Resource center Archives - Flare | Cyber Threat Intel | Digital Risk Protection https://flare.io/learn/resources/blog/category/resource-center/ Attackers Shouldn't Have the Information Advantage Mon, 10 Feb 2025 18:47:35 +0000 en-US hourly 1 https://wordpress.org/?v=6.7.1 https://flare.io/wp-content/uploads/cropped-Favicon-32x32.png Resource center Archives - Flare | Cyber Threat Intel | Digital Risk Protection https://flare.io/learn/resources/blog/category/resource-center/ 32 32 AlphaLock, Threat Actor Branding, and the World of Cybercrime Marketing https://flare.io/learn/resources/blog/alphalock-threat-actor-branding-and-the-world-of-cybercrime-marketing/ Mon, 08 Apr 2024 14:34:36 +0000 https://flare.io/?p=15165 Threat actors are not a monolith in their approach to cybercrime. The popular perception is that threat actors steal information for the sake of it, while knowing and accepting that they are doing something wrong. However, some threat actors also justify their actions by promoting an image that their activity ethically advances the cause of […]

The post AlphaLock, Threat Actor Branding, and the World of Cybercrime Marketing appeared first on Flare | Cyber Threat Intel | Digital Risk Protection.

]]>
Gradient blue background. There is a light orange oval with the white text "BLOG" inside of it. Below it there's white text: "AlphaLock, Threat Actor Branding, and the World of Cybercrime Marketing" with a light orange arrow pointing down.

Threat actors are not a monolith in their approach to cybercrime. The popular perception is that threat actors steal information for the sake of it, while knowing and accepting that they are doing something wrong. However, some threat actors also justify their actions by promoting an image that their activity ethically advances the cause of cybersecurity. At Flare we regularly see threat groups state that they are “(reverse) pen testers”. Security researchers are very familiar with ransomware groups referring to their actions as “pentesting after the fact.” 

One such entity is the malicious group AlphaLock. The Flare Research team reviewed their Telegram channel, and combed through to identify the ways the group describes itself.

AlphaLock is a Russian hacking group that describes itself as a “pentesting training organization.” The group has a two-part business model designed to both educate cyber criminals, then weaponize them for profit against organizations.:

  • Training: referred to as the Bazooka Code Pentest Training. This training covers the basics of offensive security and is designed to take non-technical users and teach social engineering and technical offensive security skills.
  • Affiliate program: ALPentest Hacking Marketplace, which monetizes the services of the hackers trained through the training program

Threat Actors as Pentesters: AlphaLock Edition

The psychology of justifying cybercrime is fascinating. Going through AlphaLock’s recent Telegram messages, there are generally three areas where we can see that on full display:

  • The language of “pentesting”
  • Donating items and funding to an orphanage and animal shelters
  • Description of training program as supporting cybersecurity

Pentest Messaging 

The language of “pentesting” is sprinkled through the Telegram channel, starting with the name of the channel. 

There were several graphics shared to announce opening up enrollment for training programs with different languages for soon-to-be threat actors. The logo includes the word “pentest.”  

AlphaLock's logo is in the middle with a black background and an American flag on the left side
Graphic to announce enrollment for English-speaking soon-to-be threat actors

In addition, when referring to members of the AlphaLock community, they use terms such as:

  • Pentesters from the AlphaLock Pentest community
  • Freelance pentester
  • Pentest partnership program

Program Language 

The pentesting terminology is most prominently featured in descriptions of Alphalock’s  training program. If you read only what they have published, it can be easy to mistake this for an ethical hacking program.

‼ Over 250 people have gone through us and many of them stay with us and become cool specialists in the field of Pentesting.

Course Program:

Introduction to Linux and the basics of the command line

  • Introduction to pentesting: basic concepts, methodologies, goals, and the fundamentals of ethical hacking.
  • Understanding the concept and role of network security.
  • Network scanning tools: introduction to Nmap and Masscan, their capabilities, command syntax, and examples of use.
  • Finding open ports, identifying services, identifying vulnerabilities using scanners.
  • Advanced use of Nmap: a wide range of parameters, security assessment using Nmap, determining the operating system and vulnerabilities.
  • Advanced scanning tools: introduction to additional tools such as Zenmap, Unicornscan, and Hping.
  • Protection from scanning: means of detection and protection against passive and active scanning, bypassing firewalls and control tools.

Password cracking, protocol analysis, and web application

  • Password cracking: introduction to Hydra and its capabilities for cracking passwords for SSH, FTP, web forms, and other types of authentication.
  • Password protection methods and strong authentication measures.
  • Vulnerability analysis in web applications: introduction to the OWASP Top 10 and tools for detecting and exploiting vulnerabilities, such as ZAP Proxy and Burp Suite.

Our team is looking for outstanding specialists in the first pentest affiliate program in the world, AL PENTEST.

Charitable Giving 

Donating to good causes is also a part of AlphaLock’s self-image as ethical hackers.

Around the holiday season in December, AlphaLock published a poll on charitable giving. The message stated that the group would send “50% of the entrance fees to charitable organizations.” 

The group then allocated about $1000 USD to an orphanage in Russia, and the group announced that, “we will create a New Year’s miracle for the children 😍.” Apparently other members of the group advocated to donate to an animal shelter as well.

AlphaLock purchased a “hockey arsenal” for one Russian orphanage, and the gift package included ice skates, pucks, and sleds. The group shared a video in the channel in which an unshown person distributed the items. The video displayed the ice skates with logos: “AL PENTEST.”

Screenshot of Telegram message that shows a paused video of ice skates in a box with text underneath describing the video
Screenshot of message with video that shows items purchased for the orphanage
Black ice skate that shows the AlphaLock logo on the side in white
Ice skates sent to children in orphanage with the AlphaLock logo including the term “pentest”

What Does This Mean?

Understanding the Impact of AlphaLock in Cybersecurity

AlphaLock’s activity on Telegram offers valuable insights.

  • Branding: It’s become evident that cybercriminal groups are increasingly emphasizing their branding and identity. This shift towards building a recognizable brand is vividly exemplified by AlphaLock, which has dedicated considerable efforts towards crafting a distinct image and reputation, both within and outside of its direct sphere of influence.
  • Shifting Arena of Cyber Threats: Threat actor activity on Telegram challenges the traditional belief that cyber threats predominantly lurk reside on the dark web. Today, the distinction between the dark web and more accessible platforms is becoming increasingly opaque. Applications like Telegram and clear web sites are merging into a unified space where threat actors can easily network and orchestrate their plans. Modern cybersecurity calls for Continuous Threat Exposure Management across various avenues to most effectively counter threats. 

Monitoring Telegram and Other Sources with Flare

The Flare Threat Exposure Management (TEM) solution empowers organizations to proactively detect, prioritize, and mitigate the types of exposures commonly exploited by threat actors. Our platform automatically scans the clear & dark web and illicit Telegram channels 24/7 to discover unknown events, prioritize risks, and deliver actionable intelligence you can use instantly to improve security.

Flare integrates into your security program in 30 minutes and often replaces several SaaS and open source tools.  Learn more by signing up for our free trial.

The post AlphaLock, Threat Actor Branding, and the World of Cybercrime Marketing appeared first on Flare | Cyber Threat Intel | Digital Risk Protection.

]]>
LockBit’s Conversation on XSS Forum with an Initial Access Broker https://flare.io/learn/resources/blog/lockbits-conversation-on-xss-forum-with-an-initial-access-broker/ Wed, 13 Mar 2024 20:17:23 +0000 https://flare.io/?p=15085 In February of 2024, admins of the Russian hacking forum XSS banned the primary LockBit account active on the forum. The ban was the result of a dispute between LockBit, and an initial access broker operating under the username “aa.”  The following is a conversation between AA and LockBit, posted on XSS as aa sought […]

The post LockBit’s Conversation on XSS Forum with an Initial Access Broker appeared first on Flare | Cyber Threat Intel | Digital Risk Protection.

]]>
Gradient blue background. There is a light orange oval with the white text "BLOG" inside of it. Below it there's white text: "LockBit's Conversation on XSS Forum with an Initial Access Broker" with a light orange arrow pointing down.

In February of 2024, admins of the Russian hacking forum XSS banned the primary LockBit account active on the forum. The ban was the result of a dispute between LockBit, and an initial access broker operating under the username “aa.” 

The following is a conversation between AA and LockBit, posted on XSS as aa sought arbitration to force LockBit to pay:

Initial discussion about unauthorized access to a company network with domain admin privileges. The threat actor “aa” has provided illicit access details.

[15:02:42] aa: Greetings. There’s good access.

[15:02:45] aa: (Description of Access1)

[15:03:31] aa: Their main domain is going. There’s no branch or anything like that.

[15:04:09] aa: There are still accesses of that order. All with domain admins.

[22:05:42] LockBitSupp: Hello, and all with such antiviruses that you can’t turn off?

[22:06:30] aa: Hello. They are bigger there, everywhere there’s usually EDR but this one was the most annoying) I can check if necessary.

[22:07:32] aa: But not on the others, not on cortex.

[22:09:20] aa: link if anything

[22:18:44] LockBitSupp: Got a host checker?

[22:22:34] aa: Didn’t quite understand the question.

[22:23:34] LockBitSupp: Is there internet there? Have you been inside or not?

[22:26:14] aa: YES

[22:26:20] aa: Went in

[22:26:32] aa: There’s no internet

[22:26:38] aa: At least not on the DC

[22:27:50] LockBitSupp: Well, let’s see that access now

LockBitSupp instructs aa not to access the domain controller directly as it may alert the company. aa provides additional compromised access credentials.

[22:28:36] LockBitSupp: but in general, you should never go into the DC because they’ll kick you out within an hour

[22:29:37] aa: Well, it’s been down for 3 weeks with me

[22:29:58] LockBitSupp: give access faster

[22:30:21] aa: Access1 creds

[22:30:30] aa: Access1

[22:30:49] aa: Might not be able to enter from Windows but you probably know this joke

[pending] : 2023-12-22

[00:08:16] aa: ?

[07:36:46] LockBitSupp: managed to get in, send everything you have on the network if there’s any info, and I’ll start working on it

[16:58:10] aa: Hello. No info, I just raised the rights and didn’t look further. There’s an LDAP dump if needed.

[16:59:01] aa: If you have commands of that level, I can give about 5 more similar ones, all with DA. But everything should be simpler.

[pending] : 2023-12-24

[17:44:37] aa: Hello. Any news?

[17:58:54] LockBitSupp: Hello, no news yet, the network is being worked on.

[17:59:45] aa: By the way, I wanted to just sell it) But if along the way I didn’t sell but gave it away, what’s the percentage at least?

[18:01:18] LockBitSupp: Let’s at least finish and get the payment first) then we’ll decide if anything)

[18:01:28] LockBitSupp: You don’t think every network pays)

[18:04:16] aa: Yeah, I know it all, just as I know how hard it is to make a big network pay even a little bit. That’s why I just wanted to sell it, but okay, I’ll wait then.

[18:06:19] LockBitSupp: Just buying is also not very interesting, especially from an unverified supplier, you never know how many hands the network has been sold through.

[pending] : 2023-12-25

[16:31:34] aa: Hello. There’s also Access2 that goes in. DA the same.

[16:32:13] aa:

[16:32:19] aa:

[16:33:32] aa:

[17:57:39] LockBitSupp: Hello, getting more interesting, where do you get them from?

[17:58:37] aa: I have my own things. And I raise the rights further already.

[17:58:59] LockBitSupp: Why don’t you want to cover yourself? Steal the data?

[18:15:36] aa: (Personal)

[18:17:20] LockBitSupp: Alright

In the following segment, LockBitSupp and aa discuss the distribution of aa’s illicitly obtained access to various company networks among trusted LockBit affiliates. aa mentions a high-value network (“Access3”) with domain admin privileges, but notes that the credentials need to be updated regularly. LockBitSupp advises against letting accesses expire and suggests immediately sharing them with proven affiliates who have successfully earned millions from attacks. They agree to start by providing a smaller network (“Access4”) to an eager affiliate as a test, with aa supplying the credentials and LockBitSupp offering data dumps to facilitate the attack.

[18:17:20] LockBitSupp: Alright, let’s try to do something with this, top affiliates are offline right now, if you want you can pass me the access directly, as soon as they log in I’ll give it to them for work if they agree so we don’t waste time and don’t wait for your online.

[18:19:23] aa: There’s a nuance, you’ll need to wait for me) The entry will be specific but the network is top. But I need to keep updating the creds for them.

[18:19:37] LockBitSupp: +

[18:19:59] LockBitSupp: then we’ll wait until the top advertisers respond.

[18:21:39] aa: If there are good advertisers with a guarantee through you, I can supply very good material and simpler ones too. Because I’m currently on

[18:23:59] LockBitSupp: I don’t give material to those I don’t trust, I only give it to people proven over the years and only those who have been paid millions of dollars, I trust them.

[18:24:47] aa:

[18:25:03] aa: I’m on a new one since November.

[18:27:28] LockBitSupp: Look, you decide for yourself, if there are simpler accesses without EDR I can give to other affiliates who are less loaded and have less skill, but they also have been paid millions of dollars.

[18:28:51] aa:

[18:28:53] LockBitSupp:

[18:29:07] LockBitSupp:

[18:30:55] aa: Then a little later from the next batch, I’ll write to you about what there is and we’ll look at it already.

[18:31:20] LockBitSupp: what’s that accent?

[18:31:42] aa:

[18:32:20] aa:

[18:33:49] LockBitSupp: We can actually stream and distribute all your accesses to different advertisers to process everything simultaneously.

[18:33:49] aa: Access3 I have now for instance. But it’s very big. And yes, with DA included too, true DA is in trust.

[18:35:44] LockBitSupp: No need to wait for the access to die, gotta do something with it)

[18:36:43] aa: That’s what I’ve been doing for a year now))

[18:37:00] aa: I can list for you how much everything has died on me. I take DA so it could be recovered.

[18:37:10] aa: Doesn’t always work out.

[18:37:20] LockBitSupp: What are you doing? Waiting for accesses to die?

[18:37:32] aa: Yes.

[18:37:57] LockBitSupp: Don’t do that, I’m at your service.)

[18:39:38] aa: I didn’t give Access3.

[18:39:46] aa:

[18:40:42] aa: You’re everywhere too.

[18:41:11] LockBitSupp: Let me distribute all your networks to advertisers, why wait until they die.

[18:41:54] aa: Are there people of such level?

[18:42:05] aa: Just not to be offended by it.)

[18:42:52] LockBitSupp: Listen, how would I know what level they are, I see thousands of chats, see who regularly gets payouts, who attacked whom, if payouts are coming, it means they’re with hands.

[18:43:28] LockBitSupp: Let’s give this one to a person now, he asks, will try to make it as good as possible, let’s start with a little.

