capabilities, tools, and methodologies. In addition, you need information about what to look for when your adversaries succeed.
Threat intelligence gathering relies on real-world information gathering, evidence collection, and analysis. Threat intelligence can be categorized into three levels of intelligence. The first is strategic intelligence, which provides broad information about threats and threat actors allowing organizations to understand and respond to trends. Second, tactical threat intelligence includes more detailed technical and behavioral information that is directly useful to security professionals and others who are tasked with defense and response. Finally, operational threat intelligence is composed of highly detailed information allowing response to a specific threat and often includes information about where it came from, who created it or how it has changed over time, how it is delivered or how it spreads, what it attempts to do, how to remove it, and how to prevent it.
In this chapter, you will learn about the many types of threat intelligence, including sources and means of assessing the relevance and accuracy of a given threat intelligence source. There is a broad threat intelligence community, and we will discuss sources that you can use in your work. We will also talk about threat classification, threat actors, and attack frameworks to help you as you model and describe threats. Finally, you will learn about how to apply threat intelligence across your organization.
There are many sources of threat intelligence, ranging from open source intelligence that you can gather from publicly available sources to commercial services that provide proprietary or closed source intelligence information. An increasing number of products and services have the ability to consume threat feed data, allowing you to leverage it throughout your infrastructure and systems.
Regardless of their source, threat feeds are intended to provide up-to-date details about threats in a way that your organization can leverage. Threat feeds often include details such as IP addresses, hostnames and domains, email addresses, URLs, file hashes, file paths, CVE numbers, and other details about a threat. Additional information is often included to help make the information relevant and understandable, including details of what may make your organization a target or vulnerable to the threat, descriptions of threat actors, and even details of their motivations and methodologies.
Open source threat intelligence is threat intelligence that is acquired from publicly available sources. Many organizations have recognized how useful open sharing of threat information can be, and open source threat intelligence has become broadly available. In fact, now the challenge is often around deciding what threat intelligence sources to use, ensuring that they are reliable and up-to-date, and leveraging them well.
A number of sites maintain extensive lists of open source threat information sources:
Senki.org
provides a list: www.senki.org/operators-security-toolkit/open-source-threat-intelligence-feeds/
www.alienvault.com/open-threat-exchange
www.misp-project.org/feeds/
, with community-driven collections.threatfeeds.io
In addition to open source and community threat data sources, there are many government and public sources of threat intelligence data. For example, Figure 2.1 shows a recent alert listing from the CISA website.
Government sites:
www.us-cert.gov
www.dc3.mil
www.dhs.gov/cisa/automated-indicator-sharing-ais
, and their Information Sharing and Analysis Organizations program, www.dhs.gov/cisa/information-sharing-and-analysis-organizations-isaos
Vendor websites:
www.microsoft.com/security/blog/tag/threat-intelligence/
FIGURE 2.1 Recent alert listing from the CISA website
tools.cisco.com/security/center/home.x
, as well as the Cisco Talos reputation lookup tool, talosintelligence.com
Public sources:
isc.sans.org
virusshare.com
www.spamhaus.org
Although these are just a small portion of the open source intelligence resources available to security practitioners, they can give you a good idea of what is available.
Commercial security vendors, government organizations, and other security-centric organizations also create and use proprietary, or closed source, intelligence. They do their own information gathering and research, and they may use custom tools, analysis models, or other proprietary methods to gather, curate, and maintain their threat feeds.
There are a number of reasons that proprietary threat intelligence may be used. The organization may want to keep their threat data secret, they may want to sell or license it and their methods and sources are their trade secrets, or they may not want to take the chance of the threat actors knowing about the data they are gathering.
Commercial closed source intelligence is often part of a service offering that can be a compelling resource for security professionals. The sheer amount of data available via open source threat intelligence feeds can be overwhelming for many organizations. Combing through threat feeds to identify relevant threats, then ensuring that they are both well defined and applied appropriately for your organization, can require massive amounts of effort. Validating threat data can be difficult in many cases, and once you are done making sure you have high-quality threat data, you still have to do something with it!
Regardless of the source of your threat intelligence information, you need to assess it. A number of common factors come into play when you assess a threat intelligence source or a specific threat intelligence notification:
One way to summarize the threat intelligence assessment data is via a confidence score. Confidence scores allow organizations to filter and use threat intelligence based on how much trust they can give it. That doesn't mean that lower confidence information isn't useful; in fact, a lot of threat intelligence starts with a lower confidence score and that score increases as the information solidifies and as additional sources of information confirm it or are able to do a full analysis. Low confidence threat information shouldn't be completely ignored, but it also shouldn't be relied on to make important decisions without taking the low confidence score into account.
