<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
     xmlns:content="http://purl.org/rss/1.0/modules/content/"
     xmlns:wfw="http://wellformedweb.org/CommentAPI/"
     xmlns:dc="http://purl.org/dc/elements/1.1/"
     xmlns:atom="http://www.w3.org/2005/Atom"
     xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
     xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
>

    <channel>
        <title>Threat Intelligence and Cybersecurity Prevention Blog and White Papers</title>
        <atom:link href="https://threatintelligenceplatform.com/blog/feed/" rel="self" type="application/rss+xml" />
        <link>https://threatintelligenceplatform.com/blog</link>
        <description>On the TIP blog, you can find plenty of useful free resources to help you enhance your cybersecurity protection and eliminate cybersecurity risks.</description>
        <lastBuildDate>Wed, 13 May 2020 01:00:00 +0000</lastBuildDate>
        <language>en-US</language>
        <sy:updatePeriod>weekly</sy:updatePeriod>
        <sy:updateFrequency>1</sy:updateFrequency>
        <generator></generator>
        <item>
            <title>How Cybersecurity Experts Can Use Threat Intelligence Tools to Prevent Malware Infection</title>
            <link>https://threatintelligenceplatform.com/how-cybersecurity-experts-can-use-threat-intelligence-tools-to-prevent-malware-infection</link>
            <pubDate>Wed, 13 May 2020 01:00:00 +0000</pubDate>
            <dc:creator>admin</dc:creator>

            <guid isPermaLink="false">https://threatintelligenceplatform.com/blog/?p=5100</guid>
            <description><![CDATA[
            <img width="1000" height="750" src="https://publishing-platform.threatintelligenceplatform.com/wordpress/wp-content/uploads/how-cybersecurity-experts-can-use-threat-intelligence-tools-to-prevent-malware-infection.jpg" class="webfeedsFeaturedVisual wp-post-image" alt="How Cybersecurity Experts Can Use Threat Intelligence Tools to Prevent Malware Infection" style="display: block; margin: auto; margin-bottom: 25px;max-width: 100%;" />
            <p>In this post, we take a look at how threat intelligence tools like Threat Intelligence Platform (TIP) can help them safeguard their infrastructure from debilitating attacks. Before that, though, let’s list some of the most common malware-enabled cyber attacks that cybersecurity teams must thwart.</p>
]]></description>
            <content:encoded><![CDATA[
            <img width="1000" height="750" src="https://publishing-platform.threatintelligenceplatform.com/wordpress/wp-content/uploads/how-cybersecurity-experts-can-use-threat-intelligence-tools-to-prevent-malware-infection.jpg" class="webfeedsFeaturedVisual wp-post-image" alt="How Cybersecurity Experts Can Use Threat Intelligence Tools to Prevent Malware Infection" style="display: block; margin: auto; margin-bottom: 25px;max-width: 100%;" />
            <p>Cybersecurity is indeed a growing concern for all. Over the years, we continued to witness a considerable increase in the volume and sophistication of cybersecurity threats — resulting in breaches, <a href="https://enterprise.verizon.com/en-gb/resources/reports/dbir/2019/summary-of-findings/" target="_blank" aria-label=" (opens in a new tab)" rel="noreferrer noopener" class="aioseop-link">28% of which were malware-enabled</a>, which continue to cripple companies. Amid this backdrop, cybersecurity experts must remain vigilant and ensure that none of their network-connected systems are malware-infected.</p><p>In this post, we take a look at how threat intelligence tools like Threat Intelligence Platform (TIP) can help them safeguard their infrastructure from debilitating attacks. Before that, though, let’s list some of the most common malware-enabled cyber attacks that cybersecurity teams must thwart.</p><!-- wp:more --><!--more--><!-- /wp:more --><!-- wp:heading {"align":"left"} --><h2 class="has-text-align-left"><strong>4 Threats Every Organization Needs Protection From</strong></h2><!-- /wp:heading --><p>When it comes to cybersecurity, defenders first need to know how attackers get into their networks. These days, the latter typically exploit vulnerabilities in software and hardware with malware. We identified four ways in which malware infection can start in a target network below.</p><!-- wp:heading {"level":3} --><h4>1. <strong>Phishing</strong></h4><!-- /wp:heading --><p>Phishing is one of the oldest cyberattack methods that remain effective to this day. Attackers usually prey on the fear or shock of victims to get them to click on malicious links embedded in an email or download a malware disguised as an attachment. Such was the case in a recent <a aria-label=" (opens in a new tab)" href="https://nakedsecurity.sophos.com/2020/02/21/the-amazon-prime-phishing-attack-that-wasnt/" target="_blank" rel="noreferrer noopener" class="aioseop-link">Amazon Prime phishing campaign</a>. Targets received emails telling them they were locked out of their accounts and thus needed to verify their details to continue using the service. While this particular campaign looks like a test easy to foil, users should always be wary of phishing that often tricks them into handing out their account or payment card credentials to cybercriminals.</p><!-- wp:heading {"level":3} --><h3>2. <strong>Malware</strong></h3><!-- /wp:heading --><p>Most malware campaigns often ride on trending topics that are likely to get victims to visit a malicious site where the file automatically gets dropped onto their computers. The point is to run some harmful computer program the user is not even aware of. In some cases, attackers use emails to spread mayhem: even document attachments can contain executable code running automatically upon opening. That was how attackers went about distributing Emotet Trojans in the guise of documents that provided important information about the ongoing <a aria-label=" (opens in a new tab)" href="https://www.securitymagazine.com/articles/91646-coronavirus-campaigns-spreading-malware" target="_blank" rel="noreferrer noopener" class="aioseop-link">Coronavirus outbreak</a>.</p><!-- wp:heading {"level":3} --><h3>3. <strong>Unauthorized Command and Control</strong></h3><!-- /wp:heading --><p>Some of the malware is distributed by cyber attackers to find vulnerable computers to make them part of their botnet. Bots or zombies then figure in attacks against big targets, forming the most important infrastructure at the miscreant’s disposal. The so-called “Winnti Group” is infamous for turning the systems of insufficiently protected organizations in the healthcare and education sectors into bots using the <a aria-label=" (opens in a new tab)" href="https://www.welivesecurity.com/2020/01/31/winnti-group-targeting-universities-hong-kong/" target="_blank" rel="noreferrer noopener" class="aioseop-link">ShadowPad backdoor</a>. A backdoor, of course, is a type of malware that allows attackers to control and command infected computers remotely. They then use these compromised systems to launch attacks against video game and software companies.</p><!-- wp:heading {"level":3} --><h3>4. <strong>Denial-of-Service (DoS) Attacks</strong></h3><!-- /wp:heading --><p>The biggest distributed DoS (DDoS) attack to date is still the one against <a aria-label=" (opens in a new tab)" href="https://blog.sucuri.net/2019/08/largest-ddos-attack.html" target="_blank" rel="noreferrer noopener" class="aioseop-link">GitHub</a>. A 1.3Tbps-strong attack flooded its network, causing the organization to go offline for five minutes, although a complete recovery took nearly a week. DoS attacks cause victims to lose revenue due to site unavailability.</p><p>As shown, these four types of attacks can cripple victims, making it all the more necessary to defend against them. With this in mind, TIP can <a href="https://threatintelligenceplatform.com/threat-intelligence-analysis-docs/malware-detection" class="aioseop-link">identify known spam senders and disreputable sites</a>. Threat intelligence analysis can help organizations reduce their exposure to malware-instigated attacks. Read on to find out how.</p><!-- wp:heading {"align":"left"} --><h2 class="has-text-align-left"><strong>Performing </strong><strong>Threat Intelligence Analysis</strong><strong> with Threat Intelligence Platform</strong></h2><!-- /wp:heading --><p>TIP allows users to scan their web properties for any sign of malware infection, thus reducing their chances of suffering unwanted consequences. It specifically:</p><!-- wp:heading {"level":3} --><h3>1.<strong> Checks Domains for Ties to Phishing</strong></h3><!-- /wp:heading --><p>Users can run all domains that wish to interact with their IT infrastructure on TIP before granting them access. Say, for instance, that an employee gets an email from a sender sporting the domain 4black4[.]pro. When queried on TIP, they can see that the domain is listed on PhishTank (a publicly accessible phishing blocklist). It is also a known malware host based on VirusTotal (a public threat database). That said, all access coming from and going to any site on the domain should be blocked.</p><!-- wp:image {"align":"center","id":12,"sizeSlug":"large"} --><div class="wp-block-image"><figure class="aligncenter size-large"><img src="https://publishing-platform.threatintelligenceplatform.com/wordpress/wp-content/uploads/Copy-of-image-1.jpg" alt="Checks Domains for Ties to Phishing" class="wp-image-12"></figure></div><!-- /wp:image --><!-- wp:heading {"level":3} --><h3>2. <strong>Determines If Sites Are Known Malware Hosts</strong></h3><!-- /wp:heading --><p>TIP checks if any of the sites interacting with a network contain malware.</p><p>We tested it on the known malware host http[:]//hodermouse[.]com/hotoffice/. Apart from blocking access to and from the site, it is also a good idea to prevent any communication with the domain hodermouse[.]com. The page may not have been the only one that the attackers compromised.</p><!-- wp:image {"id":13,"sizeSlug":"large"} --><figure class="wp-block-image size-large"><img src="https://publishing-platform.threatintelligenceplatform.com/wordpress/wp-content/uploads/Copy-of-image-2.jpg" alt="We tested it on the known malware host http[:]//hodermouse[.]com/hotoffice/. Apart from blocking access to and from the site, it is also a good idea to prevent any communication with the domain hodermouse[.]com. The page may not have been the only one that the attackers compromised." class="wp-image-13"></figure><!-- /wp:image --><!-- wp:heading {"level":3} --><h3>3. <strong>Warns About Command-and-Control (C&amp;C) Server Connections</strong></h3><!-- /wp:heading --><p>TIP can also notify users about URLs that have ties to known C&amp;C servers. <br>We ran the known C&amp;C server domain afapudcvknpewfc[.]com on the platform and found that it was on both VirusTotal and the Bambenek Consulting OSINT threat repositories. Blocking access to and from the said domain should thus be done immediately.</p><!-- wp:image {"id":14,"sizeSlug":"large"} --><figure class="wp-block-image size-large"><img src="https://publishing-platform.threatintelligenceplatform.com/wordpress/wp-content/uploads/Copy-of-image-3.jpg" alt="Warns About Command-and-Control (C&amp;C) Server Connections" class="wp-image-14"></figure><!-- /wp:image --><!-- wp:heading {"level":3} --><h3>4. <strong>Prevents Spam from Reaching Users</strong></h3><!-- /wp:heading --><p>TIP can also help users block spam, thus reducing the chances that recipients’ computers will get infected with malware. We ran the known spam-sending domain recreationalparksusa[.]info on it and found that it was on StopForumSpam. Further communication with anyone using the said domain should thus be blocked.</p><!-- wp:image {"id":15,"sizeSlug":"large"} --><figure class="wp-block-image size-large"><img src="https://publishing-platform.threatintelligenceplatform.com/wordpress/wp-content/uploads/Copy-of-image-41.png" alt="Prevents Spam from Reaching Users" class="wp-image-15"></figure><!-- /wp:image --><p>Apart from the four uses above, TIP also warns users against disreputable sites using data from Web of Trust: Safe Web Search &amp; Browsing and other sources. It also flags IP addresses and domains that may be tied to DoS attacks using information from Open Threat Exchange (Alien Vault) and other sources.</p><p>---</p><p>Threat intelligence tools like TIP are a necessity for cybersecurity experts who want to make sure that their networks remain safe from all kinds of malware-based attackers. Proactive protection is critical if they wish to detect malware before these can do harm to their systems.</p>
]]></content:encoded>
        </item>
        <item>
            <title>How Threat Intelligence Platform Can Help Companies Keep Their Websites Threat-Free</title>
            <link>https://threatintelligenceplatform.com/3-ways-how-threat-intelligence-platforms-ssl-certificate-chain-checks-can-enhance-your-cybersecurity-posture</link>
            <pubDate>Mon, 13 Apr 2020 01:00:00 +0000</pubDate>
            <dc:creator>admin</dc:creator>

            <guid isPermaLink="false">https://threatintelligenceplatform.com/blog/?p=5000</guid>
            <description><![CDATA[
            <img width="1000" height="750" src="https://threatintelligenceplatform.com/images/blog/3-ways-how-threat-intelligence-platforms-ssl-certificate-chain-checks-can-enhance-your-cybersecurity-posture/3-ways-how-threat-intelligence-platforms-ssl-certificate-chain-checks-can-enhance-your-cybersecurity-posture.jpg" class="webfeedsFeaturedVisual wp-post-image" alt="How Threat Intelligence Platform Can Help Companies Keep Their Websites Threat-Free" style="display: block; margin: auto; margin-bottom: 25px;max-width: 100%;" />
            <p>In this post, however, we will focus on why it is essential to check a domain’s SSL certificate chain, a feature that not all threat intelligence platforms offer. But before we delve into this, let’s first define what an SSL certificate chain is.</p>
]]></description>
            <content:encoded><![CDATA[
            <img width="1000" height="750" src="https://threatintelligenceplatform.com/images/blog/3-ways-how-threat-intelligence-platforms-ssl-certificate-chain-checks-can-enhance-your-cybersecurity-posture/3-ways-how-threat-intelligence-platforms-ssl-certificate-chain-checks-can-enhance-your-cybersecurity-posture.jpg" class="webfeedsFeaturedVisual wp-post-image" alt="How Threat Intelligence Platform Can Help Companies Keep Their Websites Threat-Free" style="display: block; margin: auto; margin-bottom: 25px;max-width: 100%;" />
            <p>Not all <strong>threat intelligence platforms</strong> are created equal, but for organizations that want to strengthen theircybersecurity posture, using comprehensive <a href="https://threatintelligenceplatform.com/" title="Threat Intelligence Platform">threat intelligence platforms</a> is a must. Such a solution should beable to gather and analyze a wide range of data points and perform crucial functions that include:</p><ul><li>Checking and analyzing a host’s infrastructure and IP address resolution</li><li>Analyzing web content and checking for host configuration issues</li><li>Detecting malware</li><li>Examining a domain’s WHOIS record</li><li>Testing the configuration of a domain’s name and mail servers</li><li>Analyzing a domain’s Secure Sockets Layer (SSL) certificate chain</li></ul><p>In this post, however, we will focus on why it is essential to check a domain’s <strong>SSL certificate chain</strong>, a featurethat not all <strong>threat intelligence platforms</strong> offer. But before we delve into this, let’s first define what an<strong>SSL certificate chain</strong> is.</p><h3>What Is An SSL Certificate Chain?</h3><p>A certificate chain is an organized list of certificates that include SSL and certificate authority (CA)certificates. These serve as a means to verify the trustworthiness of a domain. Each certificate in the chainshould contain the signature of the entity indicated in the succeeding certificate in the chain. The certificatechain begins with the end user’s SSL certificate and finishes with the root CA certificate.</p><h3>What Does A Threat Intelligence Platform’s SSL Certificate Chain Check Reveal?</h3><p>Threat Intelligence Platform returns comprehensive <strong>SSL certificate chain</strong> details for all the certificates linkedto any target domain that’s being analyzed.</p><ul><li><strong>Certificates chain:</strong> A list of certificates from the SSL certificate to the intermediatecertificate and the root CA certificate. It also reveals signature details like the signature algorithm.</li><li><strong>Issued to:</strong> Includes the certificate owner’s organization, location, and other details.</li><li><strong>Issued by:</strong> Refers to the entity that issued the certificate.</li><li><strong>Certificate details:</strong> Includes the certificate’s validation type, serial number, allowedpurposes, signature algorithm, and public key information.</li><li><strong>Certificate validity:</strong> Indicates the start and end dates of the certificate, along with theOnline Certificate Status Protocol (OCSP) check result and the hostname validation result.</li></ul><p>Now that you have an idea about what <strong>SSL certificate chain</strong> checks entail, let’s move on to how the process helpsto bolster cybersecurity.</p><h3>How SSL Certificate Chain Checks Improve Cybersecurity</h3><p>An analysis of the SSL certificate chain with <a href="https://threatintelligenceplatform.com/threat-intelligence-apis/ssl-certificates-chain-api" title="SSL Certificates Chain API | Threat Intelligence Platform">SSL Certificates Chain API</a> in combination with TIP’s other<a href="https://threatintelligenceplatform.com/threat-intelligence-analysis-docs/ssl-certificate" title="Threat intelligence analysis docs | Threat Intelligence Platform">SSL-related capabilities</a> helps with the following:</p><h4>1. Enhances data protection</h4><p>The primary purpose of a SSL certificate is to protect communications between servers. The SSL encrypts all dataexchanged between a server and a client, making it more difficult for hackers and skimmers to compromise.However, threat actors can exploit some SSL vulnerabilities. For instance, a host that uses self-signedcertificates (as opposed to certificates signed by a certificate authority) does not enable the verification ofthe owner’s identity, hence making the host prone to man-in-the-middle (MITM) attacks (the interception ofcommunications by miscreants).</p><p>SSL misconfigurations such as lack of an HTTP Strict Transport Security (HSTS) header are also prone to abuse.Failing to set the HSTS header translates into not forcing HTTPS connections, thus allowing for unencryptedcommunication, a kind of protocol downgrade attack, and making systems vulnerable to, for example, cookiehijacking.</p><p>By checking for vulnerabilities and misconfigurations throughout a domain’s <strong>SSL certificate chain, threatintelligence platforms</strong> can better protect an organization’s data from theft and exposure.</p><h4>2. Tells organizations who to trust</h4><p>Although the Internet largely relies on trust, the proliferation of cybercriminals, fake websites, and otherthreats have made it necessary for organizations to establish the trustworthiness of a domain first before it isallowed access to a network.</p><p>Looking at a domain’s <strong>SSL certificate chain</strong> is a standard method of authenticating a website and establishing itstrustworthiness. When a CA validates a website’s certificates, it tells users that an independent third-partyentity has vetted its owner. If an <strong>SSL certificate chain</strong> check on <strong>threat intelligence platforms</strong> reveals that aCA did not issue the domain’s certificates, that should raise a red flag.</p><h4>3. Verifies the credibility of third parties</h4><p>When dealing with suppliers and third-party vendors, especially those that accept online payments, organizationsneed to check if they have satisfied Payment Card Industry Data Security Standard (PCI/DSS) requirements. Amongthe conditions that vendors have to meet in terms of SSL certificates are:</p><ul><li>SSL/TLS version 1.1 or higher</li><li>Strong cipher suites</li><li>Trusted keys and certificates</li></ul><p>Threat Intelligence Platform also checks all of these items. If a supplier fails to meet any of the abovecriteria, it may be better to look for another vendor or negotiate for another payment method.</p><div class="custom-hr"></div><p>SSL certificates are not a requirement in website creation, but they could serve as a means to differentiatebetween trustworthy and dubious sites. That said, the mere presence of an <strong>SSL certificate chain</strong> does notguarantee the integrity of a domain. Sadly, that’s the kind of online world we live in.</p><p>And so, apart from checking a website’s <strong>SSL certificate chain</strong> to enhance your overall cybersecurity posture,<a href="https://threatintelligenceplatform.com/" title="Threat Intelligence Platform">Threat Intelligence Platform</a> can look for other weaknesses associated with IP resolution, WHOIS recordmismatches, name and mail server misconfigurations, and malicious website content.</p>
]]></content:encoded>
        </item>
        <item>
            <title>How Threat Intelligence Platform Can Help Companies Keep Their Websites Threat-Free</title>
            <link>https://threatintelligenceplatform.com/how-threat-intelligence-platform-can-help-companies-keep-their-websites-threat-free</link>
            <pubDate>Mon, 30 Mar 2020 01:00:00 +0000</pubDate>
            <dc:creator>admin</dc:creator>

            <guid isPermaLink="false">https://threatintelligenceplatform.com/blog/?p=4900</guid>
            <description><![CDATA[
            <img width="1000" height="750" src="https://threatintelligenceplatform.com/images/blog/how-threat-intelligence-platform-can-help-companies-keep-their-websites-threat-free/how-threat-intelligence-platform-can-help-companies-keep-their-websites-threat-free.jpg" class="webfeedsFeaturedVisual wp-post-image" alt="How Threat Intelligence Platform Can Help Companies Keep Their Websites Threat-Free" style="display: block; margin: auto; margin-bottom: 25px;max-width: 100%;" />
            <p>The Internet has grown immensely both in scale and reach over time, allowing anyone to grow ventures online as they wish. Unfortunately, that convenience also allowed parasites (aka cybercriminals) who seek to exploit legitimate sites for their own gain. Based on the latest statistics, a company can lose an average of <a href="https://www.accenture.com/_acnmedia/pdf-96/accenture-2019-cost-of-cybercrime-study-final.pdf" title="NINTH ANNUAL COST OF CYBERCRIME STUDY" target="_blank">$13 million</a> to an attack. Organizations, big and small alike, have fallen prey to costly and devastating attacks and so now have no choice but to improve their defenses.</p><p>One way of amplifying security efforts, especially for those who own and maintain websites, is to use applications like <a href="https://threatintelligenceplatform.com/" title="Threat Intelligence Platform">Threat Intelligence Platform (TIP)</a>. But before we can go into the “how,” let’s first identify some of the biggest threats that can affect any organization’s site.</p>
]]></description>
            <content:encoded><![CDATA[
            <img width="1000" height="750" src="https://threatintelligenceplatform.com/images/blog/how-threat-intelligence-platform-can-help-companies-keep-their-websites-threat-free/how-threat-intelligence-platform-can-help-companies-keep-their-websites-threat-free.jpg" class="webfeedsFeaturedVisual wp-post-image" alt="How Threat Intelligence Platform Can Help Companies Keep Their Websites Threat-Free" style="display: block; margin: auto; margin-bottom: 25px;max-width: 100%;" />
            <p>The Internet has grown immensely both in scale and reach over time, allowing anyone to grow ventures online as they wish. Unfortunately, that convenience also allowed parasites (aka cybercriminals) who seek to exploit legitimate sites for their own gain. Based on the latest statistics, a company can lose an average of <a href="https://www.accenture.com/_acnmedia/pdf-96/accenture-2019-cost-of-cybercrime-study-final.pdf" title="NINTH ANNUAL COST OF CYBERCRIME STUDY" target="_blank">$13 million</a> to an attack. Organizations, big and small alike, have fallen prey to costly and devastating attacks and so now have no choice but to improve their defenses.</p> <p>One way of amplifying security efforts, especially for those who own and maintain websites, is to use applications like <a href="https://threatintelligenceplatform.com/" title="Threat Intelligence Platform">Threat Intelligence Platform (TIP)</a>. But before we can go into the “how,” let’s first identify some of the biggest threats that can affect any organization’s site.</p> <h3>How Malware Affect Websites</h3> <p>In general, cybercriminals use malware to damage victims’ computers or to infect corporate websites. You may be wondering how they profit from such acts. Let’s go into further detail below:</p> <h4>Website Defacement</h4> <p>Although many defacement cases have to do with expressing discontent with the website owners and are thus considered acts of hacktivism, some attacks are financially motivated. Cybercriminals can deface your site, for instance, for a fee. An unscrupulous business rival can, for example, hire them to alter your website’s content so you’d lose your customers’ trust.</p> <h4>Malvertising</h4> <p>Malvertising, or “malicious advertising,” uses online ads to spread malware. Cybercriminals typically inject malicious or malware-laden ads into legitimate websites. Any visitor who clicks them may end up with infected computers. If the malicious file happens to be a spyware, for instance, cybercriminals would be able to get their hands on all of the victim’s online account credentials. These can be sold in underground markets or used to steal money from the victim’s bank account.</p> <h4>Malicious Website Redirection</h4> <p>Cybercriminals also inject malware into unprotected websites to redirect their visitors to their own sites. In most cases, their specially crafted sites are copycats of those of the victims. That way, visitors won’t get alerted about the redirection and so get their systems infected. This tactic produces the same effects as malvertising.</p> <h4>Malware Injection</h4> <p>We all know that today’s search engines now actively audit website content and block access to those that contain malware. Apart from turning legitimate websites into a source of traffic for their own pages as in malicious site redirection, cybercriminals can cause victims’ sites to end up on blocklists. Malware injection could also be employed as a tactic to serve the wishes of a competitor for a fee.</p> <p>These are just some of the ways in which cybercriminals can cause website owners to suffer via website content manipulation. Entrepreneurs need not fret, however, as these issues are avoidable with TIP’s help.</p> <h3>Using Threat Intelligence Platform to Protect Website Content</h3> <p><strong>Threat intelligence products</strong> are easy-to-use solutions that help users get accurate and well-parsed information about their websites. Its website analysis capability, in particular, allows them to check if their assets are playing host to malicious content that could negatively affect their organizations’ reputation. Here’s how it works:</p> <h4>Detects Technologies Used to Build the Site</h4> <p><strong>Threat Intelligence Platform</strong> runs a website through a comprehensive check to see metatags, HyperText Markup Language (HTML) directives, and JavaScript source code, among others. That allows it to discover the content management system (CMS), JavaScript frameworks, and other technologies used to build the website so it can identify vulnerabilities that attackers can exploit.</p> <h4>Searches for Potentially Dangerous Content</h4> <p>The platform scans the website for any possible harmful content, including malware. While not all of the items on the list are necessarily malicious, they need further scrutiny to make sure that they won’t cause problems for site visitors. <strong>Threat Intelligence Platform</strong> can detect:</p> <ul> <li><strong>Links to Android package kit (.apk) files:</strong> A lot of mobile malware attacks come in the form of malicious .apk files that may be dropped by hosts onto vulnerable Android devices. </li> <li><strong>Links to executable (.exe) files:</strong> Very few websites, apart from those that sell applications or programs, typically have executable content. Note that malware meant to run on Windows-powered computers usually comes in this format. </li> <li><strong>Iframes:</strong> These refer to hardly visible frames that cybercriminals use to embed code from other domains into a website. They figure in cross-site scripting (XSS) and clickjacking attacks, among others. Some can make JavaScript calls to get access to user data by showing an extra field on an online form, for instance. Others can redirect visitors to other websites. Not all iframes are malicious, though. Some users use the technology to embed YouTube videos on their sites. </li> <li><strong>Scripts:</strong> These are code fragments usually hidden in legitimate but compromised websites. The platform alerts users to the presence of scripts that open new browser windows. </li> <li><strong>Redirects:</strong> Malicious redirects can cause website visitors to land on harmful sites. The platform checks for redirects, too. </li> </ul> <h4>Checks for Host Configuration Issues</h4> <p>In a lot of cases, website compromise begins with the exploitation of an unpatched vulnerability. <strong>Threat Intelligence Platform</strong> checks a website’s content to see if it has open directories in the document root.</p> <p>The platform also checks a website to see if it allows directory listing. If that’s the case, any visitor can view the files in the document root, which is useful for a variety of attacks. No outsider should be able to do this as well.</p> <p>In a nutshell, <strong>threat intelligence products</strong> like <strong>Threat Intelligence Platform</strong> are handy tools for any website owner or administrator who wants to make sure their portals are threat-free.</p> <div class="custom-hr"></div> <p>While securing devices and systems from harm is their owners’ responsibility, any good online entrepreneur should take time to look out for their customers’ welfare. How else will they be able to gain their trust and loyalty, right? To get the most out of their websites, business owners can rely on <a href="https://threatintelligenceplatform.com/" title="Threat Intelligence Platform">Threat Intelligence Platform</a> as a means to proactively defend against a myriad of website content threats that can put their clients and thus their reputation and bottom line at risk.</p>
]]></content:encoded>
        </item>
        <item>
            <title>How To Avoid JavaScript Injection Attack</title>
            <link>https://threatintelligenceplatform.com/how-to-avoid-javascript-injection-attack</link>
            <pubDate>Wed, 18 Mar 2020 01:00:00 +0000</pubDate>
            <dc:creator>admin</dc:creator>

            <guid isPermaLink="false">https://threatintelligenceplatform.com/blog/?p=4800</guid>
            <description><![CDATA[
            <img width="1000" height="750" src="https://threatintelligenceplatform.com/images/blog/how-to-avoid-javascript-injection-attack/3-Ways-to-Prevent-JS-Injection-Attack.jpg" class="webfeedsFeaturedVisual wp-post-image" alt="3 Ways to Prevent JS Injection Attack" style="display: block; margin: auto; margin-bottom: 25px;max-width: 100%;" />
            <p>As a web application tool, JavaScript is often run on the client-side so that the developers of a web service can implement a desktop-like view and provide a similar experience to users. JavaScript Injection, also known as JS Injection, injects a JavaScript code that can run on the user's end of the website. It is the client-side injection where a user can insert JS code onto a page through the URL link bar or by finding a Cross-Site Scripting vulnerability on the website. An attacker creates a way to inject a payload (malicious JS code) onto a web page visited by the victim, which the attacker can then engineer to perpetrate their crime(s).</p>
]]></description>
            <content:encoded><![CDATA[
            <img width="1000" height="750" src="https://threatintelligenceplatform.com/images/blog/how-to-avoid-javascript-injection-attack/3-Ways-to-Prevent-JS-Injection-Attack.jpg" class="webfeedsFeaturedVisual wp-post-image" alt="3 Ways to Prevent JS Injection Attack" style="display: block; margin: auto; margin-bottom: 25px;max-width: 100%;" />
            <p>As a web application tool, JavaScript is often run on the client-side so that the developers of a web service can implement a desktop-like view and provide a similar experience to users. JavaScript Injection, also known as JS Injection, injects a JavaScript code that can run on the user's end of the website. It is the client-side injection where a user can insert JS code onto a page through the URL link bar or by finding a Cross-Site Scripting vulnerability on the website. An attacker creates a way to inject a payload (malicious JS code) onto a web page visited by the victim, which the attacker can then engineer to perpetrate their crime(s).</p> <h3>Implications of a JS Injection Attack</h3> <p>JS injection vulnerability is commonly addressed by Cross-Site Scripting (XSS). JavaScript Injection attacks cause disruptive implications including identity theft and hijacking. The crimes can include hijacking users’ browsing sessions and cookies. It is also used as a precursor for phishing attacks, webworms, and keystroke logging. Therefore, the entering of a sensitive piece c information on a JS injection compromised page opens the data to being grabbed and sent to another location/website. Various JS injection targets include:</p> <ul> <li>forums</li> <li>guestbooks</li> <li>comment fields</li> <li>any other form with user-editable text box</li> </ul> <p>JS injection typically changes the website's appearance and is able to let the attacker change certain parameters. The consequences range from information leak to damaged website designs, which can be done with the aid of social engineering tricks.</p> <h3>Checking for JS injection</h3> <p>The testing of JS injection is very important, and the vulnerability test should be incorporated as a standard test in an organization’s security testing routines.</p> <ul> <li>The first test to run is the possibility of JS injection. This is done by going to the browser's address bar and inputting the code: <em>JavaScript:alert(‘Executed!');</em> </li> <li>An <em>'Executed!'</em> pop-up on the screen shows that the website is vulnerable to JS injection attack.</li> <li>Use regex on user's input. There are different libraries and each uses a varying and customized regex.</li> </ul> <p>Using regex, though, can be complex, depending on the complexity of the regex string in the library used. Knowing the part of the website injected with a JS attack is the precursor to figuring out the best way to check for such attacks.</p> <h3>Prevention and Protection from JS Injection Attacks</h3> <p>The first step to protection is the prevention of the attack, and this starts with validating every received input before submission. Input details should be validated at all times and not only at the point of data entry. Security protocols should be installed and website owners or managers must not only rely on the client-side validation, but also on a logic analysis on the server-side.</p> <h4>1. HTML Encode in the View</h4> <p>HTML encoding is one of the most popular JS injection mitigation techniques. In this approach, the data entered by website users, during display are encrypted with the use of special characters. By encoding a feedback.message with HTML, the value that will be shown in the view is:</p> <pre><code>&lt;%=Html.Encode(feedback.Message)%&gt;</code></pre> <br> <p>To HTML encode, a string of characters including, &lt; and &gt; are replaced with different entities such as &lt; and &gt;. Therefore, in a typical string like <em>&lt;script&gt;alert("Confirm!")&lt;/script&gt;</em> becomes <em>&lt;script&gt;alert("Confirm!")&lt;/script&gt;</em> . This language is then interpreted by the browser, to show a harmless message, <em>&lt;script&gt;alert("Confirm!")&lt;/script&gt;</em> , instead of a Pop-up alert.</p> <h4>2. HTML Encode in Controller</h4> <p>Instead of HTML encoding data when displayed, the data can be alternatively encoded before it is submitted to the database. This is done in the controller case controller.cs.</p> <p>To do this right, the message value must be HTML-encoded before the value is submitted to the database within the create ( ). With this method, however, you will have HTML-encoded data in your database.</p> <p>Some also make an attempt to protect JavaScript injection by changing the quotes to double. The issue with this is that the JavaScript code will not be executed. For example, a <em>&lt;code&gt; ... &lt;code/&gt;</em> will be rewritten as <em>&lt;&lt;code&gt;&gt; ... &lt;&lt;/code&gt;&gt;</em>. The latter will not be executed.</p> <h4>3. Using Vulnerability Test Tools</h4> <p>Certain technological tools, like Domain Reputation API, exist to help detect JavaScript vulnerabilities in your code at every Software Development Life Cycle (SDLC) stage. By integrating a security tool into your Integrated Development Environment (IDE), you can stay up to date with updated and standard security protocols.</p> <h2>Conclusion</h2> <p>Being a widely used technology, JavaScript injection should be reckoned as a way that websites can be exploited in. Websites and apps that use this technology must be tested against this attack in question. JS injection testing should be incorporated in every security process of an enterprise.</p>
]]></content:encoded>
        </item>
        <item>
            <title>Why Should Enterprises Adopt Vulnerability Management In Their Security Program?</title>
            <link>https://threatintelligenceplatform.com/why-should-enterprises-adopt-vulnerability-management-in-their-security-program</link>
            <pubDate>Tue, 03 Mar 2020 01:00:00 +0000</pubDate>
            <dc:creator>admin</dc:creator>