[18:45:19] aa: Let’s say the only hemorrhoid?)

[18:45:59] aa: I have one such hemorrhoid. But she’s classy from the point of view of payouts.

[18:46:10] LockBitSupp: Well, let’s give access faster while the advertiser is hot on the connection he’s about to start on this one, if he successfully copes we’ll give him a bigger network.

[18:47:40] aa: Access4 let’s try this one so the entrance would be problem-free?

[18:47:46] aa: Access4

[18:48:00] aa: Access4

[18:48:18] aa: Maybe you’ll trust me and I’ll explain.

[18[18:48:18] aa: Maybe then you will trust me and I will explain.

[18:48:20] LockBitSupp: Let’s take anyone while the advertiser is hot and ready to fight.

[18:49:52] aa: Access4

[18:50:06] aa: Access4

[18:50:11] aa: He is also the admin there.

[18:50:24] aa: Access4

Access4

[18:50:26] aa: Access4

[18:50:54] aa: These are others who got caught with open passwords might be needed suddenly.

[18:50:58] aa: Access4

[18:52:24] LockBitSupp: Is this all the info?

[18:52:50] aa: Access4

[18:53:25] LockBitSupp: I’ll give you all the dumps so that it would be less work for him and less exposure.

File sharing:

Private note service:

In this part of the conversation, LockBitSupp and aa continue to coordinate attacks on various company networks. aa provides additional credentials and sensitive data for “Access4”, while LockBitSupp requests more small-scale accesses for other affiliates and informs aa that a major affiliate is ready to handle a large-scale intrusion. aa shares cookie-based access for “Access2” and access to “Access5”, which does not require special entry methods. LockBitSupp assigns affiliates to work on the new accesses, manages the ongoing negotiations for “Access1”, and keeps aa updated on the progress of the attacks, including data theft and any issues encountered.

[20:05:24] aa: Access4

[20:05:27] aa: ntds

[20:06:25] aa: Access4

[pending] : 2023-12-26

[13:53:54] LockBitSupp: Do you have any more small stuff like this? I’ll distribute it to other advertisers.

[14:20:43] LockBitSupp: A major advertiser responded with two teams for a big access, give me the big access.

[16:32:50] aa: Hello, you’ll need to enter through cookies.

[16:33:42] aa: Access2

[16:34:07] aa: Access2

[16:34:35] aa: Access2

[16:34:59] aa: Access2

[18:59:48] LockBitSupp: So what is this corp?

[19:07:33] LockBitSupp: Ah, I get it, this is Access2.

[21:48:11] aa: Were you able to enter?

[21:48:30] aa: Access5

[21:48:39] aa: But there you can enter without any trouble.

[22:08:37] LockBitSupp: Haven’t entered yet, the advertiser says they are breaking down two major corps and will only be free in mid-January, wrote to another advertiser (I’ll tell you when you need to make a proxy)

Let’s try to set up Access5 for someone too.

[pending] : 2023-12-28

[14:33:23] aa: Hello, did you do anything?

[23:04:38] LockBitSupp: Hello, in the process.

[23:09:10] LockBitSupp: Make me a new proxy for Access2, another experienced advertiser appeared online and seems ready to start working.

[23:30:06] aa: Access2

[23:30:58] aa: If the advertiser is on the connection, I can issue it. Or we can agree on a specific time when everyone will be online.

[pending] : 2023-12-29

[09:56:48] LockBitSupp: Go ahead and issue fresh cookies or whatever, I told him to be on connection so nothing dies.

[20:39:06] LockBitSupp: Access2

[pending] : 2024-01-03

[03:59:36] aa: Hello

[03:59:40] aa: Any news?

[13:33:10] LockBitSupp: Hello, negotiations are still only about Access1 (how much should we ask, do you think? the advertiser says he deleted backups) but didn’t steal as much data for the blog as he wanted because there was something wrong with the internet and he says there was no opportunity to steal a lot.

The rest are in work (data is being stolen and all that advertisers have written to me lately)

Access1

In this part of the conversation, LockBitSupp and aa continue to coordinate attacks on various company networks. aa provides additional credentials and sensitive data for “Access4”, while LockBitSupp requests more small-scale accesses for other affiliates and informs aa that a major affiliate is ready to handle a large-scale intrusion. aa shares cookie-based access for “Access2” and access to “Access5”, which does not require special entry methods. LockBitSupp assigns affiliates to work on the new accesses, manages the ongoing negotiations for “Access1”, and keeps aa updated on the progress of the attacks, including data theft and any issues encountered.

[13:33:41] LockBitSupp: Now the moment has come to write a price to the target, your opinion?

[pending] : 2024-01-04

[13:09:38] LockBitSupp: Where did you disappear? The advertiser is itching, ready to work.

[13:43:06] LockBitSupp: Report by one of your companies from another advertiser.

Access3

[13:46:13] LockBitSupp: Stolen by them.

[15:53:32] aa: Hello. Today I’ll drop everything, I keep being distracted.)

[15:53:43] aa: Just about to write you messages and I get distracted again

[15:53:43] aa: Just about to write you messages and I get distracted again.

[15:54:00] aa: Thanks for proving I’m not a fool and everything can be done properly.

[16:00:31] LockBitSupp:

[16:01:14] aa: 5 minutes.

[16:04:32] aa: Access2

[16:07:01] aa: Access2

[16:07:10] aa: Access2

[16:08:07] LockBitSupp: What do you think about the ransom for Access1?

[18:02:23] aa: There’s nothing critical here, right? (the amount)

[18:05:08] aa: Were you able to get in there?

[18:42:57] LockBitSupp: Got in, there’s Falcon, what are we supposed to do with this network?

[18:54:38] LockBitSupp: So, he’ll try to do what he can to at least steal data, because this is one of the toughest AVs, are all your networks like this? Without AV you do it yourself?

[18:56:30] LockBitSupp: Give me some smaller accesses too so the other advertisers don’t get bored.

[19:19:21] aa: Not all.

[19:20:58] aa: But I wanted to give away a classy access. ACCESS3. There you can normally enter without cookies.

[19:21:10] aa: There’s just a little bit left undone. I only took one domain.

[19:21:14] aa: There are 7 of them.

[19:21:22] aa: And there the AV is simpler I think.

[19:21:29] aa: Sophos if I’m not mistaken.

[19:22:33] LockBitSupp: Well, give me that honey.

[19:25:00] aa: Just so you know, I don’t understand AV and backups beyond that. I always just handed them off and sometimes pumped data. Theoretically, I know, but especially with major AVs, I’ve never encountered it. So don’t pressure me about Falcon ;)

[19:25:12] aa: 10 minutes and I’ll upload, I have a lot of info on it.

[19:26:03] LockBitSupp: I’m not pressuring, I’m just telling you few can handle them, AV lights you up at any noise.

[19:26:41] LockBitSupp: Just in case you think we’re supermen and omnipotent, now we’ll kill the network and you’ll say what assholes messed up my network ;)

[19:32:11] aa: You’ve already done what would have killed everything for me.

[19:35:30] aa: ACCESS3

[19:41:13] aa: ACCESS3

[19:41:50] aa: ACCESS3

[19:42:32] aa: ACCESS3

[19:47:22] aa: And for medium ones, I get networks about once a month in batches. I gave away the average ones in November and December, unfortunately to the wrong people.

[19:59:47] aa: Can’t I accidentally have access to the chats? Just nice to watch the negotiations.

[pending] : 2024-01-05

[09:47:21] LockBitSupp: So what is this access you dropped? Not very clear.

You can have access to the chats but then you’ll be knocking the victim out of the chat, I could give you chat IDs of the victims and all, you would watch their chats from their side, but when you enter the chat they will be kicked out and they may panic that someone else has access to the chat, like it’s not private and all that.

[10:52:31] aa: ACCESS3

[10:53:04] aa: ACCESS3

[10:56:45] aa: But I have DA only in one trust. I immediately dropped ntds to make it easier.

[10:56:55] aa: ACCESS3

[10:59:45] aa: I can take DA in all domains. But it will be a bit risky and complicated. Because I can’t even load BloodHound because of the network size.

[11:00:46] aa: It would just be better and more chances if a more experienced person takes over.

[11:20:02] LockBitSupp: We’ll wait with ACCESS3, the advertiser said he’ll be free on the 8th and ready to take over.

[11:20:41] aa: And how much did[11:20:41] aa: And how much did Access1 say?

[11:21:12] LockBitSupp: Figures.

[11:21:24] aa: I always estimate very low.))

[11:22:26] LockBitSupp: Well, that’s a margin for a discount.

[11:23:08] LockBitSupp: Still no response yet.

[pending] : 2024-01-08

[10:11:14] LockBitSupp: Need new ones for Access2.

[16:29:29] aa: Hello.

[16:29:33] aa: Will do now.

[16:38:30] aa: Access2

[16:39:52] aa: Any news on the others?

[20:34:20] LockBitSupp: No news on the others yet.

[20:34:48] LockBitSupp: Work is being done, you understand the process isn’t quick, haste isn’t needed here.

[20:35:05] LockBitSupp: The main thing is the result, not the speed.

[20:40:04] aa: Did you get in?

[20:40:21] aa: I’m more about new messages from Access1.

[21:00:48] LockBitSupp: Negotiations with Access1…

Nothing significant, now giving them another list, the advertiser managed to steal very few files, they seem to realize this, so the chances of success aren’t great, but I’m trying to get through by bluffing.

In this part of the conversation, LockBitSupp and aa discuss the ongoing ransom negotiations and the challenges faced in the various attacks. The ransom negotiations for “Access1” are not progressing well due to the affiliate’s inability to steal a significant amount of data, while issues with credentials and security measures hinder progress on “Access2” and “Access3”. LockBitSupp declines an initial ransom offer for “Access1”, aiming to negotiate a higher amount, and expresses his desire to make the first payment to aa to establish trust for future collaboration. aa encourages accepting the current offer, believing that a payout will motivate him to provide more high-value targets. LockBitSupp reassigns affiliates to tackle the challenges posed by each network and keeps aa informed about the progress of the attacks, including the status of ransom negotiations, data theft, and any obstacles encountered, such as antivirus software and firewalls.

[21:00:48] LockBitSupp: Access2 isn’t working, just checked, give me a new one, make sure it’s working.

[21:13:24] aa: Access2

[21:13:41] aa: Access2

[21:17:57] aa: Plus, as I understand, the affiliate also didn’t take the most up-to-date data. Did the affiliates take Access3?

[21:18:28] aa: I just understand well how to do them correctly with Access3.

[21:19:40] LockBitSupp: It doesn’t matter what the partner took, nothing can be changed now, he complained that a firewall or something did not allow him to go wild, and can you steal data yourself? or don’t you even try? any advice? very curious.

[21:42:54] aa: Access3

[21:44:09] aa: Access3

[21:45:27] LockBitSupp: Got it, will give the advertiser separate instructions on data for Access3, but locking it for order won’t hurt anyway.)

[22:13:08] LockBitSupp: You promised me Access3.

[pending] : 2024-01-09

[16:08:01] aa: Access3

[16:08:14] aa: Can’t find the second one yet.

[pending] : 2024-01-10

[23:08:16] LockBitSupp: Access3 VPN died, do you have more creds?

[pending] : 2024-01-11

[12:37:09] aa: I have a lot. I will check it out, it has been living with me for a long time.

[12:57:00] aa: Access3

[12:57:36] aa: Any movement on the negotiations and other networks?

[14:53:13] LockBitSupp: They offered for Access1…

Access1

I declined, it’s quiet on the others, remind me please of the list of other sites so I can nudge the advertisers and ask what’s up with those networks.

[15:50:43] aa: Access2 Access4

[15:51:55] aa: Don’t you want to agree by any chance? You yourself say that the advertiser didn’t take the data quite right. Plus, the amount isn’t so bad for a network that’s not fully done.

[15:53:23] aa: Just getting a payout I would bring you another 10 like that and we would earn more and I can bring you networks for PR too if needed.

[15:58:02] aa: Access4 seems to be done too if I remember correctly.

[16:03:25] LockBitSupp: Access2 one advertiser seems to have given up, nothing is working out for him, give it another try I’ll give it to another advertiser.

Access4 no contact yet, calling didn’t help, we’ll wait another week if they don’t get in touch we’ll publish in the blog, then they might come running.

I don’t want to agree on Access1, I’ll try to squeeze out a bit more money. I also want to make the first payment with you so we can then take on other targets seriously and distribute all your targets to other advertisers for payments on a flow basis.

[23:02:27] LockBitSupp: Accepted, handed off for work,

there was also an error in communication, so there are 3 networks in contact, as soon as anyone pays we will start talking about money, for now, I’m trying to get a payment from someone.

[23:03:18] LockBitSupp: Access6

[23:07:19] aa: That’s not my network))

[23:08:26] aa: There should be significantly more servers

[23:09:38] aa: Access6 has 2200 servers according to LDAP, there should be more, there were about 30 controllers

[23:13:50] aa: Can you send the correspondence with Access1, I’m very worried, especially since they offered money

[pending] : 2024-01-19

[15:59:32] LockBitSupp: 2200 devices not servers, I can send the correspondence but why do you need it? You will worry even more if you see it, I can conduct correspondence for months, and you will write to me every day to send the correspondence and worry and worry and worry again

[16:01:17] aa: I’m telling you I’m worried, it’s just nice for me to watch, since I can’t organize access anyway, so I’m just curious about how the negotiations are going

[16:02:38] aa: I would still like to see, I won’t bother you every day)

Access1 correspondence

[16:09:51] aa: thank you

[pending] : 2024-01-23

[20:53:57] aa: Hello, can you tell if Access6 and Access2 were made?

[pending] : 2024-01-24

[14:59:17] LockBitSupp:

They wrote about Access6 today

Access2 no one can do, I’m asking for permission to transfer Access2 to someone I don’t trust, i.e., the person might scam the access

the problem is with Falcon, it’s tough with it

there are no problems with cookies, without Falcon it would be easier

let’s see what else you have, not to let the goods go to waste

[pending] : 2024-01-25

[23:54:16] aa: Hello again, you can transfer Access2 at your discretion, it will die sooner or later when passwords are updated.

[23:54:50] aa: Access2t

[pending] : 2024-01-26

[20:43:56] LockBitSupp: Access2

[23:12:23] aa: Access7

[23:12:48] aa: Access7

[23:13:00] aa: Access7

[23:16:33] aa: Access7

[23:17:04] aa: Access2 is dead, if NTDS is left I can probably recover it

[23:20:25] aa: Any news on the negotiations?

[pending] : 2024-01-28

[14:41:13] LockBitSupp: Hello

1. The very first access you gave me, Access1, paid a ransom after a month of negotiations, since originally you came to me to sell it, there can’t be a fixed percentage, I can pay as for purchased access, how much did you want to sell it for?