Managing threat information at any scale requires standardization and tooling to allow the threat information to be processed and used in automated ways. Indicator management can be much easier with a defined set of terms. That's where structured markup languages like STIX and OpenIOC come in.
Structured Threat Information Expression (STIX) is an XML language originally sponsored by the U.S. Department of Homeland Security. STIX 2.0 (its current version as of this writing) defines 12 STIX domain objects, including things like attack patterns, identities, malware, threat actors, and tools. These objects are then related to each other by one of two STIX relationship object models: either as a relationship or as a sighting. A STIX 2.0 JSON description of a threat actor might read
{
"type": "threat-actor",
"created": "2019-10-20T19:17:05.000Z",
"modified": "2019-10-21T12:22:20.000Z",
"labels": [ "crime-syndicate"],
"name": "Evil Maid, Inc",
"description": "Threat actors with access to hotel rooms",
"aliases": ["Local USB threats"],
"goals": ["Gain physical access to devices", "Acquire data"],
"sophistication": "intermediate",
"resource_level": "government",
"primary_motivation": "organizational-gain"
}
Fields like sophistication
and resource_level
use defined vocabulary options to allow STIX 2.0 users to consistently use the data as part of automated and manual systems.
Since its creation, STIX has been handed off to OASIS (the Organization for the Advancement of Structured Information Standards), an international nonprofit consortium that maintains many other projects related to information formatting, including XML and HTML.
A companion to STIX is the Trusted Automated Exchange of Indicator Information (TAXII) protocol. TAXII is intended to allow cyberthreat information to be communicated at the application layer via HTTPS. TAXII is specifically designed to support STIX data exchange. You can read more about both STIX and TAXII in detail at the OASIS GitHub documentation site: oasis-open.github.io/cti-documentation/
.
Another option is the Open Indicators of Compromise (OpenIOC) format. Like STIX, OpenIOC is an XML-based framework. The OpenIOC schema was developed by Mandiant, and it uses Mandiant's indicators for its base framework. A typical IOC includes metadata like the author, the name of the IOC, and a description; references to the investigation or case and information about the maturity of the IOC; and the definition for the indicator of compromise, which may include details of the actual compromise.
Using threat intelligence well requires planning and forethought. Thus, many organizations adopt a threat intelligence life cycle, as shown in Figure 2.2.
FIGURE 2.2 The threat intelligence cycle
The first phase in the intelligence cycle is to plan for your intelligence requirements. Your requirements may be created as a result of successful breaches and compromises, industry trends, or risk assessments conducted for your organization. In this step you will typically do the following:
Once you have your information requirements, you can collect data from threat intelligence sources to meet those requirements. This phase may repeat as additional requirements are added or as requirements are refined based on available data and data sources.
The threat intelligence data that you gathered in the data collection stage will likely be in several different formats. Some may be in easy-to-access formats that your existing tools and systems can consume. Other data may be in plain-text or written form, or it may be almost entirely unformatted. In this stage you must first process the data to allow it to be consumed by whatever tools or processes you intend to use, and then you must analyze the data itself. The output from this stage could be data fed into automated systems or other tools, or written reports to distribute to leadership or others across your organization.
In the dissemination phase of the intelligence cycle, data is distributed to leadership and operational personnel who will use the data as part of their security operations role.
The final stage in the threat intelligence cycle is gathering feedback about the reports and data you have gathered. Continuous improvement is a critical element in the process, and it should be used to create better requirements and to improve the overall output of your threat intelligence program.
In addition to threat intelligence vendors and resources, threat intelligence communities have been created to share threat information. In the United States, organizations known as Information Sharing and Analysis Centers (ISACs) help infrastructure owners and operators share threat information, as well as provide tools and assistance to their members. The National Council of ISACs lists the sector-based ISACs at www.nationalisacs.org/member-isacs
.
The ISAC concept was introduced in 1998 as part of Presidential Decision Directive-63 (PDD-63), which asked critical infrastructure sectors to establish organizations to share information about threats and vulnerabilities. ISACs operate on a trust model, allowing in-depth sharing of threat information for both physical and cyber threats. Most ISACs operate 24/7, providing ISAC members in their sector with incident response and threat analysis.
In addition to ISACs, there are specific U.S. agencies or department partners for each critical infrastructure area. A list breaking them down by sector can be found here: www.dhs.gov/cisa/critical-infrastructure-sectors
.
