fbpx
The Case For Cyber Threat Hunting

The Case For Cyber Threat Hunting

Cyber threat hunting is the process of actively seeking out potential threats in your network and eliminating them before they can cause harm. But, is this a service your organization needs? 

Hackers are always looking for new vulnerabilities to exploit, and they’re becoming increasingly sophisticated in their methods. To protect your business, it’s essential to have a comprehensive security strategy in place.

What Does a Threat Hunter Do?

A threat hunter is a professional who specializes in identifying and mitigating threats to an organization’s information security. They work to identify potential security vulnerabilities and mitigation strategies before a threat can be exploited.

A threat hunter is a professional who specializes in identifying and mitigating threats to an organization’s information security. They work to identify potential security vulnerabilities and mitigation strategies before a threat can be exploited. In many cases, threat hunters are also responsible for developing new methods and techniques for detecting threats.

Organizations that employ threat-hunting teams typically do so in order to supplement their existing security measures. Threat hunting can help organizations to identify previously unknown threats, as well as to better understand the behavior of known threats. This information can then be used to improve an organization’s overall security posture.

Threat-hunting teams typically use a combination of manual and automated methods to detect threats. Manual methods may include reviewing log files or network traffic for suspicious activity. Automated methods may include using machine learning algorithms to identify patterns of behavior that could indicate a potential threat.

The goal of threat hunting is to proactively find and mitigate threats before they can cause damage to an organization. By identifying and understanding the behavior of threats, organizations can better protect themselves against future attacks.

hackers

But simply having security measures in place isn’t enough – you need to be proactive in identifying and mitigating threats before they can do damage. That’s where cyber threat hunting comes in.

Cyber hunting is the process of actively seeking out potential threats in your network and eliminating them before they can cause harm. It’s a vital component of any business security strategy, and it can make a big difference in protecting your company from online attacks. So why is cyber threat hunting so important? And how can you get started?

The Importance Of Cyber Threat Hunting

There are many reasons why cyber threat hunting is so important. Most importantly, it can help you to identify potential threats before they have a chance to do damage. By proactively seeking out vulnerabilities, you can fix them before hackers have a chance to exploit them.

Threat hunters use threat intelligence and exceptional tactics techniques and procedures to identify potential threats and then take action to mitigate them. This can involve anything from patching vulnerabilities to implementing security controls.

Consider a Threat Hunting Team

In many cases, threat hunting can help you to avoid costly breaches. The average cost of a data breach is over $3 million – and that number is only going to increase as hackers become more sophisticated. By identifying and eliminating threats before they can cause damage, you can save your business a lot of money in the long run.

In addition to saving money, customized threat hunting can also help to protect your brand reputation. Data breaches can have a major impact on public perception, and they can damage your relationships with customers and partners.

By proactively hunting for threats, you can reduce the chances of a breach occurring in the first place. This can help to protect your brand and maintain customer trust.

Threat Hunting Models

There are three main types of threat-hunting models: reactive, proactive, and predictive.

Reactive threat hunting is the most common type. In this model, you only hunt for threats after they have already been detected in your network. This can be a very time-consuming process, and it can be difficult to find all the threats that are lurking in your network.

Proactive threat hunting is a more proactive approach. In this model, you hunt for potential threats before they have a chance to cause harm. This can be a more efficient way to find and eliminate threats, but it requires regular updates to your security tools and processes so that you can stay ahead of the latest threats.

Predictive threat hunting is the most advanced type of threat hunting. In this model, you use data analytics and machine learning to predict which threats may be coming next. This can help you proactively protect your network from future attacks.

Active threat hunting refers to the proactive identification of threats that may have bypassed security controls. This can be done through manual or automated means, and often involves using specialized tools and techniques to identify malicious activity.

How To Get Started With Cyber Threat Hunting

If you’re interested in getting started with cyber threat hunting, there are a few things you need to do. First, you need to build a strong foundation of security controls. This will give you a good starting point for identifying and mitigating threats.

Next, you need to develop a comprehensive threat intelligence strategy. This will help you to identify potential threats and understand the risks they pose to your business.

Finally, you need to put together a team of skilled threat hunters. These individuals should have experience in security, incident response, and network forensics. They should also be able to work effectively as part of a team and understand the most up-to-date threat hunting methodologies. If you prefer to outsource, there are many threat hunting companies.

What is Cyber Threat Hunting in Cybersecurity?

ransomware, cyber crime, malware

Cyber hunting is the proactive search for cyber threats to neutralize them before they can do damage. This activity is usually carried out by security professionals who specialize in cyber security.

Cyber hunting generally involves the use of tools and techniques that are designed to find, identify, and track down cyber threats. Once a threat has been located, the threat hunters will then work to neutralize it.

This may involve taking steps to isolate the threat or working to remove it entirely from the system. Cyber hunting is an important part of cyber security, as it helps to protect systems and data from harm using threat intelligence indicator searches.

What is Threat Hunting in SOC?

Threat hunting is usually performed by a security operations center (SOC) team, which uses a variety of tools and techniques to find signs of malicious activity. Some common threat hunting strategies include analyzing system logs, inspecting network traffic, and reverse-engineering malware samples.

By constantly searching for new threats, SOC teams can help to keep their organizations safe from the ever-changing landscape of cybersecurity threats.

