SlideShare a Scribd company logo
6
Most read
8
Most read
11
Most read
EVERY INCIDENT LEAVES A TRAIL OF EVIDENCE
D3PAK KUMAR (D3)
DIGITAL FORENSICS | CYBER INTELLIGENCE
The Technology World Always has the Sharpest Brains...
There are equally sharp minds, working against you…
Src : Securus First
Cyber Threat Intelligence: Medium D3PAK KUMAR (D3)
DIGITAL FORENSICS | CYBER INTELLIGENCE
DISCLAIMER
The views / opinions / assumptions expressed in this presentation/resource is for educational & research
purposes only. Do not attempt to violate the law with anything contained here. Neither the author of this
material, nor anyone else affiliated in any way, is liable for your actions.
The purpose of this presentation is to share what is happening in cyber and what is possible...
D3PAK KUMAR (D3)
DIGITAL FORENSICS | CYBER INTELLIGENCE
ONCE THE DOCUMENTS HAVE BEEN POSTED
ONLINE, THE
GENIE IS OUT OF THE BOTTLE
D3PAK KUMAR (D3)
DIGITAL FORENSICS | CYBER INTELLIGENCE
Cyber Threat Intelligence: Medium
We live in the digital age
Actors/Criminals do too
What are the top cyber threats ?
Think Adversarial Perspective
D3PAK KUMAR (D3)
DIGITAL FORENSICS | CYBER INTELLIGENCE
Cyber Threat Intelligence: Medium
D3PAK KUMAR (D3)
DIGITAL FORENSICS | CYBER INTELLIGENCE
CRITICAL INFRASTRUCTURE
GOVERNMENT
MANUFACTURING
BANKING
FINANCIAL SERVICES & MOBILE MONEY RETAIL
STRATEGIC & PUBLIC ENTERPRISES. PROFESSIONAL SERVICES
HOSPITALITY
INSURANCE
TELECOMMUNICATIONS
Cyber Threat Intelligence: Medium
D3PAK KUMAR (D3)
DIGITAL FORENSICS | CYBER INTELLIGENCE
CYBER of THINGS
C Factor and all are interrelated
CYBER
CRIME
CYBER
SECURITY
CYBER
TERRORISM
Cyber Threat Intelligence: Medium
D3PAK KUMAR (D3)
DIGITAL FORENSICS | CYBER INTELLIGENCE
Example: RANSOMWARE Now Crypto
Hackers Mindset : Too much risk......but the target is too sweet
Cyber Threat Intelligence: Medium
D3PAK KUMAR (D3)
DIGITAL FORENSICS | CYBER INTELLIGENCE
Anything Likely to cause damage or danger
+
Ability to acquire and apply knowledge and skills
=
Threat Intelligence
Another Buzz
Cyber Threat Intelligence: Medium
D3PAK KUMAR (D3)
DIGITAL FORENSICS | CYBER INTELLIGENCE
Cyber Threat Intelligence: Medium
D3PAK KUMAR (D3)
DIGITAL FORENSICS | CYBER INTELLIGENCE
OSINT ≠ Actionable Intelligence
What exactly : OSINF Open Source Information
Players are Firewalls, Endpoint Detection & Response, Endpoint protection platform, Anti-Virus Intel Stakeholders & OPSEC Firms
Online Social media : Sentiments, Statistics, Trends
Threat Intel firms:
Good intel
No Responsible Disclosure Policy; No verification
Shift towards Data breach and Free media PR
Defacement Days gone… APT , Malware, Ransomware, Honeypots, Bots, Watering Hole etc.
Present Scenario
Cyber Threat Intelligence: Medium
D3PAK KUMAR (D3)
DIGITAL FORENSICS | CYBER INTELLIGENCE
34% of
respondents
didn't have any
prior experience
with OSINT-
related research;
85% reported
they received
little or no
training in OSINT
techniques and
risk prevention
from their current
employer;
55% are
venturing into
the Dark Web as
part of their
OSINT activity 10
or more times
per month;
38% do not use
managed
attribution tools
to mask or hide
their online
identities or
personas;
29% report no
oversight
procedures to
ensure that tools
are not being
abused by
analysts;
83% of cyber
threat
intelligence
analysts use a
web browser as
their primary
tool.