Outside the United States, government bodies and agencies with similar responsibilities exist in many countries. The UK's Centre for Protection of National Infrastructure (www.cpni.gov.uk
) is tasked with providing threat information as well as resources and guidance to industry and academia, as well as other parts of the government and law enforcement.
Once you decide to assess the threats to your organization, you will quickly find that you need standard ways to describe them. Fortunately, there are a number of common descriptive schemes and terms used across the industry. Many organizations seek to describe both the threat actors and to classify the threats that they face to better understand the threats themselves.
The CySA+ exam objectives specifically call out four common threat actors:
Your organization may want to consider other specific threat actors based on your threat models and profile, so you should not consider this a complete list. You should conduct an organizational threat assessment to determine what types of threat actors are most likely to target your organization and why.
Although there are many ways to classify threats, common classifications include differentiating between known threats, which you are aware of and are likely to have useful information about, and unknown threats, which you can prepare for only through use of general controls and processes. Zero-day threats, or threats that exploit an unknown security vulnerability, are one of the most common types of unknown threats.
Advanced persistent threat actors, particularly those with nation-state resources, commonly acquire zero-day exploit information and leverage it to their advantage.
Organizations actively seek to understand the threats that they are likely to face by conducting threat modeling activities. Threat modeling takes many factors into account, but common elements include the following:
All of these items can be scored to help assess organizational risk, as well as to help the organization understand the threats it faces.
Once an organization has established a threat model, or has made it part of their threat modeling activities, they will conduct threat research. There are a number of types of threat research that you or your organization may choose to conduct. You may look at the reputation of a site, netblock, or actor to determine whether they have a history or habit of malicious behavior. This is called threat reputation, and it is most often paired with IP addresses or domains, but file reputation services and data feeds also exist, as well as other reputation-based tools.
You can see an example of this done via Cisco's Talos Intelligence reputation lookup tools found at talosintelligence.com/reputation_center
and shown in Figure 2.3. Note that you can see the host's owner and DNS information, as well as email reputation, web reputation, how much spam email it is sending, and if it is on blacklists. In some cases, you may also get information about the content.
FIGURE 2.3 A Talos reputation report for a single host
In addition to reputation research, behavioral assessments are often used to assess a threat. Monitoring for behaviors like those listed in the ATT&CK framework can provide the basis for threat identification and incident response.
Behavioral assessments are particularly useful for insider threats because insider threat behavior is often difficult to distinguish from job- or role-related work. Detecting internal threat behaviors relies heavily on the context of the actions that were performed; a broad view of the insider's actions across all the systems, applications, and networks they interact with; and the availability to provide insight over time. Many insider attacks rely on privileged account abuse, leveraging access to sensitive information, and use of shared passwords. They also often occur outside of normal hours or may require more time, making it possible to identify them through these differences in behavior.
Another measure used to assess threats are indicators of compromise (IOCs). Indicators of compromise are forensic evidence or data that can help to identify an attack. Unlike the other assessment methods, indicators of compromise are used exclusively after an attack has started—but it may still be ongoing! That doesn't mean that they're useless for threat assessment, though.
Knowing which IOCs are associated with a given threat actor, or common exploit path, can help defenders take appropriate steps to prevent further compromise and possibly to identify the threat actor. It can also help defenders limit the damage or stop the attack from progressing.
There have been many attempts to describe attack methodologies in frameworks to help defenders model attacks and appropriate defenses. The CySA+ exam focuses on three specific frameworks, but your organization may use a different model or could create its own either from scratch or by combining one or more frameworks with its own requirements and experience. Frameworks are useful to help think through what an attacker is likely to do so that you can build appropriate defenses against attacks.
MITRE provides the ATT&CK, or Adversarial Tactics, Techniques, and Common Knowledge, knowledge base of adversary tactics and techniques. The ATT&CK matrices include detailed descriptions, definitions, and examples for the complete threat life cycle, from initial access through execution, persistence, privilege escalation, and exfiltration. At each level, it lists techniques and components, allowing threat assessment modeling to leverage common descriptions and knowledge.
ATT&CK matrices include preattack, enterprise matrices focusing on Windows, macOS, Linux, and cloud computing, as well as iOS and Android mobile platforms. It also includes details of mitigations, threat actor groups, software, and a host of other useful details. All of this adds up to make ATT&CK the most comprehensive freely available database of adversary techniques, tactics, and related information that the authors of this book are aware of.