Automated cybersecurity tools traditionally used by a SOC will typically catch around 80% of threats. Threat hunting is vital for sophisticated attacks. Skilled cyber threat hunters will use successful data analysis procedures, and machine learning to help mitigate threats.

Should I Hire a Threat Hunting Service?

There are several factors to consider when deciding whether or not to hire a threat-hunting service. These include the size and complexity of your organization, the types of threats you are most likely to face, and your overall security posture.

If you are concerned about sophisticated cyber attacks, then hiring a cyber hunter solution may be the best option for you. A threat-hunting service can help to find and neutralize threats before they cause damage.

However, if you are more concerned about simple cyber threats, then hiring a threat detection service may be a better choice. A threat detection service can help you identify and respond to potential threats quickly and effectively.

What Tools Are Required for Cyber Threat Hunting?

cyber security, recruitment, professional

Cyber threat hunting requires several different tools, depending on the specific needs of the organization. Some common tools used in cyber threat hunting include network monitors, intrusion detection systems, malware analysis toolkits, and security information and event management (SIEM) systems.

Organizations may also choose to use honeypots, which are systems designed to lure attackers and collect data about their activities.

To be effective, cyber threat hunting must be constantly updated with the latest information about new threats. This can be accomplished through the use of threat intelligence platforms, which provide real-time data about the latest cybersecurity threats.

Organizations may also choose to hire a threat hunting service, which can provide expert assistance in identifying and responding to threats.

Cyber Security Controls Assessment

With the frequency and sophistication of cyber attacks on the rise, it is essential for businesses to take proactive measures to protect their data and networks. One way to do this is to conduct a cyber security controls assessment. This assessment can help businesses identify hidden security gaps and take steps to close them. Cyber Hunter Solutions provides comprehensive cyber security consulting services, including control assessments. Our team of cyber security experts will work with you to identify vulnerabilities and develop a plan to mitigate them. Contact us today to learn more about our cyber security solutions.

Is Cyber Threat Hunting Necessary?

The decision of whether or not to implement cyber threat hunting depends on several factors, including the size and complexity of your organization, the types of threats you are most likely to face, and your overall security posture. If you are concerned about sophisticated cyber attacks, then cyber threat hunting may be the best option for you.

How does Cyber Threat Hunting work?

hand, magnifying glass, earth

The process of cyber threat hunting usually begins with the identification of a potential threat. This can be done through the use of network monitoring, intrusion detection systems, and malware analysis. Once a threat has been identified, it is then assessed for its impact and severity. Based on this assessment, a response plan is put in place to mitigate the threat.

Organizations may also choose to use honeypots, which are systems designed to lure attackers and collect data about their activities. To be effective, cyber threat hunting must be constantly updated with the latest information about new threats. This can be accomplished through threat intelligence platforms, which provide real-time data about the latest cybersecurity threats.

What are the benefits of Cyber Threat Hunting?

Cyber threat hunting can provide several benefits for organizations, including the following:

· Helps to identify and neutralize threats before they cause damage

· Can be used to collect data about attacker activities

· Can help to improve an organization’s overall security posture

· Can be used to improve the efficiency of security operations

Threat Hunting Tools List

1. Kaspersky Security Center – Network Threat Prevention

2. McAfee Advanced Threat Defense

3. Symantec Endpoint Protection – Advanced Threat Protection

4. F-Secure Radar

5. Trend Micro Deep Discovery Inspector

6. FireEye HX Series appliances

7. Palo Alto Networks WildFire

8. Cisco AMP for Endpoints

9. IBM QRadar SIEM

10. Splunk Enterprise Security Suite

11. RSA NetWitness Platform

12. ArcSight Enterprise Security Manager

13. LogRhythm NextGen SIEM Platform

14. IBM i2 Analyst’s Notebook

15. Recorded Future

16. ReversingLabs TitaniumPlatform

17. ThreatConnect Platform

18. Anomali ThreatStream

19. EclecticIQ Platform

20. Phantom Cyber Corporation’s Phantom Security Orchestration, Automation and Response platform (Phantom)

What are the challenges of Cyber Threat Hunting?

Cyber threat hunting can be a difficult and time-consuming process. It requires a high level of expertise and knowledge about cybersecurity threats. Additionally, it can be challenging to keep up with the latest information about new threats.

Organizations may also choose to hire a threat hunting service, which can provide expert assistance in identifying and responding to threats. However, this option can be expensive and may not be feasible for all organizations.

hacking, hacker, cyber

To be effective, cyber threat hunting must be constantly updated with the latest information about new threats. This can be accomplished through the use of threat intelligence platforms that updates through routine data collection, which provides real-time data about the latest cybersecurity threats.

Organizations may also choose to hire a threat hunting service, which can provide expert assistance in identifying and responding to threats. However, this option can be expensive and may not be feasible for all organizations.

While automated security tools are incredibly helpful in security strategies, especially when using artificial intelligence, human threat hunters are invaluable in keeping potential risks at bay.

Threat Hunting Maturity Model

A threat hunting maturity model is a framework that can be used to assess the readiness of an organization to engage in cyber threat hunting. The model can be used to identify the areas where an organization needs improvement and to provide guidance on how to improve.

The threat hunting maturity model consists of five stages: awareness, preparation, detection, response, and continuous improvement.

