Threat Intelligence and Cake - The Tenuous Link

Date: 24 July 2018


The cyber resilience challengeToday and beyond, the only certainties are death, taxes and cyber-attacks.  The challenge, today and forever ahead, is clear.  Wait! One more certainty? Regulations. 

How do you build and maintain a cyber resilient, regulation ready (think GDPR) business?

A key area of focus must be threat intelligence. Let's cut to the chase:

  1. If it's not, threat-intel (short form TI) should be on your must-have-cybersecurity-product list. 
  2. Investing in the wrong threat intelligence feed can be costly and even counter productive.  
  3. The right kind of threat-intel can significantly increase your cybersecurity posture.

Threat Intelligence Case Study with Tushar Vartak and Amar Singh CEO of Cyber Management Alliance Ltd - Click to Read


I spoke to Tushar Vartak, a leading Middle Eastern bank's CISO on how he sourced threat intelligence feeds and how he uses threat-intel to stay a step ahead of cyber criminals.  It's available here.

Threat intelligence is not well understood and unsurprisingly, the market takes advantage and flogs painted paper as gold wafers. In this blog, I unravel some mysteries of threat-intel and cover the below key topics. 

Who should read this?

  • Management such as CIO, CISO, CRO, IT Directors and anyone in charge of reducing an organisation's cyber risk. 
  • If you are a CISSP, studying for the CISSP, CISM, CISA or if you are an IT or security engineer. 
  • Auditors and folks in the governance, risk and compliance domains will find this information insightful.


Threat Intelligence and the Poisoned Cake

During our popular cybersecurity training, GCHQ-Certified CIPR course I explain the threat intelligence value proposition with the following story. 

The Poisoned Cake: 

Threat Intelligence for non technical peopleImagine this: There are ten banks in a country and the CEOs of eight of them, have mysteriously died in the last six months. The surviving two have approached you for protection as they suspect that someone is possibly murdering these top executives one by one. 

There is big money involved (come on, they are bank CEOs after all) and you decide to take the contract! 


Before you accept the contract, what's one of the first things you should do?

  1. Buy a few drones with HD camera, extra batteries, and fly them over the executives when they are out, watching every move. 

  2. Order an ambush of bodyguards, similar to the Kim Jong's running chaps.Threat Intelligence - stop

  3. Figure out how the other CEOs of the eight banks were murdered; the weapon used, the threat actors and more. 

From the three available options, I would hope you selected option 3.  It's simply ineffective and impractical to design any protection, response and recovery strategy without having the information and the intelligence on how the adversaries accomplished these daring murders. 

It turns out that on every occasion, the attackers poisoned the cake and pastries with an undetectable poison. So, instead of focusing on the bodyguard ambush, you should ensure that someone (not sure who that unfortunate brave volunteer is) tests the pastries and cakes before the remaining CEO's have their bite. 

FYI: I have nothing against cakes. As a matter of fact they are a weakness and that's how I came up with this simple story. 


Tushar Vartak, a deeply experienced cybersecurity practitioner and CISO of a leading bank in UAE, told me how he built his own malware research lab. A must see video. 

 

 

Back to the Top


The ABC of Threat Intelligence

ABC of threat intelligenceThe simplest way to explain what is threat intelligence is to understand how and why governments depend on it. In addition to investing in protection and security, governments spend and put significant effort in the following:

  • Threat Actors: Know your adversary. Who are they. (often more than one entity) 

  • Motivation: Yes, different criminals have different motivations and many times multiple motivations. What are the key drivers for attack.  

  • Attack Strategies: Understand how that adversary attacks, its modus operandi, the choice of weapons (tools and more) 

In a nutshell, yes, you should invest in established technology controls but if you want your business to stand a chance of surviving in the digital, always-connected era, you must focus and invest in threat intelligence.

We cover the above and much more in our UK Government, GCHQ-Certified workshop. In these workshops we equip the attendees with an actionable blueprint for building a cyber resilient business.  Read more about it here. 

Wait! There is more. The Threat Intelligence Value Pyramid. Read on. 


The Threat Intelligence Value Pyramid

An image speaks a thousand words and the below is no exception. The threat intelligence value pyramid talks of two key things, namely, sourcing and the value. The better, more valuable threat intelligence is more difficult to source. As might be expected, in most cases, the higher up the pyramid, the bigger the budgetary requirements.  

I explain each section of the pyramid further down

Threat Intelligence Value Proposition


Threat Intelligence Case Study with Tushar Vartak and Amar Singh CEO of Cyber Management Alliance Ltd - Click to Read

Tushar discussed this pyramid and it's value proposition in the case study and the video interview. 

Simply, a must see and essential read. 


  • Hashes & IP Addresses:  Basic threat-intel that’s effective in the early stages of the cyber kill chain. Straightforward to produce, easy to obtain and very simple to ingest in most existing technologies like AV or SIEM.
    • Often available free of charge.
  • Domain Names: Domain names offer better value and protection (caveats do apply) It's sufficient to say here that, to be effective, most bad guys require domain names and DNS to work. Consequently, good threat intel at this level can greatly improve your resiliency.   
    • Available commercially and without cost. 
  • Tools and Weapons: As we go up the pyramid it gets harder to produce and obtain quality intelligence.  Often, from this layer, the human expert gets involved, putting in time and effort to verify and test before publishing the intelligence.  Threat intelligence from here onwards can add real value to the cyber resilience posture of an organisation.  In many cases, the intel can be ingested automatically but also must be read and understood by other humans so they can take plan and design counter actions. 
    • More often than not you have to pay for this intelligence. 
  • TTP: An acronym for Tactics, Techniques and Procedures. Put simply, this type of threat-intel offers the best value, is not easy to source and is often the most human-effort intensive to produce. Yes, consequently, it’s also the costliest.  However, I repeat, it offers the best value and can truly uplift an organisation's cyber resiliency posture.   
    • In almost all cases (unless procured and supplied by government) this threat intelligence feed is NOT free.