Figure 2.4 shows an example of an ATT&CK technique definition for attacks against cloud instances via their metadata APIs. It provides an ID number as well as classification details like the tactic, platforms it applies to, what user permissions are required, the data sources it applies to, who contributed it, and the revision level of the specific technique.
FIGURE 2.4 The ATT&CK definition for Cloud Instance Metadata API attacks
In addition to the ATT&CK website and materials, a variety of third-party projects leverage ATT&CK to build playbooks, tools, and even commercial software. You can find the ATT&CK website at attack.mitre.org
.
The Diamond Model of Intrusion Analysis describes a sequence where an adversary deploys a capability targeted at an infrastructure against a victim. In this model, activities are called events, and analysts label the vertices as events that are detected or discovered. The model is intended to help analysts discover more information by highlighting the relationship between elements by following the edges between the events.
The Diamond Model uses a number of specific terms:
Figure 2.5 shows an example of an analysis conducted for a compromised system. Note that each element helps to identify additional information or areas to review.
FIGURE 2.5 A Diamond Model analysis of a compromised system
The Diamond Model focuses heavily on understanding the attacker and their motivations, and then uses relationships between these elements to allow security analysts to both understand the threat and consider what other data or information they may need to obtain or may already have available.
You can read the full text of the Diamond Model paper at apps.dtic.mil/dtic/tr/fulltext/u2/a586960.pdf
.
Lockheed Martin's Cyber Kill Chain is a seven-stage process, as shown in Figure 2.6.
FIGURE 2.6 The Cyber Kill Chain.
The seven stages are as follows:
The entire Lockheed Martin Cyber Kill Chain can be found in greater detail at www.lockheedmartin.com/content/dam/lockheed-martin/rms/documents/cyber/Gaining_the_Advantage_Cyber_Kill_Chain.pdf
.
Although the CySA+ exam doesn't specifically mention it, you may find the Unified Kill Chain useful. The Unified Kill Chain combines both Lockheed Martin's Cyber Kill Chain and MITRE's ATT&CK framework (as well as quite a few others!) into a single kill chain model. It uses 18 phases to describe attacks that occur both inside and outside a defended network, addressing complaints about both frameworks. You can read Paul Pols's 2017 proposal for the Unified Kill Chain at www.csacademy.nl/images/scripties/2018/Paul_Pols_-_The_Unified_Kill_Chain_1.pdf
.
While you are reviewing threat frameworks, you are likely to encounter the Common Vulnerability Scoring System (CVSS). Although CVSS does not cover threats directly, it is often used to help describe vulnerabilities using a numerical score. You can read about CVSS, how CVSS scoring works, and how to use CVSS as part of your vulnerability assessment program in Chapter 4, “Designing a Vulnerability Management Program.”
Building a comprehensive threat intelligence function requires multiple parts of an organization to work together. Security practitioners, system administrators, auditors, and others need to share data to identify threats, monitor for them, detect them using known activities and fingerprints, then respond to them, and finally use the information you have gained to prepare for future threats.
Threat intelligence should be shared to ensure that incident response, vulnerability management, risk management, and security engineering functions understand the likely threat actors, capabilities, and indicators of compromise you will face.
Searching for threats proactively rather than reactively can help you stay ahead of attackers. Proactive threat hunting is often triggered by new data or tools that inspire threat analysts or security professionals to establish a hypothesis about a new threat, a new threat actor, or a new type of threat.
Once you have a hypothesis, the next step is to investigate the threat. The analytical frameworks we discussed earlier in this chapter can provide a foundation that will allow you to profile threat actors, to analyze malware or other tools by doing things like executable process analysis or reverse engineering, or to otherwise investigate the new threat.
If a new threat is discovered, then some form of action is typically undertaken to counter the threat. You might identify a way to reduce your organization's attack surface area, or you might find other ways to reduce the number of attack vectors available to attackers based on your threat analysis.
Keys to this type of proactive activity are the use of integrated intelligence feeds from multiple sources, and improving your organization's detection capabilities so that you can identity threats before they become a serious issue.
The CySA+ exam groups proactive threat hunting activities into a few bullets:
As you prepare for the exam, make sure you consider how each of these plays a role in proactive threat hunting activities and what impact they would have in your organization.
Understanding the threats that your organization faces is a critical part of your security program and operations. In order to understand those threats, security professionals gather threat intelligence composed of data about your adversaries, their motivations, capabilities, tools, and methodologies.
Open source threat intelligence is acquired from publicly available sources, and closed source threat intelligence is from commercial or other sources that do not make their data available to the public. Both are used by many organizations as part of their threat intelligence efforts. Many open source threat intelligence sources exist, including government sponsored feeds and sites, professional organizations, vendor resources, social media, and even information from individuals.
