Cyber Threat Intelligence
   HOME

TheInfoList



OR:

Cyber threat intelligence (CTI) is a subfield of
cybersecurity Computer security (also cybersecurity, digital security, or information technology (IT) security) is a subdiscipline within the field of information security. It consists of the protection of computer software, systems and networks from thr ...
that focuses on the structured collection, analysis, and dissemination of data regarding potential or existing cyber threats. It provides organizations with the insights necessary to anticipate, prevent, and respond to cyberattacks by understanding the behavior of threat actors, their tactics, and the
vulnerabilities Vulnerability refers to "the quality or state of being exposed to the possibility of being attacked or harmed, either physically or emotionally." The understanding of social and environmental vulnerability, as a methodological approach, involves ...
they exploit. Cyber threat intelligence sources include open source intelligence, social media intelligence,
human Intelligence Human intelligence is the Intellect, intellectual capability of humans, which is marked by complex Cognition, cognitive feats and high levels of motivation and self-awareness. Using their intelligence, humans are able to learning, learn, Concept ...
, technical intelligence, device log files, forensically acquired data or intelligence from the internet traffic and data derived for the
deep Deep or The Deep may refer to: Places United States * Deep Creek (Appomattox River tributary), Virginia * Deep Creek (Great Salt Lake), Idaho and Utah * Deep Creek (Mahantango Creek tributary), Pennsylvania * Deep Creek (Mojave River tributary ...
and
dark Darkness is the condition resulting from a lack of illumination, or an absence of visible light. Human vision is unable to distinguish colors in conditions of very low luminance because the hue-sensitive photoreceptor cells on the retina are ...
web. In recent years, threat intelligence has become a crucial part of companies' cyber security strategy since it allows companies to be more proactive in their approach and determine which threats represent the greatest risks to a business. This puts companies on a more proactive front, actively trying to find their vulnerabilities and preventing hacks before they happen.CyberProof Inc. (n.d.). ''Managed Threat Intelligence''. CyberProof. Retrieved on April 03, 2023 from https://www.cyberproof.com/cyber-101/managed-threat-intelligence/ This method is gaining importance in recent years since, as
IBM International Business Machines Corporation (using the trademark IBM), nicknamed Big Blue, is an American Multinational corporation, multinational technology company headquartered in Armonk, New York, and present in over 175 countries. It is ...
estimates, the most common method companies are hacked is via threat exploitation (47% of all attacks). Threat vulnerabilities have risen in recent years also due to the
COVID-19 pandemic The COVID-19 pandemic (also known as the coronavirus pandemic and COVID pandemic), caused by severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2), began with an disease outbreak, outbreak of COVID-19 in Wuhan, China, in December ...
and more people working from home - which makes companies' data more vulnerable. Due to the growing threats on one hand, and the growing sophistication needed for threat intelligence, many companies have opted in recent years to outsource their threat intelligence activities to a managed security provider (MSSP).


Process - intelligence cycle

The process of developing cyber threat intelligence is a circular and continuous process, known as the intelligence cycle, which is composed of five phases, carried out by intelligence teams to provide to leadership relevant and convenient intelligence to reduce danger and uncertainty. The five phases are: 1) planning and direction; 2) collection; 3) processing; 4) analysis; 5) dissemination. In planning and directing, the customer of the intelligence product requests intelligence on a specific topic or objective. Then, once directed by the client, the second phase begins, collection, which involves accessing the raw information that will be required to produce the finished intelligence product. Since information is not intelligence, it must be transformed and therefore must go through the processing and analysis phases: in the processing (or pre-analytical phase) the raw information is filtered and prepared for analysis through a series of techniques (decryption, language translation, data reduction, etc.); In the analysis phase, organized information is transformed into intelligence. Finally, the dissemination phase, in which the newly selected threat intelligence is sent to the various users for their use.