Awareness:

The first stage of the threat hunting maturity model is awareness. In this stage, organizations should have a basic understanding of what cyber threat hunting is and its benefits. Additionally, they should be aware of the types of threats they are most likely to face and the potential damage that can be caused by these threats.

Preparation:

The second stage of the threat hunting maturity model is preparation. In this stage, organizations should develop a clear understanding of their goals and objectives for cyber threat hunting. They should also create a plan for how they will conduct threat hunting operations and what resources they will need. Additionally, they should identify the individuals who will be responsible for carrying out threat hunting activities.

Detection:

The third stage of the threat hunting maturity model is detection. In this stage, organizations should have the ability to detect potential threats through the use of security tools and processes. Additionally, they should have a system in place for identifying and responding to suspicious activity.

Response:

The fourth stage of the threat hunting maturity model is the response. In this stage, organizations should have a plan in place for how they will respond to threats that are identified. This plan should include the steps that will be taken to neutralize the threat and prevent it from causing damage. Additionally, the plan should identify the individuals who will be responsible for carrying out the response.

Continuous Improvement:

The fifth stage of the threat hunting maturity model is continuous improvement. In this stage, organizations should constantly review and revise their threat hunting operations to ensure that they are effective. Additionally, they should identify new threats and develop plans for how to address them.

Threat Hunting Platform

In the age of big data, Security analysts are turning to threat hunting to detect malicious activity and investigate attacks that have already breached their organizations. But what is threat hunting, and how can your organization benefit from this proactive security approach?

Threat hunting is a method of proactively and iteratively searching through networks or systems to detect and isolate advanced threats that have evaded traditional security defenses. It’s a continuous process that involves the use of skilled security analysts, cutting-edge technology, and creative thinking to investigate and map out an organization’s attack surface.

Organizations that implement threat hunting can improve their overall security posture by detecting attacks early, understanding the full scope of an attack, and providing actionable intelligence that can be used to improve security defenses.

There are many different ways to approach threat hunting, but most methodologies share common elements:

1. Identify goals and objectives.

2. Collect and analyze data.

3. Develop hypotheses based on analysis.

4. Test hypotheses and take action.

5. Monitor results and refine the approach.

The best technique of threat hunting and threat-hunting platforms are those that allow security analysts to quickly and easily collect, analyze, and visualize data from multiple sources.

Threat Hunting vs. Threat Intelligence

Threat hunting and threat intelligence are often used interchangeably, but they are two distinct concepts. Threat intelligence is the data-driven process of understanding the who, what, when, where, and why of an attacker or attack. It helps organizations build a profile of an attacker and understand their motives, capabilities, and methods. This information can then be used to inform and improve security defenses.

Threat hunting, on the other hand, is the process of actively searching for signs of an attack that has already evaded detection. It’s a reactive security measure that is often used in conjunction with threat intelligence. By combining the two approaches, organizations can improve their overall security posture and better defend against sophisticated attacks.

When it comes to choosing a threat hunting platform, there are a few key considerations that organizations should keep in mind:

1. Ease of Use: The platform should be easy to use and allow security analysts to quickly collect, analyze, and visualize data from multiple sources.

2. Flexibility: The platform should be flexible and allow for customization based on the specific needs of the organization.

3. Integration: The platform should integrate seamlessly with existing security infrastructure and tools.

4. Scalability: The platform should be able to scale as the organization grows and evolve over time.

The best threat-hunting platforms are those that combine all of these elements to provide a comprehensive solution for security analysts.

Organizations that are serious about threat hunting should consider investing in a platform that can help them automate and streamline the process. A threat hunting platform can save time and resources by automating data collection, analysis, and reporting. It can also provide analysts with the ability to quickly pivot and investigate new leads.

The bottom line is that threat hunting is a critical security measure that can help organizations detect and respond to attacks before they cause damage. When combined with threat intelligence, it can provide a powerful defense against even the most sophisticated attackers.

Managed Proactive threat hunting is a process of identifying and addressing potential security risks before they can cause damage. This can be done through a combination of system monitoring and human analysis, which allows for early identification of threats and quick response times.

Threat Hunting Ideas

1. Look for anomalous user behavior: Monitor user accounts and detect any irregular login patterns, such as logins from strange locations or access to resources they don’t usually use.

2. Pay attention to system changes: Analyze the system logs and look out for any suspicious changes that could be indicative of an attack, such as modifications to system settings or unexpected software installations.

3. Monitor external events: Keep an eye on activities occurring outside of your network, such as suspicious activity in the public cloud services you use and news reports about new malware variants targeting similar systems.

4. Set up honeypots: Create decoy systems that mimic production environments to draw attackers away from your real systems and detect malicious behavior.

5. Utilize automated tools: Automate the collection, aggregation, and analysis of system logs to reduce manual processes and uncover hidden threats more quickly.

6. Leverage third-party intelligence: Monitor for news about new threats, indicators of compromise (IoCs), and other intelligence that can help you anticipate attacks before they happen.

7. Invest in employee training: Educate your employees on the basics of cyber security, as well as how to recognize suspicious activities and take appropriate action in response.

8. Implement threat-hunting tactics: Analyze system logs for signs of malicious activity, such as unusual system connections or file modifications, and actively hunt for threats in your environment.

