November 19

Webinar takeaway: Deutsches Cyber Threat Briefing mit Anomali, RiskIQ und CrowdStrike

0  comments

My key takeaways

Anomali

  • it takes up to 200+ days on average before a breach might be detected
  • one challenge in many SOCs is to find relevant information in a growing "data lake"; this is where tools are needed
  • wannacry example: blocking the kill switch domain as suspicious would have helped the worm spread; getting the information about the purpose of this domain as fast as possible was mission critical
  • cross combining information from different sources and perspectives may increase the amount of data, but also make the neccesary data available to detect threads and breaches earlier

RISKIQ

  • Skimmer are collecting credit card data online like their equivalent in RL on ATMs
  • A common way to place them, is infiltrating javascript that is not self hosted but imported into websites
  • loading assets from third party websites on critical pages like a checkout-page is a big no-no
  • A full functioning skimmer can be bought on the darkweb with a shared revenue model so very low entry barriers for criminals
  • A lot of esp. smaller websites are still infected

Crowdstrike

  • 2019 crowdstrike identified 35.000 potential intrusions, in Q1 and Q2 2020 already 41.000
  • The most part of it, are conducted by cyber crime organisations followed by nation state actors
  • Panda, Bear, Kitten, Chollima, Tiger and Buffalo are code names for APTs

Env

  • Provided by Anomali
  • Supported by
  • Presenter:
    • Frank Lange (Anomali)
    • Fabian Libeau (RISKIQ)
    • Jörg Schauff (Crowdstrike)

Tags

threat hunting, webinar takeaway


You may also like

What Fantasy Role-Playing Games Can Teach Us About Cybersecurity Roles

— And why your SOC might actually need a Bard 🐉⚔️ Cybersecurity teams are often compared to armies, fire brigades, or special forces. Personally? I think they’re much closer to a party of heroes in a classic fantasy role-playing game. No matter how many frameworks, SIEMs, or AI tools we summon, defending a digital kingdom

Read More

Webinar takeaway – Applying The Threat Hunter’s Runbook

My key takeaways threat hunting runbook Identify connection persistency Identify if there is a business need Protocol analysis Investigate external IP address Investigate internal IP address Threat hunting is stealthy only when in IR mode, the adversary should be allowed to notice we are after him set the TCP timeout from 5min to 1h in

Read More