2. As I said after the first payment we can move on to more serious cooperation, as you are now a verified person give me your tox I’ll add you to tox for verified people

3. Access4 is in the process of negotiations, still water

4. Access6 is in the process of negotiations, still water

5. Did you manage to regain access to Access2?

6. Now we can discuss more detailed conditions of permanent work if you’re interested, scaling up the work and financial questions

In this part of the conversation, LockBitSupp and aa negotiate the terms of their partnership, focusing on the percentage of ransom payments aa will receive for providing illicit access to corporate networks. LockBitSupp proposes a tiered payment structure, starting at 10% and increasing by 1% for each successful ransom, up to a maximum of 20%, encouraging aa to provide more accesses to maximize profits. aa argues for a fair, fixed percentage, considering the value he provides by including domain admin privileges. He expresses concern about the terms offered, finding them unfair given the quality of the accesses he provides. The conversation concludes without a clear resolution, highlighting the complex dynamics and negotiations involved in the ransomware-as-a-service (RaaS) model, where access brokers, affiliates, and operators must agree on payment terms and navigate a high-risk, high-reward criminal ecosystem.

[14:41:13] LockBitSupp: you said you want 25%, I think that’s a lot to start with, I’d like you to give as many accesses as possible and constantly, and not just leave to spend money after the first large payment

therefore, I propose to do it this way

we gradually raise the percentage from 10 to 20 percent

access paid – you get 10%

the next access paid – you get 11%

the next access paid – you get 12%

the next access paid – you get 13%

the next access paid – you get 14%

the next access paid – you get 15%

the next access paid – you get 16%

the next access paid – you get 17%

the next access paid – you get 18%

the next access paid – you get 19%

the next access paid – you get 20%

[14:41:13] LockBitSupp: And so, through 10 payments, you reach the maximum level of income on your side. I, in turn, guarantee you control and that no one among the pentesters will cheat you out of money. From you, maximum effort and an increase in the volume of supplies are required to maximize our profit. For example, instead of doing 5 accesses a month, aim for 50 or more. You can also give accesses that are not too lucrative. I have advertisers of different ranks, some more experienced, some simpler, to keep everyone busy.

7. Sangwing has been handed over for work.

[15:33:59] aa: Hello, selling implies immediate money))) Not when the network pays. Let’s agree on a fair and normal percentage and work at a normal pace.

[15:37:20] aa: I give access immediately with domain admins in the package, doing half the work for your workers, meaning the access goes 100% straight to work (you know the problem with this). Another contact.

[15:43:54] aa: About Access2, I told you wrong, did the advertisers not have ntds? Because I didn’t take it off there due to AV so as not to alert, because I don’t know ways to do this without an alert with such AV, shadow copying there will also alert if done.

[15:44:47] aa: And I will never have 50, but I will have 5 guaranteed ones that can be calmly set and worked on, with rights that won’t die in 2 days.

[15:46:12] aa: I always worked quietly but on more or less good targets and top countries, let’s say more precisely.

[16:28:05] aa: If anything, the domain admin on Access1, there the point of entry had no rights at all.

[16:45:23] aa: It feels like I just threw you a random access from the logs, but it’s far from that.

[16:54:50] aa: Contact.

[16:55:31] aa: Please add, because I am very concerned about our cooperation.

[17:58:06] aa:

> [18:04:16] aa: Yes, I know everything, also know how hard it is to make a big network pay even a little bit. That’s why I just wanted to sell, okay, I’ll wait then.

> [18:06:19] LockBitSupp: Just buying is also not very interesting, especially from an unverified supplier, you never know how many hands the network has been sold through.

[17:58:21] aa: I accidentally attached the link))

[17:59:07] aa: You yourself refused to buy, so I absolutely do not understand your statement now.

[21:14:18] aa: Let’s negotiate more properly please, because the terms you’re offering are absolutely unfair to me and my work.

[21:18:57] LockBitSupp: Why does selling imply immediate money, not when the network pays? I often write that I am ready to pay only if the network pays a ransom. If it doesn’t, it ends up in the blog, and many are okay with this because accesses die and they can’t work them themselves. To my knowledge, there are no specific international standards or rules on how to pay or buy networks, everything is individual as you negotiate. I initially told you let’s work your networks as best as we can, after the first payment we will discuss all the financial issues and conditions, because every day about 10 people write to me and push their endless accesses. Since I’ve verified you, I am now ready to work with you permanently, ready to discuss.

[21:18:57] LockBitSupp: A fair and normal percentage, I offered you conditions, your task is either to agree to them, refuse them, or propose your own. The number of advertisers allows us to maintain the maximum possible pace, as long as there are free hands.

[21:18:57] LockBitSupp: The fact that you give access immediately with domain admin in the package is of course good, but as you can see there are many other factors that affect payment, and domain admin is not always a guarantee of success. Some accesses died even with domain admin, because logging into DA is always noticeable. Specifically in this case with Access1, only my negotiation skills resolved it, which I personally led for a month, but I don’t say anything to you for this, we have team work and each profession is important, your help is useful, an experienced pentester is useful, an experienced negotiator is useful, and I as a guarantor am useful. It’s hard to imagine how all this can be evaluated, you can’t pull the blanket over someone, everyone is important and needed. In essence, I can give you a panel and you can personally work accesses and take the entire ransom sum for yourself and not share with anyone. I am not against such a scenario, but you yourself said that you are not able to work alone and need an experienced team, I have assembled an experienced team and as a result, we have success. You can also give accesses without a domain admin, perhaps my pentesters can take DA just as you do if you want. The fact that you help as you can only increases the chance of payment, but sometimes it can also harm, because usually any movements on DA are very strictly controlled in proper companies, of course where there are screw-ups no one will notice anything.

[21:18:57] LockBitSupp: About Access2, everything is very difficult, I am sure that no one could take anything there because there is a malicious AV.

50 accesses from you are my dreams, you can give as many as you have, as you like. My task as the head of an organized crime group is to load all free hands with work to maximize profit, so I take accesses from all sources.

I don’t know where you get accesses, from logs or somehow cunningly mine them, it’s your concern and I am ready to pay you for it, now we are discussing this topic.

[21:18:57] LockBitSupp: Again, I refused not only to buy but also to discuss any percentage, I said that only after the first payment we will discuss all financial issues and close cooperation if we can agree, usually when it comes to sharing the loot there are quarrels. You could have just given me nothing if you didn’t get a clear agreement, but you decided to hand over access for work because you understood that it could just die and you wouldn’t earn anything, as it was with many of your other accesses. Now we are engaged in discussing the most clear and transparent conditions that will suit both of us, as soon as we agree we move forward.

[21:18:57] LockBitSupp: Where do you see the injustice? What injustice?

By the way, what to say about Access1, how did we hack them? I need some information, can you disclose it or is it better not to? If it’s better not to, then we need to come up with something to tell them so it looks realistic.

[21:21:15] aa: The injustice is not giving me my percentage for the work on Access1.

[21:22:14] LockBitSupp: I added you to another Tox, we didn’t discuss a percentage with you, if I had promised you a certain percentage and then didn’t give it, that would have been injustice.

After that, we switched to another contact with LockBit and argued for a long time without coming to any conclusion. I think there is no need to send it here, I sent it to the admin, there LockBit just repeats the same thing and even sends me to write an arbitration.

Monitoring Dark Web Forums with Flare

The Flare Threat Exposure Management (TEM) solution empowers organizations to proactively detect, prioritize, and mitigate the types of exposures commonly exploited by threat actors. Our platform automatically scans the clear & dark web and illicit Telegram channels 24/7 to discover unknown events, prioritize risks, and deliver actionable intelligence you can use instantly to improve security.
Flare integrates into your security program in 30 minutes and often replaces several SaaS and open source tools.  Learn more by signing up for our free trial.

The post LockBit’s Conversation on XSS Forum with an Initial Access Broker appeared first on Flare | Cyber Threat Intel | Digital Risk Protection.

]]>
Modern Cyber Warfare: Crowdsourced DDoS Attacks https://flare.io/learn/resources/blog/modern-cyber-warfare-crowdsourced-ddos-attacks/ Wed, 14 Feb 2024 16:22:53 +0000 http://flare.io/?p=14846 Over the past few years, politically motivated threat actors have increasingly gone online to find allies for their causes. While ten years ago most hactivism like this was anonymous, modern actors favoring certain political elements or governments leverage a broader ecosystem. Since Distributed Denial of Service (DDoS) attacks require little technical skill, they offer a […]

The post Modern Cyber Warfare: Crowdsourced DDoS Attacks appeared first on Flare | Cyber Threat Intel | Digital Risk Protection.

]]>
Gradient blue background. There is a light orange oval with the white text "BLOG" inside of it. Below it there's white text: "Modern Cyber Warfare: Crowdsourced DDoS Attacks." There is white text underneath that which says "Learn More" with a light orange arrow pointing down.

Over the past few years, politically motivated threat actors have increasingly gone online to find allies for their causes. While ten years ago most hactivism like this was anonymous, modern actors favoring certain political elements or governments leverage a broader ecosystem. Since Distributed Denial of Service (DDoS) attacks require little technical skill, they offer a low barrier to entry for people who want to help a cause despite being located outside of the impacted geographics region. 

As the geopolitical landscape continues to evolve, understanding how groups crowdsource DDoS attacks to enhance impact gives organizations a way to protect themselves more effectively. 

To learn more, check out our full report Crowdsourced DDoS Attacks Amid Geopolitical Events or keep reading for the highlights.

What is a Distributed Denial of Service (DDoS) attack?

In a DDoS attack, threat actors flood a target server with excessive internet traffic. In response, the server is unable to send responses, meaning that the application or network no longer works as intended. 

Although these attacks are neither sophisticated nor new, they have a greater impact on businesses and customers in a digitally transformed world. Today, a DDoS attack can take down everything from patient and physician portals to government services. Increasingly, governments recognize the impact that these attacks have, as evidenced by the Latvian government designating the “Killnet” group a terrorist organization.

Some recent examples that show the impact DDoS attack can have on critical services include:

  • 5000 Kenyan government services being offline for a week, including passport renewal and train booking systems
  • Canada’s Border Services Agency experiencing physical delays at checkpoint
  • Microsoft Outlook and Azure going offline in June 2023

What it Means to “Crowdsource a DDoS”

Hacktivist groups use dark web forums and public Telegram channels to find people sympathetic to their causes the same way average citizens use a platform like GoFundMe. By making their needs public, hacktivists can get other people to share their attack tools, enabling them to expand an attack’s scale by bringing in more users. With more devices sending requests to a target IP, server, or website, the DDoS attack will be more successful. 

By sharing targets and their respective port numbers, hacktivist groups can orchestrate significant attacks against prominent domains because the DDoS tools have a lower barrier for entry for people with less technology experience. While infecting enough devices to create a botnet requires resources to develop a malware, crowdsourcing eliminates that cost. With a few volunteers who share the same political ideology, a group and share an attack tool and engage in loose coordination across a few thousand volunteers, enabling them to deploy a large-scale DDoS attack. 

The rise of Telegram eliminates the need to have specialized skills for accessing the dark web. Hacktivist groups create Telegram channels that provide like-minded individuals an easy way to join them. These channels typically share the attacks’ outcomes with a live stream of screenshots from showing:

  • Website unavailability 
  • 502 errors
  • Bad gateways
  • 429 errors

While creating a dark web forum is time consuming and accessing one requires unique skills, Telegram offers the following benefits:

  • Instant messaging capabilities, including emojis 
  • Easy creation and deletion of channels
  • Ability to click “like” or “share” for easy image dissemination
  • Ineffective moderation allowing groups to stay online without anyone detecting or erasing the channels or accounts

We’ve identified three categories of victims in our research:

  • Government ministries: high level prominent website representing official governments and bodies
  • Innocent bystanders: organizations related to the country but not involved in the conflict, like hospitals, schools, retail organizations, banks
  • Sympathetic geographic regions: targeting companies after their home country announces providing aid to one member of the conflict

Crowdsourcing DDoS in the Real World

The tool creators use open source software and make the tools publicly available, giving researchers insights into how the technology’s work. Additionally, the open source nature makes it easier for threat actors to copy/paste from known working models so they can more rapidly deploy their own models. 

Over the last few years, some hacktivist groups have begun commodifying and monetizing their activities to expand their reach beyond people aligned to their political philosophies and attract people who want fast money. 

IT Army of Ukraine

The first explosion of crowdsourced DDoS attacks began with Russia’s invasion of the Ukraine in early 2022. Two days after the initial invasion, the IT Army of Ukraine, a volunteer-based collective, sprang into action and found support from the country’s official government with ministers of technology putting out a tweet that invited people to join the Telegram channel. Targeting prominent Russian and Belarusian digital assets, the group created several tools intended to cripple aggressor economies, including:

  • MHDDoS: “user-friendly” interface that automatically downloads and selects working proxies rather than requiring VPN
  • DB1000N (“Death by 1000 Needles”): Go-based tool 
  • Distress: Rust-based tool 
  • ADSS (Automatic DDoS Server Starter): shell script for Linux that automates self-updating, determining operating system version, installing DDoD tools and firewall, and setting to automatically start during Linux boot
  • UKITA (Ukraine IT Army Installer): all-in-one suite for Windows
  • UAshield: DDoS tool with a custom leaderboard to incentivize volunteer participation

The IT Army of Ukraine also creates “leaderboards” that appeal to users’ competitive nature.

NoName057(16)

Launched in March 2022, this pro-Russian group provides a custom multi-platform tool named “DDoSia” for simplified attack crowdsourcing that targets American and European entities, like: 

  • Government websites
  • Banks
  • Healthcare organizations
  • Schools
  • Municipal governments

NoName057(16) built on the leaderboard model to include monetary compensation using cryptocurrency wallets attached to the user’s Telegram address so that they can receive weekly payment tied to their proportional impact. 

Cyber Army of Palestine 

Launched on October 14, 2023, the Cyber Army of Palestine engages primarily in anti-Israel DDoS campaigns using a recycled version of the IT Army of Ukraine’s UAShield tool. Politically aligned with Hamas, the group’s logo and infographics use “Tufan al-Aqsa” which translates to Al Aqsa Flood, the nickname used for the October 7 attack on Israel. 

The Telegram channel has engaged administrators and volunteers answering questions and sharing political imagery. Its tool dynamically pulls targets at coordinated attack times, so all users need to do is launch the tool and keep it running in the background. The group administrators push the targets to the tool so the attack commences automatically. 