Cyber Threat Intelligence: Analysts Undertrained, Unsupported
Cyber Threat Intelligence: Medium
Source: Authentic8
D3PAK KUMAR (D3)
DIGITAL FORENSICS | CYBER INTELLIGENCE
i. Hypothesis Driven: Data Leak/Breach, IOC, TTPS (Post incident)
ii. Analytics and Machine Learning : Data set, Signatures, Anomalies, Historical repo, UEBA, SOAR etc.
iii. Manual Interventions: Customised sensors, crawlers, parsers, API
iv. Human Intelligence always Win : Expertise, SME, Coordination agencies/organisations, etc.
Types and Approaches
Cyber Threat Intelligence: Medium
Strategic: Broader threat trends typically meant for a non technical audience
Tactical: Outlines of tactics, techniques, and procedures (TTP) of threat actors
for a more technical audience
Operational: Technical details about specific attacks and campaigns
D3PAK KUMAR (D3)
DIGITAL FORENSICS | CYBER INTELLIGENCE
• Threat Intel Cycle: Plan, Collect, Analysis, Dissemination
• Capacity building: Detailed subject training as Ramayana can't be finished in 1 hour
• PPT factor with proper effective coordination
• Proactive Threat Hunting required : Data and Patience
• Understand the Threat and Actor and what to hunt
REQUIRED ACTION
Cyber Threat Intelligence: Medium
D3PAK KUMAR (D3)
DIGITAL FORENSICS | CYBER INTELLIGENCE
Sophisticated actors penetrating networks using "publicly" available
information demonstrate they don’t need to develop advanced malware/tactics
when the vulnerabilities are sitting in plain sight. Using open-source
information (OSINF) to assess publicly available information is somehow
sufficient to serve the purpose
Cyber Threat Intelligence: Medium
The best defence start with good OSINF
GOOD THINGS OF TECHNOLOGY
D3PAK KUMAR (D3)
DIGITAL FORENSICS | CYBER INTELLIGENCE
DEEP-WEB / REDDIT
LEAD (SOCIAL NETWORKING)
IOT / Sync
COOKIES INTELLIGENCE
Cyber Threat Intelligence: Medium
CTI COMMUNITIES
GOOGLE
D3PAK KUMAR (D3)
DIGITAL FORENSICS | CYBER INTELLIGENCE
SOCMINT
• Disseminate to Concern
• Need to add
Output
COTS
Twitter
iMessengers
Maltego
Etc.
Processing
There are three main steps in
analysing social media:
• Data identification,
• Data analysis, and
• Information interpretation.
Gather actionable insights in raw
form concerning to Subject, etc.
Input
Cyber Threat Intelligence: Medium
D3PAK KUMAR (D3)
DIGITAL FORENSICS | CYBER INTELLIGENCE
Cyber Kill Chain
MITRE ATT&CK MATRIX
Recon Weaponise Delivery Exploitation Installation C2
Actions &
Objectives
 Task: Identify the Attackers’ Step by Step Process
 Goal: Disrupting Attackers’ operations
 Motivation
 Preparation
 SE
 OSINT
 Configuration
 Packaging
 Powershell
 Add
 Mechanism
of Delivery
 Infection
Vector
 Phishing
 Technical or
human?