            <guid isPermaLink="false">https://threatintelligenceplatform.com/blog/?p=4700</guid>
            <description><![CDATA[
            <img width="1000" height="750" src="https://threatintelligenceplatform.com/images/blog/why-should-enterprises-adopt-vulnerability-management-in-their-security-program/Quantify-and-Reduce-Cyber-Risks-With-Vulnerability-Assessment.jpg" class="webfeedsFeaturedVisual wp-post-image" alt="Quantify and Reduce Cyber Risks With Vulnerability Assessment" style="display: block; margin: auto; margin-bottom: 25px;max-width: 100%;" />
            <p>Vulnerability assessment refers to a series of operations that are used to define, identify, prioritize and classify vulnerabilities on computer networks, applications, and infrastructures. This assessment provides intelligence regarding the conditions, risks and the background to the security team of an organization. It determines how they can react to the threats appropriately. Vulnerability assessment identifies threats and the risk they pose. Sophisticated security tools including network security scanners and <a href="https://threatintelligenceplatform.com/threat-intelligence-api" title="Threat Intelligence API - 6 Different Security Analysis APIs">threat intelligence tools</a> are the most used resources to assess vulnerabilities in your environment.</p><p>Organizations, whether big or small, can benefit from vulnerability assessments by understanding the nature of a threat or attack, security flaws, and overall risks. This means the chances of systems breach are reduced, thus protecting the assets of an organization.</p>
]]></description>
            <content:encoded><![CDATA[
            <img width="1000" height="750" src="https://threatintelligenceplatform.com/images/blog/why-should-enterprises-adopt-vulnerability-management-in-their-security-program/Quantify-and-Reduce-Cyber-Risks-With-Vulnerability-Assessment.jpg" class="webfeedsFeaturedVisual wp-post-image" alt="Quantify and Reduce Cyber Risks With Vulnerability Assessment" style="display: block; margin: auto; margin-bottom: 25px;max-width: 100%;" />
            <p>Vulnerability assessment refers to a series of operations that are used to define, identify, prioritize and classify vulnerabilities on computer networks, applications, and infrastructures. This assessment provides intelligence regarding the conditions, risks and the background to the security team of an organization. It determines how they can react to the threats appropriately. Vulnerability assessment identifies threats and the risk they pose. Sophisticated security tools including network security scanners and <a href="https://threatintelligenceplatform.com/threat-intelligence-api" title="Threat Intelligence API - 6 Different Security Analysis APIs">threat intelligence tools</a> are the most used resources to assess vulnerabilities in your environment.</p> <p>Organizations, whether big or small, can benefit from vulnerability assessments by understanding the nature of a threat or attack, security flaws, and overall risks. This means the chances of systems breach are reduced, thus protecting the assets of an organization.</p> <h3>Types of Vulnerability Assessments</h3> <p>An organization is expected to perform its assessments or scans on different levels. They include:</p> <ul> <li><strong>Network-based scans:</strong> These scans are used to identify security attacks on an organization's network. Occasionally, it can check for risks on wireless and wired networks.</li> <li><strong>Host-based scans:</strong> This type checks for risks and threats to an organization through servers, workstations, and on host points of other networks. They offer a wider visibility coverage for configuration settings and patch logs.</li> <li><strong>Wireless network scans</strong> include the search of the Wi-Fi infrastructure and networks of an organization for threats. They also detect rogue access points and validate security configuration.</li> <li><strong>Database scans</strong> check the databases for threats and possibly malicious access.</li> </ul> <h3>Why Vulnerability Assessments?</h3> <p>Before any form of scanning is done, it’s necessary to understand the organization's network. Hence, a vulnerability assessment is supposed to start with asset discovery. Knowing this will help to define the vulnerability scans to specific network segments and assets that matter the most.</p> <ul> <li>With the use of Threat intelligence and analytics tools, vulnerabilities discovered on an organization's systems, networks, and/or database can provide clues on what techniques can be used to mitigate any future risks. Techniques may include patching for certain weaknesses. </li> <li>Proactively finding vulnerabilities also helps to prioritize the order of dealing and fixing them.</li> <li>It is a vital process to indulge in timely remediation where managed services help to maintain a view and control over 3rd-party liaisons and multiple teams working on a host's network. </li> <li>Rogue assets including changed profiles on historic IPs can be probed in investigative instances.</li> <li>Real-time knowledge of an organization's weakness is obtainable from a vulnerability assessment or scanning and these weak points can be sought early and closed up before attackers are able to exploit them. </li> <li>With the right tool, it is possible to gain insights and make choices concerning remediation actions. It will also provide guidance and industry support to issues found. </li> </ul> <p><b>This helps to:</b></p> <ul> <li>Access control parameters and check if authentication processes can be bypassed.</li> <li>Check that a non-user cannot intercept a password reset.</li> <li>Check the <a href="https://threatintelligenceplatform.com/threat-intelligence-apis/domains-infrastructure-analysis-api" title="Domain's Infrastructure Analysis API">webserver configuration</a>.</li> <li><a href="https://threatintelligenceplatform.com/threat-intelligence-apis/ssl-configuration-analysis-api" title="SSL Configuration Analysis API">Check SSL versions</a>, key lengths, key exchange methods, and algorithms.</li> <li>Check OS command, LDAP injections, Script, SQL Injections.</li> <li>Check the overall <a href="https://threatintelligenceplatform.com/threat-intelligence-apis/domain-reputation-api" title="Domain Reputation API">integrity of your system</a>.</li> </ul> <h3>Best Practices for Vulnerability Assessments</h3> <p><b>To perform a valid and top-quality assessment, the following has to be considered:</b></p> <ul> <li>Invest in the needed tools for vulnerability assessment and management.</li> <li>Seek to incorporate broad scanning techniques and prioritize risks.</li> <li>Assessments should be carried out as frequently as possible. Weekly or daily assessments should be indulged, as against quarterly scans that most people run. </li> <li>An organization will benefit more when the change-over-time is known.</li> <li>It is important to scan high-value assets and resources in authenticated or credentialed mode and configuration settings should be tested on key hosts. </li> </ul> <p><a href="https://threatintelligenceplatform.com/" title="Threat Intelligence Platform">Threat Intelligence Platform</a> finds application in vulnerability assessments as it helps to classify vulnerabilities, prioritize them, and point at the sources, and the likely targets for an attack. Furthermore, it helps to provide insights &amp; warnings on various infrastructure and server vulnerabilities which can be exploited as part of an advanced attack – intel that will strengthen security centers’ strategies. In addition, these scans are performed in real time, so analysts are up-to-date on the security (or risks) of their assets.</p> <h3>Parting Note</h3> <p>You should know that vulnerability management never ends. Hence, vulnerability assessments cannot be done away with, because any organization’s network is always changing. To keep up with consistent assessment, the need for threat intelligence becomes expedient. Organizations today cannot afford for their systems to be compromised as that could not only affect their business and reputation but also impact their customers and everyone connected with them. Therefore, conducting timely vulnerability assessment has become a necessity to proactively protect your organization from any impending harm.</p>
]]></content:encoded>
        </item>
        <item>
            <title>How Enterprises Can Prevent and Mitigate DDoS Attacks With Real-time Threat Intelligence</title>
            <link>https://threatintelligenceplatform.com/how-enterprises-can-prevent-and-mitigate-ddos-attacks-with-real-time-threat-intelligence</link>
            <pubDate>Mon, 17 Feb 2020 01:00:00 +0000</pubDate>
            <dc:creator>admin</dc:creator>

            <guid isPermaLink="false">https://threatintelligenceplatform.com/blog/?p=4600</guid>
            <description><![CDATA[
            <img width="1000" height="750" src="https://threatintelligenceplatform.com/images/blog/how-enterprises-can-prevent-and-mitigate-ddos-attacks-with-real-time-threat-intelligence/Enterprise-DDoS-Protection-and-Mitigation-Solution.jpg" class="webfeedsFeaturedVisual wp-post-image" alt="How Enterprises Can Prevent and Mitigate DDoS Attacks With Real-time Threat Intelligence" style="display: block; margin: auto; margin-bottom: 25px;max-width: 100%;" />
            <p>A Distributed Denial of Service (DDoS) attack is a non-intrusive internet-based attack that is targeted on a website to slow it down. This is executed by hijacking and infecting vulnerable computers and IoT devices, such as security cameras, digital video recorders, smart TVs, etc. with malware and then weaponizing them for use in widespread attacks on various websites. As the adoption of IoT devices increases, the risks grow higher. In fact, the number of <a href="https://www.forbes.com/sites/zakdoffman/2019/09/14/dangerous-cyberattacks-on-iot-devices-up-300-in-2019-now-rampant-report-claims/#4e3f653f5892" title="Cyberattacks On IOT Devices Surge 300% In 2019, ‘Measured In Billions’, Report Claims" target="_blank">cyberattacks on IoT devices increased by 300% in 2019</a>!</p><p>DDoS attacks leverage those infected devices (also known as bots) by generating false traffic to the network or server. This attack blocks legitimate users from reaching an organization's web page. Fake traffic surges test the bandwidth of an application or website server. DDoS attacks happen as threat requests on a server's vulnerable endpoint.</p><p>In mild cases, the effect of a DDoS attack would slow down traffic on a website, causing slow responses to prompt actions. And in extreme cases, it shuts down the website entirely, making access difficult for genuine users and causing an organization to lose a large amount of revenue. Needless to say that this is problematic for any business, isn't it?</p><p>While trying to know the effect of DDoS attacks, some wonder if users' information can be extracted during the event. Well, as mentioned earlier, the attack is non-intrusive; so, it means that no internal information or data can be accessed. However, for those who may not know (and even those who do), the attackers can use the DDoS hack to blackmail and extort host websites/organizations. To prevent these expensive outcomes, the Security Operation Center of any organization must do well to learn the tactics that would keep them above DDoS attacks.</p>
]]></description>
            <content:encoded><![CDATA[
            <img width="1000" height="750" src="https://threatintelligenceplatform.com/images/blog/how-enterprises-can-prevent-and-mitigate-ddos-attacks-with-real-time-threat-intelligence/Enterprise-DDoS-Protection-and-Mitigation-Solution.jpg" class="webfeedsFeaturedVisual wp-post-image" alt="How Enterprises Can Prevent and Mitigate DDoS Attacks With Real-time Threat Intelligence" style="display: block; margin: auto; margin-bottom: 25px;max-width: 100%;" />
            <p>A Distributed Denial of Service (DDoS) attack is a non-intrusive internet-based attack that is targeted on a website to slow it down. This is executed by hijacking and infecting vulnerable computers and IoT devices, such as security cameras, digital video recorders, smart TVs, etc. with malware and then weaponizing them for use in widespread attacks on various websites. As the adoption of IoT devices increases, the risks grow higher. In fact, the number of <a href="https://www.forbes.com/sites/zakdoffman/2019/09/14/dangerous-cyberattacks-on-iot-devices-up-300-in-2019-now-rampant-report-claims/#4e3f653f5892" title="Cyberattacks On IOT Devices Surge 300% In 2019, ‘Measured In Billions’, Report Claims" target="_blank">cyberattacks on IoT devices increased by 300% in 2019</a>!</p> <p>DDoS attacks leverage those infected devices (also known as bots) by generating false traffic to the network or server. This attack blocks legitimate users from reaching an organization's web page. Fake traffic surges test the bandwidth of an application or website server. DDoS attacks happen as threat requests on a server's vulnerable endpoint.</p> <p>In mild cases, the effect of a DDoS attack would slow down traffic on a website, causing slow responses to prompt actions. And in extreme cases, it shuts down the website entirely, making access difficult for genuine users and causing an organization to lose a large amount of revenue. Needless to say that this is problematic for any business, isn't it?</p> <p>While trying to know the effect of DDoS attacks, some wonder if users' information can be extracted during the event. Well, as mentioned earlier, the attack is non-intrusive; so, it means that no internal information or data can be accessed. However, for those who may not know (and even those who do), the attackers can use the DDoS hack to blackmail and extort host websites/organizations. To prevent these expensive outcomes, the Security Operation Center of any organization must do well to learn the tactics that would keep them above DDoS attacks.</p> <h3>Types of DDoS Attacks</h3> <p>There are three main types of DDoS attacks namely: <strong>volumetric attacks, application-layer attacks, and protocol attacks</strong>.</p> <p><strong>Volumetric Attacks</strong> are overwhelming, as a machine's network bandwidth is flooded with false requests on the open ports of a device or server. The large influx of data would keep the machine busy to check for malicious requests, thereby being unable to process legitimate traffic requests.</p> <p><strong>Application-Layer Attacks</strong> target the topmost layer of the Open System Interconnection (OSI) model. These attacks are primarily on direct web traffic, with HTTP, HTTPS, SMTP, and even DNS being the attraction levels.</p> <p><strong>Protocol-based Attacks</strong> are directed to vulnerable ports in layers 3 and 4 protocol stacks. These attacks take their toll on a network’s hardware including server resources, thus disrupting service. To put it simply, more packets are sent to exploit a network's stack, stretching the network's bandwidth more than the ports can handle. There is the Ping of Death and the SYN flood attacks.</p> <h3>How to Prevent DDoS attacks</h3> <p>Before we learn effective ways to overcome DDoS attacks, let’s first see what red flags should alert security professionals for a possibility of an on-going attack. The common and noticeable signs include:</p> <ul> <li>Slow or unresponsiveness to queries on a website</li> <li>Difficulty in accessing a website</li> <li>Internet connection problems for a specific target</li> <li>Multiple traffic from the same IP</li> </ul> <p>Without an early threat detection and profiling strategy, fighting against DDoS may be difficult. Here are things security experts should proactively do:</p> <h4>1) Regularly Assess Risks To Your Domain’s DNS System</h4> <p>Explore and audit your DNS configurations for any vulnerability that can be exploited and enable attackers to infiltrate into your networks. Misconfigurations or unauthorized alterations in your DNS protocol are some of the weak points that can be easily abused. Analyzing and regularly <a href="https://threatintelligenceplatform.com/threat-intelligence-apis/domains-infrastructure-analysis-api" title="Domain's Infrastructure Analysis API">checking on the integrity of your entire domain’s infrastructure like web servers, mail servers and name servers</a> is absolutely crucial to assess risks and proactively identify possible attack vectors.</p> <h4>2) Maintain Diversified Network Architecture</h4> <p>It is crucial for organizations to spread their servers across multiple data centers to avoid presenting a single rich target to an attacker. In case of an attack on one server, the traffic can be handled by others. In addition, organizations can further widen their resources by ensuring that the data centers are located in different places geographically, have different networks and paths that will prove more difficult for attackers to target.</p> <h4>3) Activate A Web Application Firewall (WAF)</h4> <p>The WAF protection sieves the kind of traffic that a website receives. There are specially designed solutions that automate DDoS defense mechanisms. One way to enhance these firewalls is by <a href="https://threatintelligenceplatform.com/threat-intelligence-apis/domain-reputation-api" title="Domain Reputation API">integrating feeds of domain risk evaluations</a> to provide security experts with real-time intel on threat activities. In cases of domains and IP addresses flagged dangerous, further investigation can be performed with the various threat points that are underscored in the analysis, and malicious entities can be blocked from accessing your network. By creating tighter control, based on domain intel evaluated against multiple parameters and sources, you can prevent intrusions right in the beginning.</p> <h4>4) Monitor Website Traffic</h4> <p>The monitoring of traffic on your website is important. When any anomalies are noticed, quick actions should be taken to mitigate traffic rates. For instance, a dramatic increase in traffic should trigger an alarm. It will be good to set threshold traffic requests and utilize monitoring tools to that effect. Also, checking activity logs is equally helpful. When the web traffic logs show that domains with high-risk scores are accessing a company’s website, that should raise a red flag. Quality domain intelligence can provide quick insights and help identify owners of malicious domains/IP addresses. Security experts should also <a href="https://threatintelligenceplatform.com/threat-intelligence-apis/connected-domains-api" title="Connected Domains API">find other domains hosted on the same malicious IP</a> and analyze them immediately or in case of lack of resources block them to protect against foreseeable threats. Also, these connected domains should be checked across various <a href="https://threatintelligenceplatform.com/threat-intelligence-apis/domain-malware-check-api" title="Domain Malware Check API">reputed malware databases</a> quickly and if they are tagged suspicious then they should be rejected too. In this way, by finding ties and proactively thwarting them, the attack is less likely to push through.</p> <h4>5) Proactively Blacklisting Traffic</h4> <p><a href="http://www.circleid.com/posts/20190923_is_blocking_via_ip_geolocation_answer_to_preventing_ddos_attacks" title="Is Blocking via IP Geolocation the Answer to Preventing DDoS Attacks?" target="_blank">A report</a> showed that most DDoS attacks come from China, followed by the U.S., and then Hong Kong. Country-based IP blocking is a precautionary action to minimize DDoS risks. Though not an ideal situation, as it could affect your customer base as well. However, in case of an on-going attack, finding the exact region where most traffic is directed from and blocking them may help to mitigate the attack. Ideally, a more sophisticated proactive DDoS defense approach should be taken by creating blacklists based on intel gained by combining various data points like IP locations, malware databases and credibility scores.</p> <h4>6) Cloud Mitigation</h4> <p>Pre-programmed secure perimeter should be set around cloud infrastructure to allow/drop packets with pre-programmed rules.</p> <h4>7) Traffic Scrubbing</h4> <p>An organization can get a third-party vendor to analyze inbound traffic and eliminate potential threats as soon as possible. Scrubbed traffics are discarded and the clean ones are allowed to reach the target network.</p> <h4>8) Develop a Denial of Service Response Plan</h4> <p>With a comprehensive security assessment, a DDoS prevention plan should be drawn up before an attack. It is the surest way to ensure quick response when an attack is launched. A DDoS response plan is important; the first step of action in response to an attack can predict how well or how bad things will get. Right from deterring the attack to knowing how to manage more servers for uninterrupted service of the genuine visitor, every point should be covered, so there is no panic (okay, well ‘no panic’ is difficult when your business is under attack, but let's say, less panic) and the situation is handled more systematically.</p> <h3>How TIP Can Help In Preventing and Mitigating DDoS Attacks</h3> <p>Our <a href="https://threatintelligenceplatform.com/threat-intelligence-api" title="Threat Intelligence API - 6 Different Security Analysis APIs">Threat Intel solutions</a> aggregate and analyze data from a wide range of sources to provide security professionals contextual awareness for identifying attack origins. Our APIs empower security teams with not only an understanding of their own environment but also that of the threat actors on a global scale.</p> <h4>Advanced System</h4> <p>Our RESTful APIs are robust, scalable and are capable of 100 queries per minute! Security teams can extend the capabilities of their security systems and applications by directly integrating and leveraging our Threat Intelligence data. Our platform also has a <a href="https://threatintelligenceplatform.com/" title="Threat Intelligence Platform - Protection Tools, Services, API's">web-app</a> that can be used for quick visual analysis of various threat vectors.</p> <h4>Real-time Intel</h4> <p>Gather real-time actionable insights into traffic and execute more accurate decisions.</p> <h4>Integrated Platform</h4> <p>Our APIs focus on providing insights into domain names, DNS servers, DNS records, IP addresses, open ports, SSL certificates and malware databases. We don’t just provide data, but intel gained by analyzing and co-relating various data points that could highlight various risks and threats.</p> <h4>More Automation and Quicker Response Time</h4> <p>Automated threat intel from TIP saves analyst time by eliminating the time-consuming manual work of getting different types of data from multiple sources and also feeding the data into their systems for further analysis. By getting relevant and timely traffic intelligence, the analyst can focus more on preventing and mitigating attacks.</p> <h4>Global Scale</h4> <p>Our sophisticated systems are capable of collecting domain, IP and DNS data globally. No matter where your traffic is coming from, our APIs will be able to provide accurate data on it.</p> <p>With the ever-increasing adoption of technologies and growth in the use of IoT devices, preventing DDoS attacks by security teams is only going to get tougher. Incorporating the right tools and approach, combined with real-time threat detection will allow proactive defence against DDoS attacks, no matter where they originate. This can help organizations protect the availability and integrity of their website and online services. Finally, there is no “too-big-to-hack” enterprise. In case of an attack, mitigating the risk as quickly as possible is absolutely crucial.</p>
]]></content:encoded>
        </item>
        <item>
            <title>Threats Trends To Watch Out For In 2020</title>
            <link>https://threatintelligenceplatform.com/threats-trends-to-watch-out-for-in-2020</link>
            <pubDate>Mon, 03 Feb 2020 01:00:00 +0000</pubDate>
            <dc:creator>admin</dc:creator>

            <guid isPermaLink="false">https://threatintelligenceplatform.com/blog/?p=4500</guid>
            <description><![CDATA[
            <img width="1000" height="750" src="https://threatintelligenceplatform.com/images/blog/threats-trends-to-watch-out-for-in-2020/Top-Cybersecurity-Threats-in-2020.jpg" class="webfeedsFeaturedVisual wp-post-image" alt="Top Cybersecurity Threats in 2020" style="display: block; margin: auto; margin-bottom: 25px;max-width: 100%;" />
            <p>Foresight is power when it comes to cybersecurity. Every Security Operation Center (SOC) has the responsibility of following security and threats trends and forecasts each year so they can proactively prevent online wrongdoing. In 2019, about $2 trillion was attributed to global cybercrime, according to <a href="https://www.juniperresearch.com/press/press-releases/cybercrime-cost-businesses-over-2trillion-by-2019" title="CYBERCRIME WILL COST BUSINESSES OVER $2 TRILLION BY 2019" target="_blank">Juniper Research</a>. Considering the growing rate and sophistication of cybercrime, it is expedient to stay abreast of the cybersecurity threat trends in 2020. Here is our list of top 5 threats that security experts should definitely look out for in the coming year.</p>
]]></description>
            <content:encoded><![CDATA[
            <img width="1000" height="750" src="https://threatintelligenceplatform.com/images/blog/threats-trends-to-watch-out-for-in-2020/Top-Cybersecurity-Threats-in-2020.jpg" class="webfeedsFeaturedVisual wp-post-image" alt="Top Cybersecurity Threats in 2020" style="display: block; margin: auto; margin-bottom: 25px;max-width: 100%;" />
            <p>Foresight is power when it comes to cybersecurity. Every Security Operation Center (SOC) has the responsibility of following security and threats trends and forecasts each year so they can proactively prevent online wrongdoing. In 2019, about $2 trillion was attributed to global cybercrime, according to <a href="https://www.juniperresearch.com/press/press-releases/cybercrime-cost-businesses-over-2trillion-by-2019" title="CYBERCRIME WILL COST BUSINESSES OVER $2 TRILLION BY 2019" target="_blank">Juniper Research</a>. Considering the growing rate and sophistication of cybercrime, it is expedient to stay abreast of the cybersecurity threat trends in 2020. Here is our list of top 5 threats that security experts should definitely look out for in the coming year.</p> <h3>1. Malware Infection of Devices</h3> <p><a href="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2018/11/27082929/KSB_Predictions-2019_General-APT.pdf" title="THREAT PREDICTIONS FOR 2019" target="_blank">Kaspersky's IT Security reports</a> for 2019 showed that almost half of all organizations suffered malware infection on their companies’ devices, and about half was also accountable for malware on the employee's devices. This trend is going to keep rising in 2020 because employees will be allowed to use personal devices to access, store, and retrieve information from the cyberspace so that they can work remotely. Hence, personal devices would be a target for attackers to gain access to companies' network systems. This is also easy for attackers to execute because they don't need a target before they can attack; all they require is a carrier, which personal devices can function as.</p> <p>Investing in/installing robust USB and other external-device antivirus protection on your computer system will help. An antivirus will effectively scan your device when transferring files from an external device, as well as monitoring suspicious activities.</p> <h3>2. AI-based Malware</h3> <p>Since 2017, AI-based malware has been a theory that has not materialized. However, with the tremendous impact of AI technological solutions in the previous year, there are strong indications that attackers may develop AI solutions that can obtain information from and plant malware roots into adopters' systems. Possible victims of AI-based malware include core national infrastructures, nuclear power stations, transport networks, to name a few. <a href="https://securityintelligence.com/deeplocker-how-ai-can-power-a-stealthy-new-breed-of-malware/" title="DeepLocker: How AI Can Power a Stealthy New Breed of Malware" target="_blank">IBM was noted</a> to have developed a case-study and proof of this concept. Researchers have been keen to acquire information from this concept. However, it still stands that no one knows what AI-based malware may be capable of until it comes open in the wild.</p> <h3>3. Asynchronous Procedure Calls (APC) Through System Kernels</h3> <p>Not so long ago, <a href="https://arstechnica.com/gadgets/2019/03/how-microsoft-found-a-huawei-driver-that-opened-systems-up-to-attack/" title="How Microsoft found a Huawei driver that opened systems to attack" target="_blank">Microsoft Defender Advanced Threat Protection (ATP) service discovered</a> that unprivileged users could access Huawei MateBook systems with superuser privileges. Although Huawei fixed the issue and published a safer version, the news already hit the ground, and it shows just one case out of other possible ones that are available.</p> <p>2020 may see similar asynchronous (suspicious) calls taken by certain software on a system's driver. Other software systems might be employing this approach to provide backdoor access to non-administrative users to bypass systems' security through the use of APC to interrupt systems operations and enforce the running of malware codes.</p> <p>Proactively updating systems, removing dormant software, and continuous defender scans will help to either flush out programs that run other functions or to alert you early about the process.</p> <h3>4. Ransomware Attacks</h3> <p>With many private organizations and individuals taking security seriously, ransomware attacks are now directed more to businesses. The detection rate of ransomware rose from 2.8 million in the first quarter of the year 2018 to about 9.5 million in the first quarter of 2019, according to <a href="https://www.itprotoday.com/security/why-enterprise-ransomware-attacks-are-rise" title="Why Enterprise Ransomware Attacks Are on the Rise" target="_blank">ITPro Today</a>. This shows that more attempted attacks are waged on businesses. Companies are seen as ideal targets of ransomware because they will want to pay ransom to protect their confidential data and preserve their reputation. Although no one is happy about having their data encrypted or losing it altogether, attackers keep posing threats with different strategies of ransomware attacks. The trends of ransomware attacks will continue to grow even as business giants emerge in 2020.</p> <p>Implementing strong firewalls as part of robust perimeter security will help prevent the case of ransomware infection on systems. Using proper encryption of sensitive data, applying right measures for information security, using antivirus software, as well as taking an offsite backup will also help.</p> <h3>5. IoT-based Attacks</h3> <p>Smart, internet-connected devices now invade homes and offices through security systems, electronic devices, and so on. 2020 is going to see attacks launched on major networks through IoT devices because not all of them are proofed with robust security systems pre-installed in them. Recent discoveries have shown that internet-connected devices susceptible to weak security systems stand the risk of Reaper, a kind ofmalware that exploits the vulnerabilities of IoT devices, in an attempt to hack the network and reproduce itself.</p> <p>A continuously updated firmware of IoT devices will help you stay abreast of attacks.</p> <p>Conclusively, these threats are at the door, seeking a vulnerability that would give them access into systems, even as businesses begin work for the year. Any security-conscious personnel would do well to prepare or reinforce their security system against these attacks. The first line of safeguarding your networks and systems against these threats is to thwart them before they can cause any damage. SOC’s would benefit by <a href="https://threatintelligenceplatform.com/threat-intelligence-api" title="Threat Intelligence API - 6 Different Security Analysis APIs">integrating Threat Intel provided by TIP</a> into their security applications for early detection and prevention of threats. Our comprehensive APIs provide Intel on external threats, as well as internal vulnerabilities present in your systems. Get an idea of the Intel we provide by getting a free trial of our <a href="https://threatintelligenceplatform.com/" title="Threat Intelligence Platform - Protection Tools, Services, API's">online Platform</a> now!</p>
]]></content:encoded>
        </item>
        <item>
            <title>Importance of Threat Hunting Today!</title>
            <link>https://threatintelligenceplatform.com/importance-of-threat-hunting-today</link>
            <pubDate>Fri, 10 Jan 2020 01:00:00 +0000</pubDate>
            <dc:creator>admin</dc:creator>

            <guid isPermaLink="false">https://threatintelligenceplatform.com/blog/?p=4400</guid>
            <description><![CDATA[
            <img width="1000" height="750" src="https://threatintelligenceplatform.com/images/blog/importance-of-threat-hunting-today/The-Value-of-Threat-Hunting.jpg" class="webfeedsFeaturedVisual wp-post-image" alt="The Value of Threat Hunting" style="display: block; margin: auto; margin-bottom: 25px;max-width: 100%;" />
            <p>A cyber attack is a pain, not just because an organization’s sensitive information can fall into the wrong hands, but also because the trust between clients and a company can be hurt in various irreparable ways. As security policies are adopted to ensure the safety of sensitive data, it is now common practice for companies and other data-reliant businesses to engage in the early detection of threats that may escape first-level security checks. Threat hunting as a concept is the proactive and purposeful search of networks to detect, identify and remove advanced threats that escaped security solutions. Simply put, threat hunting is a defensive measure that seeks to detect vulnerabilities and prevent attacks. It is proactive, iterative, and systematic.</p><p>Today, threat hunting has become a necessity because of the incessant, persistent, and dynamic attacks by cybercriminals seeking to steal sensitive data. Because it is practically impossible for organizations to cover the time, technology, and processes involved in building and developing sophisticated cybersecurity strategy at the same rate the threats do, it has become important to try and get ahead of the criminals and reduce their success rate.</p><p>As part of hunting threats, security experts need comprehensive data to make sense of their current landscape. <a href="https://threatintelligenceplatform.com/" title="Threat Intelligence Platform ">Threat Intelligence Platform (TIP)</a> can provide threat hunters with a wide range of information on risks and threats and help raise red flags on suspicious items for further investigation. Taking a proactive stance on your cybersecurity &amp; <a href="https://threatintelligenceplatform.com/threat-hunting-for-professionals-the-one-stop-guide-to-get-started" title="Threat Hunting for Professionals: The One-Stop Guide to Get Started">preventing attacks by leveraging threat hunting practices</a> can benefit your organization in the following ways...</p>
]]></description>
            <content:encoded><![CDATA[
            <img width="1000" height="750" src="https://threatintelligenceplatform.com/images/blog/importance-of-threat-hunting-today/The-Value-of-Threat-Hunting.jpg" class="webfeedsFeaturedVisual wp-post-image" alt="The Value of Threat Hunting" style="display: block; margin: auto; margin-bottom: 25px;max-width: 100%;" />
            <p>A cyber attack is a pain, not just because an organization’s sensitive information can fall into the wrong hands, but also because the trust between clients and a company can be hurt in various irreparable ways. As security policies are adopted to ensure the safety of sensitive data, it is now common practice for companies and other data-reliant businesses to engage in the early detection of threats that may escape first-level security checks. Threat hunting as a concept is the proactive and purposeful search of networks to detect, identify and remove advanced threats that escaped security solutions. Simply put, threat hunting is a defensive measure that seeks to detect vulnerabilities and prevent attacks. It is proactive, iterative, and systematic.</p> <p>Today, threat hunting has become a necessity because of the incessant, persistent, and dynamic attacks by cybercriminals seeking to steal sensitive data. Because it is practically impossible for organizations to cover the time, technology, and processes involved in building and developing sophisticated cybersecurity strategy at the same rate the threats do, it has become important to try and get ahead of the criminals and reduce their success rate.</p> <p>As part of hunting threats, security experts need comprehensive data to make sense of their current landscape. <a href="https://threatintelligenceplatform.com/" title="Threat Intelligence Platform ">Threat Intelligence Platform (TIP)</a> can provide threat hunters with a wide range of information on risks and threats and help raise red flags on suspicious items for further investigation. Taking a proactive stance on your cybersecurity &amp; <a href="https://threatintelligenceplatform.com/threat-hunting-for-professionals-the-one-stop-guide-to-get-started" title="Threat Hunting for Professionals: The One-Stop Guide to Get Started">preventing attacks by leveraging threat hunting practices</a> can benefit your organization in the following ways:</p> <h3>Uncover Security Threats &amp; Stay Ahead Of Cybercriminals</h3> <p>The first benefit of threat hunting is that it can help to proactively identify threats on a network and stop them. Hidden threats like malware that run in the background and other forms of malicious intrusion can be located and dealt with. This gives the company an edge over cybercriminals and reduces the possibility of threats and malicious intruders to cause damage.</p> <h3>Reduce Time Spent On An Investigation</h3> <p>By identifying the scope, causes, path, and forecasting the effects, threat hunting tools can help a security team to have a better understanding of a threat incident. An example of this is the active monitoring of networks with the aim of detecting potential threats and improving the current cybersecurity measures. This will provide crucial data for investigating incidents and equip the team with valuable lessons, tips, and corrections to prevent future incidents.</p> <h3>Improve Response To Security Threats</h3> <p>Another benefit of threat hunting is that companies and enterprises can improve the speed at which they respond to security threats. Experts say <a href="https://www.ibm.com/security/data-breach?ce=ISM0484&amp;ct=SWG&amp;cmp=IBMSocial&amp;cm=h&amp;cr=Security&amp;ccy=US&amp;cm_mc_uid=10183967237015284624205&amp;cm_mc_sid_50200000=45736461536071168677&amp;cm_mc_sid_52640000=42078211536071168687&amp;ce=ISM0484&amp;ct=SWG&amp;cmp=IBMSocial&amp;cm=h&amp;cr=Security&amp;ccy=US" title="How much would a data breach cost your business?" target="_blank">cybercriminals spend an average of 191 days inside a network before being discovered</a>, and it takes even longer before they are successfully dealt with. A proactive hunt through a network for abnormal patterns and behaviors caused by potential threats can be an important step in determining the response rate of the cybersecurity team.</p> <p>Additionally, identified active threats can be reported to a database, such as an incident responder, in order to expand the knowledge base and speed up the process of responding to threats before they can cause damage to a network.</p> <h3>Evaluate And Position Security Systems</h3> <p>Threat hunting is useful not only for intercepting potentially advanced persistent threats, but also for evaluating and understanding the current condition of the company’s cybersecurity, and its capacity to withstand attacks. This testing provides further actionable insights for security analysts.</p> <h3>Measurable Improvements In The Network Security</h3> <p>With threat hunting, an enterprise can progressively monitor the state of its security and the improvements that have happened over time. Situational reports and tracking simplify the processes of preventive and defensive security implementation protocols.</p> <h3>Enhance Productivity Of Resources</h3> <p>When used with the right intelligence, awareness, and analytics tools, threat hunting in the care of a good security analyst will bring about a reduction in breaches and breach attempts and help with optimum time and resource management.</p> <div class="custom-hr"></div> <p>Conclusively, threat hunting is coherent, comprehensive and is gradually gaining momentum in the technological world. 100% detection is difficult to achieve (if not impossible), but with the right <a href="https://threatintelligenceplatform.com/threat-intelligence-api" title="Threat Intelligence API - 6 Different Security Analysis APIs">Threat Intel</a>, the most dangerous threats can be detected and dealt with before they cause harm.</p> <p>Companies in search of strategies and tools to develop and improve on their cybersecurity to keep cybercriminals at bay must adopt solutions that offer accurate, actionable and relevant threat intel whether it is to <a href="https://threatintelligenceplatform.com/threat-intelligence-apis/domains-infrastructure-analysis-api" title="Domain's Infrastructure Analysis API">identify internal infrastructure vulnerabilities</a> which malicious actors may try to take advantage of or whether it is to <a href="https://threatintelligenceplatform.com/threat-intelligence-apis/domain-reputation-api" title="Domain Reputation API">confirm a website’s credibility</a> before making connections with it. With the arsenal of tools provided by TIP, security teams can save their time and resources and enrich their threat hunting practices today!</p>
]]></content:encoded>
        </item>
        <item>
            <title>8 Ways Unified Threat Management (UTM) Appliance can Benefit Small and Medium Businesses!</title>
            <link>https://threatintelligenceplatform.com/8-ways-unified-threat-management-appliance-can-benefit-small-and-medium-businesses</link>
            <pubDate>Thu, 26 Dec 2019 01:00:00 +0000</pubDate>
            <dc:creator>admin</dc:creator>