The group uses a Hamas-themed rank system that incentivizes participation by linking successful DDoS contributions connected to HTTP GET requests sent to the ranks of key Hamaz figures. The scale ranks users from 0 to 24, with levels that include:

  • Rank 12: Yahya Ayyash, bombmaker assassinated in 1996
  • Rank 17: Mahmoud al-Mabhouh, military commander assassinated in Dubai in 2010
  • Rank 23: Sheikh Ahmed Ismail Hassan Yassin, Hamas founder and spiritual leader assassinated in a 2004 airstrike
  • Rank 24: Izz ad-Din al-Qassam, nationalist and Islamic militant leader from 1930s after whom Hamas named its militant wing

The Cyber Army of Palestine is the first hacktivist group that actively pairs its DDoS attack capabilities with a specific geopolitical group. 

Mitigations

To protect themselves, organizations need a defense-in-depth approach that includes technology and information. 

Content Delivery Network (CDN)

A CDN can distribute incoming traffic to dilute an attack’s impact. By concealing the server’s real IP address, the CDN makes executing a direct Layer 4 attack more difficult. 

Firewalls

Organizations can choose various options in their CDNs and firewalls to mitigate risk, including:

  • Set rate limiting to send one request per minute
  • Use IP scoring to see connections from VPNs
  • Use geoblocking to mitigate risks of inbound traffic, especially for organizations that focus on their local communities, like hospitals or public school districts

Threat Intelligence

Proactive online forum and threat actors communications monitoring provides insights about potential attacks targeting the organization. A threat intelligence tool can:

  • Provide automated alerts when threat actors mention the company’s domain on the dark web or in Telegram channels
  • Identify when hacktivists mention a company’s IP addresses or name
  • Give advanced warning since crowdsourced attacks discuss a specific future time

With a threat intelligence platform, companies can prepare for and mitigate risks of the high volumes of HTTP traffic that DDoS attacks generate. 

How Flare Can Help

The Flare Threat Exposure Management (TEM) solution empowers organizations to proactively detect, prioritize, and mitigate the types of exposures commonly exploited by threat actors. Our platform automatically scans the clear & dark web and illicit Telegram channels 24/7 to discover unknown events, prioritize risks, and deliver actionable intelligence you can use instantly to improve security.

Flare integrates into your security program in 30 minutes and often replaces several SaaS and open source tools. 

Learn more by signing up for our free trial.

The post Modern Cyber Warfare: Crowdsourced DDoS Attacks appeared first on Flare | Cyber Threat Intel | Digital Risk Protection.

]]>
Initial Access Broker Landscape in NATO Member States on Exploit Forum https://flare.io/learn/resources/blog/initial-access-broker-landscape-in-nato-member-states-on-exploit-forum/ Wed, 14 Feb 2024 16:19:23 +0000 http://flare.io/?p=14844 Initial access brokers (IABs) gain unauthorized access to the system then sell this access to other malicious actors. Based on a large sample of IAB posts on the Russian-language hacking forum Exploit.in (Exploit), IABs increasingly target entities within NATO member states, with research revealing recent activity in 21 of 31 countries. Additionally, access to organizations […]

The post Initial Access Broker Landscape in NATO Member States on Exploit Forum appeared first on Flare | Cyber Threat Intel | Digital Risk Protection.

]]>
Gradient blue background. There is a light orange oval with the white text "BLOG" inside of it. Below it there's white text: "Initial Access Broker Landscape in NATO Member States on Exploit Forum." There is white text underneath that which says "Learn More" with a light orange arrow pointing down.

Initial access brokers (IABs) gain unauthorized access to the system then sell this access to other malicious actors. Based on a large sample of IAB posts on the Russian-language hacking forum Exploit.in (Exploit), IABs increasingly target entities within NATO member states, with research revealing recent activity in 21 of 31 countries. Additionally, access to organizations within industries classified as “critical infrastructure” commanding higher prices. Based on the basic concept of supply-demand pricing models, these postings indicate that threat actors may be targeting these industries, especially given the clear trend around cyberattacks targeting the U.S. defense sector. 

As organizations seek to mitigate their risks, understanding cybercriminal networks and monitoring them becomes increasingly important. 

To learn more, check out the full report, Initial Access Broker Landscape in NATO Member States on Exploit Forum, or keep on reading for the highlights.

Exploit: Insight into a Cybercrime IAB Forum

Understanding how attacks work means understanding how the cybercrime world functions. With visibility into cybercriminal forums, organizations can better understand the threats they face and implement appropriate proactive security controls more effectively.

The typical IAB post includes the following information:

  • Access Type: Usually RDP or VPN.
  • Activity: Victim company’s industry.
  • Revenue: Often sourced from data providers and services such as ZoomInfo.
  • Level / Rights: Level of privileges obtained.
  • Host / Network: Details about the victim’s network and security systems.
  • Start, Step, and Blitz: Auction prices detailing the starting, bid increments, and ‘buy it now’ prices, respectively.

A small sample of recent IAB sales from 2023 and 2024 involving entities in 21 of 31 NATO countries provide insight into the various industries and access offered. A few highlights include:

  • A Belgian company in the Commercial and Residential Construction industry providing access that allows users to explore the network, including backup folders, with the action starting at $500, stepping at $50, and blitzing at $600
  • A Canadian company in the Legal industry providing all user hashes offering potential for extensive unauthorized access within the firm’s network with the auction starting at $300, stepping at $100, and blitzing at $1000
  • An Italian company in the Energy, Utilities, & Waste industry providing screenshots showing workstations and folders on the network with the auction starting at $3000, stepping at $1000, and blitzing at $6000
  • A Polish company in the Construction Materials and Sanitary Equipment industry providing user domain rights and an escrow services for added security with auction starting at $700, stepping at $100, and blitzing at $1500
  • A US company in the Telecommunications industry providing enterprise admin access within a domain controller starting at $300, stepping at $550, and blitzing at $6000

Across the sales, listings offer insight into different security tools that the buyers can either compromise or evade, including:

  • Kaspersky Lab antivirus
  • Pulse Secure VPN
  • Symantec antivirus
  • ESET antivirus
  • Cortex XDR

The Exploit Forum: A Deep Dive

Established in the mid-2000s, Exploit is a well-known Russian-language hacking forum that beginner and experienced cybercriminals use for exchanging information and services. Historically, the forum serves as a marketplace for various illicit digital goods, including:

  • botnets 
  • unauthorized system access 
  • stolen credit card details 
  • ransomware 
  • phishing kits

IABs are typically active in the “Commerce” section, selling access and making custom requests for access to specific countries or regions. Recognizing that security researchers and law enforcement may be monitoring the forum, sellers often withhold location and company details. 

The Why and What

438 IAB listings collected from Exploit between August 2022 and September 2023 were significantly similar to those posted on other hacking forums as cybercriminals often cross-post their listing to increase the likelihood of selling their goods. Since Exploit has an active user base, it offers robust data for a meaningful use case. 

The research focused on organizations that qualify as critical infrastructure based on the Cybersecurity & Infrastructure Security Agency (CISA) definition. The analyzed data included:

  • post date, 
  • actor name, 
  • victim revenue, 
  • industry, 
  • auction prices, 
  • access type, 
  • level of access

By examining IAB posts and prominent threat actors, the research aimed to answer the question: Are attackers disproportionately targeting NATO countries’ critical infrastructure?

Key Findings

Although approximately 15% of all listings mentioned organizations within critical infrastructure sectors, the pricing models show a trend that indicates targeted cyber attacks against them. 

Bar graph with title "NATO Country IAB Blitz Pricing" that compares Critical Infrastructure which has the bar going to $6,000 and the Non-Critical Infrastructure bar going up to $3,000.
Average blitz pricing of critical versus non-critical infrastructure in NATO countries.

The disproportionately higher “buy now” prices appear to mean cybercriminals can request more money for critical infrastructure data, indicating that the demand is higher. 

An analysis of individual threat actors focusing on critical infrastructure found 108 unique actors with higher levels of activity. Of these posts, two threat actors appeared to specifically target critical infrastructure:

  • Roblette: 29% of their posts targeted critical infrastructure, with 57% of them focused on US companies and 94% of them focused on NATO countries
  • Sandocan: 25% of their posts targeted critical infrastructure, with with 53% of them focused on US companies and 71% of them focused on NATO countries while including NATO-allied countries like Australia increased that percentage to 93%

The U.S. Defense Sector

As several recent high-profile attacks targeted the U.S. defense sector, the research aimed to answer two questions:

  • Are financially motivated threat actors targeting these organizations because they can command higher prices due to the role the sectors play in national security?
  • Are these incidents a byproduct of widespread phishing and social engineering campaigns?

Across hundreds of Exploit posts, listings, and discussions, IABs and forum users regularly mentioned specifically targeting the defense sector and highlighted the value of accessing companies that have government connections. Some notable finding include:

  • U.S. defense contractor access commanding an blitz price of $5750 compared to $1489 across other sectors
  • Offers that included privileged access to U.S. IT management companies with federal contracts
  • Frequent and explicitly promotion of access to U.S. government digital assets

Risk Mitigation Strategies

While IABs currently appear to target critical infrastructure across NATO member states, no organization is immune to these pervasive threats. To mitigate risk, organizations should:

  • Actively Monitor Forums that Enable IABs: While anonymized posts make identifying a target victim difficult, organizations can gain insights by reviewing post  information like geography, revenue, industry, and especially technical details like number of hosts, sample usernames, and antivirus solutions. With early detection, organizations can proactively address existing breaches before threat actors leverage them as part of ransomware attacks or other malicious activities. 
  • Actively Monitor Stealer Logs: IABs typically gain initial access using leaked credentials and cookies from stealer logs which can contain information like RDP,  VPN, and local network IP credentials. By detecting leaks in the dark web and illicit Telegram channels, organizations can act upon these leaked credentials and infected devices before IABs do.
  • General Security: Organizations should continuously assess and update their security measures by implementing and maintaining vulnerability scanning, patch management processes, multi-factor authentication, and employee awareness training.

Monitoring Dark Web Forums with Flare

The Flare Threat Exposure Management (TEM) solution empowers organizations to proactively detect, prioritize, and mitigate the types of exposures commonly exploited by threat actors. Our platform automatically scans the clear & dark web and illicit Telegram channels 24/7 to discover unknown events, prioritize risks, and deliver actionable intelligence you can use instantly to improve security.

Flare integrates into your security program in 30 minutes and often replaces several SaaS and open source tools.  Learn more by signing up for our free trial.

The post Initial Access Broker Landscape in NATO Member States on Exploit Forum appeared first on Flare | Cyber Threat Intel | Digital Risk Protection.

]]>
Threat Intelligence Sharing: 5 Best Practices https://flare.io/learn/resources/blog/threat-intelligence-sharing/ Fri, 04 Aug 2023 17:24:16 +0000 http://flare.io/?p=8921 To combat sophisticated and relentless threats effectively, organizations must adopt a collaborative approach that goes beyond their individual security measures. Threat intelligence sharing has emerged as a powerful strategy to enhance cybersecurity defenses by leveraging the collective knowledge and insights of the cybersecurity community.  By exchanging information about emerging threats, attack techniques, and indicators of […]

The post Threat Intelligence Sharing: 5 Best Practices appeared first on Flare | Cyber Threat Intel | Digital Risk Protection.

]]>
Gradient blue background. There is a light orange oval with the white text "BLOG" inside of it. Below it there's white text: "Threat Intelligence Sharing: 5 Best Practices ." There is white text underneath that which says "Learn More" with a light orange arrow pointing down.

To combat sophisticated and relentless threats effectively, organizations must adopt a collaborative approach that goes beyond their individual security measures. Threat intelligence sharing has emerged as a powerful strategy to enhance cybersecurity defenses by leveraging the collective knowledge and insights of the cybersecurity community. 

By exchanging information about emerging threats, attack techniques, and indicators of compromise (IOCs), organizations can gain a broader perspective and stay ahead of evolving cyber threats. In this article, we will explore five best practices for effective threat intelligence sharing. We will discuss the benefits of collaboration, the importance of trusted relationships, the need for standardized formats and protocols, the role of automation and sharing platforms, and the significance of ongoing evaluation and improvement. By implementing these best practices, organizations can strengthen their cybersecurity posture and create a united front against cyber threats.

The Power of Collaboration: Leveraging the Collective Knowledge

In the ever-evolving landscape of cybersecurity threats, organizations face a common adversary: cybercriminals. To effectively combat these threats, it is crucial for organizations to recognize the power of collaboration and leverage the collective knowledge of the cybersecurity community. Threat intelligence sharing enables organizations to pool their resources, insights, and experiences to build a stronger defense against cyber threats. By collaborating with trusted peers, industry partners, and information sharing communities, organizations can enhance their threat intelligence capabilities and stay one step ahead of the attackers.

Access to Diverse Perspectives and Expertise

Collaboration in threat intelligence sharing brings together organizations from various industries, sectors, and regions. This diversity of perspectives and expertise enriches the collective knowledge pool and enables a more comprehensive understanding of the threat landscape. 

By engaging with peers who have different experiences and insights, organizations can gain fresh perspectives on emerging threats, attack techniques, and defensive strategies. This collective knowledge allows organizations to identify blind spots, anticipate threats, and develop more effective cybersecurity measures.

Timely and Actionable Intelligence

Collaborative threat intelligence sharing facilitates the exchange of timely and actionable intelligence. When organizations share threat intelligence, they can provide real-time updates on emerging threats, indicators of compromise (IOCs), and malicious activities. This shared intelligence enables participating organizations to proactively detect and respond to threats within their own environments. By receiving timely alerts and intelligence from trusted sources, organizations can take swift action to protect their systems, block malicious activities, and strengthen their defenses.

Faster Detection and Response

Collaboration in threat intelligence sharing enhances the speed and effectiveness of threat detection and response. When organizations share threat intelligence, they can leverage the collective knowledge and insights to identify patterns, trends, and indicators of compromise across different networks. This collaborative approach enables faster detection of potential threats and the sharing of incident response strategies and best practices. By learning from each other’s experiences and leveraging shared intelligence, organizations can respond more effectively to attacks, minimize the impact, and recover quickly.

Strengthened Situational Awareness

Collaborative threat intelligence sharing improves organizations’ situational awareness by providing a broader view of the threat landscape. Instead of relying solely on internal sources, organizations can tap into the collective intelligence gathered by trusted peers and industry partners. This expanded situational awareness helps organizations identify emerging threats, understand the tactics and techniques employed by threat actors, and assess the potential impact on their own systems. By staying informed about the latest threats and trends, organizations can adjust their security strategies and prioritize their defenses accordingly.

Mutual Support and Trust Building

Collaboration in threat intelligence sharing fosters mutual support and trust among participating organizations. Organizations can build relationships based on shared goals and mutual trust by actively participating in:

  • Information sharing communities
  • Industry-specific forums
  • Trusted networks

This trust facilitates open and transparent sharing of threat intelligence, including sensitive information and incident details. Through mutual support and trust building, organizations can create a united front against cyber threats, collectively raising the bar for cybersecurity defenses across industries.