 Applications
affected
 Method &
Characteristics
 Persistence
 Characteristic
s of change
 Self0signed
Driver
 Communication
between victim
& adversary
 VPN
 What the adversary
does when they
have control of the
system
 Data Exfil
 APT
MITRE ATT&CK:
 Active Scanning
 Passive Scanning
 Determine Domain
& IP Address Space
 Analyze Third-Party
IT Footprint
MITRE ATT&CK:
 Malware
 Scripting
 Service
Execution
MITRE ATT&CK:
 Spearphishing
Attachment/Link
 Exploit Public-
Facing
Application
 Supply Chain
Compromise
MITRE ATT&CK:
 Local Job
Scheduling
 Scripting
 Rundll32
MITRE ATT&CK:
 Application
Shimming
 Hooking
 Login Items
MITRE ATT&CK:
 Data
Obfuscation
 Domain
Fronting
 Web Service
MITRE ATT&CK:
 Email Collection
 Data from Local
System/Network
Share
 Surveillance
Cyber Threat Intelligence: Medium
D3PAK KUMAR (D3)
DIGITAL FORENSICS | CYBER INTELLIGENCE
CYBER SECURITY PREPAREDNESS
LEGALMEASURES
• Measures the
legal
framework of a
country that
streamlines
basic response
mechanisms to
breaching of
cyber law
TECHNICAL
• Measures the
adequacy of
technical
measures and
the strength of
capabilities
based on the
number of
existing
technical
institutions
and
frameworks
dealing with
cybersecurity
ORGANISATIONAL
• Measures the
organisational
strategy of a
countries
cybersecurity
imitative. This
is based on
the number of
institutions
and strategies
organizing
cybersecurity
development
at national
level
CAPACITYBUILDING
• Measures the
awareness
campaign and
the availability
of resources
for each
country. (
Includes the
existence of
research and
development
education and
training
programs and
certified
professionals
and public
sector
agencies.
COOPERATION
• Measures the
active
engagement
of different
sectors and
stakeholders in
preventing
threats and
combating
cyber-attacks.
Cyber Threat Intelligence: Medium
D3PAK KUMAR (D3)
DIGITAL FORENSICS | CYBER INTELLIGENCE
i. OSINT Tools and Framework : Domain Based, Searching, Clustering, Grouping etc.
ii. OSINT Services websites: osint, start.me, midasearch, toddington, osintgeek, intel technique etc.
iii. Commercial vendors: Feeds, Alerts
iv. Government off-the-shelf Tools : In-House, Integrated APIs and Data Lake
v. Common Sense
Tools
Cyber Threat Intelligence: Medium
CIA Director: We kill people based on metadata
Open Network
Top OTT platforms, Social media domains Twitter,
Facebook, YouTube, Instagram, Parler, 4chan, 8chan,
Stream, Kiwi, countries specific search engine
Close Network
Encrypted channels keybase, chirpwire, signal, Kirk,
FaceTime, Riot, discord, gaming platform etc.
invitation /participation basis
D3PAK KUMAR (D3)
DIGITAL FORENSICS | CYBER INTELLIGENCE
Cyber Threat Intelligence: Medium
D3PAK KUMAR (D3)
DIGITAL FORENSICS | CYBER INTELLIGENCE
Don't believe marketing hype regarding Cyber Threat Safety
"oh, we spent $$$ in $Vendor product, so we are safe"
Any "tool", regardless of the price, is still a "tool“
Take a Break
Cyber Threat Intelligence: Medium
D3pak@Protonmail.com
Resources : D3pakblog.wordpress.com
D3PAK KUMAR (D3)
DIGITAL FORENSICS | CYBER INTELLIGENCE
Thank You
References
o Cyber Threat Intelligence Command Centre - SC3
o GitHub/SANS/Lockheed Martin Corporation
Cyber Threat Intelligence: Medium

More Related Content

PDF
Cyber Threat Intelligence - It's not just about the feeds
PPTX
MITRE ATT&CK framework
PPTX
Cyber Threat Intelligence | Information to Insight
PPTX
Cyber kill chain
PDF
Cyber Threat Intelligence
PPTX
Cyber Threat Hunting Workshop
PDF
MITRE ATT&CK Framework
PDF
Introduction to MITRE ATT&CK
Cyber Threat Intelligence - It's not just about the feeds
MITRE ATT&CK framework
Cyber Threat Intelligence | Information to Insight
Cyber kill chain
Cyber Threat Intelligence
Cyber Threat Hunting Workshop
MITRE ATT&CK Framework
Introduction to MITRE ATT&CK

What's hot (20)

PDF
Threat Hunting with Splunk Hands-on
PPTX
Deception technology for advanced detection
PPSX
Next-Gen security operation center
PPTX
Threat Hunting
PPTX
Cyber Security Awareness Session for Executives and Non-IT professionals
PPTX
Security operation center
PDF
Threat Intelligence
PPTX
Cyber security landscape
PDF
Intelligence Failures of Lincolns Top Spies: What CTI Analysts Can Learn Fro...