            <guid isPermaLink="false">https://threatintelligenceplatform.com/blog/?p=4300</guid>
            <description><![CDATA[
            <img width="1000" height="750" src="https://threatintelligenceplatform.com/images/blog/8-ways-unified-threat-management-appliance-can-benefit-small-and-medium-businesses/The-Importance-of-Unified-Threat-Management-for-SMBs.jpg" class="webfeedsFeaturedVisual wp-post-image" alt="The Importance of Unified Threat Management for SMBs" style="display: block; margin: auto; margin-bottom: 25px;max-width: 100%;" />
            <p>Small and Medium Businesses (SMB) should literally mean small and medium; hence, ideally, it can’t be expected that either of them will become a target for attackers. Sadly, more often than may seem, SMBs get attacked and hacked. In fact, <a href="https://smallbiztrends.com/2017/01/cyber-security-statistics-small-business.html" title="Cyber Security Statistics: Numbers Small Businesses Need to Know" target="_blank">43% of cyber attacks are targeted towards small businesses</a>. The reason is not that far-fetched; SMBs rarely invest in cybersecurity measures and threat intelligence, thus making their systems easy to hack. Most big organizations now invest in sophisticated threat prevention and detection solutions; therefore, attackers find it easy to target small and medium businesses.</p><p>A possible network security solution for SMBs with limited resources is to invest in a Unified Threat Management (UTM) appliance. With UTM, it is easier to handle security operations because all security protocols are grouped in one place and not separate applications. Here is how UTM can benefit small and medium-scaled businesses.</p>
]]></description>
            <content:encoded><![CDATA[
            <img width="1000" height="750" src="https://threatintelligenceplatform.com/images/blog/8-ways-unified-threat-management-appliance-can-benefit-small-and-medium-businesses/The-Importance-of-Unified-Threat-Management-for-SMBs.jpg" class="webfeedsFeaturedVisual wp-post-image" alt="The Importance of Unified Threat Management for SMBs" style="display: block; margin: auto; margin-bottom: 25px;max-width: 100%;" />
            <p>Small and Medium Businesses (SMB) should literally mean small and medium; hence, ideally, it can’t be expected that either of them will become a target for attackers. Sadly, more often than may seem, SMBs get attacked and hacked. In fact, <a href="https://smallbiztrends.com/2017/01/cyber-security-statistics-small-business.html" title="Cyber Security Statistics: Numbers Small Businesses Need to Know" target="_blank">43% of cyber attacks are targeted towards small businesses</a>. The reason is not that far-fetched; SMBs rarely invest in cybersecurity measures and threat intelligence, thus making their systems easy to hack. Most big organizations now invest in sophisticated threat prevention and detection solutions; therefore, attackers find it easy to target small and medium businesses.</p> <p>A possible network security solution for SMBs with limited resources is to invest in a Unified Threat Management (UTM) appliance. With UTM, it is easier to handle security operations because all security protocols are grouped in one place and not separate applications. Here is how UTM can benefit small and medium-scaled businesses.</p> <h3>It Brings Convenience</h3> <p>It is easier for a cost-conscious organization with limited manpower to manage just one security console as the central system for an entire organization. This is better than a bulky system that may require different people and resources to handle. A single security control interface exterminates complexities in security protocols.</p> <h3>Intrusion Prevention</h3> <p>UTM offers a precautionary approach for a network's security to detect possible threats and to react accordingly and promptly. The right UTM function will recognize malicious threats trying to make the organization’s network vulnerable and would trigger a defense mechanism against them while also alerting the security personnel. This way, unidentified attempts/accesses are blocked off from entering an organization's system.</p> <h3>Antivirus Scanning</h3> <p>UTM performs an antivirus scanning that identifies, prevents, and removes dangerous malware and their activities on a network. Though it was originally designed to ward off viruses, it has developed over time to detect and nullify the harmful actions of some other kinds of malware that could put an entire system at risk. It is crucial to have access to a <a href="https://threatintelligenceplatform.com/threat-intelligence-apis/domain-malware-check-api" title="Domain Malware Check API">reliable malware data source</a> to ensure accurate intel &amp; prevent threats.</p> <h3>It Helps To Throttle Bandwidth</h3> <p>UTM can be set by an administrator to temper the internet bandwidth and traffic. It utilizes a communication network for the control of network traffic to prevent jams and slow down traffic when needed. This functionality can help when an organization has a congested network and is on the brink of crashing, which could cost data loss and extra recovery time.</p> <h3>It Has Virtual Private Network Capabilities</h3> <p>UTM provides a classified Virtual Private Network (VPN) that allows users to send and collect data and information on shared networks. This helps users to stay private and secured, to have their locations encrypted with a virtual point-to-point network, and other administrative incognito benefits. With VPN incorporated into a UTM system, the staff of an organization can stay secured to an intranet while operating outside the office place.</p> <h3>Firewall Functionality</h3> <p>An application firewall, either the host-based application firewall or network-based application firewall, is a core function of a UTM as it controls access to and from things via a service supplier. It monitors and blocks the system service from inbound or outbound services that are at odds with the configuration of the firewall. With an incorporated firewall, UTM can umpire network traffic on multiple layers and can give clearance to different applications and services.</p> <h3>Web Filtering</h3> <p>An organization stands to get the benefit of web filtering by the security system of UTM before presenting web pages to a user. This protocol checks and determines if the web pages or content are safe enough for a user and the entire system. Filtration is done by confirming the origin of a web page and specific criteria according to the developer's pre-installed web filter protocols. Furthermore, an enterprise or a user on a central host can set custom restrictions for malware, intrusive ads, pornographic contents, phishing sites, and so on. Web filtering is a sort of fortification against threats on a company's central network or an individual's system on a host network.</p> <h3>Advanced Threat Protection</h3> <p>For an organization, threats occur at numerous levels, which is why Advanced Threat Protection (ATP) is important. ATP depends on various security tools to ward off threats and criminal activities ranging from a central network to a user's device. Different tools specifically work for various things, however, by seamlessly working in a coordinated way altogether. UTM makes this functionality much easier without having to toggle between various security technologies on different levels before a problem can be determined and a response action can be triggered.</p> <p>In order to enrich your security analytics for both internal vulnerabilities and external threats, security teams can access <a href="https://threatintelligenceplatform.com/threat-intelligence-api" title="Threat Intelligence API - 6 Different Security Analysis APIs">Threat Intelligence feeds</a> directly in their UTM appliances to enable quicker and more informed decisions. Threat Intelligence Platform (TIP) enables faster detection and response times by putting comprehensive, real-time intelligence in the center of your security processes.</p> <p>Finally, before investing in a Unified Threat Management solution, you should assess your current level of security and security needs and go for a solution that best covers your needs.</p>
]]></content:encoded>
        </item>
        <item>
            <title>Phishing Website Investigation with Whois XML API and Threat Intelligence Platform Toolsets</title>
            <link>https://threatintelligenceplatform.com/phishing-website-investigation-with-whoisxmlapi-and-threatintelligenceplatform-toolsets</link>
            <pubDate>Mon, 09 Dec 2019 01:00:00 +0000</pubDate>
            <dc:creator>admin</dc:creator>

            <guid isPermaLink="false">https://threatintelligenceplatform.com/blog/?p=4200</guid>
            <description><![CDATA[
            <p>Arguably, the most ironic phishing incident to hit American corporations occurred shortly after the infamous Equifax data breach. In September 2017, hackers broke into the networks of the credit reporting bureau Equifax and stole the private details of about 60% of the population of the United States; that is, every American of working age. <a target="_blank" rel="nofollow" title="Equifax Says Cyberattack May Have Affected 143 Million in the U.S." href="https://www.nytimes.com/2017/09/07/business/equifax-cyberattack.html?module=inline">They made off with the names, addresses, drivers' license numbers, and social security numbers of 143 million consumers</a>.</p><p>Only days later, Equifax launched the website equifaxsecurity2017.com to answer the questions the consumers had about the hacked account and to apply an account protection service. Unfortunately, Equifax staff actually linked the official Equifax Twitter account to a fake site, securityequifax2017.com. <a target="_blank" rel="nofollow" title="Someone Made a Fake Equifax Site. Then Equifax Linked to It." href="https://www.nytimes.com/2017/09/20/business/equifax-fake-website.html">A software engineer named Nick Sweeting created the fake website</a> to make a point to Equifax -- and, as one would expect, the entire corporate world -- how they set themselves up to be defrauded.</p>
]]></description>
            <content:encoded><![CDATA[
            <p>Arguably, the most ironic phishing incident to hit American corporations occurred shortly after the infamous Equifax data breach. In September 2017, hackers broke into the networks of the credit reporting bureau Equifax and stole the private details of about 60% of the population of the United States; that is, every American of working age. <a target="_blank" rel="nofollow" title="Equifax Says Cyberattack May Have Affected 143 Million in the U.S." href="https://www.nytimes.com/2017/09/07/business/equifax-cyberattack.html?module=inline">They made off with the names, addresses, drivers' license numbers, and social security numbers of 143 million consumers</a>.</p> <p>Only days later, Equifax launched the website equifaxsecurity2017.com to answer the questions the consumers had about the hacked account and to apply an account protection service. Unfortunately, Equifax staff actually linked the official Equifax Twitter account to a fake site, securityequifax2017.com. <a target="_blank" rel="nofollow" title="Someone Made a Fake Equifax Site. Then Equifax Linked to It." href="https://www.nytimes.com/2017/09/20/business/equifax-fake-website.html">A software engineer named Nick Sweeting created the fake website</a> to make a point to Equifax -- and, as one would expect, the entire corporate world -- how they set themselves up to be defrauded.</p> <div class="pic-wrapper hovered w100 bordered"> <img src="https://threatintelligenceplatform.com/images/blog/phishing-website-investigation-with-whoisxmlapi-and-threatintelligenceplatform-toolsets/image1-17.png" title="The fake Equifax website" alt="The fake Equifax website"> <br><br> <p>The fake Equifax website (Source: <a target="_blank" rel="nofollow" title="Someone Made a Fake Equifax Site. Then Equifax Linked to It." href="https://www.nytimes.com/2017/09/20/business/equifax-fake-website.html">New York Times</a>)</p> </div> <p>The estimated 200,000 people who logged onto the account on the fake website saw a message that read, “Cybersecurity incident &amp; Important Consumer Information Which Is Totally Fake, Why Did Equifax Use A Domain That’s So Easily Impersonated By Phishing Sites?” The identity theft protection website required the surname and the last six digits of their Social Security numbers to enroll on the Equifax program. Mr. Sweeting’s website did not keep the information. He took the site down within a few days of posting it.</p> <p>“It only took me 20 minutes to build my clone. I can guarantee there are real malicious phishing versions already out there.” Because phishing websites are so easy and inexpensive to build, the internet is awash with online portals that fool end-users into believing they represent real brands.</p> <p>Every day, information security forensics researchers uncover the origins of phishing websites through the use of cybersecurity tools such as those that WHOISXMLAPI.com and ThreatIntelligencePlatform.com provide.</p> <h3>WHOISXMLAPI.com and ThreatIntelligencePlatform.com Phishing Domain Research Tools</h3> <p>The researchers at <a target="_blank" href="https://www.whoisxmlapi.com/" title="Whois XML API - Whois Lookup - Domain Name Search">WHOISXMLAPI.com</a> and <a href="http://threatintelligenceplatform.com/" title="Threat Intelligence Platform">ThreatIntelligencePlatform.com</a> came across a phishing website for Xfinity (a division of Comcast). Xfinity supports television and internet services. At the end of August 2019, he website appeared on several blacklists. We chose to apply WHOISXMLAPI.com and ThreatIntelligencePlatform.com forensics toolkits to see if we could reveal who was behind the fraudulent website.</p> <p>WHOISXMLAPI.com offers information security forensics professionals the <a target="_blank" title="Domain Research Suite | Whois XML API" href="https://drs.whoisxmlapi.com">Dashboard Domain Research Suite</a>, and ThreatIntelligencePlatform.com provides the <a title="Threat Intelligence Analysis - Website &amp; Host Security Analysis" href="https://threatintelligenceplatform.com">Domain Name Analysis</a> to get to the bottom of phishing websites.</p> <p>Both kits provide users with the ability to look behind the facade of websites to discover their origins. In some instances, the tools can excavate the physical location in which hackers created the website. The location can sometimes provide circumstantial evidence with regard to the authors of the phishing site, as well.</p> <div class="pic-wrapper hovered w100 bordered"> <img src="https://threatintelligenceplatform.com/images/blog/phishing-website-investigation-with-whoisxmlapi-and-threatintelligenceplatform-toolsets/image2-19.png" title="WHOISXMLAPI Domain Research Suite" alt="WHOISXMLAPI Domain Research Suite"> <br><br> <p><a target="_blank" href="https://drs.whoisxmlapi.com" title="Domain Research Suite | Whois XML API">WHOISXMLAPI Domain Research Suite</a></p> </div> <p><a target="_blank" href="https://drs.whoisxmlapi.com" title="Domain Research Suite | Whois XML API">WHOISXMLAPI Domain Research Suite</a> provides a means of revealing the domain’s current and historic information of behind a website. Users can search by domain name, contact and registrar addresses, country, and more. The tools we used in the Suite include:</p> <ul> <li>WHOIS Search</li> <li>WHOIS History Search</li> <li>Reverse WHOIS Search</li> </ul> <p><a href="https://threatintelligenceplatform.com" title="Threat Intelligence Analysis - Website &amp; Host Security Analysis">The ThreatIntelligencePlatform.com Domain Name Analysis</a> can resolve the IP addresses of domains, and reveals the domain infrastructure information. It delivers a lengthy, highly readable report based upon results from a single input. Some of the infrastructure information includes geolocation data attached to an IP address, the domains related to an IP address, the status of the SSL certificate for the IP, whether the domain has been blacklisted on malware lists, and more..</p> <div class="pic-wrapper hovered w100 bordered"> <img src="https://threatintelligenceplatform.com/images/blog/phishing-website-investigation-with-whoisxmlapi-and-threatintelligenceplatform-toolsets/image3-21.png" title="Threat Intelligence Analysis - Website &amp; Host Security Analysis" alt="Threat Intelligence Analysis - Website &amp; Host Security Analysis"> <br><br> <p><a href="https://threatintelligenceplatform.com" title="Threat Intelligence Analysis - Website &amp; Host Security Analysis">ThreatIntelligencePlatform.com Domain Name Analysis</a></p> </div> <p>The research team used the GUI tools to reveal at a domain level how the website was fake, and, if possible, the probable origin of the phishing portal.</p> <h3>An Investigation into a Real Fake Website</h3> <p>Hackers make their business by creating phishing versions of well-known brands. The brands have a built-in level of authority and credibility as consumers give them a great deal of trust. The most popularly phished websites are in the financial sector, since “that’s where the money is.” E-commerce sites are also popular since users share critical personal contact details with sellers and make funds transfers to sellers.</p> <p>The website our research team found appeared on several blacklists as <a target="_blank" rel="nofollow" href="https://x-finitycomcastboxappsuitnewteam.duckdns.org/xfinity">https://x-finitycomcastboxappsuitnewteam.duckdns.org/xfinity</a>. Xfinity is one of the largest cable providers in the United States. The interface most likely displays after a user clicks on a link in an email that tells them that they have a billing issue, probably a late billing problem.</p> <div class="pic-wrapper hovered w100 bordered"> <img src="https://threatintelligenceplatform.com/images/blog/phishing-website-investigation-with-whoisxmlapi-and-threatintelligenceplatform-toolsets/image4-23.png" title="A fraudulent Xfinity website" alt="A fraudulent Xfinity website"> <br><br> <p>A fraudulent Xfinity website</p> </div> <p>The website makes it as easy as possible for the unsuspecting user to enter critical private information. Its simplicity belies its malevolence. However, the sheer length of the domain address informs us of an entity not associated with Xfinity created the domain. One dead giveaway that the domain name is not trustworthy is the reference to “x-finity” instead of “xfinity”. And then, of course, there is the .org designation. Xfinity as a commercial corporation does not use the non-profit .org top-level domain designation. The duckdns reference implies the IP address is a dynamic one.</p> <div class="pic-wrapper hovered w100 bordered"> <img src="https://threatintelligenceplatform.com/images/blog/phishing-website-investigation-with-whoisxmlapi-and-threatintelligenceplatform-toolsets/image5-25.png" title="DuckDNS.org home page" alt="DuckDNS.org home page"> <br><br> <p>DuckDNS.org home page</p> </div> <p>Domain administrators use dynamic DNS servers for a continuous mapping of changing IP addresses to a domain name. Dynamic DNS servers help users on the internet to always find a domain by its domain name, even though the IP address of the device that hosts the domain changes. <a target="_blank" rel="nofollow" href="https://en.wikipedia.org/wiki/Dynamic_DNS">Usually, residential and small business users elect to use DNS Dynamic addresses</a>. Most enterprises specifically require static addresses. Thus, another clue about the nature of the domain is that whoever launched it did it from a home- or small organization-based location. It is definitely not associated with the Xfinity group of related subdomains. Researchers posit that it was a home-based effort.</p> <p>Dynamic IP addresses pose a problem if the customer wants to provide a service to other users on the Internet, such as a web service. As the IP address can be changed frequently, corresponding domain names must be quickly re-mapped in the <a target="_blank" rel="nofollow" href="https://en.wikipedia.org/wiki/Domain_Name_System">DNS</a>, to maintain accessibility using a well-known URL. A quick look at its root domain address, <a target="_blank" rel="nofollow" href="https://x-finitycomcastboxappsuitnewteam.duckdns.org/xfinity">https://x-finitycomcastboxappsuitnewteam.duckdns.org/</a>, reveals a basic file directory, instead of the x-finity.com homepage.</p> <div class="pic-wrapper hovered w100 bordered"> <img src="https://threatintelligenceplatform.com/images/blog/phishing-website-investigation-with-whoisxmlapi-and-threatintelligenceplatform-toolsets/image6-27.png" title="Screenshot of https://x-finitycomcastboxappsuitnewteam.duckdns.org" alt="Screenshot of https://x-finitycomcastboxappsuitnewteam.duckdns.org"> <br><br> <p><a target="_blank" rel="nofollow" href="https://x-finitycomcastboxappsuitnewteam.duckdns.org/xfinity">Screenshot of https://x-finitycomcastboxappsuitnewteam.duckdns.org</a></p> </div> <h3>WHOIS Behind the Fake Website?</h3> <p>A look at the WHOIS record in the <a target="_blank" title="Domain Research Suite | Whois XML API" href="https://drs.whoisxmlapi.com">WHOISXMLAPI Domain Research Suite</a> of GUI tools illustrates that the only information to be found about the registrant is a name -- Gandi SAS -- and Registrant State/Province: Paris and Registrant Country: FRANCE. Of course, Paris is neither a state nor a province. In addition, the record lacks contact details like the address, phone numbers, and email addresses. However, a quick search on Google does indicate Gandi SAS is a French domain registrar company. Apparently, the registrar requires very little in confirmation of ownership of domains.</p> <div class="pic-wrapper hovered w100 bordered"> <img src="https://threatintelligenceplatform.com/images/blog/phishing-website-investigation-with-whoisxmlapi-and-threatintelligenceplatform-toolsets/image7-29.png" title="WHOIS record of https://x-finitycomcastboxappsuitnewteam.duckdns.org" alt="WHOIS record of https://x-finitycomcastboxappsuitnewteam.duckdns.org"> <br><br> <p>WHOIS record <a target="_blank" rel="nofollow" href="https://x-finitycomcastboxappsuitnewteam.duckdns.org/xfinity">of https://x-finitycomcastboxappsuitnewteam.duckdns.org</a></p> </div> <p>When we run a WHOIS history of <a target="_blank" rel="nofollow" href="https://x-finitycomcastboxappsuitnewteam.duckdns.org/xfinity">https://x-finitycomcastboxappsuitnewteam.duckdns.org</a> in <a target="_blank" title="Domain Research Suite | Whois XML API" href="https://drs.whoisxmlapi.com">WHOISXMLAPI Domain Research Suite</a> we find that the domain has no history of changes at all.</p> <div class="pic-wrapper hovered w100 bordered"> <img src="https://threatintelligenceplatform.com/images/blog/phishing-website-investigation-with-whoisxmlapi-and-threatintelligenceplatform-toolsets/image8-31.png" title="WHOIS HISTORY FOR https://x-finitycomcastboxappsuitnewteam.duckdns.org" alt="WHOIS HISTORY FOR https://x-finitycomcastboxappsuitnewteam.duckdns.org/"> <br><br> <p>WHOIS HISTORY FOR <a target="_blank" rel="nofollow" href="https://x-finitycomcastboxappsuitnewteam.duckdns.org/xfinity">https://x-finitycomcastboxappsuitnewteam.duckdns.org/</a> </p> </div> <p>Instead, what we find is that the duckdns.org service masks the registration information of the originator of <a target="_blank" rel="nofollow" href="https://x-finitycomcastboxappsuitnewteam.duckdns.org/xfinity">https://x-finitycomcastboxappsuitnewteam.duckdns.org/</a> .</p> <div class="pic-wrapper hovered w100 bordered"> <img src="https://threatintelligenceplatform.com/images/blog/phishing-website-investigation-with-whoisxmlapi-and-threatintelligenceplatform-toolsets/image9-33.png" title="WHOIS HISTORY FOR duckdns.org" alt="WHOIS HISTORY FOR duckdns.org"> <br><br> <p>WHOIS HISTORY FOR <a target="_blank" rel="nofollow" href="https://x-finitycomcastboxappsuitnewteam.duckdns.org/xfinity">duckdns.org</a></p> </div> <p>Indeed, in <a href="https://threatintelligenceplatform.com" title="Threat Intelligence Analysis - Website &amp; Host Security Analysis">ThreatIntelligencePlatform.com Domain Name Analysis</a>, the record for duckdns.org shows that the domain redirects calls to other domains. Those redirects mask the origins of domains that rely on the DDNS service.</p> <div class="pic-wrapper hovered bordered"> <img src="https://threatintelligenceplatform.com/images/blog/phishing-website-investigation-with-whoisxmlapi-and-threatintelligenceplatform-toolsets/image10-35.png" title="Warning for duckdns.org" alt="Warning for duckdns.org"> <br><br> <p>Warning for duckdns.org</p> </div> <p>When we run the ThreatIntelligencePlatform.com <a title="Threat Intelligence Analysis - Website &amp; Host Security Analysis" href="https://threatintelligenceplatform.com">Domain Name Analysis</a> on the domain name <a target="_blank" rel="nofollow" href="https://x-finitycomcastboxappsuitnewteam.duckdns.org/xfinity">https://x-finitycomcastboxappsuitnewteam.duckdns.org/</a>, everything looks legitimate except a record showing that it failed the Certificate Validity From date test.</p> <div class="pic-wrapper hovered w100 bordered"> <img src="https://threatintelligenceplatform.com/images/blog/phishing-website-investigation-with-whoisxmlapi-and-threatintelligenceplatform-toolsets/image11-37.png" title="WHOIS record for https://x-finitycomcastboxappsuitnewteam.duckdns.org/" alt="WHOIS record for https://x-finitycomcastboxappsuitnewteam.duckdns.org/"> <br><br> <p>WHOIS record for <a target="_blank" rel="nofollow" href="https://x-finitycomcastboxappsuitnewteam.duckdns.org/xfinity">https://x-finitycomcastboxappsuitnewteam.duckdns.org/</a> </p> </div> <p>The fact that Certificate validity has failed makes one doubt that the registrant of the domain is also the owner of the domain. To recap, in the WHOIS Search the only identifying information was Paris, France (wherein Paris was a State).</p> <p>A failed Certificate Validation can also arise because of the administrator’s use of a Dynamic DNS (DDNS) provider instead of a valid DNS service. Valid DNS services can grant domains the records they need to create certificates.</p> <h3>A Poke Around the Fake Website</h3> <p>So, while we’ve established the website is fake, what specific information is the portal seeking for users to divulge? By examining the links on the site, we can see where innocent users can find themselves in trouble. For instance, the <em>Create user id and password</em> page requests users to enter their phone number or the United States Social Security Number. While hackers can use the phone number to build up a profile of a hacking target, the Social Security Number gives criminals access to a wealth of access to commercial and governmental resources.</p> <div class="pic-wrapper hovered w100 bordered"> <img src="https://threatintelligenceplatform.com/images/blog/phishing-website-investigation-with-whoisxmlapi-and-threatintelligenceplatform-toolsets/image12-39.png" title="Individual services log-in screen" alt="Individual services log-in screen"> <br><br> <p><a target="_blank" rel="nofollow" href="https://idm.xfinity.com/myaccount/create-uid?execution=e2s1">Individual services log-in screen</a></p> </div> <p>The address indicates that the login screen is also not associated with the authorized Comcast website: <a target="_blank" rel="nofollow" href="https://idm.xfinity.com/myaccount/create-uid?execution=e2s1">https://idm.xfinity.com/myaccount/create-uid?execution=e2s1</a> </p> <p>When we type in the root domain name idm.xfinity.com, the website displays a generic password reset screen: <a target="_blank" rel="nofollow" href="https://idm.xfinity.com/myaccount/account-selector?execution=e3s1">https://idm.xfinity.com/myaccount/account-selector?execution=e3s1</a> </p> <p>The “forgot your user name or password” links on the primary page lead users to the same screen, with a slightly different wording.</p> <div class="pic-wrapper hovered w100 bordered"> <img src="https://threatintelligenceplatform.com/images/blog/phishing-website-investigation-with-whoisxmlapi-and-threatintelligenceplatform-toolsets/image13-41.png" title="Forgot your username response (https://idm.xfinity.com/myaccount/lookup?execution=e2s1)" alt="Forgot your username response (https://idm.xfinity.com/myaccount/lookup?execution=e2s1)"> <br><br> <p>Forgot your username response (<a target="_blank" rel="nofollow" href="https://idm.xfinity.com/myaccount/lookup?execution=e2s1">https://idm.xfinity.com/myaccount/lookup?execution=e2s1</a>) </p> </div> <p>The screen asks the user for his/her email address, Xfinity user id, or telephone number. Any one of these pieces of information helps hackers target a range of the user’s accounts, not just their Xfinity login. As an uninformed user may recklessly type in their identification information into any of the contact details screens, the hackers will be able to go to the real Xfinity website with the information to take over the user’s account.</p> <p>The idm.xfinity.com domain may be directly connected to the database that captures user information. Typing the address into a browser does not connect to any website. Our researchers assume the hackers have taken the site offline.</p> <div class="pic-wrapper hovered w100 bordered"> <img src="https://threatintelligenceplatform.com/images/blog/phishing-website-investigation-with-whoisxmlapi-and-threatintelligenceplatform-toolsets/image14-43.png" title="The WHOIS record for idm.xfinity.com" alt="The WHOIS record for idm.xfinity.com"> <br><br> <p>The WHOIS record for idm.xfinity.com</p> </div> <p>The WHOIS record for idm.xfinity.com does not display any untoward data.</p> <p>Researchers ran a Reverse WHOIS search of the domain registration company CSC Corporate Domains in <a target="_blank" title="Domain Research Suite | Whois XML API" href="https://drs.whoisxmlapi.com">WHOISXMLAPI Domain Research Suite</a>.</p> <div class="pic-wrapper hovered w100 bordered"> <img src="https://threatintelligenceplatform.com/images/blog/phishing-website-investigation-with-whoisxmlapi-and-threatintelligenceplatform-toolsets/image15-45.png" title="Reverse WHOIS of CSC Corporate Domains, Inc. (no idm.*)" alt="Reverse WHOIS of CSC Corporate Domains, Inc. (no idm.*)"> <br><br> <p>Reverse WHOIS of CSC Corporate Domains, Inc. (no idm.*)</p> </div> <p>We did not find any additional domains with the prefix idm.*, nor any that included the prefix xfinity*.</p> <div class="pic-wrapper hovered w100 bordered"> <img src="https://threatintelligenceplatform.com/images/blog/phishing-website-investigation-with-whoisxmlapi-and-threatintelligenceplatform-toolsets/image16-47.png" title="Reverse WHOIS of CSC Corporate Domains, Inc. (no xfinity.*)" alt="Reverse WHOIS of CSC Corporate Domains, Inc. (no xfinity.*)"> <br><br> <p>Reverse WHOIS of CSC Corporate Domains, Inc. (no xfinity.*)</p> </div> <p>However, the inconsistency becomes apparent when researchers compare the WHOIS record to the SSL certificate data for the domain.</p> <div class="pic-wrapper hovered w100 bordered"> <img src="https://threatintelligenceplatform.com/images/blog/phishing-website-investigation-with-whoisxmlapi-and-threatintelligenceplatform-toolsets/image17-49.png" title="Certificates record for idm.xfinity.com displays organization and address information" alt="Certificates record for idm.xfinity.com displays organization and address information"> <br><br> <p>Certificates record for idm.xfinity.com displays organization and address information</p> </div> <p><a href="https://threatintelligenceplatform.com" title="Threat Intelligence Analysis - Website &amp; Host Security Analysis">ThreatIntelligencePlatform.com Domain Name Analysis</a> SSL Certificate record for idm.xfinity.com displays registration contact information inconsistent with current files. A quick google on the address displays a different address for Comcast Corporation. Further, the alternate addresses listed in the WHOIS record also do not display any websites.</p> <p>Just like the Certificate validation for <a target="_blank" rel="nofollow" href="https://x-finitycomcastboxappsuitnewteam.duckdns.org/xfinity">https://x-finitycomcastboxappsuitnewteam.duckdns.org/</a>, idm.xfinity.com fails the test. The administrator apparently registered the certificate of idm.g.xfinity.com as idm.xfinity.com’s own.</p> <div class="pic-wrapper hovered w100 bordered"> <img src="https://threatintelligenceplatform.com/images/blog/phishing-website-investigation-with-whoisxmlapi-and-threatintelligenceplatform-toolsets/image18-51.png" title="Idm.xfinity.com certificate validity fails" alt="Idm.xfinity.com certificate validity fails"> <br><br> <p>Idm.xfinity.com certificate validity fails</p> </div> <p>The WHOIS record shows additional, explicit warnings for Idm.xfinity.com, including:</p> <ul> <li>Found name servers don't provide A record for the domain</li> <li>The Configuration does not meet best practices: some name servers are located on a single ASN</li> <li>In the SOA record configuration check, the Serial number format has a warning that “Although the serial number is valid, it's not following the general convention: 6039,” and “The minimum TTL is 60. Recommended range is [3600 .. 86400]” </li> </ul> <p>Nevertheless, website links to forms meant to capture user information consistently use the idm.xfinity.com domain, including ‘Reset your password’, ‘Let’s find your username’, and a link to a screen for a Quick Pay without Logging In.</p> <div class="pic-wrapper hovered w100 bordered"> <img src="https://threatintelligenceplatform.com/images/blog/phishing-website-investigation-with-whoisxmlapi-and-threatintelligenceplatform-toolsets/image19-53.png" title="Quick pay without logging in (https://idm.xfinity.com/myaccount/account-selector?execution=e3s1)" alt="Quick pay without logging in (https://idm.xfinity.com/myaccount/account-selector?execution=e3s1)"> <br><br> <p>Quick pay without logging in (<a target="_blank" rel="nofollow" href="https://idm.xfinity.com/myaccount/account-selector?execution=e3s1">https://idm.xfinity.com/myaccount/account-selector?execution=e3s1</a>) </p> </div> <h3>So, Who Is Behind the Phishing Site?</h3> <p>Through ThreatIntelligencePlatform.com’s <a title="Threat Intelligence Analysis - Website &amp; Host Security Analysis" href="https://threatintelligenceplatform.com">Domain Name Analysis</a>, we can resolve the domain name of the primary fake website at <a target="_blank" rel="nofollow" href="https://x-finitycomcastboxappsuitnewteam.duckdns.org/t">https://x-finitycomcastboxappsuitnewteam.duckdns.org/</a> to the IP address 54.191.209.253.</p> <div class="pic-wrapper hovered w100 bordered"> <img src="https://threatintelligenceplatform.com/images/blog/phishing-website-investigation-with-whoisxmlapi-and-threatintelligenceplatform-toolsets/image20-55.png" title="IP resolution of the fake website at https://x-finitycomcastboxappsuitnewteam.duckdns.org/ " alt="IP resolution of the fake website at https://x-finitycomcastboxappsuitnewteam.duckdns.org/ "> <br><br> <p>IP resolution of the fake website at <a target="_blank" rel="nofollow" href="https://x-finitycomcastboxappsuitnewteam.duckdns.org/xfinity">https://x-finitycomcastboxappsuitnewteam.duckdns.org/</a> </p> </div> <p>ThreatIntelligencePlatform.com’s <a title="Threat Intelligence Analysis - Website &amp; Host Security Analysis" href="https://threatintelligenceplatform.com">Domain Name Analysis</a> displays several geolocations for the resolution of DuckDNS.org IP designations. However, there is one IP address that stands out: 35.167.241.52.</p> <div class="pic-wrapper hovered w100 bordered"> <img src="https://threatintelligenceplatform.com/images/blog/phishing-website-investigation-with-whoisxmlapi-and-threatintelligenceplatform-toolsets/image21-57.png" title="IP resolution of the fake website at duckdns.org" alt="IP resolution of the fake website at duckdns.org"> <br><br> <p>IP resolution of the fake website at <a target="_blank" rel="nofollow" href="https://x-finitycomcastboxappsuitnewteam.duckdns.org/xfinity">duckdns.org</a> </p> </div> <p>The geolocation for the IP address corresponds with the one for the website at <a target="_blank" rel="nofollow" href="https://x-finitycomcastboxappsuitnewteam.duckdns.org/xfinity">https://x-finitycomcastboxappsuitnewteam.duckdns.org/</a>. On the map that includes the United States and Europe, the locations for <a target="_blank" rel="nofollow" href="https://x-finitycomcastboxappsuitnewteam.duckdns.org/xfinity">https://x-finitycomcastboxappsuitnewteam.duckdns.org/</a> and for duckdns.org converge in one location: Boardman, Oregon.</p> <div class="pic-wrapper hovered w100 bordered"> <img src="https://threatintelligenceplatform.com/images/blog/phishing-website-investigation-with-whoisxmlapi-and-threatintelligenceplatform-toolsets/image22-59.png" title="IP resolution of the fake website at https://x-finitycomcastboxappsuitnewteam.duckdns.org/" alt="IP resolution of the fake website at https://x-finitycomcastboxappsuitnewteam.duckdns.org/"> <br><br> <p>IP resolution of the fake website at <a target="_blank" rel="nofollow" href="https://x-finitycomcastboxappsuitnewteam.duckdns.org/xfinity">https://x-finitycomcastboxappsuitnewteam.duckdns.org/</a> </p> </div> <p>Boardman is the location of <a target="_blank" rel="nofollow" href="https://www.datacenterknowledge.com/archives/2017/03/21/amazon-looks-build-ninth-oregon-data-center">one of Amazon’s web service (AWS) centers</a>. Resolving the geolocations of duckdns.org also reveals the locations of AWS data centers.</p> <p>It seems that the author of the fraudulent Xfinity website is well hidden by the duckdns.org DDNS service, another “benefit” of Dynamic Domain Name Servers. The lack of clear ownership and registration of the site combined with the inconsistencies the researchers found in the DNS infrastructure records point to a cyber-effort meant to defraud and obfuscate.</p> <h3>Cybersecurity Isn’t Just for Techies Anymore</h3> <p>The data that the WHOISXMLAPI.com <a target="_blank" title="Domain Research Suite | Whois XML API" href="https://drs.whoisxmlapi.com">Dashboard Domain Research Suite</a> and the ThreatIntelligencePlatform.com <a title="Threat Intelligence Analysis - Website &amp; Host Security Analysis" href="https://threatintelligenceplatform.com">Domain Name Analysis</a> enable researchers to assemble a picture and craft a narrative of criminal online behavior. In this instance, we explored the domain infrastructure of a phishing website design capture user credentials and perhaps even funds. Forensics specialists can also use the toolkits to supplement efforts to discover the parties infringing on brand equity and intellectual property. Fraud investigators can also use the tools to follow the trails of shell companies and laundering operations.</p> <p>Further, the GUI interfaces of the toolkits and the displays of records lend themselves well to creating reports for infosec colleagues, business managers, and courts of law. Whenever professionals need to understand domain-level data, cybersecurity professionals and law enforcement investigators can use the toolkits to draft easy-to-read narratives for non-technical readers to digest effortlessly.</p> <p>Meanwhile, every day, hackers create hundreds of new phishing websites intended to defraud and steal from people. WHOISXMLAPI.com and ThreatIntelligencePlatform.com offer just the right kind of tools to unmask criminals and get the right information across to those who need it most.</p>
]]></content:encoded>
        </item>
        <item>
            <title>The Use Of Connected Domains API In Cyber Security and Threat Intelligence</title>
            <link>https://threatintelligenceplatform.com/the-use-of-connected-domains-api-in-cyber-security-and-threat-intelligence</link>
            <pubDate>Mon, 28 Oct 2019 01:00:00 +0000</pubDate>
            <dc:creator>admin</dc:creator>