To make the most of collaboration in threat intelligence sharing, organizations should adhere to best practices. These include establishing clear guidelines and policies for information sharing, ensuring the confidentiality and privacy of shared intelligence, and actively contributing to the community by sharing their own insights and experiences. 

Additionally, organizations should leverage automated threat intelligence sharing platforms and standardized formats and protocols to streamline the sharing process and enhance interoperability. By embracing collaboration and actively participating in threat intelligence sharing initiatives, organizations can strengthen their cybersecurity defenses and contribute to the collective effort of creating a safer digital environment.

Building Trusted Relationships: Establishing Effective Information Sharing Networks

In the realm of cybersecurity, establishing trusted relationships and effective information sharing networks is paramount to successful threat intelligence sharing. These networks provide a platform for organizations to collaborate, exchange insights, and collectively combat cyber threats. However, building such networks requires careful consideration of trust, transparency, and mutual benefit. 

Establish Clear Objectives and Guidelines

To build trusted relationships and establish effective information sharing networks, it is crucial to define clear objectives and guidelines from the outset. Organizations should have a shared understanding of the purpose and goals of the network. This includes outlining the: 

  • Types of threat intelligence to be shared
  • Expected level of participation
  • Confidentiality and privacy considerations

Clear guidelines ensure that all participants are aligned and can contribute meaningfully to the network.

Foster Mutual Trust and Confidentiality

Trust is the foundation of any successful information sharing network. Organizations must foster an environment of trust by upholding strict confidentiality and privacy practices. Confidentiality agreements and data sharing protocols should be in place to protect the sensitive information shared within the network. Transparency about how the shared data will be handled, stored, and protected is crucial for building trust among participants. Establishing trust takes time and effort, but it is essential for maintaining the long-term viability and effectiveness of the information sharing network.

Promote Active Participation and Collaboration

Active participation and collaboration are vital for the success of information sharing networks. Encourage participants to contribute their expertise, share relevant threat intelligence, and actively engage in discussions. Collaboration can take various forms, such as: 

  • Sharing incident reports
  • Contributing to threat analysis
  • Providing insights on emerging threats

By fostering an environment that encourages active participation, organizations can harness the collective knowledge and experiences of network members, leading to more robust and valuable threat intelligence.

Standardize Data Formats and Sharing Protocols

To facilitate seamless information sharing, it is important to standardize data formats and sharing protocols within the network. Standardization ensures that shared threat intelligence is compatible across different systems and can be easily ingested and analyzed by participating organizations. 

Adopting widely accepted data formats, such as Structured Threat Information eXpression (STIX) and Trusted Automated eXchange of Indicator Information (TAXII), promotes interoperability and simplifies the sharing process. Standardized data formats and sharing protocols streamline information exchange, allowing organizations to focus on analyzing and acting upon the shared intelligence.

Encourage Continuous Learning and Improvement

Information sharing networks should be viewed as dynamic and evolving entities. Encourage a culture of continuous learning and improvement by conducting regular assessments and seeking feedback from network participants. Evaluate the effectiveness of the network in achieving its objectives and identify areas for improvement. Actively seek input from participants to understand their needs and expectations, and incorporate their feedback into the network’s development. By continuously refining and adapting the information sharing network, organizations can ensure its relevance and value over time.

By following these best practices, organizations can establish trusted relationships and effective information sharing networks that drive the exchange of high-quality threat intelligence. These networks enable participants to stay ahead of emerging threats, enhance their cybersecurity defenses, and collectively contribute to the broader goal of a safer digital environment. 

Standardizing Formats and Protocols: Enhancing Interoperability and Efficiency

In the realm of threat intelligence sharing, standardizing formats and protocols is crucial for achieving interoperability and maximizing efficiency. By adopting common data formats and sharing protocols, organizations can streamline the exchange of threat intelligence and overcome barriers that hinder effective collaboration. 

Adopting Common Data Formats

One of the key challenges in threat intelligence sharing is the diverse range of data formats used by different organizations. This can lead to compatibility issues, making it difficult to ingest and analyze shared threat intelligence. 

By adopting common data formats such as Structured Threat Information eXpression (STIX) and Trusted Automated eXchange of Indicator Information (TAXII), organizations can ensure compatibility and seamless integration of shared intelligence into their existing systems. These standardized formats provide a common language for describing threat intelligence, allowing for easier interpretation and analysis.

Implementing Data Mapping and Transformation

In situations where organizations use different internal data formats, implementing data mapping and transformation processes becomes essential. Data mapping involves establishing a mapping schema that defines how data from one format can be translated into another format. 

By employing automated data mapping and transformation tools, organizations can convert threat intelligence data from one format to another, ensuring compatibility and consistency across different systems. This enables smooth data exchange and eliminates the need for manual data manipulation, saving time and effort.

Utilizing Trusted Automated eXchange of Indicator Information (TAXII) Protocol

The Trusted Automated eXchange of Indicator Information (TAXII) protocol is a widely adopted industry standard for exchanging threat intelligence. TAXII provides a secure and structured mechanism for sharing threat intelligence data in a standardized format. By leveraging TAXII, organizations can establish direct connections with trusted partners, automate the exchange of threat intelligence, and ensure the timely dissemination of critical information. The protocol supports various transport mechanisms, including HTTPS and email, enabling flexibility in information sharing.

Incorporating Structured Threat Information eXpression (STIX)

Structured Threat Information eXpression (STIX) is a language designed to represent and share cyber threat intelligence. STIX allows for the structured representation of threat information, including indicators, threat actors, campaigns, and vulnerabilities. 

By adopting STIX, organizations can create a common framework for describing and exchanging threat intelligence, enabling better collaboration and analysis. STIX supports the inclusion of additional contextual information, enhancing the richness and relevance of shared threat intelligence.

Participating in Information Sharing Communities

To further enhance interoperability and standardization, organizations should actively participate in information sharing communities and industry initiatives. These communities facilitate the exchange of best practices, promote the adoption of common formats and protocols, and encourage collaboration among organizations. 

Examples of such communities include sector-specific Information Sharing and Analysis Centers (ISACs), threat intelligence sharing platforms, and collaborative initiatives within the cybersecurity industry. By engaging with these communities, organizations can stay informed about emerging standards and practices, contribute to the development of industry guidelines, and foster a culture of collaboration.

Standardizing formats and protocols in threat intelligence sharing not only enhances interoperability but also improves efficiency and reduces friction in the exchange process. It allows organizations to focus on analyzing and acting upon the shared intelligence, rather than dealing with compatibility issues or manual data manipulation. 

By adopting common data formats, leveraging standardized protocols like TAXII, incorporating STIX, and participating in information sharing communities, organizations can unlock the full potential of threat intelligence sharing and build stronger collective defenses against cyber threats. 

Automation and Sharing Platforms: Streamlining Threat Intelligence Sharing Processes

In the realm of threat intelligence sharing, automation and sharing platforms play a pivotal role in streamlining and optimizing the sharing processes. These platforms leverage technology and advanced capabilities to facilitate the secure and efficient exchange of threat intelligence among organizations. In this section, we will explore the benefits of automation and sharing platforms and discuss best practices for leveraging them to enhance threat intelligence sharing.

Advantages of Automation in Threat Intelligence Sharing

Automation brings numerous advantages to the process of sharing threat intelligence. By automating the collection, analysis, and dissemination of threat intelligence, organizations can save valuable time and resources, enabling them to respond more swiftly to emerging threats. 

Automated processes can ingest threat data from various sources, perform data enrichment and normalization, and disseminate relevant information to trusted partners in real-time. This allows for more timely threat detection and response, reducing the window of opportunity for attackers.

Implementing Threat Intelligence Sharing Platforms

Threat intelligence sharing platforms are dedicated tools or platforms designed to facilitate the exchange of threat intelligence among organizations. These platforms provide a secure and centralized environment where organizations can share and receive threat intelligence with trusted partners. 

They often support standardized formats and protocols, enabling seamless integration with existing systems. By leveraging threat intelligence sharing platforms, organizations can simplify the sharing process, ensure secure data transmission, and gain access to a wider network of trusted collaborators.

Automated Ingestion and Processing of Threat Data

Automation plays a crucial role in the ingestion and processing of threat data. Threat intelligence sharing platforms can automatically ingest data from various sources, including internal feeds, external threat intelligence providers, open-source intelligence, and industry-specific feeds. This automation eliminates manual data entry, reduces the risk of errors, and ensures a more comprehensive and up-to-date view of the threat landscape. Automated processing capabilities can also enrich the data with additional context, such as threat actor profiles, related campaigns, or indicators of compromise (IOCs), enhancing the value and relevance of shared intelligence.

Real-Time Threat Intelligence Exchange

Sharing platforms equipped with real-time capabilities enable organizations to exchange threat intelligence in a more dynamic and responsive manner. Real-time exchange allows for near-instantaneous sharing of critical threat information, enabling organizations to take proactive measures against emerging threats. 

This is particularly beneficial in situations where timely response is crucial, such as during ongoing cyberattacks or the discovery of zero-day vulnerabilities. Real-time threat intelligence exchange enhances the collective defense capability by empowering organizations to swiftly respond to new threats and adapt their security measures accordingly.

Secure Collaboration and Access Controls

Effective threat intelligence sharing relies on trust and secure collaboration. Sharing platforms provide the necessary infrastructure to establish secure channels for information exchange and enforce access controls. These platforms often incorporate advanced security features such as:

  • Encryption
  • Secure authentication mechanisms
  • Granular access permissions. 

By implementing strong access controls, organizations can ensure that sensitive threat intelligence is only shared with authorized parties, maintaining confidentiality and preventing potential misuse of the data.

Incorporating automation and leveraging sharing platforms streamlines the threat intelligence sharing process, enhancing its effectiveness and efficiency. By automating data ingestion, processing, and dissemination, organizations can accelerate threat detection and response, while sharing platforms provide a secure and collaborative environment for exchanging threat intelligence. 

These practices enable organizations to build stronger collective defenses, stay ahead of emerging threats, and foster a collaborative cybersecurity ecosystem. 

Threat Intelligence with Flare

Threat intelligence sharing is a powerful strategy that allows organizations to leverage the collective knowledge and insights of the cybersecurity community. By collaborating with trusted peers, industry partners, and information sharing networks, organizations can enhance their threat intelligence capabilities, detect and respond to threats more effectively, and strengthen their cybersecurity defenses. 

Flare monitors the clear & dark web as well as illicit Telegram channels to provide security teams with actionable threat intelligence. Sign up for a free trial to learn more. 

The post Threat Intelligence Sharing: 5 Best Practices appeared first on Flare | Cyber Threat Intel | Digital Risk Protection.

]]>
Actionable Threat Intelligence: Generating Risk Reduction from CTI https://flare.io/learn/resources/blog/actionable-threat-intelligence/ Fri, 04 Aug 2023 17:03:09 +0000 http://flare.io/?p=8918 Organizations need to go beyond traditional security measures to effectively protect their valuable assets and maintain a strong security posture. They must harness the power of actionable threat intelligence, which provides timely and relevant insights that can drive proactive risk reduction strategies.  Actionable threat intelligence empowers organizations to not only understand the threat landscape but […]

The post Actionable Threat Intelligence: Generating Risk Reduction from CTI appeared first on Flare | Cyber Threat Intel | Digital Risk Protection.

]]>
Gradient blue background. There is a light orange oval with the white text "BLOG" inside of it. Below it there's white text: "Actionable Threat Intelligence: Generating Risk Reduction from CTI." There is white text underneath that which says "Learn More" with a light orange arrow pointing down.

Organizations need to go beyond traditional security measures to effectively protect their valuable assets and maintain a strong security posture. They must harness the power of actionable threat intelligence, which provides timely and relevant insights that can drive proactive risk reduction strategies. 

Actionable threat intelligence empowers organizations to not only understand the threat landscape but also take informed and targeted actions to mitigate risks and defend against potential cyber attacks. 

Actionable Threat Intelligence: The Value

Organizations face an increasing number of sophisticated and persistent threats. To effectively mitigate these risks and protect their digital assets, organizations need more than just raw threat data—they need actionable threat intelligence. Actionable threat intelligence refers to the insights and information derived from cyber threat intelligence (CTI) that can be directly applied to enhance security measures and reduce risk.

What Does Actionable Threat Intelligence Provide?

Actionable threat intelligence provides organizations with specific, relevant, and timely information about: 

Unlike generic threat data, actionable threat intelligence goes beyond mere awareness and equips organizations with the knowledge needed to proactively defend against threats. By leveraging actionable threat intelligence, organizations can make informed decisions, prioritize resources, and implement effective security controls to reduce their overall risk exposure.

The value of actionable threat intelligence lies in its ability to enable organizations to be proactive rather than reactive in their security posture. Instead of waiting for an attack to occur, organizations can leverage actionable threat intelligence to identify potential vulnerabilities, anticipate attack patterns, and implement proactive security measures. 

This proactive approach not only reduces the likelihood of successful attacks but also minimizes the impact of potential breaches, allowing organizations to effectively manage risks and protect their critical assets.

Moreover, actionable threat intelligence provides organizations with a deeper understanding of the threat landscape and the motivations, tactics, and techniques employed by threat actors. This contextual understanding allows organizations to prioritize their security efforts, allocate resources effectively, and tailor their defensive strategies to the specific threats they face. By focusing on the most relevant and imminent threats, organizations can optimize their risk mitigation efforts and minimize the strain on their resources.

Actionable Threat Intelligence and Cross-Organizational Decision-Making

Actionable threat intelligence also facilitates informed decision-making at various levels within an organization. Security teams can use this intelligence to fine-tune their incident response plans, prioritize vulnerability patching, and enhance their security controls. Business leaders can leverage actionable threat intelligence to assess the potential impact of cyber threats on their operations, make strategic investments in security measures, and demonstrate due diligence to stakeholders.

Actionable threat intelligence is a valuable asset for organizations seeking to strengthen their cybersecurity defenses and reduce risk. By providing specific and relevant insights into emerging threats, actionable threat intelligence empowers organizations to proactively identify and mitigate potential risks. This proactive approach allows organizations to stay ahead of attackers, optimize resource allocation, and make informed decisions that effectively protect their digital assets. 

Components of an Effective CTI Program

To generate actionable threat intelligence and effectively reduce risks, organizations need to establish a robust cyber threat intelligence (CTI) program. An effective CTI program comprises several key components that work together to collect, analyze, and disseminate valuable threat intelligence. Let’s explore these components in detail:

Comprehensive Data Collection 

The foundation of any CTI program is the collection of comprehensive and diverse data from multiple sources. This includes external threat intelligence feeds, internal logs, open source intelligence, dark web monitoring, and information sharing communities. By gathering a wide range of data, organizations can gain a holistic view of the threat landscape and identify emerging threats.