PDF
Threat Hunting Report
PDF
How MITRE ATT&CK helps security operations
PPTX
SIEM Primer:
PDF
ATT&CK Updates- Defensive ATT&CK
PDF
Security Strategy and Tactic with Cyber Threat Intelligence (CTI)
PDF
Secure Design: Threat Modeling
PDF
PaloAlto Enterprise Security Solution
PPT
Intrusion Detection Systems and Intrusion Prevention Systems
PDF
Overview of Data Loss Prevention (DLP) Technology
PDF
Addressing the cyber kill chain
PDF
Threat hunting 101 by Sandeep Singh
Threat Hunting with Splunk Hands-on
Deception technology for advanced detection
Next-Gen security operation center
Threat Hunting
Cyber Security Awareness Session for Executives and Non-IT professionals
Security operation center
Threat Intelligence
Cyber security landscape
Intelligence Failures of Lincolns Top Spies: What CTI Analysts Can Learn Fro...
Threat Hunting Report
How MITRE ATT&CK helps security operations
SIEM Primer:
ATT&CK Updates- Defensive ATT&CK
Security Strategy and Tactic with Cyber Threat Intelligence (CTI)
Secure Design: Threat Modeling
PaloAlto Enterprise Security Solution
Intrusion Detection Systems and Intrusion Prevention Systems
Overview of Data Loss Prevention (DLP) Technology
Addressing the cyber kill chain
Threat hunting 101 by Sandeep Singh
Ad

Similar to Cyber Threat Intel : Overview (20)

PDF
Cyber of things 2.0
PDF
The Hacker Playbook: How to Think like a Cybercriminal to Reduce Risk
PPTX
Achieving Caribbean Cybersecuirty
PPTX
Research on AI using Cyber Security and Forensics
PPTX
Artificial Intelligence in Cybersecurity
PDF
2015 Cyber Security
PPTX
Cybersecurity PowerPoint Presentation
PPTX
Cyber security with ai
PDF
Cyber Forensics
PDF
Ethical Hacking
PDF
Cybercrime Bill 2014: Due Diligence
PDF
The Role Of Data Analytics In Cybersecurity
PPTX
C4I cyber secuirty by Eric Eifert - Keynote 9.pptx
PPT
The-Role-of-Digital-Forensics-in-Unraveling-Modern-Cybercrimes-_1_.ppt
PDF
Most Influential Cybersecurity Leader to Follow in 2024.pdf
PDF
What You’ll Learn in a Cybersecurity Course
PDF
Fall2015SecurityShow
PDF
Resiliency-Part One -11-3-2015
PPTX
Module 1Introduction to cyber security.pptx
PPTX
Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network Insights
Cyber of things 2.0
The Hacker Playbook: How to Think like a Cybercriminal to Reduce Risk
Achieving Caribbean Cybersecuirty
Research on AI using Cyber Security and Forensics
Artificial Intelligence in Cybersecurity
2015 Cyber Security
Cybersecurity PowerPoint Presentation
Cyber security with ai
Cyber Forensics
Ethical Hacking
Cybercrime Bill 2014: Due Diligence
The Role Of Data Analytics In Cybersecurity
C4I cyber secuirty by Eric Eifert - Keynote 9.pptx
The-Role-of-Digital-Forensics-in-Unraveling-Modern-Cybercrimes-_1_.ppt
Most Influential Cybersecurity Leader to Follow in 2024.pdf
What You’ll Learn in a Cybersecurity Course
Fall2015SecurityShow
Resiliency-Part One -11-3-2015
Module 1Introduction to cyber security.pptx
Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network Insights
Ad

More from Deepak Kumar (D3) (20)

PDF
Dark Web Forensics
PDF
Cyber Security Tips
PDF
CISSP INFORGRAPH MINDMAP
PDF
Cyber Forensics & Challenges
PDF
Cyber Crime Types & Tips
PDF
Cyber Security India & Cyber Crime
PDF
21st Century Cyber Forensics
PDF
PPTX
PDF
PDF
Ransomware
PDF
Success Mantra
PDF
Facebook Security Tips
PDF
Registry Registrar Registrant
PDF
PDF
How to social/official network
PDF
Dark Web Forensics
Cyber Security Tips
CISSP INFORGRAPH MINDMAP
Cyber Forensics & Challenges
Cyber Crime Types & Tips
Cyber Security India & Cyber Crime
21st Century Cyber Forensics
Ransomware
Success Mantra
Facebook Security Tips
Registry Registrar Registrant
How to social/official network

Recently uploaded (20)

PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PPTX
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
PPTX
Cell Structure & Organelles in detailed.