9. Utilize the latest security technologies: Stay informed about the latest developments in cyber security and make sure you’re taking advantage of the best tools and practices to protect yourself against attacks.

10. Conduct regular vulnerability assessments: Identify and address any vulnerabilities in your systems, such as outdated software or weak passwords, before attackers can exploit them.

By following these steps, you’ll be better equipped to detect and respond to cyber threats before they cause significant harm to your organization. Taking a proactive approach to threat hunting is an essential part of any successful security program.

Custom Threat Hunt in Cybersecurity

Custom threat hunts are a great way to stay ahead of the ever-evolving threats in cybersecurity. A custom threat hunt is an inquiry into specific security incidents and anomalies in order to identify hidden malicious activity that may be occurring within your environment. The process involves analyzing large volumes of logs, events, and other data sources for the purpose of detecting potential threats or incidents. During a custom threat hunt, security experts look for indicators of compromise that could help identify malicious actors and their techniques in order to take action before they cause damage to your organization.

Custom threat hunts are different from traditional incident response operations in that they are proactive rather than reactive. They often involve the use of sophisticated tools and techniques to analyze large amounts of data and uncover hidden clues that can lead to the detection of malicious activity. Additionally, custom threat hunts can be tailored to a specific organization’s environment in order to maximize its effectiveness.

Custom threat hunts are becoming increasingly popular as organizations realize their importance in keeping up with today’s ever-changing threats. A successful custom threat hunt will enable organizations to detect potential threats before they can cause significant damage and allow for the development of preventative measures to stop them from occurring in the future. By taking advantage of these proactive security measures, organizations are better equipped to protect their data and assets against malicious actors.

Conclusion

The Ponemon Institute’s study found that the average cost of a data breach is $3.86 million, so it is clear that organizations need to take every step possible to protect their networks and data. One such step is engaging in regular cyber threat hunting activities.

Threat hunting involves proactively searching for threats on your network before they cause damage. It is a vital activity that should be done by a certified cyber threat hunting professional who has the expertise and tools necessary to identify and mitigate risks quickly.

If you are not currently engaged in cyber threat hunting, we encourage you to consider Managed Security Services as a way to improve your organization’s security posture. Our team of experts has the experience and knowledge necessary to help you stay ahead of the latest cybersecurity threats. Contact us today to learn more about our services.

How a Cyber Security Maturity Model Protects Your Business

How Your Business Can Benefit from Cyber Threat Intelligence

How Your Business Can Benefit from Cyber Threat Intelligence

As a CIO, you know that your business faces cyber threats daily. While you may have robust security measures in place, it’s impossible to protect your organization from every possible attack.

That’s where cyber threat intelligence comes in. By incorporating this valuable resource into your security strategy, you can dramatically reduce your risk of a breach. Here are just a few ways that your business can benefit from cyber threat intelligence:

  1. Get real-time alerts about new threats and vulnerabilities.
  2. Gain insights into how malicious actors are targeting organizations like yours.
  3. Strengthen your defenses by learning about the latest attacks and tactics being used by hackers.
  4. Develop better risk management strategies based on data

AlienVault USM Anywhere Threat Intelligence

cyber threat intelligence

With the increased number of cyber threats today, it is impossible to stay up-to-date on the latest security threats and trends. As a USM Anywhere training and implementation partner, Cybriant can improve your incident response plan by getting actionable intelligence about specific attacks. Learn more about our partnership. 

As an outsourced partner, our team is trained on the latest security risks and how to avoid them. Our in-depth reporting will help you make informed decisions about which security products and services to invest in.

We highly recommend continuous Threat Intelligence updates that are fully integrated into the AlienVault® Unified Security Management® (USM) platform for threat assessment, detection, and response.

The AlienVault USM platform receives updates every 30 minutes from AlienVault Labs. This dedicated team spends countless hours analyzing the different types of attacks, emerging threats, suspicious behavior, vulnerabilities, and exploits they uncover across the entire threat landscape.

This valuable information is then compiled and released in the form of an intelligence feed, which is accessible to all USM Anywhere customers. With this real-time data, you can be confident that your organization has the most up-to-date information available to help you detect, investigate and respond to threats.

What is AlienVault USM Anywhere?

AlienVault USM Anywhere is a cloud-based security platform that includes everything you need to detect, investigate and respond to threats in one place. It’s easy to use, scalable and provides comprehensive visibility into your entire environment.

Some of the key features include:

– asset discovery

– vulnerability management

– intrusion detection

– behavioral analytics

– SIEM

Learn more about USM Anywhere or contact us to get started with a free trial. Cybriant will work with your organization to get the best pricing possible, plus our monitoring service includes 24/7 analysts that can implement your SIEM so you don’t have to.

What is Cyber Threat Intelligence and Why Do Businesses Need It?

Businesses today face a wide variety of cyber threats, ranging from simple viruses to sophisticated attacks that can cripple operations and lead to the loss of sensitive data. To protect themselves, businesses need to have a clear understanding of the types of threats they face and the best way to defend against them.

This is where cyber threat intelligence comes in. Cyber threat intelligence is information that businesses can use to identify, assess and respond to cyber threats. It can come from a variety of sources, including managed security services providers, government agencies, and private companies. But, when it’s incorporated into SIEM, you have a trusted team of analysts watching your back.