TTP is also used in the attack knowledge-base from MITRE. I will deep dive into MITRE and attack methodologies in a different blog. Suffice to say, you should standardise on the MITRE taxonomy.  

Back to the Top


Webinar on Threat Intelligence and Security OperationsPeter Culley, Vodafone's Cyber Intelligence Authority, Tushar Vartak, Director of Security at RAKBank in UAE and some crazily intelligent experts from Kaspersky joined me on a webinar on threat intelligence. Check it out


Applying Threat Intelligence in the Business

The WannaCry example is still fresh in most minds so let's go along with something WannaCry like. This is a simplification.

Scene 1: Someone stole some deeply advanced details on weaknesses in ALL Windows systems. (vulnerabilities). The criminal gang who stole this data has successfully auctioned some of these secrets on the dark web. 

Scene 2: The other gang who purchased this exploit tasked their team members to help them develop this exploit. As part of any good development process one member of the team decides to test the beta version of the malicious file and sends it to an experienced security researcher who he despises. 

Scene 3: The researcher who works for this security vendor receives this malicious file. An industry veteran the researcher takes all precautions and decides to take a deeper peek into this file from an anonymous email. To his surprise, he observes an entirely new exploit for Windows systems. He is surprised and impressed with the person who created this "weapon"

Scene 4:  The Security researcher immediately writes a detailed report on this malicious file. In the research he also shares what configurations and updates need to be applied to Windows systems that would render this exploit useless. 

Scene 5: The company that hires this security researcher validates this information and immediately pushes it out to their paying customers with clear indication (1) that the exploit is of critical nature and (2) guidance on how to fix the issue and (3) what exact indicators to look out for signs of compromise. 

Scene 6: Within a few hours of the distribution of the private threat intelligence report, the criminal gang releases the exploit into the open with two simple objectives, that of causing chaos and earning money. Hundreds and thousands of organisations fall for this never before-seen exploit except for those who heeded the advice of the security research team. 

Back to the Top


Sourcing and Considerations

Threat Intelligence Value Proposition smallReferring back to the threat intelligence value pyramid, I hope it's clear that if you want an effective and mature cybersecurity posture and a cyber resilient organisation you must go up the pyramid. 

Remember, at the top of the pyramid, it's primarily all about the human expertise. 

Commercial Threat Intelligence Feeds - Key Considerations

  • The Human: Ask to meet the human experts that are involved in the threat intelligence production cycle. If possible, ask this expert to give you a summary of current threats. 

  • Seek evidence: Ask for past analysis and reports.  However, as in finance, past performance does not necessarily reflect on the future output. 

  • Employee Departures: Consequently, ask about any recent employee departures. If there are a few experts who have left (who had a good track record) then it could be a sign of trouble.  

  • Location does matter: Check to see if the threat-intel provider specialises in or at the least covers your region. Different regions have different specialist vendors. 

  • Specialism: During our interview Tushar touched on the importance of sector specialism as one of the criteria when selecting his threat feeds provider. Put another way, if you are in banking, not every threat feed provider specialises in attacks on ATMs.  

The Threat Intelligence Journey and Takeaways.

As in all process based initiatives cyber resilience is a continuous loop linked to and operating within other business operational cycles. The key things to keep in mind. Protection is important but give equal weighting to making your organisation cyber resilient and breach ready. 

  • To gain maximum value from the upper pyramid you need in-house specialists with the knowledge and passion to digest the context, the TTPs and the situational awareness generated from these private threat-intel reports. 

  • Threat Intelligence comes in many forms. Before paying, do your due diligence and read the section on Commercial Threat Feeds above.

  • Remember, depending on your region and the nature of your business, yo you may NOT receive all the threat-intel from a particular vendor. Especially when it comes to intelligence from state actors. Tiny but crucial point.

  • Regulations, yes, like the GDPR, demand that organisations be breach ready. As I discuss and teach in my UK-Government GCHQ certified CIPR course, early detection is a key ingredient of being data-breach ready.  Threat intelligence is one very effective way of building effective early detection mechanisms. 

Start Your Response Planning Now!

In addition, if you are running a business, of any size, consider getting all the middle to senior management trained on how to plan and prepare for a cyber attack. All layers of management must have basic security awareness and the knowledge required to make their organisations more cyber resilient. 

Act now to register for our GCHQ Certified Cyber Incident Planning & Response workshopsRemember, a cyber attack could easily lead to a data breach, that could put you at odds with the GDPR on several fronts.  

To begin planning your incident you can download our Cyber Incident Planning & Response mind map here. We also created a Action Checklist to help you on your journey. You can download the checklist here. 


More Information and Useful Links

We have created a resources page where you can download the latest PDFs, watch the latest video interviews with CISOs, CIOs and global leaders. Much more on that page.

Back to the Top

Threat Intelligence Platforms

Threat Intelligence Report

Get Email Updates on our Latest News

Simply enter you details in the form below to subscribe:

  • Or call us on:
  • +44 (0) 203 189 1422