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PDF
Mark Klimek Lecture Notes_240423 revision books _173037.pdf
PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PDF
Insiders guide to clinical Medicine.pdf
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PDF
VCE English Exam - Section C Student Revision Booklet
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PPTX
Pharma ospi slides which help in ospi learning
PPTX
PPH.pptx obstetrics and gynecology in nursing
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PDF
Origin of periodic table-Mendeleev’s Periodic-Modern Periodic table
PPTX
Institutional Correction lecture only . . .
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PDF
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
STATICS OF THE RIGID BODIES Hibbelers.pdf
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
Cell Structure & Organelles in detailed.
FourierSeries-QuestionsWithAnswers(Part-A).pdf
Mark Klimek Lecture Notes_240423 revision books _173037.pdf
102 student loan defaulters named and shamed – Is someone you know on the list?
Abdominal Access Techniques with Prof. Dr. R K Mishra
Insiders guide to clinical Medicine.pdf
Microbial diseases, their pathogenesis and prophylaxis
VCE English Exam - Section C Student Revision Booklet
2.FourierTransform-ShortQuestionswithAnswers.pdf
Pharma ospi slides which help in ospi learning
PPH.pptx obstetrics and gynecology in nursing
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
Origin of periodic table-Mendeleev’s Periodic-Modern Periodic table
Institutional Correction lecture only . . .
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...

Cyber Threat Intel : Overview

  • 1. EVERY INCIDENT LEAVES A TRAIL OF EVIDENCE D3PAK KUMAR (D3) DIGITAL FORENSICS | CYBER INTELLIGENCE
  • 2. The Technology World Always has the Sharpest Brains... There are equally sharp minds, working against you… Src : Securus First Cyber Threat Intelligence: Medium D3PAK KUMAR (D3) DIGITAL FORENSICS | CYBER INTELLIGENCE
  • 3. DISCLAIMER The views / opinions / assumptions expressed in this presentation/resource is for educational & research purposes only. Do not attempt to violate the law with anything contained here. Neither the author of this material, nor anyone else affiliated in any way, is liable for your actions. The purpose of this presentation is to share what is happening in cyber and what is possible... D3PAK KUMAR (D3) DIGITAL FORENSICS | CYBER INTELLIGENCE
  • 4. ONCE THE DOCUMENTS HAVE BEEN POSTED ONLINE, THE GENIE IS OUT OF THE BOTTLE D3PAK KUMAR (D3) DIGITAL FORENSICS | CYBER INTELLIGENCE Cyber Threat Intelligence: Medium
  • 5. We live in the digital age Actors/Criminals do too What are the top cyber threats ? Think Adversarial Perspective D3PAK KUMAR (D3) DIGITAL FORENSICS | CYBER INTELLIGENCE Cyber Threat Intelligence: Medium
  • 6. D3PAK KUMAR (D3) DIGITAL FORENSICS | CYBER INTELLIGENCE CRITICAL INFRASTRUCTURE GOVERNMENT MANUFACTURING BANKING FINANCIAL SERVICES & MOBILE MONEY RETAIL STRATEGIC & PUBLIC ENTERPRISES. PROFESSIONAL SERVICES HOSPITALITY INSURANCE TELECOMMUNICATIONS Cyber Threat Intelligence: Medium
  • 7. D3PAK KUMAR (D3) DIGITAL FORENSICS | CYBER INTELLIGENCE CYBER of THINGS C Factor and all are interrelated CYBER CRIME CYBER SECURITY CYBER TERRORISM Cyber Threat Intelligence: Medium
  • 8. D3PAK KUMAR (D3) DIGITAL FORENSICS | CYBER INTELLIGENCE Example: RANSOMWARE Now Crypto Hackers Mindset : Too much risk......but the target is too sweet Cyber Threat Intelligence: Medium
  • 9. D3PAK KUMAR (D3) DIGITAL FORENSICS | CYBER INTELLIGENCE Anything Likely to cause damage or danger + Ability to acquire and apply knowledge and skills = Threat Intelligence Another Buzz Cyber Threat Intelligence: Medium