By gathering and analyzing this information, businesses can gain a better understanding of the evolving threat landscape and the steps they need to take to protect themselves. As the cyber threat landscape continues to evolve, so too does the need for effective cyber threat intelligence.

By staying informed and taking steps to defend against emerging threats, businesses can help reduce the risk of a devastating attack.

Related: The Financial Industry’s Biggest Threat

How Can Businesses Use Cyber Threat Intelligence to Protect Their Networks and Data?

cyber security intelligence

As the amount of data businesses produce and store continues to grow, so too does the risk of a data breach. A recent study found that the average cost of a data breach has risen to over $4 million.

Given these high costs, businesses need to have a plan in place to protect their networks and data. One way to do this is by using managed security services.

Managed security services can provide businesses with the cyber threat intelligence they need to identify and address potential threats before they cause damage. In addition, managed security services can help businesses respond quickly and effectively to data breaches when they do occur. As the costs of data breaches continue to rise, managed security services are an increasingly essential part of any business’s cyber security strategy.

What are Some of the Benefits of Using a Dedicated Cyber Threat Intelligence Provider?

Managed security service providers help to take the guesswork out of protecting your business from cyber threats. By partnering with a dedicated provider of threat intelligence, you can receive up-to-the-minute information about the latest threats, as well as customized advice on how to best protect your organization.

In addition, managed security services can help to free up valuable internal resources that can be better used elsewhere. By entrusting your cyber security to a team of experts, you can have peace of mind knowing that your business is safe from the ever-changing landscape of online threats.

Are There Any Other Ways Businesses Can Protect Themselves from Cyber Attacks?

cyber threat intelligence

In addition to managed security services, businesses can also protect themselves from cyber attacks by implementing strong security policies and procedures.

Employee education is critical, as is ensuring that all data is properly encrypted. Firewalls and intrusion detection systems are also essential, as is keeping all software up to date. By taking these steps, businesses can greatly reduce their risk of becoming the victim of a cyber attack.

Conclusion

CTI is important for your business because it can help you stay ahead of the latest cyber threats. By utilizing managed security services, you can have access to a team of experts who are constantly monitoring your networks and systems for any signs of an attack.

This proactive approach can help reduce the chances that your business will be compromised by a cybercriminal. If you’re not currently using a SIEM, CTI, or managed security services now is the time to start. Contact us today to learn more about how we can help keep your business safe from online threats.

Protect Your Business with Cybriant’s IT Security Best Practices Checklist

Cybriant CTO: Analysis of a Phishing Email

Cybriant CTO: Analysis of a Phishing Email

I recently received an interesting phishing email that I shared with the rest of our company as part of our Internal Security Awareness program.  You might guess that as CTO of a security company I often receive phishing emails (and you’d be right), but this one caught my eye.  This phishing email was interesting for a few reasons:

  1. It made it past Microsoft’s ATP (Advanced Threat Protection) anti-phishing service in Office 365.
  2. It had a valid SPF record (no DKIM or DMARC).
  3. The phishing link had a clever URL encode redirect.

So, let’s take a look at the email:

There were several factors that tipped me off that things were amiss: 

  • I have never seen a similar voicemail email.
  • We don’t do business with any company named Alarmtech (looking at the email address).
  • We definitely DON’T do any business with any company named Alarmtech that has a Polish TLD (the “.pl” of “alarmtech.pl” domain in the email address).
  • The “local Wireless User” phone number was also odd.

So, I decided to take a look at the message’s full headers.

I was quite surprised to see that the email had a valid SPF record, and while it was unfortunate to see that a DKIM was not setup it is fairly common for less sophisticated admins to omit this type of email authentication.  This also explains part of why Office365 gave a phishing email a pass instead of convicting the email.

And, a quick check with MXToolbox confirmed that the SPF record was indeed valid.

Ok, at this point I was even more curious.  So, I copied the link for the “Play Record” button and utilized www.o365atp.com to de-obfuscate the link.  Bingo!  We’ve got something interesting!

Now, we have the de-obfuscated link (Office365 ATP uses a technology called Safe Links as an extra layer of protection).

__SNIP__

https://www.google.com.mx/url?q=ht%74p%73%3A%2F%2F6%34%65%35%33r%77%37.%62l%6fb.co%72%65.%77in%64%6f%77s.n%65%74%2F5%65%353%72%77%376%2F%69%6edex.%68t%6d%6c%26%236%33%3B%70z%6fne%26%23%36%31%3BY%575%6b%63mV%33Lmhh%62Wl%73d%479uQHB%79%61W1%31%63%33Nlcn%5a%70%592VzL%6dN%76%62Q%26%2361%3B%26%23%361&sa=D&sntz=1&usg=AFQjCNEZAsy-4nufrSB7lCmGPtn98lLW9Q

__SNIP__

 

If you notice, the URL begins with http://www.google.com.mx/url?q= this is a clever way to have Google (in this case it’s the Mexico link for Google as it has a TLD – top level domain – of “.mx”) to redirect to the actual malicious website address, which is:

__SNIP__

ht%74p%73%3A%2F%2F6%34%65%35%33r%77%37.%62l%6fb.co%72%65.%77in%64%6f%77s.n%65%74%2F5%65%353%72%77%376%2F%69%6edex.%68t%6d%6c%26%236%33%3B%70z%6fne%26%23%36%31%3BY%575%6b%63mV%33Lmhh%62Wl%73d%479uQHB%79%61W1%31%63%33Nlcn%5a%70%592VzL%6dN%76%62Q%26%2361%3B%26%23%361&sa=D&sntz=1&usg=AFQjCNEZAsy-4nufrSB7lCmGPtn98lLW9Q

__SNIP__

Yes, that is a valid FQDN and URL.  And, this is the other part of the reason why I believe that this phishing email made it past Office365’s ATP service.  It’s using a method called URL encoding.  URL encoding allows you to do things such as create spaces in a filename.  For example, the following two bullet point links would point to the exact same URL (Note:  I used a random domain name):

phishing email

The “%20” is the URL encoded value for a space “ “.  There are some genuine uses for URL encoding, and it is especially helpful when creating scripts or working with APIs.  For example, when dealing with APIs in our SOC (Security Operations Center) this is often how we have to get around restrictions such as using an “@” in a username.  Instead of user@cybriant.com it’d be: user%40cybriant.com

So, let’s de-obfuscate the link using https://urldecoder.org:

__SNIP__

https://64e53rw7.blob.core.windows.net/5e53rw76/index.html?pzone=YW5kcmV3LmhhbWlsdG9uQHByaW11c3NlcnZpY2VzLmNvbQ=&#61&sa=D&sntz=1&usg=AFQjCNEZAsy-4nufrSB7lCmGPtn98lLW9Q

__SNIP__

There we have the REAL link.  Next, we’ll explode this link in Joe Sandbox to see it’s behavior.  Click on the following link to see the full Joe Sandbox analysis, and see what our SOC would discover if they were performing this for a customer.  I’ll give you a hint, it turns out it’s malicious:

https://www.joesandbox.com/index.php/analysis/166555/0/executive

Note:

When I first exploded the URL decoded link Joe Sandbox didn’t find anything interesting.  And so, the second time I utilized the link that was a google.com.mx referrer link.  When using the referring link Joe Sandbox determined that the final destination URL was indeed malicious.  In short, the bad actor built a check into their website to ensure that the full link was being used (confirmed by seeing Google.com.mx referring the user to the phishing website).  Pretty spiffy thinking on their part! 

Andrew Hamilton

Andrew Hamilton

CTO

Andrew Hamilton is a member of the executive management team of Cybriant, a leader in the cybersecurity services industry. As CTO he is responsible for the technical vision and the delivery of services at Cybriant. Since its founding in 2015, Andrew has led the selection, evaluation, and adoption of all security technology and tools utilized by Cybriant in the delivery of its managed security services.

Learn more about Cybriant’s Continuous Threat Detection & Remediation Services: http://cybriant.com/pretect

Watch On-Demand: How to Prepare for GDPR

Watch On-Demand: How to Prepare for GDPR

GDPR, or General Data Privacy Regulation, will come into force on 25 May 2018. GDPR requires organizations to maintain a plan to detect data breaches, regularly evaluate the effectiveness of security practices, and document evidence of compliance. If you don’t already have the required security tools and controls in place, your organization will need to start planning now to achieve compliance and mitigate the risk of high fines for failing to comply.

In this webcast, AlienVault CISO John McLeod provides insights into how AlienVault has approached the GDPR compliance process internally, along with how the Unified Security Management® (USM) platform can help accelerate and simplify your path to compliance.

Watch this on-demand webcast now, and learn:

  • Best practices for approaching GDPR compliance
  • How to assess your level of readiness and build your roadmap to compliance
  • How a unified security toolset can both expedite and simplify this process

They’ll also provide a brief demo of the USM platform to illustrate some of the technical controls you need in place TODAY for compliance.

Watch Now!

GDPR, HIPAA, PCI, Etc.

Looking for a better way to address threat management and compliance? By working with a professional security services organization and a SIEM like AlienVault®, you will have a better way to detect threats.

Virtually every regulatory mandate requires some form of log management to maintain an audit trail of activity. By utilizing a SIEM, Cybriant provides a mechanism to rapidly and easily deploy a log collection infrastructure that directly supports this requirement. Ticketing and alerting capabilities also satisfy routine log data review requirements.

Get more value out of your SIEM while meeting compliance regulations – find out more about Cybriant Managed SIEM with Security Monitoring: https://www.cybriant.com/managed-siem/

Managed SIEM with Security Monitoring

How to Address Common Network Security Threats

How to Address Common Network Security Threats

Top 5 most common network security threats. Be sure your organization has a plan to protect and/or prevent each of these malicious types of network security threats. 


Hacking is easy. And profitable. An average phishing attack could potentially cost a mid-sized organization $1.6 million. Phishing is just one of the many ways that an organization can be attacked or breached.

Network security threats come in many different forms, but they all pose a serious threat to the safety and security of networked systems. While information security threats are becoming increasingly sophisticated, there are a number of steps that organizations can take to protect their networks from these dangers

Let’s talk about the top 5 most common security threats.