            <guid isPermaLink="false">https://threatintelligenceplatform.com/blog/?p=4000</guid>
            <description><![CDATA[
            <img width="1000" height="750" src="https://threatintelligenceplatform.com/images/blog/the-use-of-connected-domains-api-in-cyber-security-and-threat-intelligence/Connected-Domains-API.jpg" class="webfeedsFeaturedVisual wp-post-image" alt="The Use Of Connected Domains API In Cyber Security & Threat Intelligence" style="display: block; margin: auto; margin-bottom: 25px;max-width: 100%;" />
            <p>Cyber attacks on various industries and organization cause a lot of damage, both financially and by tarnishing their reputation. There are tons of trillion attack attempts on the cyberspace occurring monthly. This is why Security Operation Centres (SOC) try to stay ahead of the game by scanning for malicious activities before they get botched. <a href="https://threatintelligenceplatform.com/threat-intelligence-apis/connected-domains-api" title="Connected Domains API - Check Domain Names on Same IP Address">Connected Domains API</a> performs a Reverse IP lookup, which is an extremely valuable tool employed by security analysts to identify different hostnames that are configured on an IP address. That is, search queries can be done to obtain crucial information about multiple virtual hosts with DNS records from a central IP address. This technique has found great applications in cybersecurity and threat intelligence activities. The protocol does not just protect virtual properties from attacks; some organizations use it for market research and identifying copyright infringers, detecting fraudulent transaction, etc., which are explained in this blog. However, the extent to which the technique is used is dependent on the sector where it would be applied. Here are some popular use cases of Connected Domains API for cybersecurity and threat intelligence that your organization can benefit from.</p>
]]></description>
            <content:encoded><![CDATA[
            <img width="1000" height="750" src="https://threatintelligenceplatform.com/images/blog/the-use-of-connected-domains-api-in-cyber-security-and-threat-intelligence/Connected-Domains-API.jpg" class="webfeedsFeaturedVisual wp-post-image" alt="The Use Of Connected Domains API In Cyber Security & Threat Intelligence" style="display: block; margin: auto; margin-bottom: 25px;max-width: 100%;" />
            <p>Cyber attacks on various industries and organization cause a lot of damage, both financially and by tarnishing their reputation. There are tons of trillion attack attempts on the cyberspace occurring monthly. This is why Security Operation Centres (SOC) try to stay ahead of the game by scanning for malicious activities before they get botched. <a href="https://threatintelligenceplatform.com/threat-intelligence-apis/connected-domains-api" title="Connected Domains API - Check Domain Names on Same IP Address">Connected Domains API</a> performs a Reverse IP lookup, which is an extremely valuable tool employed by security analysts to identify different hostnames that are configured on an IP address. That is, search queries can be done to obtain crucial information about multiple virtual hosts with DNS records from a central IP address. This technique has found great applications in cybersecurity and threat intelligence activities. The protocol does not just protect virtual properties from attacks; some organizations use it for market research and identifying copyright infringers, detecting fraudulent transaction, etc., which are explained in this blog. However, the extent to which the technique is used is dependent on the sector where it would be applied. Here are some popular use cases of Connected Domains API for cybersecurity and threat intelligence that your organization can benefit from.</p> <h3>Penetration Test</h3> <p>Connected Domains API is used to identify vulnerable websites that may want to exploit a host on a server. An attacker attempts to identify a weak point on the host surface to gain access, which would eventually lead to exploitation. SOCs now use the same technique to perform penetration tests on various hosts on the central IP. Identifying hostnames that are susceptible to attacks can be used to trace additional Domain Name System (DNS) records of potential target hosts through the information discovery process. </p> <h3>Email Censoring</h3> <p>It is not unusual that hackers try to gain access to a company's system through emails. Hence, they send emails with underlying tricks, which may be with an attached malicious file or URL. Connected Domains API can be used to ward off such malevolent emails. Organizations’ email servers can use this technique to automatically block incoming mails from a sender’s blacklisted IPs.</p> <p>Additionally, if a host on your organization's server is found performing suspicious activities, ISPs could blacklist your central IP, which may affect your reputation, email delivery, and ranking on search engine pages. You can look up the activity logs of the sites on your host to discover where the faults may be coming from, which may be poor quality hosts, phishing sites, etc. Corrective actions will help to repair web-hosting reputations.</p> <h3>Incident Response and Threat Intelligence</h3> <p>Security teams can use the log obtained from a Connected Domains API query to respond to incidents. This will include prioritizing alerts for suspicious activities, attacks or a host computer so that concerned personnel can take immediate actions in real time. Furthermore, botnet activities can be tracked, which will enable a SOC to enforce its protection protocol against Distributed Denial of Service (DDoS) attacks. Therefore, individual hosts and a central IP address that serve a botnet can be blacklisted and blocked from further attacks on the system.</p> <p>Moreover, Connected Domains API allows you to track noisy internet scanning and identify the hostnames that launch attacks on the system. More sophisticated investigation can then be undertaken on this information discovery to track the cybercriminal's source.</p> <h3>Identify Malicious Websites</h3> <p>Since Connected Domains API provides your SOC with a list of domains hosted on the same server, experts can proactively hunt for threats by subjecting these domains to further tests with a Whois search. Some parameters which could raise red flags, including:</p> <ul> <li>How recently was the domain registered?</li> <li>Location, especially the country;</li> <li>Registrant’s name or email;</li> <li>The correlation or differences in the company's address and the registrant</li> </ul> <p>Further probing or security actions can be taken from here.</p> <h3>Linking Associations of Fraudulent Activities</h3> <p>It is possible to find domains, websites, and IP syndicates of a particular fraudulent activity. Data from Connected Domains API can be used to draw links to that. For example, if you detected a malicious activity on your host, you can run the checks on other websites to see if the hosts have been flagged. If so, is it similar to what they were attempting to do on your server? This link makes some points clearer and apparent. You can proceed to share this intelligence and/or report the cybercriminals to appropriate organizations.</p> <p>In conclusion, Connected Domains API is of tremendous value in terms of cybersecurity and threat intelligence, which include penetration test, email censoring, identifying malicious websites and cybercriminals. SOCs can run diagnostic tests to determine the source of a problem and to catch cyber criminals. Get access to the most accurate and real-time Threat intelligence <a href="https://threatintelligenceplatform.com/threat-intelligence-apis/connected-domains-api" title="Connected Domains API - Check Domain Names on Same IP Address">here</a>.</p>
]]></content:encoded>
        </item>
        <item>
            <title>Understanding and Avoiding PowerShell Exploits</title>
            <link>https://threatintelligenceplatform.com/understanding-and-avoiding-powershell-exploits</link>
            <pubDate>Tue, 15 Oct 2019 01:00:00 +0000</pubDate>
            <dc:creator>admin</dc:creator>

            <guid isPermaLink="false">https://threatintelligenceplatform.com/blog/?p=3900</guid>
            <description><![CDATA[
            <img width="1000" height="750" src="https://threatintelligenceplatform.com/images/blog/understanding-and-avoiding-powershell-exploits/PowerShell-Attacks.jpg" class="webfeedsFeaturedVisual wp-post-image" alt="Understanding and Avoiding PowerShell Exploits" style="display: block; margin: auto; margin-bottom: 25px;max-width: 100%;" />
            <p>PowerShell is an inbuilt command-line tool which is incorporated on Windows operating devices. This in-memory software provides full access to system functions and can be used to execute commands, such as making downloads which are eventually run on the PC. This preinstalled and multipurpose Windows PowerShell has over time become an ideal candidate helping cyber criminals to gain entry to a target system and then laterally moving across to an organization’s entire network.</p><p>PowerShell attacks are based on fileless malware; that is, there is no need for a target to install any software from an attacker on the victim’s PC. PowerShell attacks utilize an OS (Windows 7, for example) inbuilt tool, for various malicious activities. Because this sort of attack doesn’t require any new software, coupled with limited techniques to tackle these forms of malware, it becomes difficult to detect the attacks as they keep growing. Some of the most dangerous attacks include PSAttackBuildTool, Offensive PowerShell, Nishang, etc. Between 2016 and ’17, the <a href="https://securityintelligence.com/an-increase-in-powershell-attacks-observations-from-ibm-x-force-iris/" title="An Increase in PowerShell Attacks: Observations From IBM X-Force IRIS" target="_blank">PowerShell malware attack grew by 432%</a> and by about 661% in 2018. And in 2019, so far, it has already accounted for 57% of the total of attacks detected by IBM. These figures demonstrate the tremendous influence of attackers trying to penetrate people’s personal and cyberspace. Thus, making the knowledge of this malware important for everyone.</p>
]]></description>
            <content:encoded><![CDATA[
            <img width="1000" height="750" src="https://threatintelligenceplatform.com/images/blog/understanding-and-avoiding-powershell-exploits/PowerShell-Attacks.jpg" class="webfeedsFeaturedVisual wp-post-image" alt="Understanding and Avoiding PowerShell Exploits" style="display: block; margin: auto; margin-bottom: 25px;max-width: 100%;" />
            <p>PowerShell is an inbuilt command-line tool which is incorporated on Windows operating devices. This in-memory software provides full access to system functions and can be used to execute commands, such as making downloads which are eventually run on the PC. This preinstalled and multipurpose Windows PowerShell has over time become an ideal candidate helping cyber criminals to gain entry to a target system and then laterally moving across to an organization’s entire network.</p> <p>PowerShell attacks are based on fileless malware; that is, there is no need for a target to install any software from an attacker on the victim’s PC. PowerShell attacks utilize an OS (Windows 7, for example) inbuilt tool, for various malicious activities. Because this sort of attack doesn’t require any new software, coupled with limited techniques to tackle these forms of malware, it becomes difficult to detect the attacks as they keep growing. Some of the most dangerous attacks include PSAttackBuildTool, Offensive PowerShell, Nishang, etc. Between 2016 and ’17, the <a href="https://securityintelligence.com/an-increase-in-powershell-attacks-observations-from-ibm-x-force-iris/" title="An Increase in PowerShell Attacks: Observations From IBM X-Force IRIS" target="_blank">PowerShell malware attack grew by 432%</a> and by about 661% in 2018. And in 2019, so far, it has already accounted for 57% of the total of attacks detected by IBM. These figures demonstrate the tremendous influence of attackers trying to penetrate people’s personal and cyberspace. Thus, making the knowledge of this malware important for everyone.</p> <h3>How Does it Happen?</h3> <p>Fileless malware gains access to a computer when users download codes or commands that are executable on their systems. Typically, it happens when people try to bypass a program like an antivirus or paid software so that they can use them free. The downloaded codes or files get executed and run on a computer, thereby giving access to the malware to take its place on a target location. The PowerShell, being a Windows trusted program does not get flagged as a system threat by a Windows Defender System or, as a matter of fact, check any scripts running through it. Attackers run their scripts on a computer when one downloads the compromised code, thereby giving them the access to go past the firewall. Some other times, attackers monitor operations to gain administrative control.</p> <p>A whole enterprise environment runs the risk of exploitation even when just one computer in their whole network is compromised. In the event of an active and interactive PowerShell session attack, cyber criminals can gain a username and password, which paves way for even greater abuse. Since PowerShell commands can run from remote Windows computers, attackers can move across an organization’s network to gain access to confidential information or gain control over privileged accounts. The unavailability of software to instigate an attack and the fact that different PowerShell attack tools don't target the same location makes it difficult to detect and flush out an attacker from a system.</p> <h3>What can be done?</h3> <h4>Upgrade Your PowerShell Version</h4> <p>Disabling updates is not the best thing to do as far as security measures are concerned; nor is patching a good option. The ideal prevention measure is to upgrade to the new and latest version, which contains improved features. Microsoft Windows PowerShell developers are doing great and the latest PowerShell version (5.X) is quite stable.</p> <h4>Disable Outdated Versions</h4> <p>After the upgrade, it will be necessary to disable the previous PowerShell engine. Improved Versions of Windows from 8 and above all have an optional feature to keep the installed PowerShell V2 engine on a computer and this can still cause downgrade attacks.</p> <p>For newer versions of Windows OS down to Windows 8, you can execute the following command on your endpoint.</p> <pre><code>Disable -WindowsOptionalFeature -Online -FeatureNameMicrosoftWindowsPowerShellV2Root.</code></pre> <br> <p>After this, with an Invoke-command, you can also enable ModuleLogging and ScriptBlockLogging.</p> <h4>Detection</h4> <p>One of the defensive protocols against PowerShell malware is to understand and detect its command lines. As stated, it can be extremely challenging to pin a PowerShell source. However, some command line parameters have been identified and considered notorious, and they include the following:</p> <ul> <li>-encoded: with the variation "-e", it allows a user to run an encoded code via PowerShell</li> <li>-ExecutionPolicy bypass: "-ep bypass, -exp bypass, -exec bypass" causes false positives and allows a bypass policy. </li> <li>-noprofile: "-nop" jumps loading profile.psi, thereby preventing logging.</li> <li>-windowStyle hidden: It creates false positives while preventing the running of a window.</li> <li>-version 2: "v2" enforces the version 2 of PowerShell.</li> </ul> <h4>Modules</h4> <p>During intensive scans, it is also great to look out for modules that are used to launch attacks. Common modules include .Net,Webclient, DownloadString, .DownloadFile, .Download. These modules can be monitored with enabled and enhanced module logging to disable unwanted scripts.</p> <p>In conclusion, a PowerShell attack is a malware that requires no new source (file or software) to operate on a PC or network. It simply uses a Windows’ inbuilt OS to gain access past the firewall into a system. With breached password and username, it is possible to gain access into an entire network. It can be detected and prevented by current PowerShell updates and the uninstallation of previous versions or drive engines. ModuleLogging and ScriptBlockLogging, when enabled, also detect and prevent attacks. Most importantly, the use of third-party programs to bypass the security or entrance protocol to important software should be avoided.</p> <p>Besides this, the proactive monitoring of your organization’s system and networks for any vulnerabilities or suspicious behavior can help security teams in detecting anomalies before the damage is done. Security analysts should incorporate <a href="https://threatintelligenceplatform.com" title="Threat Intelligence Platform - Protection Tools, Services, API's">Threat Intelligence</a> as a part of their security mechanism to identify and prevent attacks. The adopting of a robust defense strategy against the growing threats can help avoid the risk of a compromise.</p>
]]></content:encoded>
        </item>
        <item>
            <title>The Importance of Threat Intelligence for Financial Industry</title>
            <link>https://threatintelligenceplatform.com/the-importance-of-threat-intelligence-for-financial-industry</link>
            <pubDate>Mon, 30 Sep 2019 01:00:00 +0000</pubDate>
            <dc:creator>admin</dc:creator>

            <guid isPermaLink="false">https://threatintelligenceplatform.com/blog/?p=3800</guid>
            <description><![CDATA[
            <img width="1000" height="750" src="https://threatintelligenceplatform.com/images/blog/the-importance-of-threat-intelligence-for-financial-industry/Cybersecurity-For-Financial-Services.jpg" class="webfeedsFeaturedVisual wp-post-image" alt="The Importance of Threat Intelligence for Financial Industry" style="display: block; margin: auto; margin-bottom: 25px;max-width: 100%;" />
            <p>These days, there are a lot of security pressures on financial institutions like banks, insurance firms and payment processing platforms. Since many of the financial operations are performed through cyberspace, cybersecurity becomes a paramount issue to be considered. Much of the data and intangible assets held by Financial Service Institutions (FSI) are sensitive, and a leak or hack into those assets would make the institutions and their administrations highly vulnerable. The financial industry and services are among the 5 most attacked in cyberspace. Phishing and the misuse of privilege are both the topmost threats for financial institutions, according to the <a href="https://enterprise.verizon.com/en-gb/resources/reports/dbir/" title="2019 Data Breach Investigations Report | Verizon Enterprise Solutions" target="_blank">2019 Data Breach Investigations Report</a> (DBIR). About 28.9% of reported phishing attacks were directed towards financial institutions and related customers. To ensure timely and consistent protection of their data and other assets, the industry should consider Threat Intelligence (TI) as an important part of their IT security strategy.</p><p>Cyber Threat Intelligence collects new and existing threats from different sources around the network system and produces reports whose information can then be indexed for an automated and prioritized security control protocol. TI repeatedly performs routine checks and scans various data servers to detect and report anomalies. The following points are highlights of how the financial industry can benefit from TI.</p>
]]></description>
            <content:encoded><![CDATA[
            <img width="1000" height="750" src="https://threatintelligenceplatform.com/images/blog/the-importance-of-threat-intelligence-for-financial-industry/Cybersecurity-For-Financial-Services.jpg" class="webfeedsFeaturedVisual wp-post-image" alt="The Importance of Threat Intelligence for Financial Industry" style="display: block; margin: auto; margin-bottom: 25px;max-width: 100%;" />
            <p>These days, there are a lot of security pressures on financial institutions like banks, insurance firms and payment processing platforms. Since many of the financial operations are performed through cyberspace, cybersecurity becomes a paramount issue to be considered. Much of the data and intangible assets held by Financial Service Institutions (FSI) are sensitive, and a leak or hack into those assets would make the institutions and their administrations highly vulnerable. The financial industry and services are among the 5 most attacked in cyberspace. Phishing and the misuse of privilege are both the topmost threats for financial institutions, according to the <a href="https://enterprise.verizon.com/en-gb/resources/reports/dbir/" title="2019 Data Breach Investigations Report | Verizon Enterprise Solutions" target="_blank">2019 Data Breach Investigations Report</a> (DBIR). About 28.9% of reported phishing attacks were directed towards financial institutions and related customers. To ensure timely and consistent protection of their data and other assets, the industry should consider Threat Intelligence (TI) as an important part of their IT security strategy.</p> <p>Cyber Threat Intelligence collects new and existing threats from different sources around the network system and produces reports whose information can then be indexed for an automated and prioritized security control protocol. TI repeatedly performs routine checks and scans various data servers to detect and report anomalies. The following points are highlights of how the financial industry can benefit from TI.</p> <h3>Preparation For Data and Asset Protection</h3> <p>FSIs must protect customer data, as well as their assets, including funds. A TI system functions as a sensor for malicious IP addresses or domain that may be breaching into your financial network to obtain information. Being one of the most targeted cyber industry for cyber-attacks, FSIs have to stay on top of all threats and activities. Moreover, with millions of threats, a proper TI system can help you boost your defence system. A sophisticated system uses a data log of previous activities and predictions to prevent breaches from infiltrating IPs and sources that may want to steal data. It helps institutions to implement attack trees for advanced threat protection on networks, servers, and even point of sales.</p> <h3>Help To Develop Stronger Industry-based Defence Mechanism</h3> <p>TI makes threat intelligence sharing feasible and definitive. Various threat intelligence software collect data from FSIs and report them to the developers for the benefit of reinforcing their software to know about new malicious cyber activities as they come up. This is an advisable measure for various financial institutions in the industry because the information log collected from new attempts of attacks will help software developers and users to prevent such attacks and take necessary steps to avoid the breach. With threat intelligence sharing, financial institutions will benefit when their industry and industry-targeted software developers, with the right data, will build strong anti-malware defence mechanism.</p> <p>Furthermore, since malicious actors will be making attempts to use similar techniques and threat approach for different organizations in the industry, TI sharing can help other institutions in the industry as well. Groups of businesses are now developing shared networks where discovered threats are reported and made public to everyone in the same sector. The reports will help the security departments of the financial organizations to block related malicious threats or attacks and penetration before they are hit. It can also help them understand the trends of cybercrimes in the industry and learn to defend their financial data against reported attacks and prioritize them so that security teams will know things to look out for and take quality action.</p> <h3>Efficiency</h3> <p>Anti-malware programs ceaselessly perform thousands and millions of search queries to check various server nodes that may be prone to attacks, for threats. This helps financial institutions to stay on top of the mass of threat notifications. With TI, a Security Operations Centre (SOCs) analyst can have an automated response to unharmful alerts as ‘false positive’, which improves efficiency. TI generally improves response time to any Indicator of Compromise (IoC); thereby saving the SOC of a financial institution some stress and allowing them to focus on other activities of concern. Because of the delicate nature of data assets, promptness is the heart and soul of a financial institution's security protocol.</p> <h3>Managing Vulnerability</h3> <p>For a financial institution, the pride of SOCs is not in the numbers of vulnerabilities patched, because threats and vulnerabilities never end. The conspicuousness of the industry makes vulnerability management a task of top priority. And the pride of any FSI is that they can stop an attack before it happens; not how many patches they have been able to apply. With thousands and millions of daily notifications of potential threats (the largest potential threat notifications for any industry), FSI security teams can effectively manage their vulnerability points to protect their financial data, assets, and point of sale services.</p> <h3>Overview Of Security Level</h3> <p>TI provides an overview of the security situation of an organization to the IT departments. This security situation and report helps a financial organization to find out what their vulnerabilities are, how much they need to invest in their cybersecurity and how critical the level of their security is. Partial or a complete automation process will help to turn the available information and insights into actionable intelligence for financial organizations.</p> <h3>Real-time Insights</h3> <p>Payment platforms have more reasons to be conscious of their securities because their networks are more exposed for the public to access. The awareness of threats with standard TI tools will help them to update patches and to secure various end-points across functioning networks.</p> <p>In the face of these benefits, FSI will do well to invest in <a href="https://threatintelligenceplatform.com/threat-intelligence-api" title="Threat Intelligence API - 6 Different Security Analysis APIs">Threat Intelligence</a> that provides a comprehensive view of their internal vulnerabilities, combined with looking into external evolving threats. Also, adequate coverage should be done for data, at all times, and to keep protection active over many years because bad actors are constantly devising ways to hack into security systems of financial enterprises.</p>
]]></content:encoded>
        </item>
        <item>
            <title>The Media Investigative Platform Helps Journalists Dig Behind the News</title>
            <link>https://threatintelligenceplatform.com/the-media-investigative-platform-helps-journalists-dig-behind-the-news</link>
            <pubDate>Wed, 18 Sep 2019 01:00:00 +0000</pubDate>
            <dc:creator>admin</dc:creator>