Threat Analysis and Contextualization

Once the data is collected, it needs to be analyzed and contextualized to derive meaningful insights. This involves conducting in-depth analysis, using threat intelligence platforms, machine learning algorithms, and human expertise to identify patterns, indicators of compromise (IOCs), and potential attack vectors. Contextualization helps understand the motivations, techniques, and capabilities of threat actors, enabling organizations to prioritize their defenses.

Intelligence Reporting and Sharing

The actionable threat intelligence generated through analysis should be shared effectively across the organization and with relevant stakeholders. This involves creating intelligence reports that are concise, relevant, and easy to understand. 

Reports can include IOCs, attack narratives, recommended mitigation strategies, and strategic insights. Sharing this intelligence with key decision-makers, security teams, and incident response teams ensures that everyone is informed and able to take appropriate actions.

Collaboration and Information Sharing

Collaboration with trusted partners, industry peers, and information sharing communities is a crucial component of an effective CTI program. By participating in collaborative platforms and sharing information, organizations can benefit from the collective intelligence of the cybersecurity community. 

Collaboration enhances the quality and timeliness of threat intelligence, enables the identification of shared threats, and fosters a proactive security posture.

Integration with Security Infrastructure

To maximize the value of actionable threat intelligence, it should be seamlessly integrated into an organization’s security infrastructure. This involves integrating threat intelligence feeds with security information and event management (SIEM) systems, intrusion detection and prevention systems (IDS/IPS), and other security tools. Integration allows for real-time threat detection, automated response, and improved decision-making based on the latest threat intelligence.

Continuous Monitoring and Evaluation

An effective CTI program requires continuous monitoring and evaluation to ensure its relevance and effectiveness. This includes monitoring changes in the threat landscape, tracking the performance of intelligence sources, evaluating the impact of threat intelligence on risk reduction, and seeking feedback from stakeholders. By regularly reviewing and improving the CTI program, organizations can adapt to evolving threats and optimize their intelligence-driven security strategies.

By incorporating these components into their CTI program, organizations can generate actionable threat intelligence that drives risk reduction efforts. The combination of comprehensive data collection, thorough analysis, effective reporting and sharing, collaboration, integration with security infrastructure, and continuous evaluation forms a holistic approach to leveraging CTI for proactive defense against cyber threats.

Leveraging Actionable Threat Intelligence for Risk Reduction

Actionable threat intelligence is a vital component of a proactive cybersecurity strategy. It empowers organizations to identify, mitigate, and respond to potential threats before they can cause significant harm. By leveraging actionable threat intelligence generated from their CTI program, organizations can effectively reduce risks and enhance their overall security posture. 

Let’s explore how organizations can harness the power of actionable threat intelligence to drive risk reduction efforts:

Proactive Threat Detection

Actionable threat intelligence enables organizations to proactively detect threats in their environments. By analyzing the indicators of compromise (IOCs) and patterns identified through threat intelligence, security teams can identify potential threats and vulnerabilities before they are exploited. 

This proactive approach allows organizations to take preventive measures, such as patching vulnerabilities, updating security configurations, or implementing additional security controls to mitigate the identified risks.

Timely Incident Response

With actionable threat intelligence, organizations can respond swiftly and effectively to security incidents. By integrating threat intelligence feeds into their incident response processes, organizations can automatically correlate real-time threat data with ongoing incidents. This integration helps prioritize and escalate incidents based on the severity and relevance of the threat intelligence, enabling faster response times and minimizing the impact of security breaches.

Enhanced Vulnerability Management

Actionable threat intelligence provides valuable insights into known vulnerabilities and emerging threats. By aligning threat intelligence with vulnerability management programs, organizations can prioritize patching and remediation efforts based on the risk posed by specific vulnerabilities. This targeted approach ensures that limited resources are allocated to address the most critical vulnerabilities, reducing the attack surface and strengthening the overall security posture.

Strategic Decision-Making

Actionable threat intelligence equips organizations with the knowledge to make informed and strategic decisions regarding their security investments and resource allocation. By understanding the threat landscape, organizations can identify emerging trends, anticipate potential risks, and allocate resources to areas that are most susceptible to attacks. This strategic decision-making based on actionable threat intelligence helps optimize security investments and allocate resources effectively to minimize risk exposure.

Threat Hunting and Proactive Defense

Actionable threat intelligence enables organizations to engage in proactive threat hunting activities. By leveraging threat intelligence feeds, security teams can actively search for:

  • Indicators of compromise
  • Signs of unauthorized access
  • Other suspicious activities within their environments

This proactive defense approach allows organizations to detect and respond to threats that may have bypassed traditional security controls, enhancing their ability to prevent successful attacks.

Continuous Improvement

Actionable threat intelligence plays a crucial role in a cycle of continuous improvement. By analyzing the effectiveness of threat intelligence in risk reduction efforts, organizations can refine their CTI program, update their intelligence sources, and fine-tune their analysis techniques. This ongoing evaluation and improvement ensure that organizations stay ahead of evolving threats and remain resilient in the face of new attack vectors.

By leveraging actionable threat intelligence, organizations can proactively identify, mitigate, and respond to cyber threats, resulting in significant risk reduction. The integration of threat intelligence into various security processes enables organizations to detect threats early, respond swiftly, and make informed decisions to enhance their overall security posture. 

Best Practices for Maximizing the Impact of CTI on Risk Mitigation

Implementing a robust cyber threat intelligence (CTI) program is a crucial step in enhancing an organization’s security posture. However, to maximize the impact of CTI on risk mitigation, organizations must follow best practices that ensure the effective utilization of actionable threat intelligence.

 Let’s explore seven key practices that can help organizations extract the most value from their CTI program and generate significant risk reduction:

1. Clearly Define Objectives and Requirements

Before implementing a CTI program, organizations should clearly define their objectives and requirements. This includes identifying the specific threats and risks they want to address, determining the desired outcomes, and understanding the information needs of different stakeholders. 

By having a well-defined strategy, organizations can focus their CTI efforts on areas that align with their overall risk mitigation goals.

2. Establish Comprehensive Data Collection

To generate actionable threat intelligence, organizations must establish comprehensive data collection processes. This involves collecting data from a variety of internal and external sources, such as: 

By casting a wide net and gathering diverse data, organizations can enhance their visibility into the threat landscape and identify potential risks more effectively.

3. Emphasize Contextual Analysis

Contextual analysis is essential for deriving actionable insights from threat intelligence. Organizations should invest in advanced analysis techniques and technologies that enable them to contextualize the collected data. This includes mapping threat indicators to relevant campaigns, threat actors, and attack techniques. 

By understanding the context in which threats operate, organizations can better prioritize their mitigation efforts and respond appropriately to the most critical risks.

4. Foster Collaboration and Information Sharing

Collaboration and information sharing are key elements in maximizing the impact of CTI on risk mitigation. Organizations should actively engage with trusted partners, industry peers, and information sharing communities to exchange threat intelligence and gain additional perspectives. 

Collaborative efforts allow organizations to leverage the collective knowledge and experiences of others, broaden their understanding of emerging threats, and enhance their overall threat detection and response capabilities.

5. Integrate CTI into Security Operations

To derive the most value from CTI, organizations should integrate it into their security operations. This involves incorporating actionable threat intelligence feeds into security tools, such as SIEM (Security Information and Event Management) systems, intrusion detection systems, and endpoint protection solutions. 

By integrating CTI into existing security infrastructure, organizations can automate threat detection and response processes, enabling faster and more effective risk mitigation.

6. Regularly Update and Refine CTI Processes

Threat landscapes are constantly evolving, and organizations must keep their CTI processes up to date. Regularly review and refine the CTI program to ensure its relevance and effectiveness. This includes updating intelligence sources, refining analysis techniques, and incorporating feedback from stakeholders. By continuously improving CTI processes, organizations can adapt to emerging threats and maintain an agile defense posture.

7. Foster a Culture of Continuous Learning

Maximizing the impact of CTI requires fostering a culture of continuous learning within the organization. Encourage security teams to stay updated on the latest threat trends, attend industry conferences and training programs, and engage in ongoing professional development. 

By nurturing a learning mindset, organizations can ensure that their CTI program remains cutting-edge and that security personnel are equipped with the necessary knowledge and skills to effectively leverage actionable threat intelligence.

By following these best practices, organizations can optimize the impact of their CTI program on risk mitigation. Clear objectives, comprehensive data collection, contextual analysis, collaboration, integration into security operations, regular updates, and a culture of continuous learning are all critical components of a successful CTI program. By harnessing actionable threat intelligence and implementing these practices, organizations can significantly reduce their risk exposure and enhance their overall security posture. 

Actionable Threat Intelligence with Flare

To secure their invaluable assets and strengthen their defense mechanisms, organizations must push past the boundaries of conventional security practices. They should leverage the potential of practical cyber threat intelligence, offering them vital, up-to-the-minute insights that facilitate preemptive risk management tactics. 

Flare monitors for external risks across billions of data points and thousands of sources across the clear & dark web and Telegram. Your security team can take in this vast amount of information without all the noise, to act quickly to stop threats. Start your free trial today to learn more.

The post Actionable Threat Intelligence: Generating Risk Reduction from CTI appeared first on Flare | Cyber Threat Intel | Digital Risk Protection.

]]>
Actioning Threat Intelligence Data: The Definitive Guide https://flare.io/learn/resources/blog/threat-intelligence-data/ Fri, 04 Aug 2023 14:12:28 +0000 http://flare.io/?p=8913 Threat intelligence data plays a pivotal role in strengthening any organization’s defense systems. Actionable threat intelligence is critical, and it is an important function in active defense measures. It provides immense benefits through providing context and priority. Adopting a SaaS platform for threat intelligence handling includes useful features such as automation, consolidated data sources, real-time […]

The post Actioning Threat Intelligence Data: The Definitive Guide appeared first on Flare | Cyber Threat Intel | Digital Risk Protection.

]]>
Gradient blue background. There is a light orange oval with the white text "BLOG" inside of it. Below it there's white text: "Actioning Threat Intelligence Data: The Definitive Guide." There is white text underneath that which says "Learn More" with a light orange arrow pointing down.

Threat intelligence data plays a pivotal role in strengthening any organization’s defense systems. Actionable threat intelligence is critical, and it is an important function in active defense measures. It provides immense benefits through providing context and priority. Adopting a SaaS platform for threat intelligence handling includes useful features such as automation, consolidated data sources, real-time notifications, AI functionality, and adaptability. 

By capitalizing on cyber threat intelligence data and employing a sturdy SaaS platform, organizations can bolster their cybersecurity barriers and effectively tackle the continually shifting cyber threat landscape.

Understanding the Basics: Threat Intelligence Data

What is Threat Intelligence Data?

In essence, threat intelligence data refers to the collated information about potential or current threats that could harm an organization. This information is typically gathered from various sources, providing a comprehensive understanding of the potential cyber threats landscape.

The fundamental aim of threat intelligence data is to aid organizations in making informed decisions about their cybersecurity. It involves collecting, parsing, and analyzing vast amounts of data to provide insights into potential cyber threats, threat actors, and their tactics, techniques, and procedures (TTPs).

Threat Intelligence Data and Usability 

The value of threat intelligence data lies not just in its existence but in its usability. Raw data, on its own, can be overwhelming and difficult to decipher. However, when refined and accurately interpreted, this data transforms into actionable intelligence – a precious resource that allows organizations to proactively defend against imminent threats.

Furthermore, threat intelligence data isn’t just about identifying potential risks. It’s a strategic tool that helps in prioritizing resources, enhancing security protocols, and driving effective incident response actions. Ultimately, it empowers companies to anticipate, prepare, and combat cyber threats, fortifying their digital infrastructure and safeguarding their valuable assets.

The Importance of Actionable Threat Intelligence in Today’s Digital Landscape

The digital landscape continues to morph into a complex matrix of information exchange. While this has ushered in an era of remarkable innovation and convenience, it has also brought with it new challenges – especially in terms of cybersecurity. That’s where the importance of actionable threat intelligence becomes apparent.

What Actionable Threat Intelligence Provides

Actionable threat intelligence is not just about possessing data on potential cyber threats. It’s about distilling this data into digestible insights that can be used to fortify defenses, inform strategy, and ensure resources are allocated effectively. Actionable intelligence can provide organizations with a clear understanding of the risks they face, offering the foresight needed to implement protective measures against potential attacks.

In an environment where cyber threats are rapidly evolving, staying reactive is no longer sufficient. Companies must transition from a state of constant catch-up to a position of proactive defense, and actionable threat intelligence is pivotal to this shift. It offers an opportunity to preemptively identify and counteract threats, rather than merely responding post-breach.

Moreover, actionable intelligence brings context to threat data, illuminating the who, what, when, where, why, and how of potential attacks. This clarity enables organizations to not only understand the nature of the threats they face, but also the motivations and tactics of threat actors. This level of insight is crucial for developing robust, targeted defenses that adequately protect against specific threat vectors.

In a time where the cost and frequency of cyber attacks are escalating, leveraging actionable threat intelligence data has become a critical necessity. It is no longer an optional advantage, but a vital component of any comprehensive cybersecurity strategy. 

Techniques for Turning Raw Threat Data Into Actionable Intelligence

While raw threat data provides a wealth of information, its real value comes from its transformation into actionable intelligence. The sheer volume of data available can be overwhelming, making it crucial to have a strategy for extracting the most pertinent information. 

Here are several key techniques for converting raw threat data into actionable intelligence:

Data Aggregation

The first step is to gather data from multiple sources, including open source intelligence (OSINT), social media, log files, threat feeds, and even human intelligence. This process of data aggregation allows for a broader perspective of the threat landscape, reducing the risk of blind spots in your cybersecurity framework.

Data Normalization

Once data is collected, it needs to be standardized or normalized. Normalization ensures that data from disparate sources can be easily compared and analyzed, converting it into a consistent format that can be interpreted by your threat intelligence platform.

Threat Analysis

After data normalization, the next step is threat analysis. This involves sifting through the aggregated and normalized data to identify patterns, trends, and anomalies that could signify a potential threat. Tools like AI and machine learning can be incredibly beneficial in this phase, automating the process of detecting complex patterns and speeding up threat detection.

Contextualization

Contextualization adds an extra layer of relevance to the analyzed data. By contextualizing data, organizations can understand the potential impact of a threat in relation to their specific business operations. Factors like the nature of your business, size, industry, and geographical location can all influence the severity of different threats.

Prioritization

Prioritization comes after identifying and contextualizing threats. Not all threats are created equal and understanding which ones require immediate attention is key to effective threat management. Prioritization should be based on factors such as: 

  • Potential damage
  • Likelihood of occurrence
  • Resources required for mitigation

Dissemination

The final step is the dissemination of the actionable intelligence to the relevant stakeholders in your organization. This could include IT teams, executive leadership, or other personnel responsible for implementing cybersecurity measures.