Common Network Security Threats #1: Social Engineering

Social engineering, in the context of information security, refers to psychological manipulation of people into performing actions or divulging confidential information. Wikipedia

While we typically think of email as the main source of social engineering, hackers can gain your trust through phone, email, snail mail, or direct contact. The intention is to gain access to a system that would be too difficult for them to hack into.

Phishing or Spear phishing may be the top techniques used by social engineers to get your confidential information. Cybriant partner, KnowBe4, has compiled a list of top 10 techniques that the bad guys typically use. The list includes:

  1. Pretexting
  2. Phishing
  3. Water-holing
  4. Diversion theft
  5. Spear phishing
  6. Baiting
  7. Quid Pro Quo
  8. Tailgating
  9. Honeytrap
  10. Rogue

See the KnowBe4 article, “What is Social Engineering” for a more detailed look into those techniques.

Common Network Security Threats – Social Engineering Stats:

  • 1 in 131 emails contains malware.
  • 4,000+ ransomware attacks occur daily.
  • The number of Phishing Attacks increased 65% last year.
  • phishing attack costs a mid-sized company $1.6 million.
  • 47% of attacks in 2017 caused by phishing.

Common Network Security Threats #2: Technical Vulnerabilities

A vulnerability is a weakness of an asset or control that could potentially be exploited by one or more threats. An asset is any tangible or intangible thing or characteristic that has value to an organization, a control is an administrative, managerial, technical, or legal method that can be used to modify or manage risk, and a threat is any potential event that could harm an organization or system. Source: ISO 27001

Many organizations confuse Vulnerability Management and Vulnerability Scanning. Performing only a single vulnerability scan each year or quarter puts organizations at risk of not uncovering new vulnerabilities. The time between each scan is all an attacker needs to compromise a network. With continuous scanning, our security experts automatically have visibility to assess where each asset is secure or exposed.

Today, security professionals find themselves chasing the “threat of the week,” often to no avail. Racing ahead without context and prioritization results in reactive firefighting and pursuit of the wrong issues. Performing the security basics well demands insight and focus.

Fortunately, vulnerability remediation doesn’t always have to be performed overnight, although the highest risk issues should be addressed quickly.

According to a comprehensive assessment of global data breach statistics, 99.9 percent of the exploited vulnerabilities were compromised more than a year after the common vulnerabilities and exposures (CVE) was published.

In other words, if organizations would patch their vulnerabilities in less than a year, they could improve their chances of preventing an exploit-initiated data breach by as much as 99.9 percent.

Excerpt from “The Modern Approach to Vulnerability Scanning

Common Network Security Threats – Technical Vulnerabilities Stats:

  • More than 90% of exploited vulnerabilities in 2015 were more than one-year-old and nearly 20% were published more than 10 years ago.
  • 8,000 vulnerabilities a year were disclosed over the past decade.
  • 85% of successful hacks used the top 10 exploits.

 Common Network Security Threats #3: Poor Patch Management

Patch management is a strategy for managing patches or upgrades for software applications and technologies. A patch management plan can help a business or organization handle these changes efficiently. Techopedia

A poor patch management plan can put a company at risk of hackers finding ways through their systems via vulnerabilities. [See Equifax]

A proper patch management plan will help your organization find missing security patches, support multiple systems and platforms, and handle increased compliance restraints.

Related: The Financial Industry’s Biggest Threat

Common Network Security Threats – Poor Patch Management Stats:

  • 45% of companies are not using a dedicated patch management solution to distribute and manage software updates.
  • 72% of decision-makers do not deploy a patch within 24 hours after it is released to the public.
  • Failure to patch caused the infamous Equifax breach, releasing the data of 143 million people.

Common Network Security Threats #4: Compromised Endpoints

Compromised endpoints are a common computer security threat that has become much more common in the mobile era that we live in today. BYOD means that employees are connecting their own devices to a corporate network. While this helps an employee’s productivity, it may cause problems for an organization’s network since corporate policy may not be enforced on the device.

This threat is very closely related to common network security threats – social engineering. That is because many compromised endpoints are caused by social engineering including phishing attacks that cause an end user to download malicious software onto their devices.

What is the risk of letting malware execute? Download our ebook: Prevention vs. Detect and Respond.

Common Network Security Threats Compromised Endpoints Stats:

  • In Q1 of 2017 alone, mobile ransomware attacks increased by 253%.
  • 66% of security professionals doubt their organizations can prevent a breach of employees’ devices.
  • Most mobile attacks occur on businesses in the US. Businesses average 54 mobile malware infections.

Common Network Security Threats #5: Advanced Persistent Threats

An advanced persistent threat is a set of stealthy and continuous computer hacking processes, often orchestrated by a person or persons targeting a specific entity. An APT usually targets either private organizations, states or both for business or political motives. APT processes require a high degree of covertness over a long period of time.

The “advanced” process signifies sophisticated techniques using malware to exploit vulnerabilities in systems. The “persistent” process suggests that an external command and control system is continuously monitoring and extracting data from a specific target. The “threat” process indicates human involvement in orchestrating the attack.

APT usually refers to a group, such as a government, with both the capability and the intent to target, persistently and effectively, a specific entity. The term is commonly used to refer to cyber threats, in particular, that of Internet-enabled espionage using a variety of intelligence gathering techniques to access sensitive information,but applies equally to other threats such as that of traditional espionage or attacks.