            <guid isPermaLink="false">https://threatintelligenceplatform.com/blog/?p=3700</guid>
            <description><![CDATA[
            <img width="1000" height="750" src="https://threatintelligenceplatform.com/images/blog/the-media-investigative-platform-helps-journalists-dig-behind-the-news/the-media-investigative-platform-helps-journalists-dig-behind-the-news.jpg" class="webfeedsFeaturedVisual wp-post-image" alt="The Media Investigative Platform Helps Journalists Dig Behind the News" style="display: block; margin: auto; margin-bottom: 25px;max-width: 100%;" />
            <p>In March 2017, the ‘Bloomberq’ news website reported that the CIA award in the form of a medal of honor to the Saudi Crown Prince was a show of support for the monarch. <a href="https://citizenlab.ca/2019/05/burned-after-reading-endless-mayflys-ephemeral-disinformation-campaign/" title="Burned After Reading: Endless Mayfly’s Ephemeral Disinformation Campaign" target="_blank">The CitizenLab cites in a May 2019 investigative article</a> that the site was fake (hence, the apparent misspelling of the reputable Bloomberg name). CitizenLab attributed Iranian trolls with creating 72 lookalike domains and 153 fake news articles. It took nearly two years of research and analysis for the deception to become public.</p><p>Increasingly, the origins of the news we consume about the real world can be found in the digital realm. The information load of emails and websites and social media platforms is coursing into our lives and social interactions at a dizzying pace and sometimes to devastating effect. In October 2018, in the run-up to the United States Congressional elections, <a href="https://citizenlab.ca/2019/05/burned-after-reading-endless-mayflys-ephemeral-disinformation-campaign/" title="Burned After Reading: Endless Mayfly’s Ephemeral Disinformation Campaign" target="_blank">Facebook closed down a network of 82 accounts, pages and groups originating in Iran</a> which sought to spread divisive fake news and propaganda ahead of November's mid-term congressional elections.</p><p>It is becoming increasingly difficult for consumers to tell facts from fiction, while the credibility of journalism itself has been called into question. Journalists need new tools to supplement their traditional approach to “getting the story right.” The <a href="https://threatintelligenceplatform.com/media-investigative-platform" title="Media Investigative Platform">Media Investigative Platform</a> provides the kind of internet website domain research tools that cybersecurity journalists, mainstream journalists, and investigative journalists with the ability to perform deep-dives into the internet sources making and promoting the news. Media Investigative Platform is a product of ThreatIntelligencePlatform.com, which provides the cybersecurity community the means to track and foil cybercriminals and protect the online reputations of brands.</p>
]]></description>
            <content:encoded><![CDATA[
            <img width="1000" height="750" src="https://threatintelligenceplatform.com/images/blog/the-media-investigative-platform-helps-journalists-dig-behind-the-news/the-media-investigative-platform-helps-journalists-dig-behind-the-news.jpg" class="webfeedsFeaturedVisual wp-post-image" alt="The Media Investigative Platform Helps Journalists Dig Behind the News" style="display: block; margin: auto; margin-bottom: 25px;max-width: 100%;" />
            <p>In March 2017, the ‘Bloomberq’ news website reported that the CIA award in the form of a medal of honor to the Saudi Crown Prince was a show of support for the monarch. <a href="https://citizenlab.ca/2019/05/burned-after-reading-endless-mayflys-ephemeral-disinformation-campaign/" title="Burned After Reading: Endless Mayfly’s Ephemeral Disinformation Campaign" target="_blank">The CitizenLab cites in a May 2019 investigative article</a> that the site was fake (hence, the apparent misspelling of the reputable Bloomberg name). CitizenLab attributed Iranian trolls with creating 72 lookalike domains and 153 fake news articles. It took nearly two years of research and analysis for the deception to become public.</p> <p>Increasingly, the origins of the news we consume about the real world can be found in the digital realm. The information load of emails and websites and social media platforms is coursing into our lives and social interactions at a dizzying pace and sometimes to devastating effect. In October 2018, in the run-up to the United States Congressional elections, <a href="https://citizenlab.ca/2019/05/burned-after-reading-endless-mayflys-ephemeral-disinformation-campaign/" title="Burned After Reading: Endless Mayfly’s Ephemeral Disinformation Campaign" target="_blank">Facebook closed down a network of 82 accounts, pages and groups originating in Iran</a> which sought to spread divisive fake news and propaganda ahead of November's mid-term congressional elections.</p> <p>It is becoming increasingly difficult for consumers to tell facts from fiction, while the credibility of journalism itself has been called into question. Journalists need new tools to supplement their traditional approach to “getting the story right.” The <a href="https://threatintelligenceplatform.com/media-investigative-platform" title="Media Investigative Platform">Media Investigative Platform</a> provides the kind of internet website domain research tools that cybersecurity journalists, mainstream journalists, and investigative journalists with the ability to perform deep-dives into the internet sources making and promoting the news. Media Investigative Platform is a product of ThreatIntelligencePlatform.com, which provides the cybersecurity community the means to track and foil cybercriminals and protect the online reputations of brands.</p> <h3>Mainstream Journalist</h3> <p>One of the most important tools in the Media Investigative Platform arsenal that a journalist can use to determine the veracity of news published on websites and through social media platforms is the <a href="https://threatintelligenceplatform.com/threat-intelligence-analysis" title="Threat Intelligence Analysis - Website &amp; Host Security Analysis">Domain Name Analysis Tool</a>. The tool reveals vital information about a website name or IP address.</p> <p>One of the most illustrative features of the tool is a world map that resolves an IP address. IP resolution shows where the data and infrastructure for the address resides. Suspicious IP addresses will show clusters of the IP’s composition in regions that belie a website’s messaging (so for example, a website that publishes content about American political issues with servers resolved in Eastern Europe may not have American civil discourse in its interests.)</p> <div class="pic-wrapper"> <img src="https://threatintelligenceplatform.com/images/blog/the-media-investigative-platform-helps-journalists-dig-behind-the-news/map.jpeg" title="A world map that resolves an IP address" alt="A world map that resolves an IP address"> </div> <p>The <a href="https://threatintelligenceplatform.com/threat-intelligence-analysis" title="Threat Intelligence Analysis - Website &amp; Host Security Analysis">Domain Name Analysis Tool</a> also lists websites associated with a target IP address. Users can run an analysis of each of the associated websites to develop reports with the same GUI format. In this way, journalists can detect whether a number of related websites were set up in a short time frame with a similar intention. The listing may also help determine the spelling conventions criminals or nation-states may be used to spoof legitimate websites.</p> <p>Journalists can also see from the report what services issued the IP address, and to whom. Reporters can follow up on this information to determine whether the websites were created with recognized services. A particularly pertinent section of the report displays whether the website hosts malicious content and what sort: phishing, botnet command-and-control, malware, spam, and more. The report also displays WHOIS information with identifying attributes about the ownership of the IP address: name, address, state/province, country, and more. Journalists can track down whether a name and registered address are false. Search results on contact information may reveal other suspicious activity on the internet from that individual profile. Expiration information can help determine whether the website’s creators had long-term interests in the IP address or not.</p> <p>Meanwhile, investigative journalists often seek to dig deeply into a subject and to connect the dots between disparate pieces of information. Media Investigative Platform can aid them in their search for the truth.</p> <h3>Investigative Journalists Tools</h3> <p>An important aspect of an investigative journalist’s research into corporate or government corruption is the tracing of shell companies, which often have bogus websites associated with them. In addition to The <a href="https://threatintelligenceplatform.com/threat-intelligence-analysis" title="Threat Intelligence Analysis - Website &amp; Host Security Analysis">Domain Name Analysis Tool</a>, reporters developing a hot story can use The Media Investigative Platform’s <a href="https://threatintelligenceplatform.com/threat-intelligence-apis/domains-infrastructure-analysis-api" title="Domain's Infrastructure Analysis API">Domain’s Infrastructure Analysis API</a> to determine the origin of a website down to its longitude, latitude, and time zone of the IP address.</p> <p><a href="https://threatintelligenceplatform.com/threat-intelligence-apis/domains-infrastructure-analysis-api" title="Domain's Infrastructure Analysis API">Domain’s Infrastructure Analysis API</a> can also analyze a fake Domain's Infrastructure. The output from the domain presents data about the web, mail, and name servers for a given domain name, as well as its known subdomains. Subdomains are like rooms in a house, wherein each space can offer information about the integrity of the entire structure. The tool also offers information about the subnet to which the website belongs. Subnet information can indicate other IP addresses related to a website, which may themselves be suspicious. Inputting the related IP addresses into The <a href="https://threatintelligenceplatform.com/threat-intelligence-analysis" title="Threat Intelligence Analysis - Website &amp; Host Security Analysis">Domain Name Analysis Tool</a> could provide more background information about the associated websites.</p> <h3>Cybersecurity Journalists</h3> <p>Cybersecurity is one of the most active technology reporting fields around today. With ransomware attacks on corporations occurring daily, data breaches of corporate networks appearing weekly in the news, and nation-states targeting foreign governments and enterprises at a dizzying pace, cybersecurity journalists have a great deal to research and report on.</p> <p>After determining the efficacy of a website with The <a href="https://threatintelligenceplatform.com/threat-intelligence-analysis" title="Threat Intelligence Analysis - Website &amp; Host Security Analysis">Domain Name Analysis Tool</a>, tech journalists can drill down into whether a website harbors malware with the <a href="https://threatintelligenceplatform.com/threat-intelligence-apis/domain-malware-check-api" title="Domain Malware Check API - Check Websites for Malware">Domain Malware Check API</a>.</p> <p>The Malware Check presents users with a composite safety score for domains. The API determines the level of a domain’s ability to infect computers based on several security data sources. The API reports whether a domain is a potential threat on a scale of “0” (dangerous) to “100” (safe). The tool also indicates which malware trackers blacklisted the website and why. Hackers may also use the website to launch bots.</p> <p>Often, hackers will set up malicious domains under the same IP address to host the bots. The <a href="https://threatintelligenceplatform.com/threat-intelligence-apis/connected-domains-api" title="Connected Domains API - Check Domain Names on Same IP Address">Connected Domains API</a> provides information on whether a domain with a blacklisted website is part of a group of domains created by hackers. Reporters can use the information to extend their search to the behavior of related sites, which may be useful in alerting the cybersecurity community, law enforcement agencies, and organizations that may be vulnerable to intrusion from the sites.</p> <p>Cybersecurity journalists can obtain even more technical information about a domain name with the <a href="https://threatintelligenceplatform.com/threat-intelligence-apis/ssl-certificates-chain-api" title="SSL Certificates Chain API">SSL Certificates Chain API</a>. The API can determine if the certificate of the website as well as the company that issued the certificate is valid. Hackers sometimes fake certificates to convince a user’s browser that the website is valid; when it may, instead, harbor malware. The <a href="https://threatintelligenceplatform.com/threat-intelligence-apis/ssl-configuration-analysis-api" title="SSL Configuration Analysis API">SSL Configuration Analysis API</a> follows the certificate chain back to the server that created the certificate. The Configuration Analysis API will determine the legitimacy of the server in providing certificates by checking if the server is on the blacklist.</p> <p>Cybersecurity analysts can also retrieve a list of domain names resolving to a given IP address, including its subdomains, with the <a href="https://threatintelligenceplatform.com/threat-intelligence-apis/connected-domains-api" title="Connected Domains API - Check Domain Names on Same IP Address">Connected Domains API</a>. Legitimate websites may actually be sharing an IP address with websites on blacklists, in which case the approved website may find, for instance, that it cannot send emails or access particular websites. To determine the reputation of the websites in the IP “neighborhood” of a website, The Media Investigative Platform provides a <a href="https://threatintelligenceplatform.com/threat-intelligence-apis/domain-reputation-api" title="Domain Reputation API">Domain Reputation API</a>.</p> <p>The API enables information security professionals, researchers, and threat analysts to determine if a domain has a history of serving up malware. If domain registrars have blacklisted the domain, the Domain Reputation API will report whether the site registers a “0” for dangerous up to a “100,” which is safe. The API can perform a fast scan or a full, in-depth scan.</p> <p>Whether it comes to determining the veracity of a report, tracing the threads of corruption, or alerting the cybersecurity community to “threats in the wild”, <a href="https://threatintelligenceplatform.com" title="Threat Intelligence Analysis - Website &amp; Host Security Analysis">ThreatIntelligencePlatform.com</a>’s <a href="https://threatintelligenceplatform.com/media-investigative-platform" title="Media Investigative Platform">Media Investigative Platform</a> offers journalists tools that will keep them one step ahead in the harmful games that bad actors play.</p> <p><a href="#contact-us-block" class="anchor">Contact us</a> to learn more about how <a href="https://threatintelligenceplatform.com" title="Threat Intelligence Analysis - Website &amp; Host Security Analysis">ThreatIntelligencePlatform.com</a> can improve your research capabilities.</p>
]]></content:encoded>
        </item>
        <item>
            <title>Domain Reputation API: Stop Defacers from Harming Your Brand</title>
            <link>https://threatintelligenceplatform.com/domain-reputation-api-stop-defacers-from-harming-your-brand</link>
            <pubDate>Mon, 02 Sep 2019 01:00:00 +0000</pubDate>
            <dc:creator>admin</dc:creator>

            <guid isPermaLink="false">https://threatintelligenceplatform.com/blog/?p=3600</guid>
            <description><![CDATA[
            <img width="1000" height="750" src="https://threatintelligenceplatform.com/images/blog/domain-reputation-api-stop-defacers-from-harming-your-brand/domain-reputation-api-stop-defacers-from-harming-your-brand.jpeg" class="webfeedsFeaturedVisual wp-post-image" alt="Domain Reputation API: Stop Defacers from Harming Your Brand" style="display: block; margin: auto; margin-bottom: 25px;max-width: 100%;" />
            <p>Your website is your business’s online front door. It’s the first place people would go to for information on your brand and products or services. Anyone and everyone who’s interested in working with you or purchasing your offerings is sure to come knocking on your door, and the best thing you can do is to keep it open if you want your company to flourish.</p><p>Keeping your website up and running should thus be one of your utmost priorities. To avoid having your brand raked in the mud, make sure it’s always updated, uncompromised, and as invulnerable to online attacks as possible. You don’t want to make cybercriminals or anyone with malicious intent feel welcome in your place of business.</p><p>One way to do that is by using <a href="https://threatintelligenceplatform.com/threat-intelligence-apis/domain-reputation-api" title="Domain Reputation API">Domain Reputation API</a>, a tool that evaluates your domain’s reputation by means of a wide range of security data sources via a dynamic external configuration audit. Constantly check up on your domain’s safety to keep threats at bay. Find out why and how in this article.</p>
]]></description>
            <content:encoded><![CDATA[
            <img width="1000" height="750" src="https://threatintelligenceplatform.com/images/blog/domain-reputation-api-stop-defacers-from-harming-your-brand/domain-reputation-api-stop-defacers-from-harming-your-brand.jpeg" class="webfeedsFeaturedVisual wp-post-image" alt="Domain Reputation API: Stop Defacers from Harming Your Brand" style="display: block; margin: auto; margin-bottom: 25px;max-width: 100%;" />
             <p>Your website is your business’s online front door. It’s the first place people would go to for information on your brand and products or services. Anyone and everyone who’s interested in working with you or purchasing your offerings is sure to come knocking on your door, and the best thing you can do is to keep it open if you want your company to flourish.</p> <p>Keeping your website up and running should thus be one of your utmost priorities. To avoid having your brand raked in the mud, make sure it’s always updated, uncompromised, and as invulnerable to online attacks as possible. You don’t want to make cybercriminals or anyone with malicious intent feel welcome in your place of business.</p> <p>One way to do that is by using <a href="https://threatintelligenceplatform.com/threat-intelligence-apis/domain-reputation-api" title="Domain Reputation API">Domain Reputation API</a>, a tool that evaluates your domain’s reputation by means of a wide range of security data sources via a dynamic external configuration audit. Constantly check up on your domain’s safety to keep threats at bay. Find out why and how in this article.</p> <h3>What You Don’t Know Can Harm You</h3> <p>Malware-based attacks on company websites are no longer uncommon. Day after day, headlines are filled with stories on organizations suffering from ransomware, DDoS, cryptojacking, and other cyber attacks. And though they don’t make news, thousands of websites are brought down by hackers each day, disrupting businesses worldwide. Often overlooked among these disruptions are those caused by web defacement attacks. Most people probably thought these went out of style and are therefore no longer worth protecting against. But did you know that web defacement (typically associated with hacktivism) could just be the first step in launching a more damaging cyber attack? Here’s just a list of possible scenarios that could change your mind about the threat:</p> <ul> <li>Hacktivist supporters of the Wikileaks founder Julian Assange from various parts of the globe teamed up within 24 hours of his arrest in April and managed to bring down 39 Ecuadorian government-owned websites. Many of these <a href="http://www.xinhuanet.com/english/2019-04/16/c_137981874.htm" title="Hackers target Ecuadorian gov't after it expels Assange" target="_blank">were defaced</a>, knocking the organizations’ portals offline. </li> <li>The notorious hacktivist group <a href="https://www.timesofisrael.com/israeli-sites-hacked-to-display-jerusalem-is-the-capital-of-palestine/" title="Israeli sites hacked to display: ‘Jerusalem is the capital of Palestine’" target="_blank">Anonymous</a> launched a spate of defacement attacks against Israeli government-owned websites in March, successfully affecting dozens of organizations in the country. </li> <li>The so-called “Syrian Revolution Soldiers (SRS)” defaced the <a href="http://www.dailystar.com.lb/News/Lebanon-News/2019/Jan-28/475195-beirut-airport-website-hacked.ashx" title="Beirut airport website hacked" target="_blank">Rafic Hariri Airport</a> and many other Lebanese government-owned websites to showcase their political manifestos in January. </li> <li>Also in January, hackers demanded that <a href="https://www.tripwire.com/state-of-security/security-data-protection/hackers-demand-ransom-luas-website-defaced/" title="Hackers demand ransom from Dublin’s tram system, after Luas website defaced" target="_blank">Transdev Ireland</a>, the company operating Dublin’s tram system, pay them a ransom of 3,300 euros in Bitcoin after defacing their website. </li> </ul> <p>Typical defacement victims include government and religious organizations but are not limited to them. Any insufficiently secured domain can easily be hacked and manipulated by not only hacktivists, but also anyone who has a beef with its owner. Other potential threat sources include:</p> <ul> <li>An unscrupulous competitor who won’t stop at anything just to get ahead;</li> <li>A disgruntled former employee who thinks he was unjustly fired;</li> <li>A disgruntled employee who disagrees with his organization;</li> <li>A cybercriminal who has bigger plans but needs to know first just how vulnerable your network infrastructure is; </li> <li>An unsatisfied customer who felt your company wronged him.</li> </ul> <p>Anyone who has enough technical skill and know-how and has had a bad experience with your company can launch an attack on your domain. That’s why it’s important to always maintain its health and safety because the ramifications (some of which are listed below) can be disastrous:</p> <ul> <li><strong>Business disruption:</strong> When your website gets vandalized, everything that needs to be put back in place will require time and effort that would normally be used for regular tasks. That would mean paying staff overtime so they can still finish their work when they need to spend a lot of their day cleaning up after vandals. Some defacements may be too disturbing for your clientele and you may consequentlyhave to take down your site for cleanup, resulting in lost opportunities and sales. </li> <li><strong>Reputation damage:</strong> A defaced website could influence the way people perceive your ability to secure your network and systems. If your company stores and processes a lot of personal data, current and potential customers may think twice before trusting you again. </li> <li><strong>Potential data breach:</strong> Not all defacements are plain acts of vandalism. Because their effects are easily seen, some attackers can use them as a diversion. While you focus on setting your site to rights, they may be carrying out more sinister activities. For instance, they could be stealing sensitive information from your customers after installing a keylogger on your site. Or they could be redirecting them to their own specially crafted phishing sites. Or worse, they could have already taken confidential information from your network and the defaced site is now just a souvenir. In such a case, you’re not only left with cleanup duties, you may also need to face customer complaints or even be liable to facing charges against recently implemented and stricter data privacy regulations such as the GDPR. </li> </ul> <p>You don’t need to deal with these challenges. Just make sure your reputation remains intact with <strong>Domain Reputation API</strong>. Read on to find out how.</p> <div class="pic-wrapper"> <img src="https://threatintelligenceplatform.com/images/blog/domain-reputation-api-stop-defacers-from-harming-your-brand/dont-let-digital-vandals-harm-your-brand.jpeg" title="Don’t Let Digital Vandals Harm Your Brand" alt="Don’t Let Digital Vandals Harm Your Brand"> </div> <h3>Don’t Let Digital Vandals Harm Your Brand</h3> <p>In a world where cybercriminal tools and tactics are constantly upgraded, you can keep up by using the latest that technology has to offer. <strong>Domain Reputation API</strong> can help you not just clean up your act after the incident, it can do better than that. It will allow you to avoid becoming the next defacement victim.</p> <p>Typical web defacement attacks begin with hackers looking for ways into your domain infrastructure, which include:</p> <ul> <li><strong>Exploiting vulnerabilities in the software or applications that run on your infrastructure:</strong> The most abused OSs include Linux, Windows 2003, and Windows 2008, while Apache, IIS/6.0, and IIS/5.0 made the list of most exploited web servers. </li> <li><strong>Planting a data-stealing malware in your network to get access:</strong> In this scenario, the malware sends stolen credentials to hackers, which they then use to obtain unhindered access to your network’s backend, allowing them to perform even more nefarious deeds. </li> <li><strong>Bypassing routers and firewalls:</strong> Leaving routers unprotected is a bad idea. So is using weak passwords or leaving default ones in any of your Internet-facing hardware. These can be easily hacked, letting bad guys in through your domain’s back door, so to speak. </li> <li><strong>Infiltrating third parties with access to your network:</strong> It is common business practice to give suppliers and other partners access to your network to speed up transactions. What should be avoided, however, is to give them administrative access to your infrastructure. No matter how trustworthy they are, that doesn’t guarantee that they won’t be compromised by cyber attackers as well. If their walls fall, so may yours. </li> <li><strong>Seeking the help of an insider:</strong> Trust should not be given freely. Disgruntled employees (both former and current) are likely allies of scheming competitors or threat actors for a variety of reasons. Some may be hoping to steal intellectual property to put up their own business, others may not be supportive of their company’s political or religious leanings, while still others may just want to get even. Anyone who has a beef with your organization can be coaxed into working against you. In fact, reports say more than <a href="https://www.csoonline.com/article/3263799/insider-threat-examples-7-insiders-who-breached-security.html#slide1" title="Insider threat examples: 7 insiders who breached security" target="_blank">40 percent of data breaches</a> are caused by insiders. </li> </ul> <p>When faced with all these challenges, what can your organization do against defacement and other Web threats? The answer is simple: maintain a risk- and threat-free virtual real estate with <strong>Domain Reputation API</strong>.</p> <h3>How Domain Reputation API Can Keep Your Business Risk-Free</h3> <p>Backed by a huge database of domain records, <strong>Domain Reputation API</strong> can check your domain’s name security posture by evaluating it according to more than 120 parameters to compute its reputation score based on:</p> <ul> <li>Your website’s content, relationships with other domains, and host configuration;</li> <li>Your SSL certificates, connections, and configuration;</li> <li>How dangerous your domain is by cross-checking it against malware data feeds;</li> <li>Your domain’s WHOIS record;</li> <li>Your DNS MX records’ configuration and corresponding mail servers;</li> <li>Your name servers’ configuration;</li> <li>Your IP address infrastructure via a reverse IP address lookup.</li> </ul> <p>Apart from obtaining your domain’s overall reputation score that ranges from 0 (dangerous) to 100 (safe), <strong>Domain Reputation API</strong> also provides you with warnings on potential signs of weakness that you need to address in an easy-to-read format. Keep in mind that your customers’ and stakeholders’ trust in your company may largely depends on how secure your domain infrastructure is against all kinds of digital threats.</p> <p>Take a step further, run a domain reputation check on IP addresses that often access your site as well. Make sure they’re coming from credible and non-malicious sources. Stop those with malicious ties (invalid SSL certificates and configurations, suspicious-looking WHOIS records, known malware vectors, etc.) from breaching your network and systems. This will help you keep cybercriminals and attackers out of your domain before they can disrupt your business, drag your brand in the mud, or cause irreparable damage to your company by losing confidential data, paying fines, causing public humiliation, etc.</p> <p>You don’t have to wait for disasters to strike before ensuring your entire domain’s security. It doesn’t help that there’s a thriving underground market for web defacement service offerings on the Deep Web. Remember that your business can only succeed if your brand’s reputation remains intact despite the numerous threats and cyber attackers lurking on every dark corner of the Internet. It’s never too early to take a proactive stance to online safety, but it could be too late. Your brand is your business and the only way you can keep your head held high is by knowing that your domain is threat-free. Stay within the “safe” zone with the help of <strong>Domain Reputation API</strong>.</p> <p>For more information on how the product works and how to avail yourself of it, visit Theat Intelligence Platform’s <a href="https://threatintelligenceplatform.com/threat-intelligence-apis/domain-reputation-api" title="Domain Reputation API">Domain Reputation API</a> page.</p>
]]></content:encoded>
        </item>
        <item>
            <title>Threat Intelligence API: Walking the Cybersecurity Talk</title>
            <link>https://threatintelligenceplatform.com/threat-intelligence-api-walking-the-cybersecurity-talk</link>
            <pubDate>Fri, 23 Aug 2019 01:00:00 +0000</pubDate>
            <dc:creator>admin</dc:creator>

            <guid isPermaLink="false">https://threatintelligenceplatform.com/blog/?p=3500</guid>
            <description><![CDATA[
            <img width="1000" height="750" src="https://threatintelligenceplatform.com/images/blog/threat-intelligence-api-walking-the-cybersecurity-talk/threat-intelligence-api-walking-the-cybersecurity-talk.jpg" class="webfeedsFeaturedVisual wp-post-image" alt="Threat Intelligence API: Walking the Cybersecurity Talk" style="display: block; margin: auto; margin-bottom: 25px;max-width: 100%;" />
            <p>To many, threat intelligence still sounds like a strange term. Some specialists even claim that it’s not for every business out there and recommend either adopting it correctly or abstaining altogether… and they might have a point.</p><p>The truth is that failing to deploy threat intelligence the right way is like painting with a broad brush with no idea of the bigger picture. Adding to this is the fact that making informed decisions in the world of cybersecurity requires you to have the necessary data close at hand.</p><p>The good news is that software such as <a href="https://threatintelligenceplatform.com/threat-intelligence-api" title="Threat Intelligence API - 6 Different Security Analysis APIs">Threat Intelligence API</a> allows actionable data to be readily integrated into various processes and solutions. This product is composed of six sub-APIs: <a href="https://threatintelligenceplatform.com/threat-intelligence-apis/domains-infrastructure-analysis-api" title="Domain's Infrastructure Analysis API">Domain’s Infrastructure Analysis</a>, <a href="https://threatintelligenceplatform.com/threat-intelligence-apis/ssl-certificates-chain-api" title="SSL Certificates Chain API">SSL Certificates Chain</a>, <a href="https://threatintelligenceplatform.com/threat-intelligence-apis/ssl-configuration-analysis-api" title="SSL Configuration Analysis API">SSL Configuration Analysis</a>, <a href="https://threatintelligenceplatform.com/threat-intelligence-apis/domain-malware-check-api" title="Domain Malware Check API - Check Websites for Malware">Domain Malware Check</a>, <a href="https://threatintelligenceplatform.com/threat-intelligence-apis/connected-domains-api" title="Connected Domains API - Check Domain Names on Same IP Address">Connected Domains</a>, and <a href="https://threatintelligenceplatform.com/threat-intelligence-apis/domain-reputation-api" title="Domain Reputation API">Domain Reputation</a>. Each of them provides specifics on specific areas of the host’s infrastructure.</p><p>But before we talk about them in more detail, let’s start with the current threat landscape to understand the relevance of threat intelligence in general and <strong>Threat Intelligence APIs</strong> in particular.</p>
]]></description>
            <content:encoded><![CDATA[
            <img width="1000" height="750" src="https://threatintelligenceplatform.com/images/blog/threat-intelligence-api-walking-the-cybersecurity-talk/threat-intelligence-api-walking-the-cybersecurity-talk.jpg" class="webfeedsFeaturedVisual wp-post-image" alt="Threat Intelligence API: Walking the Cybersecurity Talk" style="display: block; margin: auto; margin-bottom: 25px;max-width: 100%;" />
            <p>To many, threat intelligence still sounds like a strange term. Some specialists even claim that it’s not for every business out there and recommend either adopting it correctly or abstaining altogether… and they might have a point.</p> <p>The truth is that failing to deploy threat intelligence the right way is like painting with a broad brush with no idea of the bigger picture. Adding to this is the fact that making informed decisions in the world of cybersecurity requires you to have the necessary data close at hand.</p> <p>The good news is that software such as <a href="https://threatintelligenceplatform.com/threat-intelligence-api" title="Threat Intelligence API - 6 Different Security Analysis APIs">Threat Intelligence API</a> allows actionable data to be readily integrated into various processes and solutions. This product is composed of six sub-APIs: <a href="https://threatintelligenceplatform.com/threat-intelligence-apis/domains-infrastructure-analysis-api" title="Domain's Infrastructure Analysis API">Domain’s Infrastructure Analysis</a>, <a href="https://threatintelligenceplatform.com/threat-intelligence-apis/ssl-certificates-chain-api" title="SSL Certificates Chain API">SSL Certificates Chain</a>, <a href="https://threatintelligenceplatform.com/threat-intelligence-apis/ssl-configuration-analysis-api" title="SSL Configuration Analysis API">SSL Configuration Analysis</a>, <a href="https://threatintelligenceplatform.com/threat-intelligence-apis/domain-malware-check-api" title="Domain Malware Check API - Check Websites for Malware">Domain Malware Check</a>, <a href="https://threatintelligenceplatform.com/threat-intelligence-apis/connected-domains-api" title="Connected Domains API - Check Domain Names on Same IP Address">Connected Domains</a>, and <a href="https://threatintelligenceplatform.com/threat-intelligence-apis/domain-reputation-api" title="Domain Reputation API">Domain Reputation</a>. Each of them provides specifics on specific areas of the host’s infrastructure.</p> <p>But before we talk about them in more detail, let’s start with the current threat landscape to understand the relevance of threat intelligence in general and <strong>Threat Intelligence APIs</strong> in particular.</p> <div class="custom-hr"></div> <h5>Table of contents</h5> <ul> <li><a href="#the-threat-landscape-today">The threat landscape today</a></li> <li><a href="#understanding-what-threat-intelligence-is-and-is-not">Understanding what threat intelligence is and is not</a></li> <li><a href="#types-and-sources-of-threat-intelligence">Types and sources of threat intelligence</a></li> <li><a href="#leveraging-threat-intelligence-apis-the-whos-and-the-hows">Leveraging Threat Intelligence APIs: the whos and the hows</a></li> <li><a href="#what-threat-intelligence-apis-are-available-today">What Threat Intelligence APIs are available today</a></li> <li><a href="#concluding-thoughts">Concluding thoughts</a></li> </ul> <div class="custom-hr"></div> <h3 id="the-threat-landscape-today">The Threat Landscape Today</h3> <p>Organizations are so reliant on the Web these days that cybercriminals find it very profitable to exploit such connectivity to disrupt daily operations and steal funds. But it’s not just the money that the hackers are after. Sensitive data can turn equally beneficial or even more so.</p> <p>What’s more, perpetrators tend to succeed despite beefed-up organizations’ cyber defenses in place — costing companies <a href="https://www.ibm.com/downloads/cas/861MNWN2" title="2018 Cost of a Data Breach Study: Global Overview" target="_blank">millions of dollars on average per data breach</a>.</p> <p>This is probably why the adoption of proactive cybersecurity approaches like threat intelligence has been continuously increasing in the past few years. A 2018 SANS survey, for instance, reveals that <a href="https://www.sans.org/press/announcement/2018/01/24/2" title="Cyber Threat Intelligence in Security Operations: Results of 2018 SANS Survey" target="_blank">81% of their respondents</a> found threat intelligence helpful. It also mentions that more than 70% of respondents claimed they had better insights into various threats and attacks compared to the past, thanks to threat intelligence.</p> <p>Experts in cybersecurity view these statistics as indications that threat intelligence will continue to be applied in future organizational operations. However, in order to get the most out of it, companies will need to have a clear understanding of what the practice will and won’t allow them to achieve.</p> <h3 id="understanding-what-threat-intelligence-is-and-is-not">Understanding What Threat Intelligence Is and Isn’t</h3> <p>To put it simply, threat intelligence is the knowledge acquired by collecting and analyzing information on online threats. It can be obtained through numerous sources such as data feeds, cybersecurity communities, domain details, Internet service providers, geolocation data, and more.</p> <p>Technological advances have allowed threat intelligence to be incorporated into software — which is the case with <strong>Threat Intelligence APIs</strong> that can provide more in-depth insights into threats. For example, a domain malware check API can perform a background check on a website to see if it is flagged in known malware databases.</p> <p>As the years go by, threat intelligence is becoming more and more widespread. But even if that’s the case, there are still several things that many users find unclear about it. To eliminate these doubts, here are four common misconceptions about threat intelligence and the reality about them.</p> <ul> <li><strong>Threat intelligence is only for big companies</strong><br> On the contrary, threat intelligence allows facilitating some cybersecurity tasks that small businesses might not have enough manpower to accomplish. For example, instead of hiring expensive specialists to verify the trustworthiness of numerous web pages, a company interacts with, one of the <strong>Threat Intelligence APIs</strong> can be used to automatically calculate a domain’s safety score. </li> <li><strong>Threat intelligence is only for cybersecurity teams</strong><br> As hackers usually look for the line of least resistance, one of their common techniques is to target businesses through the employees with very little knowledge about cybersecurity. This is why threat intelligence should be disseminated across the whole organization, something that can be done in a scalable fashion through APIs. For instance, employees across departments can leverage such software to verify if the websites they interact with contain malware or are considered dangerous. </li> <li><strong>Cybersecurity solution providers can do without threat intelligence</strong><br> Conversely, threat intelligence obtained through APIs can enrich the data gathered via other means, which ultimately allows cybersecurity enterprises to offer higher quality solutions by providing more precise and actionable intelligence. </li> </ul> <h3 id="types-and-sources-of-threat-intelligence">Types and Sources of Threat Intelligence</h3> <p>Certainly, threat intelligence is not created from thin air. As mentioned earlier, it can be acquired through several means and then integrated into customers’ systems through APIs. Let’s take a closer look at some of them.</p> <h4>Signals intelligence (SIGINT)</h4> <p>This form of threat intelligence is collected via information coming from the intercepted signals of a target such as their communications and electronics. SIGINT relies on capturing external raw data which may come in the form of monitoring incoming and outgoing data packets in a network.</p> <p>One example of this is domain’s infrastructure analysis API, which queries servers and subdomains to provide customers with the website’s latest infrastructure data. Information that can be retrieved here includes details on domain’s geolocation, sub-network, and more.</p> <h4>Geospatial intelligence (GEOINT)</h4> <p>Geospatial intelligence works by taking advantage of imagery and geospatial information to evaluate human activities around the world. Modern technology and infrastructure allow users to take GEOINT a step further.</p> <p>Using an IP geolocation API, for example, can let cybersecurity teams detect unauthorized access to networks, providing hints on where the attack is coming from. This can be acquired through details obtained from IP addresses, which apart from the location also include data on the time zone, partial ownership information, Internet Service Providers, and more. Domain's Infrastructure Analysis API, which is part of Threat Intelligence API, can also reveal web servers’ geolocation information, subdomains' servers, mail, and name servers.</p> <h4>Threat intelligence feeds</h4> <p>These feeds are streams of data that can be obtained as indicator feeds, paid feeds, strategic partnerships, bulletins, and internal intelligence gathering. Individual feeds often focus on providing details on a single area of interest, including:</p> <ul> <li>Suspicious domains</li> <li>Code found on pastebins</li> <li>Collection of known malware hashes</li> <li>IP addresses flagged with malicious activity</li> <li>... and more</li> </ul> <p>The primary advantage of a threat feed is that it provides users with knowledge of potential threats that they weren’t aware of initially. When chosen carefully, the right feed can provide visibility even on unknown threats. It can also be used to fill knowledge gaps regarding existing malware.</p> <p><strong>Threat Intelligence APIs</strong> that were mentioned earlier — SSL Certificates Chain, Connected Domains, and Domain Reputation Scoring, among others — all collect intelligence from data feeds. They can be used to analyze the domain infrastructure behind hosts and help spot various threats such as known C&amp;C servers tied to malware, URLs associated with phishing or typosquatting, and other dangerous indicators.</p> <h3 id="leveraging-threat-intelligence-apis-the-whos-and-the-hows">Leveraging Threat Intelligence APIs: The Who’s and the How’s</h3> <p>It would certainly be a mistake to think threat intelligence is only useful for corporations or solely for cybersecurity specialists. In fact, cybersecurity departments, security enterprises as well as various personas from both SMEs and large companies can put <strong>Threat Intelligence APIs</strong> to good use. Here’s what they can do:</p> <ul> <li><strong>Chief Information Security Officer (CISO)</strong> – APIs providing threat intelligence data can contribute to CISO decision-making by offering real-time insights into external threats and, therefore, helping them identify the most pressing vulnerabilities, which subsequently enables the efficient allocation of cybersecurity resources. </li> <li><strong>Chief Executive Officer (CEO)</strong> – combining intelligence gathered through <strong>Threat Intelligence APIs</strong> allows CEOs, on behalf of their companies, to provide clients seeking data enrichment solutions with high-quality and precise cybersecurity data. </li> <li><strong>Threat analysts</strong> – with <strong>Threat Intelligence APIs</strong>, analysts can integrate obtained threat data with their cybersecurity tools to optimize workflows and enrich the intelligence gathered from other sources which would make them more effective in their roles. </li> <li><strong>Incident responders</strong> – accurate information on current and potential threats integrated into systems via <strong>Threat Intelligence APIs</strong> can be crucial for response teams as it enables them to make informed decisions immediately during incidents. Aside from that, it also improves the remediation efforts when filling in security gaps in the company network. </li> </ul> <p>What makes <strong>Threat Intelligence APIs</strong> even more special is that they allow integrating actionable intel directly with existing tools for better results. Let’s take a look.</p> <h3 id="what-threat-intelligence-apis-are-available-today">Threat Intelligence APIs Available Today</h3> <p>Threat Intelligence Platform’s solution called <a href="https://threatintelligenceplatform.com/threat-intelligence-api" title="Threat Intelligence API - 6 Different Security Analysis APIs">Threat Intelligence API</a> is a collection of individual APIs that allow users to acquire specific details regarding a particular domain. Each of its components can be used exclusively or with one another.</p> <p>You can even think of these APIs as building blocks and the <strong>Threat Intelligence API</strong> as the toolbox. If you are a cybersecurity solutions provider or work in a cybersecurity department, you can decide whether you want to utilize one or two APIs separately to fill in the gaps in your systems and products or apply them all together as a complete solution.</p> <p>Without further ado, let’s examine these APIs below.</p> <h4><a href="https://threatintelligenceplatform.com/threat-intelligence-apis/domains-infrastructure-analysis-api" title="Domain's Infrastructure Analysis API">Domain's Infrastructure Analysis API</a></h4> <div class="pic-wrapper hovered w-self"> <img src="https://threatintelligenceplatform.com/images/blog/threat-intelligence-api-walking-the-cybersecurity-talk/1.jpg" title="Domain's Infrastructure Analysis API" alt="Domain's Infrastructure Analysis API"> </div> <p>This API analyzes certain configurations of a domain, such as its web server, name server (NS), mail server (MX) and subdomains. Afterward, for each of these, the software provides details regarding their IP address, subnetwork details, and geolocation.</p> <p>This information can be used by security enterprises or cybersecurity departments as part of their due diligence while preparing for merger and acquisition transactions, or when verifying the trustworthiness of a third-party provider. Users can analyze the data to learn more about how well-established an entity is and what possible vulnerabilities associated with their infrastructure may arise and what issues regarding privacy or data storage depending on the servers’ location could emerge.</p> <p>It can also be combined with other details. Let’s imagine a potential typosquatting case, for instance, someone who is trying to go to the website “python.org” but instead heads over to “pyton.org”.</p> <div class="pic-wrapper hovered"> <img src="https://threatintelligenceplatform.com/images/blog/threat-intelligence-api-walking-the-cybersecurity-talk/2.jpg" title="Domain's Infrastructure Analysis API" alt="Domain's Infrastructure Analysis API"> </div> <div class="pic-wrapper hovered"> <img src="https://threatintelligenceplatform.com/images/blog/threat-intelligence-api-walking-the-cybersecurity-talk/3.jpg" title="Domain's Infrastructure Analysis API" alt="Domain's Infrastructure Analysis API"> </div> <p>What Domain Infrastructure API reveals here is that the servers are dispersed. In the case of pyton.com this, per se, doesn’t seem alarming, however, when combined with details collected via other APIs — spotted redirects and host configuration issues, among others — such a set of information indicates that the website is not trustworthy and should be investigated further.</p> <h4><a href="https://threatintelligenceplatform.com/threat-intelligence-apis/ssl-certificates-chain-api" title="SSL Certificates Chain API">SSL Certificates Chain API</a></h4> <div class="pic-wrapper hovered w-self"> <img src="https://threatintelligenceplatform.com/images/blog/threat-intelligence-api-walking-the-cybersecurity-talk/4.jpg" title="SSL Certificates Chain API" alt="SSL Certificates Chain API"> </div> <p>This API gathers information regarding the complete SSL certificates chain of a domain. These chains contain details needed to verify whether a website can be trusted. Upon input, the software will provide users with all certificates present in the target’s chain — analyzing both intermediate and root SSL certificates.</p> <div class="pic-wrapper hovered w-self"> <img src="https://threatintelligenceplatform.com/images/blog/threat-intelligence-api-walking-the-cybersecurity-talk/5.jpg" title="SSL Certificates Chain API" alt="SSL Certificates Chain API"> </div> <div class="pic-wrapper hovered w-self"> <img src="https://threatintelligenceplatform.com/images/blog/threat-intelligence-api-walking-the-cybersecurity-talk/6.jpg" title="SSL Certificates Chain API" alt="SSL Certificates Chain API"> </div> <div class="pic-wrapper hovered w-self"> <img src="https://threatintelligenceplatform.com/images/blog/threat-intelligence-api-walking-the-cybersecurity-talk/7.jpg" title="SSL Certificates Chain API" alt="SSL Certificates Chain API"> </div> <p>The software compares these parameters against current records to give users a report of whether the domain’s certificates were issued by a reliable source or not. There is also a section on additional certificate details which includes its serial number, allowed purposes, signature algorithm, and public key size. All of the attributes that are mentioned can be further validated by the user to ensure that every element of the chain is correct.</p> <p>In the image above, the certificate chain doesn’t contain any warnings. However, if any misconfigurations with the SSL certificate chain were detected, the software would immediately flag these for review.</p> <p>In fact, it is really important to spot misconfigurations not only because these might point to a malicious website but also because invalid chains can produce several issues for legitimate websites. First of all, they are normally hard to debug, plus they can lead to pages throwing out errors while browsing, which, in turn, results in poor user experience and can drive visitors away from the website.</p> <p>For example, cybersecurity consulting agencies can leverage this API in order to analyze their clients’ websites and verify if they are secured with the right SSL certifications — allowing them to provide the right solution for moving forward.</p> <h4><a href="https://threatintelligenceplatform.com/threat-intelligence-apis/ssl-configuration-analysis-api" title="SSL Configuration Analysis API">SSL Configuration Analysis API</a></h4> <div class="pic-wrapper hovered w-self"> <img src="https://threatintelligenceplatform.com/images/blog/threat-intelligence-api-walking-the-cybersecurity-talk/8.jpg" title="SSL Configuration Analysis API" alt="SSL Configuration Analysis API"> </div> <p>This API examines and tests the SSL connection while providing a report on how it is configured. The software collects numerous SSL parameters such as the validity dates and identifies any issues that could potentially lead to domain problems.</p> <p>One scenario of this API in action can be seen with how it was able to see through a <a href="https://cryptovest.com/news/shoddy-bakkt-website-scam-fails-to-fool-investors/" title="Shoddy Bakkt Website Scam Fails to Fool Investors - Cryptovest" target="_blank">Bitcoin scam website</a>. Criminals impersonated the futures exchange platform Bakkt by launching a fake website “bakkt.io”, inviting individuals to invest and provide their personal details for assured profits.</p> <p>Although the website had already been flagged by other <strong>Threat Intelligence APIs</strong>, we ran the domain name through SSL Configuration Analysis API to see what violations it included.</p> <div class="pic-wrapper hovered"> <img src="https://threatintelligenceplatform.com/images/blog/threat-intelligence-api-walking-the-cybersecurity-talk/9.jpg" title="SSL Configuration Analysis API" alt="SSL Configuration Analysis API"> </div> <p>As is seen in the image, the result immediately revealed a hostname validation failure — explaining that the given domain name is referenced neither in the Common Name (CN) nor the Subject Alternative Names (SAN) in its certificate. This means that there is inconsistency in the domain’s SSL certificate validity.</p> <div class="pic-wrapper hovered w-self"> <img src="https://threatintelligenceplatform.com/images/blog/threat-intelligence-api-walking-the-cybersecurity-talk/10.jpg" title="SSL Configuration Analysis API" alt="SSL Configuration Analysis API"> </div> <p>The report also shows additional warnings on this domain’s other SSL-related issues such as not forcing HTTPS connections and the Heartbeat extension being disabled. The former indicates a lack of security while the latter means that the network is open to being hit by the Heartbleed bug, which can steal sensitive information from users.</p> <p>Verifying SSL configurations via this API allows cybersecurity solution providers to enrich their existing intelligence on their clients’ pages by identifying risky domains such as those with the Heartbleed vulnerability which can result in impersonation, website spoofing, and loss of sensitive information.</p> <h4><a href="https://threatintelligenceplatform.com/threat-intelligence-apis/domain-malware-check-api" title="Domain Malware Check API - Check Websites for Malware">Domain Malware Check API</a></h4> <div class="pic-wrapper hovered w-self"> <img src="https://threatintelligenceplatform.com/images/blog/threat-intelligence-api-walking-the-cybersecurity-talk/11.jpg" title="Domain Malware Check API" alt="Domain Malware Check API"> </div> <p>Numerous malicious domains are out there waiting for their next victim, and Domain Malware Check API can help you to reveal them before they can cause problems. The software does so by analyzing the safety score of a domain with 0 being dangerous and 100 being the safest. It also checks if the website is listed in one or more malware databases.</p> <p>As is seen in the output below, this sample website has been flagged as a malicious site and warns users to avoid it. This turned out to be true as experts later discovered that the trick hackers used here was to entice people to download a pretend antivirus which actually contained harmful code.</p> <div class="pic-wrapper hovered w-self"> <img src="https://threatintelligenceplatform.com/images/blog/threat-intelligence-api-walking-the-cybersecurity-talk/12.jpg" title="Domain Malware Check API" alt="Domain Malware Check API"> </div> <p>With the help of this API, cybersecurity consulting agencies, for instance, will have the ability to perform background checks for their clients to identify websites that are safe to visit and those that are not. The product can also be readily integrated with existing software, allowing it to automatically block or quarantine low safety score domains.</p> <h4><a href="https://threatintelligenceplatform.com/threat-intelligence-apis/connected-domains-api" title="Connected Domains API - Check Domain Names on Same IP Address">Connected Domains API</a></h4> <p>This API is capable of retrieving a list of all domains that share the same hosts, IP addresses, servers, and registrant information on the Web. One of the main purposes of this is to provide users with a way to verify whether a website is connected to other malicious entities online. Such information can also help to:</p> <ul> <li><strong>Validate third-party credibility</strong> – checking if the domains associated with a potential third-party provider are involved in suspicious activities; </li> <li><strong>Protect reputation</strong> – sharing the same IP address range or host server with a malicious company can lead to being associated with a criminal group; </li> <li><strong>Enforce cybersecurity</strong> – acquiring reports on all domains associated with a malevolent entity allows blacklisting potentially risky websites and preventing intrusions; </li> <li><strong>Support investigations</strong> – law enforcement agents can immediately find connections to domains that could be part of a major cybercriminal ring. This could result in prosecution and the eventual shutdown of malicious groups. </li> </ul> <p>Take, for example, this suspicious website “youzube.com”. When running it through the API, the software reveals that the domain also has equally suspicious associated domains.</p> <div class="pic-wrapper hovered w-self"> <img src="https://threatintelligenceplatform.com/images/blog/threat-intelligence-api-walking-the-cybersecurity-talk/13.jpg" title="Connected Domains API" alt="Connected Domains API"> </div> <p>One interesting pattern is that the domain names registered by its owners are all deliberate misspellings of popular brands or websites. With this kind of scheme, it wouldn’t come as a surprise if some of them could be used for phishing, URL hijacking, or could contain malware.</p> <p>Security enterprises can use the API to perform due diligence for their clients and verify if their pages are under any risk because of the potential associations with malicious domains. The information from the API can also help during risk assessment regarding the third parties with whom clients might be collaborating with, verifying if these are tied to any known shady activities.</p> <h4><a href="https://threatintelligenceplatform.com/threat-intelligence-apis/domain-reputation-api" title="Domain Reputation API">Domain Reputation API</a></h4> <div class="pic-wrapper hovered w-self"> <img src="https://threatintelligenceplatform.com/images/blog/threat-intelligence-api-walking-the-cybersecurity-talk/14.jpg" title="Domain Reputation API" alt="Domain Reputation API"> </div> <p>The final API in the collection offers the ability to examine certain parameters of a domain and find out its composite safety score, which ranges from 0 (dangerous) to 100 (safe). More than 120 attributes are checked and compared across various online databases to produce a reputation score for a given domain name. These measurable factors include:</p> <ul> <li><strong>Overall website analysis</strong> – checks the potential risks associated with a website by looking into issues regarding its host configuration, file extensions, content management system, etc. </li> <li><strong>Domain SSL certificates</strong> – the SSL chain of a given domain is validated to determine its credibility while also examining whether it is protected against spoofing attacks. </li> <li><strong>Malware detection</strong> – includes scanning a range of malware databases to check if a domain is considered to be risky or not. </li> <li><strong>Domain WHOIS record</strong> – the ownership information of a domain can be inspected for possible concerns such as suspicious registration dates, a registrant connected to malicious activities, registration in a high-risk country, and more. </li> <li><strong>Mail servers</strong> – the API will look into whether an IP address or domain was blacklisted in the past due to spam or other malicious email practices, taking into account whether the target’s mail servers follow best practices such as properly configured SPF and DMARC records. </li> </ul> <p>The capabilities of this API are particularly well-suited for cybersecurity solution providers looking to enhance their ability to garner advanced threat data. This product alone lets them perform a comprehensive security evaluation of their client’s web sources to lower the risk of digital threats.</p> <h3 id="concluding-thoughts">Concluding Thoughts</h3> <p>And there you have it, a set of <strong>Threat Intelligence APIs</strong> that can provide you with the capacity to obtain insights on the threat landscape. Leveraging the capabilities behind this reliable threat intelligence software can help cybersecurity departments, security enterprises, and other organizations accomplish numerous goals moving forward.</p> <p>What makes these products unique is that you can choose to acquire them individually to fill in the gaps you otherwise couldn’t patch on your own. On the other hand, these <strong>Threat Intelligence APIs</strong> can be used as a single, complete resource to expand your existing solutions and meet the growing demands of the cybersecurity market today.</p> <p>If you have questions about how <strong>Threat Intelligence APIs</strong> can help your organization, please contact us at <a href="mailto:service.desk@threatintelligenceplatform.com" title="service.desk@threatintelligenceplatform.com">service.desk@threatintelligenceplatform.com</a>. </p>
]]></content:encoded>
        </item>
        <item>
            <title>Emotet Dominates the Threat Landscape in 2019</title>
            <link>https://threatintelligenceplatform.com/emotet-dominates-the-threat-landscape-in-2019</link>
            <pubDate>Mon, 05 Aug 2019 01:00:00 +0000</pubDate>
            <dc:creator>admin</dc:creator>