By following these steps, organizations can successfully turn raw threat data into actionable intelligence, enabling a proactive, informed approach to cybersecurity.

Leveraging Your SaaS Platform for Optimal Threat Intelligence Management

In today’s fast-paced digital world, relying on manual processes to collect, analyze, and action threat intelligence data can leave organizations vulnerable to the rapidly evolving threat landscape. A robust SaaS platform, specifically designed for threat intelligence management, can be a game-changer. Here’s how you can leverage your SaaS platform for optimal threat intelligence management:

Automation of Data Collection and Analysis

One of the major benefits of a SaaS platform is automation. By automating the collection and analysis of threat data, organizations can streamline the time-consuming process of data gathering and normalization, ensuring that they are always equipped with the latest intelligence. 

This allows your security teams to focus more on strategic tasks rather than being consumed by the tedious task of data collection and analysis.

Integration of Multiple Data Sources

A comprehensive SaaS platform can integrate data from a wide variety of sources, enabling a holistic view of the threat landscape. Whether it’s OSINT, commercial threat feeds, industry reports, or internal incident data, integrating these diverse data sources can enhance the richness and relevance of your threat intelligence.

Real-Time Threat Alerts

SaaS platforms for threat intelligence often provide real-time alerts for identified threats. This ensures that your team is always informed about potential threats, enabling swift response times and reducing the chances of a successful cyber attack.

AI and Machine Learning Capabilities

Many modern SaaS platforms incorporate AI and machine learning technologies. These can be invaluable for identifying patterns, predicting potential threats, and providing in-depth insights that would be almost impossible to derive manually. 

Furthermore, these technologies allow your threat intelligence to continually learn and adapt to evolving threats.

Scalability and Flexibility

Finally, SaaS platforms offer scalability and flexibility. As your organization grows, your threat intelligence needs will evolve. SaaS platforms can easily scale to match your growth and change according to your shifting needs, ensuring that your threat intelligence management remains robust regardless of how your organization evolves.

In conclusion, a robust SaaS platform for threat intelligence management is not merely a tool, but a strategic partner that empowers your cybersecurity efforts. By enabling automation, integration, real-time alerts, AI capabilities, and scalability, a SaaS platform can significantly enhance your ability to transform raw threat data into actionable intelligence, fortifying your organization’s defenses against the ever-evolving world of cyber threats.

Actionable Threat Intelligence with Flare

Actionable threat intelligence plays a big role in proactive defense and brings immense value in terms of contextualization and prioritization. A SaaS platform can optimize threat intelligence management to simplify parsing through data for actionable insights.

Flare monitors billions of leaked passwords and other data points across illicit sources to provide your security team with actionable alerts. The AI Powered Assistant boosts actionable intelligence by translating and contextualizing dark web posts, cutting out noise by 50%, automating public GitHub repository takedowns, and more. 

Start your free trial today.

The post Actioning Threat Intelligence Data: The Definitive Guide appeared first on Flare | Cyber Threat Intel | Digital Risk Protection.

]]>
Cybersecurity AI: Threat Actor Profiling Provides Instant Insights https://flare.io/learn/resources/blog/cybersecurity-ai-threat-actor-profiling-provides-instant-insights/ Fri, 28 Jul 2023 14:33:44 +0000 http://flare.io/?p=8838 Generative artificial intelligence (AI) and large language models (LLM) dominate current technology conversations. From ChatGPT to DALLE 2, generative AI has become the new hype technology overtaking the corporate world. With all the hype around generative AI, the idea that it is a tool that can enable rather than replace people can get lost.  According […]

The post Cybersecurity AI: Threat Actor Profiling Provides Instant Insights appeared first on Flare | Cyber Threat Intel | Digital Risk Protection.

]]>

Generative artificial intelligence (AI) and large language models (LLM) dominate current technology conversations. From ChatGPT to DALLE 2, generative AI has become the new hype technology overtaking the corporate world. With all the hype around generative AI, the idea that it is a tool that can enable rather than replace people can get lost. 

According to recent research, global cybersecurity job vacancies grew by 350% with the current number of unfulfilled jobs at 3.5 million. Beyond unfulfilled roles, companies struggle to balance their cybersecurity needs with the limited experience that someone new to the field has.

With Flare’s AI Powered Assistant, CTI teams can benefit from enhanced automated exposure monitoring. These capabilities include Threat Actor Profiling, which analyzes a threat actor’s complete post history in seconds and generates a detailed summary of that threat actor’s TTPs.

The Clear and Dark Web Convergence

Companies today need to worry about several different types of data exfiltration and exposure across corporate, employee, and customer information. 

For example, think of the various ways that companies leak data:

  • An employee uses an unauthorized service without realizing that the data isn’t secure, making information publicly available.
  • A public service, like GitHub, is misconfigured, leaking hardcoded secrets.
  • A third-party vendor experiences a data breach. 
  • Malicious actors deploy an attack to collect data so they can sell it. 

In the past, malicious actors used the dark web because it was anonymous, enabling them to hide their illegal activities. Today, the clear web offers this same anonymity due to the sheer volume of available services. Often, modern malicious actors choose to hide “in plain sight,” using various legal digital services like:

For example, a Telegram post will link to a service with a different capability, like a Discord server that allows screen sharing. Tracing the activity further, the Discord server may send you to a Tor site.

Generating Threat Actor Profiling with Flare

As activities across the clear, deep, and dark web become more intertwined, tracking threat actors becomes more challenging. A threat actor can use multiple personas or handles, both on a single service or across multiple services. 

Flare’s machine learning models and natural language processing (NLP) create context that detect cybercriminals as they move across various platforms. Our data science team has been using machine learning and other forms of AI for the past several years to analyze data, prioritize events, recommend actions, and make predictions. Now, we’re translating that into helping you uncover patterns and relationships between otherwise disconnected threat actors using data like:

  • Speech patterns
  • Word choice
  • Abbreviations
  • Slang
  • Post telemetry

We combined a generative AI model, our NLP, and the archived dark web data that we collected over the past six years.  With this information, we generated two million threat actors profiles, eliminating manual monitoring and reducing the need for highly skilled analysts. At the same time, these profiles give the highly skilled analysts technical information they can use when trying to prioritize their activities.

For example, by using NLP and Threat Actor Profiling, an organization currently tracking 200 threat actors may learn that only 50 of those threat actors are actually the same person or group. This provides several advantages:

  • Visibility into a more targeted threat
  • Context about different activities
  • Aggregating handles or personas into a single group for better monitoring
  • Reviewing activity volume and activities to tie different names and locations together
  • Leveraging predictive analytics to identify potential likely next steps

Use Cases for Threat Actor Profiles

Threat Actor Profiling gives you a way to identify and add context to your threat intelligence research without requiring advanced or platform-specific skills.

Correlating Across Time and Place

With NLP and Flare’s archives, you can identify similarities across various communication services to look for targeted threats. 

Flare’s Threat Actor Profiling uses generative AI to identify similarities across the different locations and times to give you insights about the threat actors. For example, in this profile, the threat actor(s) appear to focus on:

  • Gaining unauthorized access to Remote Desktop Protocol systems 
  • Targeting chemicals, financial, lighting products, telecommunications, and blockchain development
Screenshot from Flare that shows the summary of a threat actor from AI Assist. The background is a light gray. There is purple-blue text at the top for the different sections: Summary, Feedback, Scoring, and AI Assist. There is an underline under AI Assist indicating that the screen is showing this page. There is an analysis of this threat actor with the sections Executive Summary, Methodology, Findings, and Conclusion.
Flare screenshot showing a summary for a threat actor’s activities across illicit sources

Comparing Across Personas and Handles

To evade detection, threat actors change their online “identities” by using different names or hiding their IP addresses. Combining Flare’s archived data and NLP models, you can identify a threat actor’s use of words and context based on the person’s writing style and online “voice.”  

In the example below, you can see how Flare’s Threat Actor Profiling compares these data points across twelve sources for a threat actor using two usernames, one beginning with a C, the other with an S.

Screenshot from Flare that shows the summary of a threat actor from AI Assist. This screenshot shows a summary of a threat actor. Under the section of Sources, there are 12 usernames indicating the threat actor is active across twelve sources. Some usernames begin with S and others with C, showing the threat actor uses different names across illicit sources.
Flare screenshot showing a threat actor using variations of two names across twelve sources

Unlike people, AI models can rapidly analyze large data sets to find these small similarities that create patterns. By leveraging generative AI and NLP, organizations gain visibility across these otherwise seemingly unconnected accounts and services.

Identifying Reuse

While malicious actors may work together, they’re not loyal to one another. Often, you’ll see almost complete code swipes where one malware is 95% similar to another with a different name. Similarly, you see the same thing with traded techniques.

The Future of AI and Cyber Threat Intelligence

By the numbers and statistics, a majority of data leakage comes from employees and vendors. However, these accidental data exposures are typically a lower risk that the data exposures associated with threat actors. When threat actors steal data, they have a malicious intent that’s almost always financially motivated. 

Despite some recent hacktivism and distributed denial of service (DDoS) attacks arising from it, money and data will likely remain the primary reason that malicious actors target organizations. People – and organizations – need to shift their expectations and assume that they have some data exposed. Statistically, most large organizations with mature programs understand that security controls have been bypassed, so they implement programs that enable them to detect and remediate it quickly. 

By leveraging generative AI and LLM, organizations can monitor their digital footprints more effectively so that attackers no longer have the information advantage.

Leveraging AI for CTI with Flare

Malicious actors are already imagining and trying out cybercrime strategies involving generative AI as seen in the examples above. However, LLM tools are a testament to human ingenuity and the immense positive potential of AI. It’s our collective responsibility to ensure that these capabilities are for our collective benefit, and not to the detriment of the digital landscape. 

Our approach at Flare is to embrace generative AI and its possibilities, and evolve along with it to provide cyber teams with the advantage. LLMs can be incorporated into cyber threat intelligence to be an essential capability to more rapidly and accurately assess threats.


Sign up for a free trial to learn more about what Flare’s AI Powered Assistant can do for you.

The post Cybersecurity AI: Threat Actor Profiling Provides Instant Insights appeared first on Flare | Cyber Threat Intel | Digital Risk Protection.

]]>
What is Your Security Attack Surface? https://flare.io/learn/resources/blog/security-attack-surface/ Tue, 18 Jul 2023 14:32:06 +0000 http://flare.io/?p=8665 As businesses and individuals become more reliant on technology, they inadvertently increase their security attack surface – the sum total of all the vulnerabilities that threat actors can exploit.  Understanding your security attack surface is essential for developing an effective cybersecurity strategy. By gaining insights into your security attack surface, you can proactively safeguard your […]

The post What is Your Security Attack Surface? appeared first on Flare | Cyber Threat Intel | Digital Risk Protection.

]]>
Gradient blue background. There is a light orange oval with the white text "BLOG" inside of it. Below it there's white text: "What is Your Security Attack Surface?" There is white text underneath that which says "Learn More" with a light orange arrow pointing down.

As businesses and individuals become more reliant on technology, they inadvertently increase their security attack surface – the sum total of all the vulnerabilities that threat actors can exploit. 

Understanding your security attack surface is essential for developing an effective cybersecurity strategy. By gaining insights into your security attack surface, you can proactively safeguard your digital assets and protect against potential cyber threats.

Assessing Your Security Attack Surface: Understanding the Vulnerabilities

To effectively protect your organization from cyber threats, it is crucial to assess and understand your security attack surface. 

What is a Security Attack Surface?

The security attack surface refers to all the potential entry points and vulnerabilities that can be targeted by attackers to gain unauthorized access or exploit weaknesses in your systems. By comprehensively assessing your attack surface, you can identify and address these vulnerabilities proactively. 

Here are key steps to assess and understand your security attack surface:

1. Inventory and Visibility

Start by taking inventory of all the assets within your organization’s digital ecosystem. This includes: 

  • Hardware devices
  • Software applications
  • Networks
  • Databases
  • Cloud services
  • Employee devices

The goal is to have a comprehensive understanding of all the components that make up your attack surface. Ensure that you have visibility into each asset, its configurations, and its connections to other systems.

2. Threat Modeling

Perform a threat modeling exercise to identify potential threats and vulnerabilities. This involves analyzing the different ways in which cybercriminals can exploit your assets. Consider external and internal threats like:

  • Hacking attempts
  • Malware
  • Social engineering
  • Insider attacks
  • Unintentional data leaks

By understanding the specific threats that your organization is susceptible to, you can prioritize your security efforts effectively.

3. Vulnerability Assessment

Conduct regular vulnerability assessments to identify weaknesses in your systems. This involves scanning your network, applications, and infrastructure for known vulnerabilities and misconfigurations. Utilize automated tools, such as vulnerability scanners, to streamline the process and ensure comprehensive coverage. 

Pay attention to potential entry points that threat actors could exploit:

  • Software vulnerabilities
  • Weak access controls
  • Unpatched systems

4. Third-Party Risk Assessment

Assess the security posture of your third-party vendors and partners, as they can introduce additional risks to your attack surface. Evaluate their security practices, data handling procedures, and adherence to industry standards. Ensure that they have robust security measures in place to protect any shared or interconnected systems.

5. User Awareness and Education

Acknowledge that human error can significantly impact your security attack surface. Educate your employees about cybersecurity best practices, such as:

  • Strong password hygiene
  • Identifying phishing attempts
  • Importance of regular software updates. 

By fostering a security-conscious culture and promoting awareness, you can minimize the likelihood of inadvertent security breaches.

6. Ongoing Monitoring and Review

Assessing your security attack surface is not a one-time activity. It requires continuous monitoring and periodic review. Implement robust monitoring tools and processes to detect and respond to potential threats in real-time. 

Regularly review your security measures, update your assessments, and adapt your strategies to evolving cyber threats.

By diligently assessing and understanding your security attack surface, you gain valuable insights into the vulnerabilities that may be exploited by malicious actors. This knowledge empowers you to prioritize and implement appropriate security measures to safeguard your organization’s critical assets and sensitive data. In the next section, we will explore the impact of digital transformation on expanding your attack surface and the associated risks.

Expanding Your Attack Surface: The Impact of Digital Transformation

In today’s rapidly evolving digital landscape, organizations are undergoing digital transformations to stay competitive and leverage the benefits of technology. However, with this digital transformation comes an expansion of the security attack surface. 

The attack surface expands as more devices, applications, and networks are connected, creating new avenues for cybercriminals to exploit vulnerabilities. Understanding the impact of digital transformation on your attack surface is crucial for effectively managing and mitigating security risks. 

Digital Attack Surfaces

Let’s explore some key factors that contribute to the expansion of your attack surface:

Internet of Things (IoT)

The proliferation of IoT devices has significantly expanded the attack surface for many organizations. These devices, ranging from smart devices in homes to industrial control systems, are often connected to networks and collect and transmit sensitive data. 