Types

There are three overarching, but not categorical - classes of cyber threat intelligence: 1) tactical; 2) operational; 3) strategic.Kaspersky. (n.d.). ''What is threat intelligence? Definition and explanation''. Retrieved on April 03, 2023 from https://www.kaspersky.com/resource-center/definitions/threat-intelligence These classes are fundamental to building a comprehensive threat assessment. * Tactical: Typically used to help identify threat actors.
Indicators of compromise Indicator of compromise (IoC) in computer forensics is an artifact observed on a computer network, network or in an operating system that, with high confidence, indicates a computer intrusion. Types of indication Typical IoCs are virus signature ...
(such as
IP addresses An Internet Protocol address (IP address) is a numerical label such as that is assigned to a device connected to a computer network that uses the Internet Protocol for communication. IP addresses serve two main functions: network interface id ...
, Internet domains or hashes) are used and the analysis of tactics, techniques, and procedures (TTP) used by cybercriminals is beginning to be deepened. Insights generated at the tactical level will help security teams predict upcoming attacks and identify them at the earliest possible stages. * Operational: This is the most technical level of threat intelligence. It shares hard and specific details about attacks, motivation, threat actor capabilities, and individual campaigns. Insights provided by threat intelligence experts at this level include the nature, intent, and timing of emerging threats. This type of information is more difficult to obtain and is most often collected through deep, obscure web forums that internal teams cannot access. Security and attack response teams are the ones that use this type of operational intelligence. * Strategic: Usually tailored to non-technical audiences, intelligence on general risks associated with cyberthreats. The goal is to deliver, in the form of white papers and reports, a detailed analysis of current and projected future risks to the business, as well as the potential consequences of threats to help leaders prioritize their responses.


Benefits of cyber threat intelligence

Cyber threat intelligence provides a number of benefits, which include: * Gives organizations, agencies or other entities, the ability to develop a proactive and robust cybersecurity posture and to bolster overall risk management and cyber security policies and responses. * Drives momentum toward a proactive cybersecurity posture that is predictive, not simply reactive after a cyber attack. * It provides context and insights about active attacks and potential threats to aid decision making. * It prevents data breaches from releasing sensitive information, thus preventing data loss. * Reduce costs. Since data breaches are costs, reducing the risk of data breaches helps save money. * It helps and provides instructions to institutions on how to implement security measures to protect against future attacks. * Enables sharing of knowledge, skills and experiences among the cyber security community of practice and systems stakeholders. * It helps to more easily and better identify risks and threats, as well as delivery mechanisms, indicators of compromise across the infrastructure, and potential specific actors and motivators.Shackleford, D. (2015). ''Who’s Using Cyberthreat Intelligence and How?''. SANS Institute. https://cdn-cybersecurity.att.com/docs/SANS-Cyber-Threat-Intelligence-Survey-2015.pdf * Helps in the detection of attacks during and before these stages. * Provides indicators of actions taken during each stage of the attack. * Communicates threat surfaces, attack vectors and malicious activities directed to both information technology and operational technology platforms. * Serve as fact-based repository for evidence of both successful and unsuccessful cyber attacks. * Provide indicators for computer emergency response teams and incident response groups.


Key elements

There are three key elements that must be present for information or data to be considered threat intelligence: * Evidence-based: For any intelligence product to be useful, it must first be obtained through proper evidence-gathering methods. Through other processes, such as malware analysis, threat intelligence can be produced. * Utility: For threat intelligence to have a positive impact on the outcome of a security event, it must have some utility. Intelligence must provide clarity, in terms of context and data, about specific behaviours and methods. * Actionable: Action is the key element that separates information or data from threat intelligence. Intelligence must drive action.