            <guid isPermaLink="false">https://threatintelligenceplatform.com/blog/?p=3400</guid>
            <description><![CDATA[
            <img width="1000" height="750" src="https://threatintelligenceplatform.com/images/blog/emotet-dominates-the-threat-landscape-in-2019/Emotet-Continues-Its-Aggressive-Stance.jpg" class="webfeedsFeaturedVisual wp-post-image" alt="Emotet Continues Its Aggressive Stance" style="display: block; margin: auto; margin-bottom: 25px;max-width: 100%;" />
            <p>First discovered in 2014, Emotet is among some of the most destructive malware which has continued to threaten users through its worm-like abilities, polymorphic features, and five scrupulous spreader modules. Created as a banking Trojan which stole data by intercepting internet traffic, the malware started evolving in its new versions and is presently known to have the ability of downloading and dropping other malware in the form of banking Trojans or spam delivery services.</p>
]]></description>
            <content:encoded><![CDATA[
            <img width="1000" height="750" src="https://threatintelligenceplatform.com/images/blog/emotet-dominates-the-threat-landscape-in-2019/Emotet-Continues-Its-Aggressive-Stance.jpg" class="webfeedsFeaturedVisual wp-post-image" alt="Emotet Continues Its Aggressive Stance" style="display: block; margin: auto; margin-bottom: 25px;max-width: 100%;" />
            <p>First discovered in 2014, Emotet is among some of the most destructive malware which has continued to threaten users through its worm-like abilities, polymorphic features, and five scrupulous spreader modules. Created as a banking Trojan which stole data by intercepting internet traffic, the malware started evolving in its new versions and is presently known to have the ability of downloading and dropping other malware in the form of banking Trojans or spam delivery services.</p> <p>Operated by a group called Mealybug, Emotet is known to have combined with Trickbot and Qakbot which has helped the notorious malware to become more aggressive and also expand its reach thus becoming a threat for individuals as well as businesses. Incidents of Emotet infection can run up costs of over $1 million in the cleanup.</p> <p>Germany suffers the highest number of Emotet attacks (30.77%) with US users not very far behind (22.53%). With new evasion techniques, the malware is beginning to target users in more and more countries and even explore new targets in various industries.</p> <h3>How Does It Work?</h3> <p>The infection process mostly starts with something as basic as a phishing email. Since it will use familiar branding along with links that may appear important, like a link to track a parcel or a link to open an invoice or show your payment details.The malware travels to your computer through a malicious script or link or a macro-enabled document.</p> <p><strong>One of the dangers stemming from this malware is that it avoids detection and analysis in the following ways:</strong></p> <ul> <li>Its polymorphic nature helps it escape signature-based detection.</li> <li>It detects virtual machines and is known to remain dormant in sandbox environments.</li> </ul> <p><strong>At this time, Emotet uses the following 5 spreader modules:</strong></p> <ul> <li><strong>NetPass.exe</strong> – The tool can recover all network passwords stored on a system including the recovery of passwords which are in the credential files of external drives. </li> <li><strong>Outlook Scraper</strong> – It ransacks the outlook account to recover emails and names which are used for sending spam through your email address. Since the recipients feel that the emails are coming from you, they are more likely to open and click on a malicious link. </li> <li><strong>Credential Enumerator</strong> – This self-extracting RAR file consists of two components, namely, the bypass component and the service component. The bypass component looks for writable share drives with the help of Service Message Block. It may also end up utilizing brute force attack trying to use a list of common passwords to gain access to other computers on the network. If it manages to enter the administrator account, then the service component is written on the system and Emotet houses itself on the disk. This can create serious breaches and may result in the infection of an entire domain. </li> <li><strong>WebBrowserPassView</strong> – It is used for recovering passwords stored on popularly used web browsers which are transferred to the credential enumerator. </li> <li><strong>Mail PassView</strong> – It is employed for recovering the passwords and email accounts on various email clients which are transferred to the credential enumerator. </li> </ul> <p>Emotet is also known to spread without human interaction using the Eternal Blue vulnerabilities,which are known to be utilized for the WannaCry attack.</p> <h3>Using Malware Database as a Preventive Measure</h3> <p>As attacks from Emotet become more complicated, and the malware in itself has evolved as a downloader and dropper and also featured in synergy with other malware, awareness becomes extremely important. Databases play a significant role in making security systems aware of known threats that can be blocked. You will find a number of malware databases which provide information on malicious IP addresses, URLs and domains.</p> <p>By looking up domains on malware databases before connecting with them or by using malicious URL lists, you can block these threats, defend your network and reduce the risk of unwanted infection by Emotet and other known malware. Such measures can help small and big businesses to reduce the risks of both threats and costly attacks.&nbsp;</p> <p>In its most recent form, Emotet is known to be able to intercept emails to include malicious content. Its disruptive abilities and continual updates have made it difficult to trace. This is why it is important that you use databases which are regularly updated and boast a reputation of including the maximum number of malware on its list.</p> <p>However, checking and authenticating malware databases can be quite cumbersome and in order to facilitate this task, we provide <a href="https://threatintelligenceplatform.com/threat-intelligence-apis/domain-malware-check-api" title="Domain Malware Check API - Check Websites for Malware">Domain Malware Check API</a> which checks 10 major malware databases to see if a domain is blacklisted or considered dangerous, i.e. related to a malware distribution network or hosts a malicious code. It is a comprehensive tool to protect users, networks, and servers from all sorts of malware attack and threat. It helps security analysts save a lot of time because there is no need to perform searches manually from multiple sources.</p> <p>Emotet’s worm-like abilities make it challenging for organizations to contain the infection. Since the network gets infected without human interaction, network operators have to be extremely vigilant and most employ defensive systems that can guard the network against single point failures.</p>
]]></content:encoded>
        </item>
        <item>
            <title>High-end Medical Imaging Equipment At Risk Of Cyber Attacks?</title>
            <link>https://threatintelligenceplatform.com/high-end-medical-imaging-equipment-at-risk-of-cyber-attacks</link>
            <pubDate>Mon, 22 Jul 2019 01:00:00 +0000</pubDate>
            <dc:creator>admin</dc:creator>

            <guid isPermaLink="false">https://threatintelligenceplatform.com/blog/?p=3300</guid>
            <description><![CDATA[
            <img width="1000" height="750" src="https://threatintelligenceplatform.com/images/blog/high-end-medical-imaging-equipment-at-risk-of-cyber-attacks/high-end-medical-imaging-equipment-at-risk-of-cyber-attacks.png" class="webfeedsFeaturedVisual wp-post-image" alt="High-end Medical Imaging Equipment At Risk Of Cyber Attacks?" style="display: block; margin: auto; margin-bottom: 25px;max-width: 100%;" />
            <p>Healthcare industry has been one of hackers’ favorite targets for quite some time now.In order to prove the damage that could be caused by malicious entities to patients, far beyond just stealing their data, few data scientists in Israel took matters into their own hands to bring to light the looming threats of the serious security weaknesses in medical imaging equipment and networks.</p>
]]></description>
            <content:encoded><![CDATA[
            <img width="1000" height="750" src="https://threatintelligenceplatform.com/images/blog/high-end-medical-imaging-equipment-at-risk-of-cyber-attacks/high-end-medical-imaging-equipment-at-risk-of-cyber-attacks.png" class="webfeedsFeaturedVisual wp-post-image" alt="High-end Medical Imaging Equipment At Risk Of Cyber Attacks?" style="display: block; margin: auto; margin-bottom: 25px;max-width: 100%;" />
            <p>Healthcare industry has been one of hackers’ favorite targets for quite some time now.In order to prove the damage that could be caused by malicious entities to patients, far beyond just stealing their data, few data scientists in Israel took matters into their own hands to bring to light the looming threats of the serious security weaknesses in medical imaging equipment and networks.</p> <h3>Who are the scientists and what did they do?</h3> <p>Yisroel Mirsky, Yuval Elovici at the Ben-Gurion University and two other associates at their Cyber Security Research Center in Israel developed malware using machine learning techniques with the aim of highlighting security issues in critical medical imaging equipment used for diagnosing conditions and also pointed the issues in networks that transmit those images — vulnerabilities that could have potentially life-affecting consequences if left unaddressed.</p> <p>The software that was specifically designed to disrupt, damage, or gain unauthorized access, would let attackers modify CT or MRI scans before radiologists and doctors could examine them. They could remove real cancerous nodules and lesions before detection, thus allowing a high probability of misdiagnosis and possibly a failure to treat patients who need critical and timely care.</p> <p>They used machine learning to rapidly assess scans passing through a Picture Archiving And Communication System (PACS). They could adjust and scale false tumors to conform to a patient’s unique anatomy and dimensions to make them more realistic. This damage mechanism can be automated so that once the malicious software is installed in a hospital’s network, it will operate independently to search and alter scans, to the extent of even searching the records of a specific patient.</p> <h3>Is it just theoretical knowledge?</h3> <p>No, it is not. The data scientists experimented real CT scans, 70 of which were modified by their malicious software, and they were able to trick three skilled radiologists into making the wrong diagnosis nearly every time.</p> <p>In the case of scans in which cancerous nodules were fabricated/added by modification, the radiologists diagnosed cancer 99 percent of the time.</p> <p>In cases where the malicious software removed and modified real cancerous scan areas from scans, the radiologists said those patients were healthy 94 percent of the time.</p> <h3>What are the consequences?</h3> <p>The researchers ran their test against a lung-cancer screening software tool that radiologists often use to confirm their diagnoses and were able to trick it into misdiagnosing the scans with false tumors every time.</p> <p>The study focused on lung cancer scans only. However, the software can modify reports and scans for brain tumors, heart disease, blood clots, spinal injuries, bone fractures, ligament injuries, and arthritis, says Mirsky.</p> <p>Such attackers could choose to modify random scans to create chaos and mistrust in medical equipment, or they could target specific patients, searching for scans tagged with a specific patient’s name or ID number. By doing so, they can prevent patients from receiving critical care or cause others who are not ill to receive unwarranted tests and treatment. The attackers could alter follow-up scans after treatment begins to falsely show tumors spreading or shrinking. It could only be left to the imagination of a hacker of the kind of havoc they would want to create!</p> <h3>Where do vulnerabilities reside?</h3> <ul> <li>The vulnerabilities that would allow someone to alter scans reside in the equipment and networks these hospitals use to transmit and store CT and MRI images. </li> <li>These images are sent to radiology workstations and back-end databases through what’s known as a Picture Archiving and Communication System (PACS). </li> <li>The attack succeeds because hospitals don’t digitally sign the scans to prevent them from being altered without detection. </li> <li>The attack also works because hospitals don’t use encryption technology in their networks, thus leaving the door open for allowing an intruder on the network to see the scans and alter them. </li> <li>Encryption is still generally not used for compatibility reasons with the older and outdated systems that don’t have the ability to decrypt or re-encrypt images. </li> <li>The networks are either directly connected to the Internet or accessible through hospital machines that are connected to the Internet, becoming vulnerable without any firewall or other protection. </li> <li>To get the malicious software onto a network, attackers would either need physical access to the network — to connect a malicious device directly to the network cables — or they could plant it remotely from the Internet. </li> </ul> <h3>How to prevent this from happening</h3> <p>To prevent someone from accessing and altering Medical Imaging scans, ideally, hospitals would have to enable end-to-end encryption across their networks and digitally sign all images while also making sure that processes are set up to verify those signatures and highlight any images that aren’t properly signed. All loose ends in the network should be tied up and the legacy network should be upgraded to the latest secure one.</p> <p>Defense is believed to be the only best offense. And in today’s world with cyber criminals getting innovative with their attacks, proactively protecting yourself against them is the best way to stay safe and secure.</p>
]]></content:encoded>
        </item>
        <item>
            <title>How Threat Intelligence Platform and Automation Collaborate</title>
            <link>https://threatintelligenceplatform.com/how-threat-intelligence-platform-and-automation-collaborate</link>
            <pubDate>Mon, 08 Jul 2019 01:00:00 +0000</pubDate>
            <dc:creator>admin</dc:creator>

            <guid isPermaLink="false">https://threatintelligenceplatform.com/blog/?p=3200</guid>
            <description><![CDATA[
            <img width="1000" height="750" src="https://threatintelligenceplatform.com/images/blog/how-threat-intelligence-platform-and-automation-collaborate/threat-intelligence-platform-and-automation.jpg" class="webfeedsFeaturedVisual wp-post-image" alt="Threat Intelligence Platform and automation" style="display: block; margin: auto; margin-bottom: 25px;max-width: 100%;" />
            <p>With today's growing cyber threat landscape, security operation centers (SOCs) find themselves overwhelmed by the sheer volume of alerts each day. Without the use of automation, it would be impossible to filter through all of the false alarms to focus on the larger legitimate threats.</p><p>While <a href="https://threatintelligenceplatform.com/blog/automated-threat-intel-processing" title="Automated Threat Intel Processing">automation is vital in the threat intelligence field</a>, it's not enough on its own and that inadequacy only promises to grow over time. Teams of security specialists can't stay on top of the swivel-chair analysis and false alerts now, finding it impossible to wade through the endless flow of varying, incoming data.</p><p>Cyber thieves are <a href="https://www.isa.org/about-isa/what-is-automation/" title="What Is Automation?" target="_blank">using automation tools</a> too in their creative, malevolent efforts, each day growing more familiar with the responses and actions of the security teams they continually test and target. Armed with automation tools themselves, <a href="https://threatintelligenceplatform.com/blog/hackers-refine-phishing-techniques" title="Hackers Refine Phishing Techniques">human hackers must be faced head-on</a> by human defenders using powerful automation-based defenses.</p>
]]></description>
            <content:encoded><![CDATA[
            <img width="1000" height="750" src="https://threatintelligenceplatform.com/images/blog/how-threat-intelligence-platform-and-automation-collaborate/threat-intelligence-platform-and-automation.jpg" class="webfeedsFeaturedVisual wp-post-image" alt="Threat Intelligence Platform and automation" style="display: block; margin: auto; margin-bottom: 25px;max-width: 100%;" />
            <p>With today's growing cyber threat landscape, security operation centers (SOCs) find themselves overwhelmed by the sheer volume of alerts each day. Without the use of automation, it would be impossible to filter through all of the false alarms to focus on the larger legitimate threats.</p> <p>While <a href="https://threatintelligenceplatform.com/blog/automated-threat-intel-processing" title="Automated Threat Intel Processing">automation is vital in the threat intelligence field</a>, it's not enough on its own and that inadequacy only promises to grow over time. Teams of security specialists can't stay on top of the swivel-chair analysis and false alerts now, finding it impossible to wade through the endless flow of varying, incoming data.</p> <p>Cyber thieves are <a href="https://www.isa.org/about-isa/what-is-automation/" title="What Is Automation?" target="_blank">using automation tools</a> too in their creative, malevolent efforts, each day growing more familiar with the responses and actions of the security teams they continually test and target. Armed with automation tools themselves, <a href="https://threatintelligenceplatform.com/blog/hackers-refine-phishing-techniques" title="Hackers Refine Phishing Techniques">human hackers must be faced head-on</a> by human defenders using powerful automation-based defenses.</p> <h3>Automation Alone is Not Enough</h3> <p>For some time already, Larger businesses with the means have been using security operation center solutions and security information and event management (SIEM) as part of enterprise security. However, <a href="https://threatintelligenceplatform.com/blog/5-more-examples-of-threat-intelligence-platform-use-cases" title="5 More Examples of Threat Intelligence Platform Use Cases">the threat landscape</a> continues to shift and grow each day due to the increase in online channels.</p> <div class="pic-wrapper"> <img src="https://threatintelligenceplatform.com/images/blog/how-threat-intelligence-platform-and-automation-collaborate/automating-business-security.jpg" title="Automating business security" alt="Automating business security"> </div> <p>More mobile devices are being used, bring your own device (BYOD) programs are popping up in more and more companies, and the escalation of the Internet of Things has provided hackers with a much larger surface to plan for, with new targets and possibilities for exploitation daily.</p> <p>Security teams are buried in incidents now and on top of taking up an inordinate amount of time ascertaining which are true threats and which aren't, the creation of new threats or variations on old ones is never-ending. Teams are forced to decide between increasing alarm thresholds to respond to more obvious attacks or spending countless hours wading through false alerts.</p> <p>Automation, supported by artificial intelligence (AI) or machine learning, never turned out to be the solution it was once believed to be. Cyber thieves have learned how to use automated systems to their advantage and AI solutions often don't have the robust datasets they need to combat the ever <a href="https://threatintelligenceplatform.com/blog/threat-intelligence-feeds-relevant-and-evolving" title="Threat Intelligence Feeds: Relevant and Evolving">increasing cyber threats</a>.</p> <p>Powerful as it is, automation alone isn't the security solution hoped for. Smart, evolving cyber thieves must be countered by smart human defenders using automation as only one of the tools in their arsenals.</p> <h3>Threat Intelligence Platforms Make All the Difference</h3> <p>Security teams of today need help when it comes to long-term planning and cybersecurity strategies. The addition of a team of threat analysts backed by a solid threat intelligence platform and carefully-managed automation can make all the difference when it comes to battling the myriad of looming threats.</p> <div class="pic-wrapper"> <img src="https://threatintelligenceplatform.com/images/blog/how-threat-intelligence-platform-and-automation-collaborate/threat-intelligence-platform-services.jpg" title="Threat Intelligence Platform services" alt="Threat Intelligence Platform services"> </div> <p>How exactly does that make things better? With the right threat intelligence platform in place, security teams can squarely focus on specific indicators and threats. The platform's automation capabilities will greatly reduce the amount of time spent by security teams investigating alerts.</p> <p>Enterprise-grade threat intelligence tools and services like those offered by <a href="https://threatintelligenceplatform.com" title="Threat Intelligence Platform - Protection Tools, Services, API's">Threat Intelligence Platform</a> give human security analysts the ability to operate proactively as opposed to reactively in ensuring security. These analysts should thoroughly understand the organization, top to bottom, and know where to find hidden threats. With the support of automation, such knowledge helps to streamline security measures and develop both short and long-term security plans.</p> <p>A vital part of automated security response, <a href="https://www.globenewswire.com/news-release/2019/01/03/1680286/0/en/12-9-Bn-Threat-Intelligence-Market-by-Solution-Service-Deployment-Mode-Organization-Size-Vertical-and-Region-Global-Forecast-to-2023.html" title="$12.9 Bn Threat Intelligence Market by Solution, Service, Deployment Mode, Organization Size, Vertical, and Region - Global Forecast to 2023" target="_blank">the threat intelligence market is becoming more substantial</a>, projected to grow from $5.3 billion in 2018 to $12.9 billion by 2023.</p> <p>Threat intelligence platforms give security teams what they need to learn about their opponents, to predict their moves and reveal their weaknesses, while making their own security exponentially stronger.</p> <p>To learn more about Threat Intelligence Platform and the tools and services we offer to companies looking to optimize their security, contact us today.</p>
]]></content:encoded>
        </item>
        <item>
            <title>When Blockchain Meets Threat Intelligence</title>
            <link>https://threatintelligenceplatform.com/when-blockchain-meets-threat-intelligence</link>
            <pubDate>Mon, 24 Jun 2019 01:00:00 +0000</pubDate>
            <dc:creator>admin</dc:creator>