A source of threat intelligence needs to be assessed, and the level of confidence you have in the data is important to know before you take actions based on it. Threat information also needs to be managed, and standardized formats and languages for describing threat information exist to help make threat information more usable. STIX, ATT&CK, and other tools help to standardize threat information. They also help to classify threats using common terms like nation-state actors and adversary capabilities.
Threat information gathering can be described as a cycle, with requirements gathering, threat data collection, threat data analysis, threat intelligence dissemination or sharing, and feedback and improvement stages all part of the typical threat information process.
Analyzing threats can also be aided by using a framework, and ATT&CK, the Diamond Model, and the Cyber Kill Chain are all common tools intended to assist in threat analysis. Each has advantages and disadvantages, and you should review them carefully to determine whether one is a better fit to your needs than the others.
Once you have built a threat intelligence function, you need to use and maintain it, and that is where organizationwide use of threat intelligence can come in. Many areas within an organization may have a use for threat data or can contribute to the threat intelligence gathering process. That data can be used for proactive threat hunting to identify threats before they successfully complete an attack or exploit.
Understand what drives intelligence source choices. Both open source and closed source or proprietary threat intelligence sources are available, and matching your needs to the right resources is important for threat intelligence programs. Intelligence sharing communities can provide threat data specifically targeted at industries or professional groups. Assessing intelligence sources based on their timeliness, how relevant the data is to your needs, and how accurate they are will help guide your choices of which datasets to use and how much you can rely on them.
Know the standards for indicator management that make intelligence data more useful. Using standardized languages like STIX and interchange protocols like TAXII allows threat intelligence information exchange and management. Describing indicators of compromise using OpenIOC provides organizations with a framework to agree on ratings for threats and events and communicate details of compromise in a known and well-defined format.
Describe threats using classification standards and common terms. Threats are often classified using a few common terms; known versus unknown threats, zero-day exploits, and advanced persistent threats are all commonly used. In addition, threats may be described by the threat actor, with nation-states, hacktivists, organized crime, and both intentional and unintentional insiders frequently identified as threat actors by organizations conducting threat intelligence and analysis activities.
Know that the threat intelligence cycle is ongoing. The threat intelligence cycle from requirements to collection of data, analysis, communication and dissemination, and gathering feedback ensures that threat intelligence does not grow stale and that threat data is consistently and continuously updated.
Be able to describe threats and attacks using frameworks and model them using analysis techniques. Frameworks like the Diamond Model, the MITRE ATT&CK framework, and Lockheed Martin's Cyber Kill Chain all provide ways to assess and describe threats. Using a threat model can help to more fully understand a threat by identifying gaps. Tools like ATT&CK also provide a broad standard taxonomy for threats that allow you to use the data in tools compatible with the framework.
Know that the ongoing process of threat management and intelligence sharing should occur organizationwide. The security processes and functions that an organization uses can benefit from threat intelligence. Threat intelligence has a major role to play in risk assessment, as it can influence the probability and impact assessment as well as provide useful information about risks due to specific threat actors. Proactive threat hunting, from forming a hypothesis, to taking actions such as reducing the organization's attack surface, is a critical part of threat intelligence and management activities. Detection and monitoring systems can more accurately detect attacks if they have good threat intelligence, and vulnerability management, incident response, and security engineering all benefit from ongoing sharing of threat details.
In this exercise, you will use the ATT&CK framework to analyze a threat. You may want to select a recent compromise that you have seen in the news, or one that has impacted an organization that you have worked with. If nothing comes to mind, the 2019 Capital One data breach offers a useful example, and you can find details of the exploit in multiple places with a quick search.
Anomali's STAXX community version provides an easy way to consume STIX feeds. In this exercise, you will download and install the STAXX client, and then review the data from one of the included feeds.
www.anomali.com/community/staxx
and download the STAXX Community edition software. STAXX is a 1 GB download and requires an email to get the download link.update.anomali.com/staxx/docs/Anomali_STAXX_Installation_&_Administration_Guide.pdf
.Match each of the activities to the phase of the threat intelligence cycle where it fits.
Requirements gathering | Update requirements for your intelligence gathering program |
Threat data collection | Provide information about a threat to an IPS administrator |
Threat data analysis | Assess missing controls from a recent breach |
Threat intelligence dissemination | Download data via STIX |
Gathering feedback | Convert manually gathered threat data to STIX format |