  • 10. D3PAK KUMAR (D3) DIGITAL FORENSICS | CYBER INTELLIGENCE Cyber Threat Intelligence: Medium
  • 11. D3PAK KUMAR (D3) DIGITAL FORENSICS | CYBER INTELLIGENCE OSINT ≠ Actionable Intelligence What exactly : OSINF Open Source Information Players are Firewalls, Endpoint Detection & Response, Endpoint protection platform, Anti-Virus Intel Stakeholders & OPSEC Firms Online Social media : Sentiments, Statistics, Trends Threat Intel firms: Good intel No Responsible Disclosure Policy; No verification Shift towards Data breach and Free media PR Defacement Days gone… APT , Malware, Ransomware, Honeypots, Bots, Watering Hole etc. Present Scenario Cyber Threat Intelligence: Medium
  • 12. D3PAK KUMAR (D3) DIGITAL FORENSICS | CYBER INTELLIGENCE 34% of respondents didn't have any prior experience with OSINT- related research; 85% reported they received little or no training in OSINT techniques and risk prevention from their current employer; 55% are venturing into the Dark Web as part of their OSINT activity 10 or more times per month; 38% do not use managed attribution tools to mask or hide their online identities or personas; 29% report no oversight procedures to ensure that tools are not being abused by analysts; 83% of cyber threat intelligence analysts use a web browser as their primary tool. Cyber Threat Intelligence: Analysts Undertrained, Unsupported Cyber Threat Intelligence: Medium Source: Authentic8
  • 13. D3PAK KUMAR (D3) DIGITAL FORENSICS | CYBER INTELLIGENCE i. Hypothesis Driven: Data Leak/Breach, IOC, TTPS (Post incident) ii. Analytics and Machine Learning : Data set, Signatures, Anomalies, Historical repo, UEBA, SOAR etc. iii. Manual Interventions: Customised sensors, crawlers, parsers, API iv. Human Intelligence always Win : Expertise, SME, Coordination agencies/organisations, etc. Types and Approaches Cyber Threat Intelligence: Medium Strategic: Broader threat trends typically meant for a non technical audience Tactical: Outlines of tactics, techniques, and procedures (TTP) of threat actors for a more technical audience Operational: Technical details about specific attacks and campaigns
  • 14. D3PAK KUMAR (D3) DIGITAL FORENSICS | CYBER INTELLIGENCE • Threat Intel Cycle: Plan, Collect, Analysis, Dissemination • Capacity building: Detailed subject training as Ramayana can't be finished in 1 hour • PPT factor with proper effective coordination • Proactive Threat Hunting required : Data and Patience • Understand the Threat and Actor and what to hunt REQUIRED ACTION Cyber Threat Intelligence: Medium
  • 15. D3PAK KUMAR (D3) DIGITAL FORENSICS | CYBER INTELLIGENCE Sophisticated actors penetrating networks using "publicly" available information demonstrate they don’t need to develop advanced malware/tactics when the vulnerabilities are sitting in plain sight. Using open-source information (OSINF) to assess publicly available information is somehow sufficient to serve the purpose Cyber Threat Intelligence: Medium The best defence start with good OSINF
  • 16. GOOD THINGS OF TECHNOLOGY D3PAK KUMAR (D3) DIGITAL FORENSICS | CYBER INTELLIGENCE DEEP-WEB / REDDIT LEAD (SOCIAL NETWORKING) IOT / Sync COOKIES INTELLIGENCE Cyber Threat Intelligence: Medium CTI COMMUNITIES GOOGLE
  • 17. D3PAK KUMAR (D3) DIGITAL FORENSICS | CYBER INTELLIGENCE SOCMINT • Disseminate to Concern • Need to add Output COTS Twitter iMessengers Maltego Etc. Processing There are three main steps in analysing social media: • Data identification, • Data analysis, and • Information interpretation. Gather actionable insights in raw form concerning to Subject, etc. Input Cyber Threat Intelligence: Medium