            <guid isPermaLink="false">https://threatintelligenceplatform.com/blog/?p=3100</guid>
            <description><![CDATA[
            <img width="1000" height="750" src="https://threatintelligenceplatform.com/images/blog/when-blockchain-meets-threat-intelligence/when-blockchain-meets-threat-intelligence.jpg" class="webfeedsFeaturedVisual wp-post-image" alt="When Blockchain Meets Threat Intelligence" style="display: block; margin: auto; margin-bottom: 25px;max-width: 100%;" />
            <p>It seems that everyone is talking about Blockchain, Bitcoin, or some kind of crypto-currency-related topic. That makes sense. Blockchain is the hotness. It is the great promise that yields so many potential benefits. This is our turn to talk about blockchain and how, sooner rather than later, even threat intelligence will find its way, meet, and coordinate with blockchain in practice.</p><p>First, we should give a bit of context to threat intelligence. All too often, this term is thrown around a bit too casually, without regard to what the process truly provides or where it comes from. Threat intelligence is the process of gathering valuable, actionable insights about existing and emerging cyber threats. That’s a pretty concise description that hides a lot of what goes into threat intelligence as a valuable practice. Threat intelligence can be sourced from anywhere. From open source to proprietary databases to self-researched information, there are many ways to carry out threat intelligence in a practical and effective program.</p>
]]></description>
            <content:encoded><![CDATA[
            <img width="1000" height="750" src="https://threatintelligenceplatform.com/images/blog/when-blockchain-meets-threat-intelligence/when-blockchain-meets-threat-intelligence.jpg" class="webfeedsFeaturedVisual wp-post-image" alt="When Blockchain Meets Threat Intelligence" style="display: block; margin: auto; margin-bottom: 25px;max-width: 100%;" />
            <p>It seems that everyone is talking about Blockchain, Bitcoin, or some kind of crypto-currency-related topic. That makes sense. Blockchain is the hotness. It is the great promise that yields so many potential benefits. This is our turn to talk about blockchain and how, sooner rather than later, even threat intelligence will find its way, meet, and coordinate with blockchain in practice.</p> <p>First, we should give a bit of context to threat intelligence. All too often, this term is thrown around a bit too casually, without regard to what the process truly provides or where it comes from. Threat intelligence is the process of gathering valuable, actionable insights about existing and emerging cyber threats. That’s a pretty concise description that hides a lot of what goes into threat intelligence as a valuable practice. Threat intelligence can be sourced from anywhere. From open source to proprietary databases to self-researched information, there are many ways to carry out threat intelligence in a practical and effective program.</p> <h3>Practical Limitations</h3> <p>Just because an organization uses threat intelligence, it doesn’t mean they are being all that effective with it or getting great value. That’s because threat intelligence sharing sources often contend to analyze and report threat information that overlaps. In other cases, the information analyzed is too broad, or too specific though not specific enough to meet the needs and parameters of the clients. Because of this, some organizations ingest these security alerts and information points in coordination with self-collected research. Our <a href="https://threatintelligenceplatform.com" title="Threat Intelligence Platform - Protection Tools, Services, API's">Threat Intelligence Platform</a> is one such tool that allows for deep, insightful research that is individual and tuned to the needs, information, and architecture of the organization itself.</p> <h3>Enter Blockchain</h3> <p>Let’s jump forward to the not-so-distant future. Blockchain is here to stay and its integration with threat intelligence is unavoidable. Here is how this could go. Imagine the integrity of computer systems at a baseline. Now imagine incidents, big or small, that happen over time. If this baseline of information begins as a blockchain, every single incident, every happening, and every change over time become part of the fabric of record. Pretty interesting, but now, extend that baseline of information to a global, opt-in consensus chain of integrity. Threat intelligence can now not only track changes and threats, but also report and distribute these issues between the participants or subscribers to the blockchain.</p> <p>This is one possible future for blockchain in the realm of security. Other security products could also integrate the integrity principles of blockchain in underlying functions. The bigger the blockchain gets, the more participants there are, the more equitable the power of it becomes. No central control, with cryptographic ledger-based proof by all, and trust across the network.</p> <p>It all sounds quite wonderful, but there’s still a long way to go. First, there’s a number of weaknesses to deal with. There have been examples of undermining the integrity of blockchain networks by intercepting, gaining control of, or impersonating central nodes. Another challenge will be achieving a higher level of adoption across tools, clients, and the industry.</p> <p>At the end of the day, blockchain shows tremendous promise in the field of cybersecurity and in the realm of threat intelligence as well. Until blockchain systems can boast increased security, integrity, and widespread participation, blockchain features will be relegated to marketing-speak and use cases that don’t pertain to the core of security systems. When that day arrives however, the capability to research information will hold tremendous value in the threat intelligence picture as it gives organizations the power to contextualize specific threat information.</p>
]]></content:encoded>
        </item>
        <item>
            <title>5 Steps to Actionable Threat Intelligence</title>
            <link>https://threatintelligenceplatform.com/5-steps-to-actionable-threat-intelligence</link>
            <pubDate>Mon, 10 Jun 2019 01:00:00 +0000</pubDate>
            <dc:creator>admin</dc:creator>

            <guid isPermaLink="false">https://threatintelligenceplatform.com/blog/?p=2900</guid>
            <description><![CDATA[
            <img width="1000" height="750" src="https://threatintelligenceplatform.com/images/blog/5-steps-to-actionable-threat-intelligence/5-steps-to-actionable-threat-intelligence-1.png" class="webfeedsFeaturedVisual wp-post-image" alt="5 Steps to Actionable Threat Intelligence" style="display: block; margin: auto; margin-bottom: 25px;max-width: 100%;" />
            <p>With everything that can be said about threat intelligence, it’s interesting to see how some organizations continue to struggle with threat intelligence programs. Recent survey participants seem to have some issues with this technology and with integrating volumes of threat information into cohesive, actionable insight. There’s a point to be made here in that threat intelligence have significant security value, but only if the operational program itself can ingest information and tie critical issues to actions.</p><p>Many organizations have some form of threat intelligence or another. Whether it’s a subscription to threat information or a full-blown integration to third-party threat intelligence services, there are many looks out there just as there are many levels of success to consider. Every organization, however, can benefit from the personal and institutional integration of foundational steps that focus on using this information and protecting the organization from specific threats.</p>
]]></description>
            <content:encoded><![CDATA[
            <img width="1000" height="750" src="https://threatintelligenceplatform.com/images/blog/5-steps-to-actionable-threat-intelligence/5-steps-to-actionable-threat-intelligence-1.png" class="webfeedsFeaturedVisual wp-post-image" alt="5 Steps to Actionable Threat Intelligence" style="display: block; margin: auto; margin-bottom: 25px;max-width: 100%;" />
            <p>With everything that can be said about threat intelligence, it’s interesting to see how some organizations continue to struggle with threat intelligence programs. Recent survey participants seem to have some issues with this technology and with integrating volumes of threat information into cohesive, actionable insight. There’s a point to be made here in that threat intelligence have significant security value, but only if the operational program itself can ingest information and tie critical issues to actions.</p> <p>Many organizations have some form of threat intelligence or another. Whether it’s a subscription to threat information or a full-blown integration to third-party threat intelligence services, there are many looks out there just as there are many levels of success to consider. Every organization, however, can benefit from the personal and institutional integration of foundational steps that focus on using this information and protecting the organization from specific threats.</p> <h3>1. What needs to be protected?</h3> <p>It’s simple; the end matters and so does the means. Every organization has an identifiable body of assets that need protection as well as a matrix of risk that stems from this. This is where threat intelligence begins and where the foundation of data collection is defined, which leads to the data analysis that makes this information relevant. This information is then distributed to the right sources, the role holders and critical security personnel.</p> <p>Data, logs, and reporting tools can all be well integrated from various sources: from the data center, the cloud, vendors, third parties, and anything in between. Making or repeating this step can uncover new horizons and insights into threat intelligence.</p> <div class="pic-wrapper"> <img src="https://threatintelligenceplatform.com/images/blog/5-steps-to-actionable-threat-intelligence/5-steps-to-actionable-threat-intelligence-2.png" title="5 Steps to Actionable Threat Intelligence" alt="5 Steps to Actionable Threat Intelligence"> </div> <h3>2. Do you really have a program?</h3> <p>Many organizations start out with data-feed-based threat intelligence. It’s everywhere and pretty easy to implement as a source for tactical security activity. However, this sort of threat intelligence integration won’t fulfill the tremendous advantage and promise of threat intelligence as a difference-maker. Whatever the quality of the security feed, there is an immutable truth that dictates that these feeds are slow, non-specific, and lacking context. One of the biggest issues in the industry is the overbearing task of making sense of vast data, faulty data, and weeding out false positive threat information. This is where contextualized information becomes critical, and a tool like Threat Intelligence Platform is so powerful. The product incorporates knowledge from vast troves of information from a variety of sources, making this information actionable.</p> <h3>3. Location, Location, Location</h3> <p>Take the task of looking at data. Map out how and where it’s collected, where it’s stored, and how people access this information. One of the problems organizations endure is having too many points of data with too many points of access. Data is most powerful when it can be correlated, integrated, and referenced in one (or as few as possible) locations. So whether this means creating a common dashboard, consolidating a bunch of data, or getting the business to accept security changes to make centralization possible, take a look at location as a potential improvement for actionable intelligence.</p> <h3>4. Integration</h3> <p>Referring back to step 3, centralizing the information is just as much at the point of analysis. You must also get threat information into the hands of the people that need it. The bigger the organization, the wider the task. Information that is specific to business units, data centers, and locations around the organization is critical to creating a complete, cohesive delivery of security information. Open source is a great tool, but technology providers can provide excellent availability throughout enterprise systems. Make sure everyone that needs the data can get access to it.</p> <h3>5. Gap-Based Intelligence</h3> <p>Daily updates on threats are available everywhere. Alongside these sources, many additional sources address the gaps that exist in many places throughout the environment. Every piece of hardware, every piece of middleware, operating systems, and applications inevitably fall out of valid status. Updates to these systems roll out frequently and the awareness of the status of relevant systems and technology platforms is critical to a healthy environment. Gap-based intelligence is every bit as important as specific threat information, and it can easily be integrated with or a companion to threat intelligence.</p> <div class="custom-hr"></div> <p>Remember that a threat intelligence program is multi-faceted and it must provide available information as far and wide as possible, as well as being accessible to all the right personnel as required. Actionable intelligence is the goal and the drive towards this goal is critical, especially in terms of its ability to research and verify information easily.</p>
]]></content:encoded>
        </item>
        <item>
            <title>Why Reputation Matters for Your Email Marketing</title>
            <link>https://threatintelligenceplatform.com/why-reputation-matters-for-your-email-marketing</link>
            <pubDate>Mon, 03 Jun 2019 01:00:00 +0000</pubDate>
            <dc:creator>admin</dc:creator>

            <guid isPermaLink="false">https://threatintelligenceplatform.com/blog/?p=2800</guid>
            <description><![CDATA[
            <img width="1000" height="750" src="https://threatintelligenceplatform.com/images/blog/why-reputation-matters-for-your-email-marketing/why-reputation-matters-for-your-email-marketing.jpg" class="webfeedsFeaturedVisual wp-post-image" alt="Why Reputation Matters for Your Email Marketing" style="display: block; margin: auto; margin-bottom: 25px;max-width: 100%;" />
            <p>Email marketing has become one of the crucial ways for businesses to communicate and establish a relationship with their customers. Your marketing team can create a well-researched and enticing subject line followed by relevant content, visuals and a call to action, as well as ticking all the checkboxes for an ‘ideal email campaign’. But what if that email doesn't make it to your audience’s inbox?</p>
]]></description>
            <content:encoded><![CDATA[
            <img width="1000" height="750" src="https://threatintelligenceplatform.com/images/blog/why-reputation-matters-for-your-email-marketing/why-reputation-matters-for-your-email-marketing.jpg" class="webfeedsFeaturedVisual wp-post-image" alt="Why Reputation Matters for Your Email Marketing" style="display: block; margin: auto; margin-bottom: 25px;max-width: 100%;" />
            <p>Email marketing has become one of the crucial ways for businesses to communicate and establish a relationship with their customers. Your marketing team can create a well-researched and enticing subject line followed by relevant content, visuals and a call to action, as well as ticking all the checkboxes for an ‘ideal email campaign’. But what if that email doesn't make it to your audience’s inbox?</p> <p>In order for email marketing to be effective, the emails have to make their way to the inbox and not be sent to the junk or spam folder or, even worse, be simply blocked by the mailbox provider. But the statistics show that this is not always the case. 1 out of every 5 commercial email never reaches the customer’s inbox! Delivering your emails to your customer’s inbox involves first having a good sender reputation.</p> <p>Your sending reputation plays a critical role as far as the delivery of your emails is concerned. Mailbox providers take many metrics into consideration to determine your sender reputation, including the proper configuration of your email delivery settings, spam complaints, mailing list, content, engagement, industry blacklists, and more.</p> <p>To begin with, your priority should be to safely reach your customer’s mailbox and for that, you need a solid email sending infrastructure. At first, step you should undertake to implement outbound email authentication, so your ISPs will know that your emails are coming from a legit source and not from spammers or malicious senders.</p> <h3>The 3 Cornerstones of Email Authentication</h3> <h4>Sender Policy Framework (SPF)</h4> <p>SPF is a standard implemented to check if a particular email campaign was launched from an authorized server. It increases your credibility in the eyes of the receiving email server by cross-checking the domain name against the associated IP address to make sure it is legitimate. Without an SPF in place, the mailbox providers will generally reject your emails.</p> <h4>DomainKeys Identified Mail (DKIM)</h4> <p>DKIM confirms to the receiving email server that your email can be trusted and has not been tampered with. It helps the receiver to ascertain that an email claiming to have come from a specific domain has been approved by the domain’s owner. This is achieved by using a digital signature linked to a domain name, for each outgoing email message. A DKIM signature means that the email has not been tampered with or hijacked upon delivery and that it comes from a valid sender. If the receiving system has a whitelist of known good sending domains, it can skip the filtering on signed mail from those domains.</p> <h4>Domain-Based Message Authentication Reporting and Conformance (DMARC)</h4> <p>DMARC is an added authentication method that uses both SPF and DKIM to verify whether or not the email was actually sent by the owner of the domain. Both SPF &amp; DKIM must pass for the DMARC to be authenticated and to confirm the email is coming from an authorized server. DMARC also lets email senders inform receiving email servers of what action to take in case an email fails authentication under SPF or DKIM. It proves to ISPs that you are legitimate and are willing to take precautionary measures to protect your identity and reputation.</p> <p>With a tool like you <a href="https://threatintelligenceplatform.com/threat-intelligence-apis/domain-reputation-api" title="Domain Reputation API">Domain Reputation API</a>, you can check for any discrepancies in your email authentication. In fact, Domain Reputation API conducts a deep analysis of your entire Mail Server and provides detailed reports of any prevailing issues. Besides your mail servers, this valuable tool can also check your infrastructure that can affect your deliverability including factors like:</p> <ul> <li><b>IP reputation:</b> When you use shared IP, your reputation can be affected if it is located in a bad neighbourhood or blacklisted because of the presence of malicious domains in the same shared space. </li> <li><b>Blacklist Appearances:</b> The system checks numerous reputed security data sources and reports if your domain is blacklisted for malware or any other spam. </li> </ul> <p>Domain Reputation API, in fact, evaluates 120 components for any given domain name or IP address and reports any warnings for it, including vulnerabilities in your infrastructure which can be adversely used by malicious actors. So you can use this tool not only for your Email Marketing but also for keeping your online brand safe and protected. Now that’s killing two birds with one tool, isn’t it?</p> <p>Start improving your reputation today!</p> <p><a href="https://threatintelligenceplatform.com/threat-intelligence-apis/domain-reputation-api" title="Domain Reputation API">https://threatintelligenceplatform.com/threat-intelligence-apis/domain-reputation-api</a></p>
]]></content:encoded>
        </item>
        <item>
            <title>Uncovering Botnets Through Domain Reputation</title>
            <link>https://threatintelligenceplatform.com/uncovering-botnets-through-domain-reputation</link>
            <pubDate>Mon, 27 May 2019 01:00:00 +0000</pubDate>
            <dc:creator>admin</dc:creator>

            <guid isPermaLink="false">https://threatintelligenceplatform.com/blog/?p=2700</guid>
            <description><![CDATA[
            <img width="1000" height="750" src="https://threatintelligenceplatform.com/images/blog/uncovering-botnets-through-domain-reputation/uncovering-botnets-through-domain-reputation.png" class="webfeedsFeaturedVisual wp-post-image" alt="Uncovering Botnets Through Domain Reputation" style="display: block; margin: auto; margin-bottom: 25px;max-width: 100%;" />
            <p>The purpose of this paper is to help educate technology practitioners, Internet users, technology executives and the security community on the importance of monitoring domain reputation to be protected against botnets and botnet-related activity. This knowledge gap discussion focuses on the validity and power of activity research and the context-based effect of publicly available WHOIS data.</p>
]]></description>
            <content:encoded><![CDATA[
            <img width="1000" height="750" src="https://threatintelligenceplatform.com/images/blog/uncovering-botnets-through-domain-reputation/uncovering-botnets-through-domain-reputation.png" class="webfeedsFeaturedVisual wp-post-image" alt="Uncovering Botnets Through Domain Reputation" style="display: block; margin: auto; margin-bottom: 25px;max-width: 100%;" />
            <h3>Introduction</h3> <p>Although they represent just one of the many cyber threats in existence today, malicious botnets are some of the most significant threats to internet security.</p> <p>Botnets, aka ‘bots’, date back to the dawn of the internet itself. Hosting applications and performing repetitive tasks, bots have leveraged the distributed nature of the internet in tasks such as search, collecting, and the delivery of information. Malicious bots however, surreptitiously employ and infect target computers as part of a ‘zombie’ network, managed at a distance under the control of a malicious cybercriminal.</p> <p>Once established, a botnet can launch attacks against even more computers, against unsuspecting users, against government agencies and just about every type of organization out there. Once unleashed, a botnet can leverage the power of thousands, hundreds of thousands, and even millions of computers in one command. In its wake, a botnet attack and related activities can create the following disruptions:</p> <ul> <li>Collect private information from infected users;</li> <li>Further spread botnet malicious payloads, cryptomining threats, ransomware, and more;</li> <li>Create a flood of email spam that can reach millions around the world;</li> <li>Denial of Service (DoS) and Distributed Denial of Service attacks;</li> <li>Distributed brute force hacking tasks.</li> </ul> <p>To put it mildly, malicious botnets possess a massive potential for unfettered cybercriminal activity, which can be difficult to track and protect against, proving to be among the most significant threats on the internet today.</p> <p>Awareness Through Domain InfoThanks to the efforts of law enforcement and major technology providers, successful attempts have been made to stop and take down botnets. However, cybercriminals have also evolved their tactics, employing dynamic domain techniques and a rapidly changing foundation called a fast-flux network. One of the best ways to uncover and detect botnet activity is through domain reputation research. Initiated within the activities of a threat intelligence program, domain reputation information is constantly updated, and can uncover the launch of networks by bot operators before they pose a threat to the organization.</p> <p>The purpose of this paper is to help educate technology practitioners, Internet users, technology executives and the security community on the importance of monitoring domain reputation to be protected against botnets and botnet-related activity. This knowledge gap discussion focuses on the validity and power of activity research and the context-based effect of publicly available WHOIS data.</p> <h3>Awareness Through Domain Info</h3> <p>It may not be obvious to the uninitiated, but the information behind domains is a valuable source in the hunt for security threats. Billions of times a day, domain information is exchanged between users around the globe, connecting their devices to applications, email, and secure computing resources. This information is highly trusted and it is built into every single application and resource in existence. Criminals see this trust level as their opportunity, plying attacks, infections, fraud, and countless other acts through its systems.</p> <h4>WHOIS and DNS</h4> <p>When a domain is registered, the WHOIS standard dictates what information is required to submit the desired domain into the worldwide domain name registry. Leveraging DNS, the Domain Naming System, the two components build a virtual directory of every domain on the web. The details of how to connect to systems with a set domain exist at one level of this directory, while in the other, a deeper set of details dictate what information exists behind the scenes, such as who registered the account, contact details, dates of registration, and, ultimately, who owns the domain. It’s not a perfect system as the information collected is vaguely accurate, rarely audited, and regularly abused or neglected by registrants. This information is also not updated regularly.</p> <p>Despite the imperfections within WHOIS data, the information within presents a valuable tool in the hunt for malicious cyber activities. Organizations can use this data to protect themselves and their customers from fraud, ransomware, malware, crypto-mining attacks, spam networks, and other forms of malicious online activity.</p> <div class="pic-wrapper"> <img src="https://threatintelligenceplatform.com/images/blog/uncovering-botnets-through-domain-reputation/Risk-Aware-Domain-Reputation.png" title="Risk-Aware Domain Reputation" alt="Risk-Aware Domain Reputation"> </div> <h3>Risk-Aware Domain Reputation</h3> <h4>The Importance of Domain Reputation</h4> <p>Domain reputation is an effective tool that is regularly utilized in email and network security. This construct gives practitioners the information needed to decide whether they trust the transaction of information to and from domain-based networks. Whether it’s basic emails, networking communications or any combination of activities, domain reputation is an integrity checkpoint that eliminates the need to dig into internet address blocks or individual internet protocol (IP) addresses. Internet Service Providers (ISPs), hosting providers, email providers, and others leverage domain reputation along with IP reputation to monitor and protect their infrastructure and services.</p> <p>Early botnet detection is achieved by dynamically detecting changes that occur in DNS and WHOIS information, leveraging domain reputation and other levels of information within assessment. As botnet controllers are busy creating the infrastructure for their botnet systems, detectable anomalies in the DNS and WHOIS systems can quickly tip off security defenders about a building threat. By catching this early in the lifecycle, protecting against botnets becomes a proactive activity aimed at detecting existing behaviors and correlated with up-to-date information on registered domains.</p> <h4>How Does It Work?</h4> <p>Domain reputation lookup exposes risk components in the information collection phase. Analysis takes place using the following incorporated example factors:</p> <ul> <li>Recently registered</li> <li>Expires soon</li> <li>Free domain zone</li> <li>Offshore country</li> <li>Owner contact details</li> </ul> <p>When correlated with other factors, such as a malware database check, the conclusions are undeniable. Malware database checking may include:</p> <ul> <li>Phishing</li> <li>Malware</li> <li>Botnet command-and-control warning</li> <li>Spam</li> <li>Reputation data</li> <li>Denial of Service (DoS) Attack Data</li> </ul> <p>Further available information includes the collection of DNS query information, analysis of the domain structure, subdomains, registrar information, zone information, and network characteristics. The security practitioner can use this information to analyze and rank the risk level of log-based events and create a custom reputation model. Using domain reputation and a tool that can explore these factors, something as innocuous as a domain lookup in a protected environment can prompt a protective action.</p> <h3>Signs of a botnet</h3> <p>With the <a href="https://threatintelligenceplatform.com" title="Threat Intelligence Platform - Protection Tools, Services, API's">Threat Intelligence Platform</a> (TIP), the existence of a botnet can be detected and confirmed by using several points of information. The TIP platform is a robust, up-to-date tool that allows organizations to collect, research, and analyze information about potential threats. It makes extensive use of domain reputation factors, along with pertinent information that helps in this analysis.</p> <p>The TIP platform is typically used in a total threat analysis program to further explore suspicious issues and create organization-specific threat profiles using the event information collected. It features an API for continual, routine, and automated lookups, but it is useful as a web-based research tool as well.</p> <h4>How Does It Work?</h4> <p>Let’s look at a suspicious domain. Assuming the domain in question came up in local DNS queries requested by critical company systems, this is something you’d want to research.</p> <div class="pic-wrapper hovered imgself-width"> <img src="https://threatintelligenceplatform.com/images/blog/uncovering-botnets-through-domain-reputation/image3-20.png" title="A suspicious domain" alt="A suspicious domain"> </div> <p>A parked web page appears, and at first glance, it appears to be an innocuous domain, but the tool tells us more.</p> <h4>Potentially Dangerous Content</h4> <p>This bit of information begins to raise the suspicion levels. Although it has passed the majority of checks, there is a redirect warning.</p> <div class="pic-wrapper hovered imgself-width"> <img src="https://threatintelligenceplatform.com/images/blog/uncovering-botnets-through-domain-reputation/image4-22.png" title="Potentially Dangerous Content" alt="Potentially Dangerous Content"> </div> <h4>SSL check</h4> <p>SSL detection was passed with no warnings, but that’s only because the site has no SSL certificate in the first place. If a certificate was found, pertinent information such as expiration, issuing authority, and date provides context for a possible threat.</p> <div class="pic-wrapper hovered imgself-width"> <img src="https://threatintelligenceplatform.com/images/blog/uncovering-botnets-through-domain-reputation/image5-24.png" title="SSL check" alt="SSL check"> </div> <h4>Malware Databases Check</h4> <p>Here’s where things get interesting. The domain comes up as part of a known malware data feed as a botnet command-and-control host. This data feed is quickly validated, meaning you can see that at some point, the domain was correlated to botnet activity.</p> <div class="pic-wrapper hovered imgself-width"> <img src="https://threatintelligenceplatform.com/images/blog/uncovering-botnets-through-domain-reputation/image6-26.png" title="Malware Databases Check" alt="Malware Databases Check"> </div> <h4>Threat Assessment</h4> <p>Every assessment process is different, as should be the case with each organization, but common threat indicators help the organization to come up with their own evaluation.</p> <div class="pic-wrapper hovered imgself-width"> <img src="https://threatintelligenceplatform.com/images/blog/uncovering-botnets-through-domain-reputation/image7-28.png" title="Threat Assessment" alt="Threat Assessment"> </div> <p>While the domain in question did not raise any red flags across the board, there is enough here to justifiably decide to blacklist this specific domain.</p> <p>Specifically:</p> <ul> <li>A business-justified reason to connect to this domain has not been presented.</li> <li>The malware database check shows a red flag.</li> <li>The lack of SSL certificate means the domain hasn’t been validated in any tangible way.</li> <li>The content check and redirect indicate something lying beyond when visiting this page.</li> </ul> <h4>Analysis</h4> <p>This domain reports a history of botnet activity and warrants blocking.</p> <p>Although it currently appears to a parked domain webpage that is currently registered and hosted through Amazon, cybercriminals are adept at rotating assets of networks, domains, and domain states. Due to this history and the impression of a non-active webpage, there is little value in maintaining access to this domain.</p> <h3>Key Takeaways</h3> <ul> <li>Domain Reputation is a valuable tool in the fight against malicious botnets.</li> <li>Specialized tools help uncover pertinent DNS and WHOIS information, relationships, and other discoveries. </li> <li>Early data research is one of the best methods of detecting potential botnets.</li> </ul>
]]></content:encoded>
        </item>
        <item>
            <title>Effective Digital Risk Management with Threat Intelligence</title>
            <link>https://threatintelligenceplatform.com/effective-digital-risk-management-with-threat-intelligence</link>
            <pubDate>Mon, 13 May 2019 01:00:00 +0000</pubDate>
            <dc:creator>admin</dc:creator>

            <guid isPermaLink="false">https://threatintelligenceplatform.com/blog/?p=2600</guid>
            <description><![CDATA[
            <img width="1000" height="750" src="https://threatintelligenceplatform.com/images/blog/effective-digital-risk-management-with-threat-intelligence/digital-risk-management-with-threat-intelligence.jpg" class="webfeedsFeaturedVisual wp-post-image" alt="Digital risk management with Threat Intelligence" style="display: block; margin: auto; margin-bottom: 25px;max-width: 100%;" />
            <p>With as many as 4.1 billion internet users globally, 2.5 billion of whom are accessing the web on smartphones, businesses around the world have a lot to gain from having an online presence. While the internet provides businesses with a great medium for reaching out and connecting with an enormous global audience, it also <a href="https://threatintelligenceplatform.com/blog/just-how-secure-is-your-organization-in-todays-digital-world" title="Just How Secure Is Your Organization in Today's Digital World?">opens them up to those with ill intentions</a>.</p><p>The cybercrime landscape is constantly shifting and growing. Contrary to popular belief, small businesses are also increasingly targeted by hackers. Studies have shown that nearly <a href="https://smallbiztrends.com/2017/01/cyber-security-statistics-small-business.html" title="Cyber Security Statistics: Numbers Small Businesses Need to Know" target="_blank">43% of the victims of cyber attack</a> are small businesses. As many of 60% of those businesses will have to close their doors within 6 months as a result.</p><p>What can businesses do to protect themselves in such an environment?</p>
]]></description>
            <content:encoded><![CDATA[
            <img width="1000" height="750" src="https://threatintelligenceplatform.com/images/blog/effective-digital-risk-management-with-threat-intelligence/digital-risk-management-with-threat-intelligence.jpg" class="webfeedsFeaturedVisual wp-post-image" alt="Digital risk management with Threat Intelligence" style="display: block; margin: auto; margin-bottom: 25px;max-width: 100%;" />
            <p>With as many as 4.1 billion internet users globally, 2.5 billion of whom are accessing the web on smartphones, businesses around the world have a lot to gain from having an online presence. While the internet provides businesses with a great medium for reaching out and connecting with an enormous global audience, it also <a href="https://threatintelligenceplatform.com/blog/just-how-secure-is-your-organization-in-todays-digital-world" title="Just How Secure Is Your Organization in Today's Digital World?">opens them up to those with ill intentions</a>.</p> <p>The cybercrime landscape is constantly shifting and growing. Contrary to popular belief, small businesses are also increasingly targeted by hackers. Studies have shown that nearly <a href="https://smallbiztrends.com/2017/01/cyber-security-statistics-small-business.html" title="Cyber Security Statistics: Numbers Small Businesses Need to Know" target="_blank">43% of the victims of cyber attack</a> are small businesses. As many of 60% of those businesses will have to close their doors within 6 months as a result.</p> <p>What can businesses do to protect themselves in such an environment?</p> <h3>The Power of Digital Risk Management</h3> <p>Companies looking for ways to protect themselves and their consumers from cybercrime are considering the advantages of threat intelligence solutions. Many threat intelligence solutions are loaded with enough robust features that can be tailored for a vast number of uses. Critical security tools, these threat intelligence tools utilize universal security data to identify malicious activity within your network and more.</p> <p>These tools can take various forms. Threat intelligence platforms (TIPs) go <a href="https://threatintelligenceplatform.com/blog/how-does-threat-intelligence-benefit-your-organization" title="How Does Threat Intelligence Benefit Your Organization?">further than intelligence feeds and other tools</a>. They integrate one or more data feeds, carefully applying advanced analytics to the data as it's received to mine for other valuable intel and to detect any and all suspicious patterns within systems.</p> <div class="pic-wrapper"> <img src="https://threatintelligenceplatform.com/images/blog/effective-digital-risk-management-with-threat-intelligence/threat-intelligence-platform-for-businesses.jpg" title="Threat Intelligence Platform for businesses" alt="Threat Intelligence Platform for businesses"> </div> <p>Threat intelligence platforms can provide numerous applications for businesses seeking online protection:</p> <h4>Managing New Threats</h4> <p>Managing New Threats: Businesses can use threat intelligence platforms in addition to their existing security protocols. The addition of digital risk tools to the cybersecurity measures a business already has in place helps to monitor for emerging threats.</p> <h4>Brand Protection and Digital Footprint Mapping</h4> <p>Brand Protection and Digital Footprint Mapping: Many businesses use threat intelligence platforms to monitor their brand to improve takedowns and remediation. These powerful tools can also be used to protect a company's executives, important persons, and to map and secure their digital assets and footprint.</p> <h4>Gathering Data from the Dark Web and Social Media</h4> <p>Gathering Data from the Dark Web and Social Media: Many businesses find threat intelligence platforms useful for harvesting data from the dark web and social media as they are valuable sources of information for a better digital risk management solution.</p> <h4>How Threat Intelligence Manages Digital Risk</h4> <p>Effective <a href="https://www.digitalshadows.com/blog-and-research/the-3-pillars-of-digital-risk-management-part-1-understanding-cyber-threats/" title="The 3 Pillars of Digital Risk Management: Part 1 Understanding Cyber Threats" target="_blank">digital risk management</a> can be handled with one all-inclusive threat intelligence platform that is capable of several different functions. The right platform should have a wide range of viable, diverse datasets to be effective in identifying potential threats. The data must be comprehensive and easy to understand, even for those without any technical background.</p> <p>A strong threat intelligence platform <a href="https://threatintelligenceplatform.com/blog/four-key-considerations-when-choosing-your-threat-intelligence-platform" title="Four Key Considerations When Choosing Your Threat Intelligence Platform">should offer a variety of features</a>, services, APIs and more to acquire the needed datasets about various hosts and their infrastructures. The platforms will gather data about a given host, analyze its configuration, and highlight any suspicious actors or unusual activity. In drawing from both dark and open web, as well as numerous other technical sources, threat intelligence platforms can provide businesses with invaluable data on their brand and their systems to deal with existing issues and be proactive in dealing with threats to come.</p> <p>Threat Intelligence Platform is a <a href="https://threatintelligenceplatform.com/blog/why-your-threat-intelligence-implementation-cant-wait-another-day" title="Why Your Threat Intelligence Implementation Can’t Wait Another Day">great place to start</a> for businesses seeking to protect their interests. In providing the ability to check IP resolution, mail servers, malware, name servers, SSL certificates, website content, and WHOIS data, Threat Intelligence Platform offers businesses the comprehensive tools they need to identify potential problems, be ready for future issues, and safeguard their brand and reputation.</p>
]]></content:encoded>
        </item>
        <item>
            <title>What Role Does a Threat Intelligence Analyst Have in a Company</title>
            <link>https://threatintelligenceplatform.com/what-role-does-a-threat-intelligence-analyst-have-in-a-company</link>
            <pubDate>Sun, 28 Apr 2019 01:00:00 +0000</pubDate>
            <dc:creator>admin</dc:creator>