Other recognized attack vectors include infected media, supply chain compromise, and social engineering. The purpose of these attacks is to place a custom malicious code on one or multiple computers for specific tasks and to remain undetected for the longest possible period. Knowing the attacker artifacts, such as file names, can help a professional make a network-wide search to gather all affected systems.[4] Individuals, such as an individual hacker, are not usually referred to as an APT, as they rarely have the resources to be both advanced and persistent even if they are intent on gaining access to, or attacking, a specific target.

Wikipedia

Common Network Security Threats Advanced Persistent Threats Stats: 

  • 81% of data breach victims do not have a system in place to self-detect data breaches.
  • Many companies rely on notifications from third parties to let them know about a data breach on their network, increasing the time to detection from 14.5 days to 154 days.

According to the FBI, business email compromise (BEC) alone cost businesses worldwide over $5 billion from 2013 to 2016. Here’s the disconnect: phishing skirts technology by targeting human beings. That’s why it’s critical to educate employees to recognize and report all manner of phishing attacks.

Gartner argues that the biggest threats are not the ones that risk causing the most damage to you, but simply the vulnerabilities in your organization’s environment that are being actively exploited “in the wild.”

According to its research, the primary method of compromise for most threats is the exploitation of known but unmitigated vulnerabilities, not zero-day threats or new exploits. This is largely a matter of cost: threat actors will continue to primarily use the most cost-effective and reliable exploits instead of new ones because they too have limited time and resources.

Related: Data Loss Prevention (DLP) Solutions

How to Address Common Network Security Threats

While each common network security threat has its own individual process for prevention (or elimination), some of the threats are closely related.

For example, organizations typically categorize vulnerability management and patch management in the same sentence. That’s because if you find a vulnerability, you want to patch it immediately, but those are different services.

Similarly, social engineering can cause compromised endpoints. But, your organization should have a way to maintain one and alleviate the other.

Related: Protect Your Business with Cybriant’s IT Security Best Practices Checklist

Common Network Security Threats and Cybriant

  1. Reducing your threat landscape: We targeted the top 5 common cyber breach vectors mentioned above and bundled services that will reduce your risk of loss due to breach.
  2. Building a solid security foundation: Our services are based on the NIST Cybersecurity Framework which consists of standards, guidelines, and best practices to manage cybersecurity-related risk.
  3. Simplify compliance: Each service Cybriant offers will help you operationally comply with any cybersecurity regulatory requirements
  4. Speeding time to business value: We have the expertise, data, processes, etc. to make your security tools work at peak efficiency.  More info at cybriant.com/services

Related: Comprehensive List of All Internet Threats

How to Identify Security Threats to a Network

Keeping track of the security posture of your network is critical in today’s digital age. Networks are constantly vulnerable to malicious actors who use a variety of techniques to infiltrate networks and steal sensitive data. It is essential that you understand how to identify the common security threats that may be present on your network.

The first step in understanding these threats is to understand the type of network traffic that is present in the system. Unusual or unexpected amounts of traffic can indicate a potential security risk. This could be the result of malware, or someone attempting to gain access to your network without authorization. It is important to monitor all traffic and investigate any suspicious activity.

Another way to identify potential risks is by monitoring changes in data or files on your system. Any modification of sensitive data or configuration settings that are not authorized should be investigated further. This can indicate the presence of an intruder attempting to gain access to your system.

Finally, it is important to monitor for unauthorized access attempts. If someone is trying to gain access to your network without authorization, you need to take immediate action to block them from gaining access. It is also important to ensure that all user accounts have strong passwords and follow best practices for security authentication.

 

Four Types of Network Security Risk

When assessing the security of a network, it is important to understand the four main types of risk. These include malicious software, unauthorized access attempts, data leakage, and changes in the system configuration.

Malicious software such as viruses and malware threaten networks by compromising system integrity or stealing data. Unauthorized access attempts involve someone trying to gain access to the system without authorization. Data leakage occurs when data is unintentionally leaked outside of the network, often through email or unencrypted documents. Finally, changes in system configuration involve someone changing settings or permissions on the system, which can give them access to sensitive information.

It is important to understand these types of risks so that they can be monitored and prevented from impacting your network. By understanding the risks, you can implement strategies to mitigate them and keep your data safe.

One of the most important steps in reducing potential security threats is patch management. Regularly updating software on your system ensures that any critical vulnerabilities have been addressed and reduces the risk of malicious software or unauthorized access attempts. Additionally, it is important to regularly monitor network traffic and verify that the system configuration has not been changed without authorization. This helps to ensure that any data leakage is detected quickly and addressed appropriately.

List of Network Security Risks

  1. Malicious Software: This type of risk includes viruses, worms, and other malware that can compromise your system integrity or steal sensitive data.
  2. Unauthorized Access Attempts: This involves someone trying to gain access to the system without authorization.
  3. Data Leakage: This occurs when sensitive data is unintentionally leaked outside the network.
  4. Changes in System Configuration: This involves someone changing settings or permissions on the system, which could give them access to sensitive information.

Having a secure network posture is essential for protecting your systems and data from potential threats.

Top Cyber Security Websites of 2022

How to Meet the Guidelines for the NIST Cybersecurity Framework

How to Prevent Zero-Day Attacks

How to Meet the Guidelines for NIST Cybersecurity Framework