  • 18. D3PAK KUMAR (D3) DIGITAL FORENSICS | CYBER INTELLIGENCE Cyber Kill Chain MITRE ATT&CK MATRIX Recon Weaponise Delivery Exploitation Installation C2 Actions & Objectives  Task: Identify the Attackers’ Step by Step Process  Goal: Disrupting Attackers’ operations  Motivation  Preparation  SE  OSINT  Configuration  Packaging  Powershell  Add  Mechanism of Delivery  Infection Vector  Phishing  Technical or human?  Applications affected  Method & Characteristics  Persistence  Characteristic s of change  Self0signed Driver  Communication between victim & adversary  VPN  What the adversary does when they have control of the system  Data Exfil  APT MITRE ATT&CK:  Active Scanning  Passive Scanning  Determine Domain & IP Address Space  Analyze Third-Party IT Footprint MITRE ATT&CK:  Malware  Scripting  Service Execution MITRE ATT&CK:  Spearphishing Attachment/Link  Exploit Public- Facing Application  Supply Chain Compromise MITRE ATT&CK:  Local Job Scheduling  Scripting  Rundll32 MITRE ATT&CK:  Application Shimming  Hooking  Login Items MITRE ATT&CK:  Data Obfuscation  Domain Fronting  Web Service MITRE ATT&CK:  Email Collection  Data from Local System/Network Share  Surveillance Cyber Threat Intelligence: Medium
  • 19. D3PAK KUMAR (D3) DIGITAL FORENSICS | CYBER INTELLIGENCE CYBER SECURITY PREPAREDNESS LEGALMEASURES • Measures the legal framework of a country that streamlines basic response mechanisms to breaching of cyber law TECHNICAL • Measures the adequacy of technical measures and the strength of capabilities based on the number of existing technical institutions and frameworks dealing with cybersecurity ORGANISATIONAL • Measures the organisational strategy of a countries cybersecurity imitative. This is based on the number of institutions and strategies organizing cybersecurity development at national level CAPACITYBUILDING • Measures the awareness campaign and the availability of resources for each country. ( Includes the existence of research and development education and training programs and certified professionals and public sector agencies. COOPERATION • Measures the active engagement of different sectors and stakeholders in preventing threats and combating cyber-attacks. Cyber Threat Intelligence: Medium
  • 20. D3PAK KUMAR (D3) DIGITAL FORENSICS | CYBER INTELLIGENCE i. OSINT Tools and Framework : Domain Based, Searching, Clustering, Grouping etc. ii. OSINT Services websites: osint, start.me, midasearch, toddington, osintgeek, intel technique etc. iii. Commercial vendors: Feeds, Alerts iv. Government off-the-shelf Tools : In-House, Integrated APIs and Data Lake v. Common Sense Tools Cyber Threat Intelligence: Medium CIA Director: We kill people based on metadata Open Network Top OTT platforms, Social media domains Twitter, Facebook, YouTube, Instagram, Parler, 4chan, 8chan, Stream, Kiwi, countries specific search engine Close Network Encrypted channels keybase, chirpwire, signal, Kirk, FaceTime, Riot, discord, gaming platform etc. invitation /participation basis
  • 21. D3PAK KUMAR (D3) DIGITAL FORENSICS | CYBER INTELLIGENCE Cyber Threat Intelligence: Medium
  • 22. D3PAK KUMAR (D3) DIGITAL FORENSICS | CYBER INTELLIGENCE Don't believe marketing hype regarding Cyber Threat Safety "oh, we spent $$$ in $Vendor product, so we are safe" Any "tool", regardless of the price, is still a "tool“ Take a Break Cyber Threat Intelligence: Medium
  • 23. D3pak@Protonmail.com Resources : D3pakblog.wordpress.com D3PAK KUMAR (D3) DIGITAL FORENSICS | CYBER INTELLIGENCE Thank You References o Cyber Threat Intelligence Command Centre - SC3 o GitHub/SANS/Lockheed Martin Corporation Cyber Threat Intelligence: Medium