Slide 1

Slide 1 text

Intel Driven Threat Hunting

Slide 2

Slide 2 text

Objectives • Threat Hunting • Who will hunt? • Tools to hunt? • Pyramid of Pain • Where do we hunt? • PASTA • Threat Intelligence • Methodically Hunting

Slide 3

Slide 3 text

What is Threat hunting? • Reactively pursuing of abnormal activity on devices that may be signs of compromise, intrusion, or exfiltration. • Proactively and iteratively searching through networks to detect advanced threat’s that evade existing security

Slide 4

Slide 4 text

Reactive • Tactical Methodology • Current / Now / “Is” or “Has” happened • Driven from present Alerts and Notifications • Incident Response Process

Slide 5

Slide 5 text

Proactive • Strategic Methodology • Deep Analysis utilizing Threat Modeling • Efficiently mature and develop for the long-term results • Utilizes knowledge of • Indicators of Attack • Tactics • Techniques • Procedures • Early warning with actively developing Threat Intelligence

Slide 6

Slide 6 text

Where do we begin?

Slide 7

Slide 7 text

Who will hunt? • Critical and Creative thinking (Think like a bad guy) • Objective • Analytical Mindset • Diverse (Jack of all trade) • Network Architecture • OS Architecture • Network Forensics • Understand Attack Lifecycle • Offline Investigative Skills • Perspective (Open Minded)

Slide 8

Slide 8 text

What tool to use? https://detect-respond.blogspot.com/2013/03/the-pyramid-of-pain.html TTP-Based Detection Manual search’s and hunting Tool-Based Detection AV/EDR Detections, Yara, tool Specific detectors such as Fireeye IOC-Based Detection Automatic matching of indicators from intel feeds developed into a product

Slide 9

Slide 9 text

PASTA: What is PASTA? • Process for Attack Simulation and Threat Analysis • Authored by Tony UcedaVélez (VerSprite CEO) in 2015 • Provides organizations a guide to assess realistic threats.

Slide 10

Slide 10 text

PASTA: How does PASTA work? • Organizations establish threats to important assets • Organizational Profile: • Important processes • Important hardware and software • Important data • Important roles (of employees) • Important safeguards • Important suppliers • Important proprietaries

Slide 11

Slide 11 text

PASTA: How does PASTA work? • Map assets onto business objectives • Two ways: • Importance of processes • Importance of product or service • Ask: what do the processes, product, or service provide?

Slide 12

Slide 12 text

PASTA: How does PASTA work? • Build a Threat Library • Or, an understanding of possible security threats similar organizations face. • Key word: ‘similar’ • Update your threat library, often.

Slide 13

Slide 13 text

PASTA: How does PASTA work? • Vulnerability Analysis • Key Question: what infrastructural (physical and technical) or computer- based exploits in our organization? • Purpose: to catalogue institutional and system-based weaknesses • Such as: points of entry or escalation

Slide 14

Slide 14 text

PASTA: How does PASTA work? • Assess findings • What attacks worked? • What else could be compromised? • Which suspicious activities should be prioritized? • Which suspicious should not? • Does organizational playbook need to change? • Implement findings

Slide 15

Slide 15 text

No content

Slide 16

Slide 16 text

PASTA: Main Purpose: Helps businesses identify and prioritize safeguards for organizational assets threat actors may seek to target.

Slide 17

Slide 17 text

What are Threat Models? • Process maps of how threat actors could compromise or disrupt and organization. • Purpose: Elucidates possible attack methods threat actors could enact against an organization. By creating maps of possible: •points of entry or escalation threat actors can leverage •informational technology or cybersecurity weaknesses within an organization.

Slide 18

Slide 18 text

No content

Slide 19

Slide 19 text

How does PASTA and Threat Models Relate? • PASTA provides a framework for prioritizing discovered vulnerabilities. • Function of Threat Models remains constant: purpose changes. • Purpose of Threat Models, now, business centric. • PASTA is innovative and state-of-the-art tool-kit. • Can change processes, outcomes, and goals within an organization • High-level: Frameworks, like PASTA, can alter the purpose and significance of Threat Models.

Slide 20

Slide 20 text

Benefits of Implementing PASTA into Threat Models • New concept: Organizational Threat Models • Realistic: data, trends, and outcomes • Sophisticated: planned, organized, tried and true.

Slide 21

Slide 21 text

Why Threat Hunting utilizing a Threat Library? • Technology advances and changes daily • Signature and Heuristic detection methods cannot keep up with evolving trends. • Utilizing Threat Modeling allows us to evolve hunting around a baseline that can be updated and adapted easily, without waiting for movements of a threat to be documented and adapt to current detection methods. • View the organization from the outside in – As a threat actor or hacker

Slide 22

Slide 22 text

Threat Intelligence In today’s age, Threat Intelligence is marketed as a reaction, its developed to be utilized after an event. Threat Intel should be developed for your Threat Library by: • Developed thru ANALYSIS of intelligence feeds– Not purchased • Knowing your surroundings – Both Digitally, Geographically, and Target Markets. • World Events • History • Offline (News – Meet ups – Local Interaction)

Slide 23

Slide 23 text

Threat Library Development Organization Threat Model • Technology • Business Initiatives • Geographical Location • Target Market • Competitors • Suppliers • INDIVIDUALS *** Threat Intel • Technology • Economics • Business • Military • Diplomatic • Infrastructure • Cultural/Professional • Religious Developed Baseline to drive hunts and architecture!

Slide 24

Slide 24 text

How to hunt?

Slide 25

Slide 25 text

How do we bring this all together? Create Hypotheses Investigate VIA Tools & Techniques Uncover New Patterns and TTPS Inform and Enrich Analytics Threat Hunting Loop

Slide 26

Slide 26 text

Reactive vs Proactive Hypothesis Hunting Malware Forensics Threat Intelligence Alert IR Analysis

Slide 27

Slide 27 text

Hypothesis Every hunt begins with a hypotheses, but what do we hunt for? • Analyze threat library • Apply threat intelligence to the library • Formulate hypothesis of from events associated with the library

Slide 28

Slide 28 text

Investigation Target • Host Analysis Capability • Adversary Toolkits Infrastructure • Log Analysis Adversary • TTPS • Toolkit

Slide 29

Slide 29 text

Uncover Discover new Patterns and TTPs from Threat Hunt • Intrusion Discovery and Response • Attack Tree Analysis

Slide 30

Slide 30 text

Inform & Enrich • Produce Threat Intelligence from discovery • Develop Hunting Techniques • Enhance Security Posture • Update Threat Library

Slide 31

Slide 31 text

Recap • Threat Hutning • Who is hunting? • Tools • What are we hunting? • Threat Hunt Model