Attribution

Cyber threats involve the use of computers, storage devices, software networks and cloud-based repositories. Prior to, during or after a cyber attack technical information about the information and operational technology, devices, network and computers between the attacker(s) and the victim(s) can be collected, stored and analyzed. However, identifying the person(s) behind an attack, their motivations, or the ultimate sponsor of the attack, - termed attribution is sometimes difficult, as attackers can use deceptive tactics to evade detection or mislead analysts into drawing incorrect conclusions. Multiple efforts in threat intelligence emphasize understanding adversary TTPs to tackle these issues. A number of recent cyber threat intelligence analytical reports have been released by public and private sector organizations which attribute cyber attacks. This includes Mandiant's APT1 and APT28 reports, US CERT's APT29 report, and Symantec's Dragonfly, Waterbug Group and Seedworm reports.


CTI sharing

In 2015 U.S. government legislation in the form of the Cybersecurity Information Sharing Act encouraged the sharing of CTI indicators between government and private organizations. This act required the U.S. federal government to facilitate and promote four CTI objectives: # Sharing of "classified and declassified cyber threat indicators in possession of the federal government with private entities, nonfederal government agencies, or state, tribal, or local governments"; # Sharing of "unclassified indicators with the public"; # Sharing of "information with entities under cybersecurity threats to prevent or mitigate adverse effects"; # Sharing of "cybersecurity best practices with attention to the challenges faced by small businesses. In 2016, the U.S. government agency
National Institute of Standards and Technology The National Institute of Standards and Technology (NIST) is an agency of the United States Department of Commerce whose mission is to promote American innovation and industrial competitiveness. NIST's activities are organized into Outline of p ...
(NIST) issued a publication (NIST SP 800-150) which further outlined the necessity for Cyber Threat Information Sharing as well as a framework for implementation.


See also

*
Cyber Intelligence Sharing and Protection Act The Cyber Intelligence Sharing and Protection Act (CISPA (112th Congress), (113th Congress), (114th Congress)) was a proposed law in the United States which would allow for the sharing of Internet traffic information between the U.S. gove ...
*
Denial-of-service attack In computing, a denial-of-service attack (DoS attack) is a cyberattack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host co ...
*
Indicator of compromise Indicator of compromise (IoC) in computer forensics is an artifact observed on a network or in an operating system that, with high confidence, indicates a computer intrusion. Types of indication Typical IoCs are virus signatures and IP addre ...
*
Malware Malware (a portmanteau of ''malicious software'')Tahir, R. (2018)A study on malware and malware detection techniques . ''International Journal of Education and Management Engineering'', ''8''(2), 20. is any software intentionally designed to caus ...
* Malware analysis *
Ransomware Ransomware is a type of malware that Encryption, encrypts the victim's personal data until a ransom is paid. Difficult-to-trace Digital currency, digital currencies such as paysafecard or Bitcoin and other cryptocurrency, cryptocurrencies are com ...
*
Zero-day (computing) A zero-day (also known as a 0-day) is a vulnerability or security hole in a computer system unknown to its developers or anyone capable of mitigating it. Until the vulnerability is remedied, threat actors can exploit it in a zero-day exploit, or ...


References


Further reading

* {{cite book, author=Boris Giannetto - Pierluigi Paganini, year=2020, title=Mastering Communication in Cyber Intelligence Activities: A Concise User Guide, publisher=Cyber Defense Magazine
Anca Dinicu, "Nicolae Bălcescu" Land Forces Academy, Sibiu, Romania, Cyber Threats to National Security. Specific Features and Actors Involved
- Bulletin Ştiinţific No 2(38)/2014
Zero Day: Nuclear Cyber Sabotage, BBC Four
- the Documentary thriller about warfare in a world without rules - the world of cyberwar. It tells the story of Stuxnet, self-replicating computer malware, known as a 'worm' for its ability to burrow from computer
What is threat intelligence?
- Blog post providing context and adding to the discussion of defining threat intelligence.
Threat hunting explained
- Short article explaining cyber threat intelligence.
Cyber Threat Intelligence
- What is Cyber Threat Intelligence? - Definitive guide for beginners. Computer forensics Cyberwarfare Intelligence gathering disciplines