Each IoT device introduces potential vulnerabilities that attackers can exploit to gain unauthorized access or disrupt operations.

Cloud Computing

The adoption of cloud computing services has revolutionized the way organizations store, process, and access data. While cloud services offer numerous benefits, they also introduce new security considerations. 

Cloud environments can be complex, with multiple access points and shared infrastructure, potentially exposing organizations to data breaches or unauthorized access if not properly secured.

Mobile Devices and Bring Your Own Device (BYOD) Policies

The widespread use of mobile devices and the implementation of BYOD policies have increased convenience and productivity. However, they have also broadened the attack surface. Mobile devices may have weaker security measures compared to traditional endpoints, making them attractive targets for attackers. Organizations must carefully manage and secure these devices to mitigate the risks they pose.

Web Applications and APIs

Web applications and APIs are fundamental components of modern business operations. However, they can also become vulnerable points of entry for cyber threats. 

Insecure coding practices, misconfigurations, and outdated software versions can expose vulnerabilities that attackers can exploit. Regular security testing and robust security measures are essential to safeguard these critical components.

Remote Workforce and Telecommuting

The shift towards remote work and telecommuting has become even more prominent in recent times. While it offers flexibility and productivity benefits, it introduces new security challenges. 

Remote workers often use personal devices and networks that may not have the same level of security as corporate environments. Ensuring secure remote access and implementing strong authentication mechanisms is crucial to mitigate the associated risks.

To effectively manage the expanding attack surface, organizations must adopt a comprehensive cybersecurity strategy that encompasses these factors. This includes: 

  • Implementing strong access controls
  • Conducting regular vulnerability assessments
  • Educating employees about cybersecurity best practices
  • Leveraging advanced threat intelligence solutions. 

By understanding the impact of digital transformation on your attack surface and implementing proactive security measures, you can mitigate risks and protect your organization from evolving cyber threats. 

Mapping Your Attack Surface: Identifying and Analyzing Potential Entry Points

To effectively defend against cyber threats, it is crucial to map your attack surface, which involves identifying and analyzing potential entry points that attackers may exploit. By mapping your attack surface, you gain a comprehensive understanding of the various vulnerabilities and exposure points within your organization’s systems and networks. 

This knowledge empowers you to implement targeted security measures and prioritize your defenses. Here are key steps to effectively map your attack surface:

1. Network Infrastructure Analysis

Begin by analyzing your network infrastructure to identify all devices, systems, and components connected to your network. This includes: 

  • Servers
  • Routers
  • Switches
  • Firewalls
  • Any other networked devices

Assess their configurations, security protocols, and potential vulnerabilities to gain insights into potential attack vectors.

2. Application Inventory and Assessment

Take stock of your applications, including both internal and external-facing ones. Conduct a thorough inventory to identify the applications, their functionalities, and the technologies they utilize. 

Assess the security controls in place, such as authentication mechanisms, input validation, and encryption. Additionally, analyze the potential vulnerabilities associated with each application, considering common security weaknesses like:

  • Injection attacks
  • Cross-site scripting
  • Insecure direct object references

3. Endpoint Evaluation

Evaluate the endpoints within your organization, including: 

  • Workstations
  • Laptops
  • Mobile devices
  • IoT devices

4. External Attack Surface Analysis

Examine the external-facing components of your infrastructure, such as websites, APIs, and cloud services. 

Identify potential entry points that attackers can exploit, such as: 

  • Open ports
  • Misconfigurations
  • Outdated software versions
  • Unpatched vulnerabilities. 

Perform regular vulnerability assessments and penetration testing to uncover weaknesses in your external attack surface.

5. Partner and Third-Party Assessment

Assess the security posture of your partners and third-party vendors who have access to your systems or handle sensitive data. 

Assess their:

  • Security practices
  • Data protection measures
  • Adherence to industry standards

Ensure that they have robust security controls in place and regularly review their security posture to mitigate any potential risks introduced through third-party connections.

6. Social Engineering and Human Factor Analysis

Consider the human factor in your attack surface mapping. Analyze the potential risks posed by social engineering attacks, such as phishing, spear phishing, or pretexting. Educate employees about these risks and implement security awareness training programs to enhance their ability to recognize and respond to social engineering attempts effectively.

By methodically mapping your attack surface, you gain insights into the vulnerabilities and potential entry points that attackers may exploit. This knowledge empowers you to prioritize your security efforts, implement targeted defenses, and develop a robust cybersecurity strategy. In the next section, we will discuss strategies for securing your attack surface and mitigating risks effectively.

Securing Your Attack Surface: Strategies for Mitigating Risks and Strengthening Defenses

Securing your attack surface is crucial to protect your organization from cyber threats. By implementing robust security measures and adopting proactive strategies, you can effectively mitigate risks and strengthen your defenses. Here are key strategies to secure your attack surface:

1. Patch Management and Updates

Regularly apply security patches and updates to your systems, applications, and devices. Unpatched vulnerabilities can provide easy entry points for attackers. 

Implement a centralized patch management process to ensure timely updates across your entire infrastructure. Prioritize critical patches and establish a schedule for patch deployment to minimize exposure to known vulnerabilities.

2. Access Control and Privileged Account Management

Implement strong access control mechanisms to limit access privileges to authorized individuals. Grant users only the relevant permissions for their responsibilities. 

Implement multifactor authentication (MFA) to enhance security and prevent unauthorized access. Additionally, establish strict privileged account management practices to protect privileged credentials from compromise.

3. Network Segmentation

Implement network segmentation to divide your network into separate zones or segments based on their functionality and security requirements. This practice reduces the impact of a potential breach by containing it within a specific segment and preventing lateral movement by attackers. Implement firewalls and access control lists (ACLs) to enforce traffic separation between segments.

4. Data Encryption and Data Loss Prevention (DLP)

Implement robust encryption mechanisms to protect sensitive data both at rest and in transit. Use strong encryption algorithms and enforce encryption protocols for:

  • Communication channels
  • Databases
  • Storage systems

Additionally, employ data loss prevention (DLP) solutions to monitor and prevent the unauthorized transfer or leakage of sensitive information.

5. Regular Security Assessments and Penetration Testing

Schedule periodic security assessments to find any weaknesses in your systems. Engage professional security experts to perform thorough assessments and simulated attacks to uncover potential entry points that attackers may exploit. Address the identified vulnerabilities promptly and perform follow-up assessments to ensure their resolution.

6. Employee Security Awareness Training

Invest in comprehensive security awareness training for your employees. Educate them about:

  • Common attack vectors
  • Social engineering techniques
  • Best practices for maintaining good cybersecurity hygiene

Foster a culture of security awareness and encourage employees to report potential security incidents as soon as possible. 

7. Incident Response Planning and Testing

Develop an incident response plan that defines the steps to be taken in the event of a security incident:

  • Decide upon clear responsibilities
  • Define communication methods
  • Outline the process for containment, eradication, and recovery

Regularly test and refine your incident response plan through tabletop exercises and simulated incidents to ensure its effectiveness.

By implementing these strategies, you can effectively secure your attack surface and strengthen your organization’s defenses against cyber threats. Regularly review and update your security measures to adapt to evolving threats. Additionally, consider leveraging advanced threat intelligence solutions and partnering with cybersecurity experts to enhance your security posture. By taking a proactive and comprehensive approach, you can significantly reduce the risks associated with your attack surface and safeguard your organization’s critical assets. 

Monitoring Attack Surface with Flare

With ongoing attack surface monitoring, you can proactively detect and respond to threats, ensuring the security and integrity of your digital assets. Remember to continuously review and improve your security measures, stay updated on emerging threats, and collaborate with cybersecurity experts to stay ahead of attackers. 

Flare scans the clear & dark web, and illicit Telegram channels for external exposures. By automating your external risk monitoring, you are better equipped to secure your security attack surface. 

Start a free trial today.

The post What is Your Security Attack Surface? appeared first on Flare | Cyber Threat Intel | Digital Risk Protection.

]]>
Threat Intelligence & The Cyber Kill Chain: The Complete Guide https://flare.io/learn/resources/blog/threat-intelligence-cyber-kill-chain/ Tue, 18 Jul 2023 14:14:38 +0000 http://flare.io/?p=8663 Every day that you prevent an attack is a good day. Sophisticated adversaries have the money, skills, and technologies to thwart most organizations’ defensive capabilities. With the rise of Ransomware-as-a-Service (RaaS), less sophisticated attackers have access to payloads and customer service representatives to help them deploy successful attacks. By understanding attackers’ motivations and goals, you […]

The post Threat Intelligence & The Cyber Kill Chain: The Complete Guide appeared first on Flare | Cyber Threat Intel | Digital Risk Protection.

]]>
Gradient blue background. There is a light orange oval with the white text "BLOG" inside of it. Below it there's white text: "Threat Intelligence & The Cyber Kill Chain: The Complete Guide." There is white text underneath that which says "Learn More" with a light orange arrow pointing down.

Every day that you prevent an attack is a good day. Sophisticated adversaries have the money, skills, and technologies to thwart most organizations’ defensive capabilities. With the rise of Ransomware-as-a-Service (RaaS), less sophisticated attackers have access to payloads and customer service representatives to help them deploy successful attacks. By understanding attackers’ motivations and goals, you can find opportunities to stop them from achieving their goals. 

When defenders use threat intelligence to detect activities across the cyber kill chain, they mitigate risks more efficiently and effectively.

What is the Cyber Kill Chain?

The cyber kill chain consists of the seven steps that threat actors must complete for a successful attack. Organizations combine threat intelligence with the cyber kill chain’s steps to minimize a cyber attack’s impact.

Stopping attackers at any of the following stages reduces potential damage to data and systems:

  1. Reconnaissance: conducting research to understand which targets enable them to achieve their objectives
  2. Weaponization: preparing and staging the operation
  3. Delivery: launching the operation by conveying malware to the target
  4. Exploitation: identifying known or unknown vulnerabilities that they can use to gain unauthorized access
  5. Installation: create a persistent way into the victim’s environment to maintain ongoing access
  6. Command and Control (C2): opening a two-way communication channel to remotely manipulate the victim’s environment
  7. Actions on Objectives: using hand-on keyboard tactics to achieve goals, like collecting credentials, escalating privileges, moving laterally through systems, stealing data

By understanding adversaries’ tactics, techniques, and procedures (TTPs), defenders can mitigate risks arising from:

Cyber threat intelligence enables security teams to mitigate risks arising from advanced persistent threats (APTs), defined as targeted, coordinated, and purposeful malicious actors with intent, opportunity, and capability. 

MITRE ATT&CK

MITRE ATT&CK is a system for organizing adversary tactics and techniques based on real-world observations. Although many people conflate it with the cyber kill chain, MITRE ATT&CK focuses on specific attacker activities while the cyber kill chain focuses on the general phases of an attack. 

Although both models include reconnaissance and C2, the MITRE ATT&CK model primarily details the activities that occur within each of the cyber kill chain phases. For example, the cyber kill chain’s actions on objectives phase includes the following MITRE ATT&CK tactics tactics:

  • Privilege Escalation
  • Defense Evasion
  • Credential Access
  • Discovery
  • Lateral Movement
  • Exfiltration

Unified Cyber Kill Chain 

Recognizing the importance of both the cyber kill chain and the ATT&CK MITRE framework, Paul Pols combined the two models to create the Unified Kill Chain.

The Unified Kill Chain model identifies the three phases of an attack as In, Through, and Out. 

During the In Phase, adversaries try to gain access to systems and employ the following tactics:

  • Reconnaissance
  • Resource development
  • Deliver
  • Social engineering
  • Exploitation
  • Persistence
  • Defense evasion
  • Command and control

During the Through Phase, adversaries try to move across and within network and systems, employing the following tactics:

  • Pivoting
  • Discovery
  • Privilege escalation
  • Execution
  • Credential access
  • Lateral movement

Finally, the Out Phase occurs when adversaries have performed their actions on objectives. This phase is defined by:

  • Collection
  • Exfiltration
  • Impact
  • Objectives

Applying Threat Intelligence to the Cyber Kill Chain

Cyber threat intelligence provides insight into adversary motivations, objectives, tactics, and techniques. The more information you have, the better prepared you can be. 

Technical Threat Intelligence

Technical threat intelligence identifies the breadcrumbs that adversaries leave in systems, including:

This information provides insights into the following cyber kill chain phases:

  • Delivery: IoCs and malware signatures provide insight into the malware that the adversary used during the attack.
  • Exploitation: Identifying known and unknown vulnerabilities that threat actors exploit enables defenders to apply security updates or look for suspicious activity on those devices or networks. 
  • C2: Identifying the C2 channels and malicious IP addresses help trace remote interactions with the organization’s environment.

Tactical Threat Intelligence

Tactical threat intelligence provides insights into the TTPs that adversaries use in attacks, including:

  • Network traffic patterns
  • Log files of known attacks
  • Phishing scams
  • URL and IP blocklists

This information provides insights into the following cyber kill chain phases:

  • Delivery: Identifying known phishing scams can help prevent malicious actors from using email as a delivery method.
  • Installation: Log files of known attacks provide insight into how adversaries are using and continuing to access resources. 
  • C2:  Network traffic patterns and blocklists give defenders a way to identify suspicious communications and prevent access from malicious locations.

Operational Threat Intelligence

Operational threat intelligence is actionable information about threat actors’ nature, motive, timing, and methods. Normally found on the deep or dark web, operational threat intelligence comes from adversary communications across illicit Telegram channels, infected device markets, and cybercriminal forums, often including information like:

  • Organizations they want to target
  • Compromised credentials for sale
  • Ransomware or malware variants for sale
  • Lists of compromised devices that can be used as entryways during attacks

This information provides insights into the following cyber kill chain phases:

  • Reconnaissance: Targeted organizations, compromised credentials, and compromised devices all help an organization identify whether adversaries are planning an attack. 
  • Delivery: Ransomware and malware variants available for sale provide information that defenders can use to prevent or detect the code in their environments. 
  • Exploitation: Finding the organization’s devices on a compromised device list gives defenders a way to prevent the devices from being exploited. 

Unified, Actionable Threat Intelligence with Flare

With Flare’s easy-to-use platform, you get simple, actionable threat intelligence that surfaces events in seconds, not days. Our platform enables all security professionals, empowering entry-level analysts to do research and giving experienced analysts detailed technical information. 

Using Flare’s AI Powered Assistant, you overcome the noise and language difficulties inherent in the mission-critical illicit sources monitoring that helps detect adversary reconnaissance activities. Our automated cyber threat intelligence linguist seamlessly translates Russian, Arabic, Spanish, French, and other threat actor forum posts into seamless English summaries that provide rich context. 

Start your free trial today.

The post Threat Intelligence & The Cyber Kill Chain: The Complete Guide appeared first on Flare | Cyber Threat Intel | Digital Risk Protection.

]]>