            <guid isPermaLink="false">https://threatintelligenceplatform.com/blog/?p=2500</guid>
            <description><![CDATA[
            <img width="1000" height="750" src="https://threatintelligenceplatform.com/images/blog/what-role-does-a-threat-intelligence-analyst-have-in-a-company/threat-intelligence-analyst-for-business.jpg" class="webfeedsFeaturedVisual wp-post-image" alt="Threat Intelligence analyst for business" style="display: block; margin: auto; margin-bottom: 25px;max-width: 100%;" />
            <p>Threat intelligence is a rapidly growing field. Evidence-based information is made up of indicators or mechanisms of compromise, implications and advice, regarding emerging or existing threats to valuable assets. <a href="https://www.itworldcanada.com/blog/what-does-it-professional-really-mean/86353" title="What does IT professional really mean?" target="_blank">IT professionals</a> use such intelligence to make decisions, form plans of action and act accordingly.</p>
]]></description>
            <content:encoded><![CDATA[
            <img width="1000" height="750" src="https://threatintelligenceplatform.com/images/blog/what-role-does-a-threat-intelligence-analyst-have-in-a-company/threat-intelligence-analyst-for-business.jpg" class="webfeedsFeaturedVisual wp-post-image" alt="Threat Intelligence analyst for business" style="display: block; margin: auto; margin-bottom: 25px;max-width: 100%;" />
             <p>Threat intelligence is a rapidly growing field. Evidence-based information is made up of indicators or mechanisms of compromise, implications and advice, regarding emerging or existing threats to valuable assets. <a href="https://www.itworldcanada.com/blog/what-does-it-professional-really-mean/86353" title="What does IT professional really mean?" target="_blank">IT professionals</a> use such intelligence to make decisions, form plans of action and act accordingly.</p> <h3>Why is Cyber Threat Intelligence Vital?</h3> <p>While most think <a href="https://threatintelligenceplatform.com/blog/importance-of-threat-intelligence" title="Sources of Threat Intelligence">threat intelligence</a> is an assemblage of indicators of compromise or a listing of limited information about specific threats to security, there's much more to it than that. Many companies don't even have a full understanding of their assets, infrastructures, operations, and personnel so they are quite ignorant of what vulnerabilities they are making available to those with malicious intent.</p> <p>Cyber threat intelligence assists in <a href="https://threatintelligenceplatform.com/blog/how-does-threat-intelligence-benefit-your-organization" title="How Does Threat Intelligence Benefit Your Organization?">identifying vulnerabilities</a> in our procedures so we can be prepared for possible threats. It also helps us identify active attacks and deal with the threat quickly to prevent or minimize damage and data loss.</p> <p>Large corporations hire <a href="https://www.idgconnect.com/idgconnect/opinion/1015318/whats-cyber-intelligence-analyst" title="What's a 'Cyber Intelligence Analyst'?" target="_blank">threat intelligence analysts</a> or outsource such services to help proactively identify risks in their organizations. Analysts run thorough analyses, digital forensics, target adversaries and monitor infrastructures so they can assess, identify and counter dangerous outside threats.</p> <div class="pic-wrapper"> <img src="https://threatintelligenceplatform.com/images/blog/what-role-does-a-threat-intelligence-analyst-have-in-a-company/essential-skills-for-a-threat-intelligence-analyst.jpg" title="Essential skills for a Threat Intelligence analyst" alt="Essential skills for a Threat Intelligence analyst"> </div> <h3>Threat Intelligence Analysts Requirements</h3> <h4>Essential Skills and Background</h4> <p>Professional intelligence offices and cyber threat analysts who apply their scientific and technical knowledge to resolving intricate intelligence problems can provide short- or long-term assessments for corporations and report their findings. Such work requires that the analyst be highly functional, creative, and proactive with a strong technical background.</p> <p>Strong analysts benefit from their ability to ascertain what's true and what's false, aided by their technical skills and interest in cybersecurity. Ideally, those analysts should possess a Bachelor's or Master's degree in computer engineering, computer science, cybersecurity, digital forensics, or telecommunication with a minimum GPA of 3.0 within a 4-point scale. Certifications like Certified Ethical Hacker (CEH) and Offensive Security Certified Professional (OSCP) would be of benefit to such analysts as well.</p> <h4>Hands-on Training</h4> <p><a href="https://threatintelligenceplatform.com/blog/what-to-look-for-in-a-threat-intelligence-platform" title="What to Look for in a Threat Intelligence Platform">Threat intelligence</a> analysts would do well to have strong verbal communication and writing skills as they need to be as clear and concise as possible when passing along the results of an assessment. The analysts will require excellent analytical skills with the ability to consider the conventional and the non-conventional. They should be able to think outside the box.</p> <p>While many think they have what it takes to begin a career as a cyber threat intelligence analyst, they still find that the job is complex, based on trial and error, and time-consuming. The position requires a strong computer background and strong language skills. Most have one or the other, but not often both.</p> <h3>What to Look For</h3> <p>Threat intelligence analysis in a company requires intelligence professionals who use their background, experience, and knowledge of security issues to prevent problems by forming plans of action to fortify security within infrastructures and to effectively deal with active threats. The role they serve is invaluable to companies of all sizes.</p> <p>The most <a href="https://www.recordedfuture.com/smart-threat-intelligence-analysts/" title="7 Habits of Smart Threat Intelligence Analysts" target="_blank">important skill these professionals possess</a> is their analytical skill. When it comes to threat intelligence analysis in a company, it's more of an art form based on insight and intuition as opposed to being an exact science. With the growing number of threats across our global digital landscape, businesses should acquire the services of a reputable threat intelligence service provider like <a href="https://threatintelligenceplatform.com" title="Threat Intelligence Platform - Protection Tools, Services, API's">Threat Intelligence Platform</a> or hire such an analyst to work for them.</p>
]]></content:encoded>
        </item>
        <item>
            <title>Sources of Threat Intelligence</title>
            <link>https://threatintelligenceplatform.com/sources-of-threat-intelligence</link>
            <pubDate>Mon, 15 Apr 2019 01:00:00 +0000</pubDate>
            <dc:creator>admin</dc:creator>

            <guid isPermaLink="false">https://threatintelligenceplatform.com/blog/?p=2400</guid>
            <description><![CDATA[
            <img width="1000" height="750" src="https://threatintelligenceplatform.com/images/blog/sources-of-threat-intelligence/sources-of-threat-intelligence.jpg" class="webfeedsFeaturedVisual wp-post-image" alt="Sources of Threat Intelligence" style="display: block; margin: auto; margin-bottom: 25px;max-width: 100%;" />
            <p>There’s no big surprise here: cybercrime is growing at an alarming rate and experts are only predicting things to get worse in the years to come. The good news is that solutions too are being developed to prevent and reduce the prevalence of online threats. One of these is threat intelligence.</p><p>Threat intelligence, or TI, became a popular term as soon as it came out, but it can mean a slew of different things to many people. This is partly due to the wide range of formats, uses, and qualities for the types of data TI is involved in.</p><p>For companies who want to keep their cybersecurity up-to-date by looking at the <strong>sources of threat intelligence</strong> from different angles is a must do and it could result in big wins — i.e., uninterrupted operations, avoided financial damages, and untarnished reputation.</p><p>Let’s examine the fundamentals of threat intelligence so we can understand how to use it best.</p>
]]></description>
            <content:encoded><![CDATA[
            <img width="1000" height="750" src="https://threatintelligenceplatform.com/images/blog/sources-of-threat-intelligence/sources-of-threat-intelligence.jpg" class="webfeedsFeaturedVisual wp-post-image" alt="Sources of Threat Intelligence" style="display: block; margin: auto; margin-bottom: 25px;max-width: 100%;" />
            <h3>Back to the Sources: The Fundamentals of Threat Intelligence Explained</h3> <p>There’s no big surprise here: cybercrime is growing at an alarming rate and experts are only predicting things to get worse in the years to come. The good news is that solutions too are being developed to prevent and reduce the prevalence of online threats. One of these is threat intelligence.</p> <p>Threat intelligence, or TI, became a popular term as soon as it came out, but it can mean a slew of different things to many people. This is partly due to the wide range of formats, uses, and qualities for the types of data TI is involved in.</p> <p>For companies who want to keep their cybersecurity up-to-date by looking at the <strong>sources of threat intelligence</strong> from different angles is a must do and it could result in big wins — i.e., uninterrupted operations, avoided financial damages, and untarnished reputation.</p> <p>Let’s examine the fundamentals of threat intelligence so we can understand how to use it best.</p> <h4>1. Types of Intelligence Combined</h4> <p>Threat intelligence is primarily composed of three subtypes. These are:</p> <h5>Human intelligence</h5> <p>This category of intelligence makes use of the knowledge and skills of a cybersecurity team to detect threats to their assigned network. Attacks can come in the form of phishing, denial-of-service (DoS), impersonation, and more, and specialists are there to develop and implement preventive measures to improve a company’s cybersecurity.</p> <p>Organizations can get an either in-house or external group to help with information security. Choosing to have an internal team gives you the benefit of retaining more control over the data that you provide as well as the ability to easily supervise tasks and activities and monitor progress.</p> <p>Relying on service providers has its own advantages as well. Perhaps the most common reason why companies hire third parties is that they are already experienced in handling cybersecurity protection from the get-go. As soon as you employ them, these units can get to work right away. You won’t have to allocate time to train them because they are already skilled in what they do.</p> <h5>Signals intelligence (SIGINT)</h5> <p>At present, the protection and detection capacities of most security tools and solutions are based on general intelligence compiled by security researchers. The problem with this approach is that such processes, when known and applied, are very predictable. A smart cybercriminal would simply use an unconventional method of attack to get past basic defenses.</p> <p>Unlike human intelligence, signals intelligence, or SIGINT, is focused on the information obtained through the collection and study of foreign electronic signals and systems. In other words, the approach here is to intercept external raw data which can then be reorganized in non-obvious ways and studied for various purposes — e.g., making the right decisions and even gaining a strategic advantage by keeping processes and protocols hidden from the public.</p> <p>Many intelligence agencies around the world use SIGINT to gather details for both domestic and foreign affairs.</p> <h5>Geospatial intelligence (GEOINT)</h5> <p>Like the two other types of intelligence mentioned above, geospatial intelligence, or GEOINT, also provides some knowledge that can be acted upon. It allows the identification and usage of data in order to evaluate human activities with the help of IP geolocation technology.</p> <p>One of the ways cybersecurity experts use geospatial intelligence is by detecting unauthorized access to their networks at an early stage. The data provides a clear overview of the systems affected by a particular incident while promoting situational awareness throughout organizational departments.</p> <p>Companies can also use the information provided by IP geolocation for activities such as redirecting visitors to another website, customer retention and conversion, and market research.</p> <div class="pic-wrapper"> <img src="https://threatintelligenceplatform.com/images/blog/sources-of-threat-intelligence/what-is-external-threat-intelligence.jpg" title="What Is External Threat Intelligence?" alt="What Is External Threat Intelligence?"> </div> <h4>2. What Is External Threat Intelligence?</h4> <p>External threat intelligence involves the use of the data obtained from third-party sources such as open-source feeds, intelligence-sharing communities, and commercial services. A company must remain vigilant and stay current on the latest updates in these areas to be able to implement an effective cybersecurity defense.</p> <p>Let’s take a look at some ways in which this can be achieved today.</p> <ul> <li><a href="https://threatintelligenceplatform.com/threat-intelligence-apis/domain-malware-check-api" title="Domain Malware Check API - Check Websites for Malware">Domain Malware Check</a> – This API pinpoints risky files and domains by automatically gathering information from popular malware databases. It uses various reputable <strong>sources of threat intelligence</strong> to circumvent different threats such as phishing, dangerous URLs, and others. </li> <li><a href="https://threatintelligenceplatform.com/threat-intelligence-apis/connected-domains-api" title="Connected Domains API - Check Domain Names on Same IP Address">Connected Domains API</a> – Domains and subdomains with similar attributes such as shared servers and IP addresses are retrieved by the API and placed in a list. This allows users to identify and keep an eye on websites that are associated with malicious activities. </li> <li><a href="https://threatintelligenceplatform.com/threat-intelligence-apis/domain-reputation-api" title="Domain Reputation API">Domain Reputation API</a> – The API gathers and studies numerous parameters across various feeds to calculate a reputation score for a given domain name. It evaluates such configurations as IP address infrastructure, SSL certificates, malware analysis, WHOIS records, mail and name servers, and more. The score helps stakeholders understand the gaps in their own systems as well as assess the danger level of the websites they interact with. </li> </ul> <h3>3. What Is Internal Threat Intelligence?</h3> <p>Compared to external threat intelligence, internal threat intelligence is collected from the operations of an organization.</p> <h5>On-the-field data</h5> <p>This information is based on what your cybersecurity team has learned from your organization so far. The area involves fraud investigation and cyber forensics, an approach used to discover and examine digital evidence of a crime. Such on-the-field threat data as incident reports and log files can be leveraged to spot and halt risks before they get worse.</p> <h5>Infrastructure configuration</h5> <p>It’s crucial for organizations to analyze their networks regularly to mitigate risks and prevent vulnerabilities from being exploited. Monitoring mail server feeds, checking domain SSL certifications, and performing website analysis are some of the activities that can help assess potential weaknesses in the system.</p> <div class="custom-hr"></div> <p>Cybercriminals are now using more complex techniques, tools, and approaches capable of outmaneuvering inadequate cybersecurity solutions. That is why proactive practices deploying the right <strong>sources of threat intelligence</strong> are crucial for protecting businesses from ever-evolving cyber attacks.</p> <p>If you’d like to know how threat intelligence can prove beneficial for your organization, contact us today at <a href="mailto:service.desk@threatintelligenceplatform.com">service.desk@threatintelligenceplatform.com</a> or sign up for a trial account.</p>
]]></content:encoded>
        </item>
        <item>
            <title>An Insider Look at the Basics of Threat Intelligence</title>
            <link>https://threatintelligenceplatform.com/an-insider-look-at-the-basics-of-threat-intelligence</link>
            <pubDate>Mon, 01 Apr 2019 01:00:00 +0000</pubDate>
            <dc:creator>admin</dc:creator>

            <guid isPermaLink="false">https://threatintelligenceplatform.com/blog/?p=2300</guid>
            <description><![CDATA[
            <img width="1000" height="750" src="https://threatintelligenceplatform.com/images/blog/an-insider-look-at-the-basics-of-threat-intelligence/an-insider-look-at-the-basics-of-threat-intelligence.png" class="webfeedsFeaturedVisual wp-post-image" alt="An Insider Look at the Basics of Threat Intelligence" style="display: block; margin: auto; margin-bottom: 25px;max-width: 100%;" />
            <p>We have often heard it name-dropped during security planning meetings. The term “threat intelligence” has an intriguing flair to it and is starting to get lots of attention. In fact, threat intelligence investments keep going up year after year. Let’s dig into the subject and find out why.</p>
]]></description>
            <content:encoded><![CDATA[
            <img width="1000" height="750" src="https://threatintelligenceplatform.com/images/blog/an-insider-look-at-the-basics-of-threat-intelligence/an-insider-look-at-the-basics-of-threat-intelligence.png" class="webfeedsFeaturedVisual wp-post-image" alt="An Insider Look at the Basics of Threat Intelligence" style="display: block; margin: auto; margin-bottom: 25px;max-width: 100%;" />
             <p>We have often heard it name-dropped during security planning meetings. The term “threat intelligence” has an intriguing flair to it and is starting to get lots of attention. In fact, threat intelligence investments keep going up year after year. Let’s dig into the subject and find out why.</p> <h3>What Is Threat Intelligence and What Is It for?</h3> <p>Threat intelligence is the knowledge gained from collecting evidence-based data on security threats and the vulnerability points that increase the risk of them occurring, and it can be used to quickly decide on the necessary responses to counter these cyber dangers.</p> <p>Sources of TI data include facts on websites, such as domain owners, IP addresses, visitors’ geolocation, the status of SSL certificates and more. Threat intelligence software promptly analyzes online assets and provides insights that users can act upon. An invalid SSL certificate, for example, makes website forgery far more likely and should trigger a preemptive defensive response.</p> <h3>What Are the Most Common Myths about Threat Intelligence?</h3> <p>Even though many organizations have already gravitated towards TI and the practice has become quite popular, it is still surrounded by myths and exaggerated expectations. Here are some of the most prevalent ones.</p> <h4>Myth 1 — TI does little for cybersecurity</h4> <p>Reality: Attackers don’t stop hatching and launching new threats. Malware is getting more vicious and harder to combat while ransomware damage costs are predicted to hit <a href="https://cybersecurityventures.com/ransomware-damage-report-2017-part-2/" title="Global Ransomware Damage Costs Predicted To Hit $11.5 Billion By 2019" target="_blank">$11.5 billion in 2019</a>. Investing in TI allows companies to be proactive in their cybersecurity efforts by detecting vulnerabilities in their own infrastructure and spotting risks outside their traditional security perimeters.</p> <h4>Myth 2 — Threat intelligence is all about data feeds</h4> <p>Reality: Even though feeds are at the core of threat intelligence, simply reviewing raw data is not enough. The practice is about making sense of this information, putting it into context and correlating this knowledge with where the company stands, what its most valuable assets are, and the vulnerabilities that attackers might exploit. What’s more, necessary actions must then be taken to fix the weak links and reinforce suboptimal practices, or the number of damaging cyber attacks will not go down.</p> <h4>Myth 3 — TI is a redundant practice, as cybersecurity efforts will do</h4> <p>Reality: As the bad actors’ level of sophistication keeps advancing, searching for threats has become more complicated. When sticking exclusively to traditional measures, cybersecurity departments may act reactively and overlook upcoming attacks. Teams equipped with TI insights, on the other hand, can quickly analyze their situation so threats can be identified and acted upon in a timely manner.</p> <div class="pic-wrapper"> <img src="https://threatintelligenceplatform.com/images/blog/an-insider-look-at-the-basics-of-threat-intelligence/how-can-threat-intelligence-be-evaluated.png" title="How Can Threat Intelligence Be Evaluated?" alt="How Can Threat Intelligence Be Evaluated?"> </div> <h3>How Can Threat Intelligence Be Evaluated?</h3> <p>In order to evaluate what kind of TI your business needs, consider the three attributes that threat intelligence possesses.</p> <p>First, its tactical characteristic. It should supply information specific to what your organization needs, and in a ready-to-use format.</p> <p>Secondly, it should provide context relevant to your sector. For instance, if you are a payment processor, you won’t need information targeting the music industry.</p> <p>Third, and most important, it should support the automatic sharing of data for quick collaboration and decision-making. In this regard, having an API is essential for effective communication.</p> <h3>Who Can Benefit from Threat Intelligence?</h3> <p>The first category of those who can benefit from TI is, of course, large corporations. Having too much to lose, these companies recognize the advantages of the practice. And as losses from global attacks on big businesses escalate each year, they will continue to rely heavily on TI insights.</p> <p>Looking at a specific context, the financial industry is on the radar of cybercriminals and, therefore, can greatly benefit from TI. Since they process multiple transactions worth loads of money, financial businesses and departments are the frequent targets of ransomware and spoofing. For that reason, such companies and divisions are required to constantly stay posted on the movements of threat actors and their criminal networks, as well as to monitor their own perimeters for weaknesses.</p> <p>However, TI can also help small businesses deal with cybercrime. Since these companies think they are not attractive for hackers and do not have enough resources to implement essential cybersecurity measures, they may become easy targets for perpetrators. Threat intelligence can greatly help these firms by warning them about imminent threats and identifying exploitable gaps.</p> <h3>Can Companies Survive Without Threat Intelligence?</h3> <p>Cyber-attacks have become a leading threat to businesses and brands. Organizations increasingly realize that leveraging real-time threat intelligence can strengthen their security posture. However, having TI only helps if we can understand the data. This requires investing in professionals who can quickly analyze the information and come up with actionable solutions.</p> <p>So, can businesses afford not to have TI? Only if being proactive is not high on the list of the company’s cybersecurity strategy.</p> <div class="custom-hr"></div> <p>Many questions continue to be asked about threat intelligence, but one answer remains the same — it’s a vital resource required by the times. TI will continue to evolve to identify the continually changing threats that it was designed to warn us against.</p> <p>Would you like more inside information about how TIP can help you block malware and other threats? <br>Contact us at <a href="mailto:service.desk@threatintelligenceplatform.com">service.desk@threatintelligenceplatform.com</a> or <a href="https://threatintelligenceplatform.com/signup">sign up for a free trial</a>.</p>
]]></content:encoded>
        </item>
        <item>
            <title>Threat Hunting for Professionals: The One-Stop Guide to Get Started</title>
            <link>https://threatintelligenceplatform.com/threat-hunting-for-professionals-the-one-stop-guide-to-get-started</link>
            <pubDate>Thu, 28 Mar 2019 01:00:00 +0000</pubDate>
            <dc:creator>admin</dc:creator>

            <guid isPermaLink="false">https://threatintelligenceplatform.com/blog/?p=2200</guid>
            <description><![CDATA[
            <img width="1000" height="750" src="https://threatintelligenceplatform.com/images/blog/threat-hunting-for-professionals-the-one-stop-guide-to-get-started/threat-hunting-for-professionals-the-one-stop-guide-to-get-started.png" class="webfeedsFeaturedVisual wp-post-image" alt="Threat Hunting for Professionals: The One-Stop Guide to Get Started" style="display: block; margin: auto; margin-bottom: 25px;max-width: 100%;" />
            <p>It’s time to reconsider conventional cybersecurity approaches, and here’s where a practice known as threat hunting comes in. When deployed correctly, it becomes a powerful weapon in the battle against cybercrime. Let’s find out how.</p>
]]></description>
            <content:encoded><![CDATA[
            <img width="1000" height="750" src="https://threatintelligenceplatform.com/images/blog/threat-hunting-for-professionals-the-one-stop-guide-to-get-started/threat-hunting-for-professionals-the-one-stop-guide-to-get-started.png" class="webfeedsFeaturedVisual wp-post-image" alt="Threat Hunting for Professionals: The One-Stop Guide to Get Started" style="display: block; margin: auto; margin-bottom: 25px;max-width: 100%;" />
             <p>Are hackers getting smarter or is there something wrong with cybersecurity?</p> <p>Here are a few hard truths. The losses caused by cybercrime continue to increase around the world — reaching billions of dollars’ worth of damage every year. Additionally, while businesses keep putting a lot of money into cybersecurity, there isn’t always a clear sign that investments are paying off.</p> <p>Why is that? Well, one reason is that cybercriminals are constantly learning how to get around traditional defenses, and let’s face it, they are really good at it.</p> <p>So how can individuals and organizations protect their confidential data? Is there anything that can be done to identify vulnerabilities before it’s too late?</p> <p>Perhaps it’s time to reconsider conventional cybersecurity approaches, and here’s where a practice known as threat hunting comes in. When deployed correctly, it becomes a powerful weapon in the battle against cybercrime. Let’s find out how.</p> <div class="custom-hr"></div> <h5>Table of contents</h5> <ul> <li><a href="#The-current-landscape-of-threat-hunting">The current landscape of threat hunting</a></li> <li><a href="#What-is-threat-hunting">What is threat hunting?</a></li> <li><a href="#The-threat-hunting-process">The threat hunting process</a></li> <li><a href="#Hunting-Modern-Threats-with-Threat-Intelligence">Hunting modern threats with threat intelligence</a></li> <li><a href="#Best-practices-for-a-productive-hunt">Best practices for a productive hunt</a></li> <li><a href="#Demo-Getting-insights-for-the-hunt">Demo: Getting insights for the hunt</a></li> <li><a href="#3-Real-word-examples">3 Real-word examples</a></li> <li><a href="#Concluding-thoughts">Concluding thoughts</a></li> </ul> <div class="custom-hr"></div> <h3 id="The-current-landscape-of-threat-hunting">The Current Landscape of Threat Hunting</h3> <p>The problem with many organizations today is that their stance towards threats is more reactive than proactive. For many, looking out for online dangers is a new thing to do. So when attacks occur, businesses are thrown off balance.</p> <p>Threat hunting aims to put an end to reactive practices. Even though it’s a relatively new technique, it’s already starting to gain traction in various industries. In fact, one of the latest SANS Institute surveys shows that more than <a href="https://www.sans.org/reading-room/whitepapers/analyst/2018-threat-hunting-survey-results-38600" title="Analyst Papers" target="_blank">40% of companies</a> are already actively performing threat hunting operations.</p> <p>However, the term still is quite unfamiliar to many and is surrounded by myths and misconceptions. So let’s take a closer look at how threat hunting emerged, what it is, and what it’s not.</p> <div class="pic-wrapper"> <img src="https://threatintelligenceplatform.com/images/blog/threat-hunting-for-professionals-the-one-stop-guide-to-get-started/what-is-threat-hunting.png" title="What is Threat Hunting?" alt="What is Threat Hunting?"> </div> <h3 id="What-is-threat-hunting">What is Threat Hunting?</h3> <p>It’s hard to trace the origins of the practice back to a particular year, but it’s fair to conclude that it all started when experts <a href="https://www.csoonline.com/article/3269779/cyber-attacks-espionage/who-wants-to-go-threat-hunting.html" title="Who wants to go threat hunting?" target="_blank">began collaborating against nation-state attacks</a>.</p> <p>The term ‘threat hunting’, though, has a more specific history. It was first mentioned in 2011 in Information Security Magazine <a href="http://docs.media.bitpipe.com/io_24x/io_24618/item_370437/informationsecurity_july_aug2011_final.pdf" target="_blank">article</a> entitled “Become a Hunter.” A memorable point in the article was that counter-threat operations are necessary to better fight back against cyber attacks.</p> <p>The author further mentioned that companies would have to be active in hunting trespassers within their enterprise and highlighted two forms of intruders: external or persistent threats and internal actors that take advantage of their access privileges.</p> <h4>Common misconceptions of threat hunting</h4> <p>Before digging into the modern definition of the practice, it’s critical to dispel doubts and debunk some popular myths.</p> <h5>1. Threat hunting is a reactive approach and is similar to incident response.</h5> <p>Not quite true. On the contrary, it is about taking charge of a company’s defenses and being proactive throughout the process. Threat hunting professionals think ahead and assume that dangerous elements can always get past even the sturdiest of IT fortifications and that the infrastructure can be breached without any alerts sent. Hunters create hypotheses based on threat intelligence analysis and act on them to figure out where possible trespassers may be lurking.</p> <h5>2. Threat hunting can be fully automated.</h5> <p>This is far from the truth since the activity itself requires the intelligence of human analysts and investigations to be based on hypotheses. One of the main purposes of threat hunting is actually to identify the aspects that may have been overlooked by automated reactive systems.</p> <h5>3. Threat hunting efforts can’t be measured.</h5> <p>That isn’t correct either. There are a few criteria that can be measured, such as the number of dangerous instances identified and the reduction of dwell time thanks to early detection. The maturity of the team can also be estimated in a way — e.g., by viewing the number of unique hypotheses, data sources used, completed hunts, unique hypotheses tested, and findings reported.</p> <h4>Internal vs. external threat hunting</h4> <p>The practice can either be outsourced or applied as an internal program. But in order to decide which one would work best in each individual case, it’s important to learn about the advantages and disadvantages of these two approaches.</p> <div class="common-tbl-wrapper white-paper-tbl-wrapper"> <table class="common-table"> <thead> <tr> <th></th> <th>Pros</th> <th>Cons</th> </tr> </thead> <tbody> <tr> <td>Internal threat hunting: <span class="span-no-wrap">Deploying in-house</span> teams and protocols to proactively spot network vulnerabilities and threats</td> <td> <ul> <li>Internal teams are already familiar with the company and its processes.</li> <li>An internal cybersecurity team is more cost-effective in the long run.</li> </ul> </td> <td> <ul> <li>Training teams from the ground up might be required.</li> <li>Constant supervision can be time-consuming and resource-intensive.</li> <li>Internal teams’ responses are not always accurate due to the lack of experience or advanced tools.</li> </ul> </td> </tr> <tr> <td>External threat hunting: <span class="span-no-wrap">Outsourcing the</span> practice to a service provider</td> <td> <ul> <li>Expert services mean more accurate and timely response.</li> <li>Outsourcing allows companies to focus on their core activities.</li> </ul> </td> <td> <ul> <li>Hiring a third-party threat hunting team can be costly.</li> <li>There’s a higher risk of business data leakage when involving a third party.</li> </ul> </td> </tr> </tbody> </table> </div> <h4>The definition of threat hunting</h4> <p>With all of the above in mind, we see threat hunting as...</p> <p><em>“The practice of proactively searching and identifying cyber threats at the earliest possible phase of an attack. It involves leveraging threat intelligence to identify gaps within and outside enterprise perimeters, as well as following analytical practices and implementing the right security tools.”</em></p> <h3 id="The-threat-hunting-process">Five Steps of Threat Hunting</h3> <p>Now that you’ve got an idea of what threat hunting is all about, let’s take a closer look at how it works in practice. It’s important to remember that threat hunting is not a one-off initiative but a multi-stage, continuous process which can be broken down into several steps. Let’s examine them one by one.</p> <div class="common-tbl-wrapper"> <table class="common-table centered"> <thead> <tr> <th>Step 1</th> <th>Step 2</th> <th>Step 3</th> <th>Step 4</th> <th>Step 5</th> </tr> </thead> <tbody> <tr> <td>Hunt preparation</td> <td>Hypothesis</td> <td>Pattern validation</td> <td>Immediate actions</td> <td>Knowledge sharing</td> </tr> </tbody> </table> </div> <h4>1. Prepare for hunting</h4> <p>The team assigned to perform the task gets equipped with the proper threat intelligence data and information about the current organization’s environment including its policies, guidelines, data about previous incidents, and the like.</p> <h4>2. Generate hypothesis</h4> <p>Once preparation is complete, the next step is the generation of hypotheses. What systems or accounts are the most likely to be targeted? What could be the attackers’ techniques and their corresponding probability of happening? Decisions can then be made regarding the instruments or tools required to verify these hypotheses.</p> <h4>3. Validate hypotheses and uncover patterns</h4> <p>At this stage, teams find out about the latent threats connected to hypotheses. This means that some hypotheses at this point have already been discarded while others are being prioritized. After an attack has been identified, the next step is to reconstruct it and find new tactics and patterns that were used to make it happen.</p> <h4>4. Acting upon discoveries</h4> <p>Once a breach or vulnerability is detected, it’s important to take immediate action. This may take different forms depending on what has been found. For instance, if the vulnerability is spotted in the infrastructure, threat hunters should contact a security team to patch and resolve it. In the event of a breach, an incident response team should take charge and respond.</p> <h4>5. Enrich systems and disseminate knowledge</h4> <p>The final step in threat hunting is making all data regarding the vulnerabilities, threats, and patterns available to the rest of the organization. The rationale for this is to share the knowledge on how to counteract threats and keep the company’s network defenses moving forward.</p> <div class="pic-wrapper"> <img src="https://threatintelligenceplatform.com/images/blog/threat-hunting-for-professionals-the-one-stop-guide-to-get-started/hunting-modern-threats-with-threat-intelligence.png" title="Hunting Modern Threats with Threat Intelligence" alt="Hunting Modern Threats with Threat Intelligence"> </div> <h3 id="Hunting-Modern-Threats-with-Threat-Intelligence">Hunting Modern Threats with Threat Intelligence</h3> <p>Finding cyber threats is no simple feat. The good news is that aspiring threat hunting teams can perform threat intelligence analysis to learn about the current threat landscape and, therefore, come up with better hypotheses. Below are some examples of the modern dangers that threat intelligence is able to detect.</p> <h4>Impersonation</h4> <p>This type of attack is a malicious practice where the perpetrator assumes the identity of a third party — a business entity, a supplier, or even an employee. Impersonation takes various forms from website forgery to business email compromise (BEC) scams.</p> <p>The threat could seriously harm business reputation and cause substantial financial losses. In 2018, damages from BEC <a href="https://www.ic3.gov/media/2018/180712.aspx" title="BUSINESS E-MAIL COMPROMISE THE 12 BILLION DOLLAR SCAM" target="_blank">reached $12.5 billion</a>, according to the FBI’s latest public service announcement. Let’s take a look at some ways threat intelligence analysis can help detect such attempts.</p> <div class="common-tbl-wrapper white-paper-tbl-wrapper"> <table class="common-table"> <thead> <tr> <th>Actions</th> <th>Parameters to examine</th> </tr> </thead> <tbody> <tr> <td>Carry out SSL configuration analysis</td> <td> <ul> <li>The hostname and certificates need to be updated and validated. Recent certificates should serve as a red flag as these might just have been acquired by a malicious third party.</li> <li>HTTP Public Key Pinning headers need to be set as they allow resisting to impersonation.</li> <li>Checking for certificate revocation which can be done by CRL (Certificate Revocation List) to review the status of all the certificates; or OCSP (Online Certificate Status Protocol), which allows asking for the status of a specific certificate signed by a particular issuer.</li> </ul> </td> </tr> <tr> <td>Evaluate WHOIS records</td> <td> <ul> <li>Newly registered domain names should be monitored for name similarities with popular brands and companies.</li> <li>Contact details should be inspected for consistency across touchpoints.</li> <li>Domain history should be examined to detect suspicious activities like multiple changes of domain owners in a short time span.</li> </ul> </td> </tr> </tbody> </table> </div> <h4>Man in the middle</h4> <p>A man-in-the-middle attack occurs when hackers secretly intercept communication amongst two parties to obtain confidential information. A notable example of this was when cybercriminals <a href="https://www.telegraph.co.uk/finance/personalfinance/borrowing/mortgages/11605010/Fraudsters-hacked-emails-to-my-solicitor-and-stole-340000-from-my-property-sale.html" title="'Fraudsters hacked emails to my solicitor and stole £340,000 from my property sale'" target="_blank">swindled more than £300,000</a> out of a British couple during their property sale. The act involved perpetrators hacking into the owner’s email, impersonating the owner, and informing the financial institution to send money to a different account. </p> <div class="common-tbl-wrapper white-paper-tbl-wrapper"> <table class="common-table"> <thead> <tr> <th>Actions</th> <th>Parameters to examine</th> </tr> </thead> <tbody> <tr> <td>Analyze SSL configurations</td> <td> <ul> <li>Self-signed certificates need to be checked and, if detected, additional website scanning might be required as these certificates are often used by malicious hosts.</li> <li>In particular, SSLv2 and SSLv3 protocols must be avoided as these were deprecated due to several security flaws as well as TLSv1.0 and TLSv1.1 which are still used in production.</li> <li>TLSv1.2 protocols should be used and enabling TLSv1.3 support would be a big plus as usage of the updated TLS protocols helps protect valuable data and is required by the PCI Compliance standards.</li> <li>Public key certificates must not be present in the Debian blacklist as some certificates generated on Debian Linux systems are weak and allow for attacks to take place.</li> <li>Certificate revocation should be checked using the OCSP and CRL protocols. This is important to let end users know they should not trust the certificate of a particular website.</li> </ul> </td> </tr> </tbody> </table> </div> <h4> Phishing</h4> <p>In its basic form, phishing is the act of sending fraudulent communications whose sources seem reputable but are intended to deceive its recipients. It is the most common method for hackers to get confidential or sensitive information. In fact, phishing is used <a href="https://www.symantec.com/content/dam/symantec/docs/reports/istr-23-2018-en.pdf" title="ISTR Volume 23" target="_blank">in more than 70% of cases</a> by attacking groups according to Symantec.</p> <div class="common-tbl-wrapper white-paper-tbl-wrapper"> <table class="common-table"> <thead> <tr> <th>Actions</th> <th>Parameters to examine</th> </tr> </thead> <tbody> <tr> <td>Conduct infrastructure analysis</td> <td> <ul> <li>Red flags in the infrastructure behind the target domain (its web server, subdomains' servers, mail servers, and name servers), for instance, unusual geolocation or subnetwork information.</li> </ul> </td> </tr> <tr> <td>Inspect WHOIS data</td> <td> <ul> <li>Recently registered domain names which may have similarities with well-known companies and brands must be monitored.</li> <li>Recent registration dates should be looked at with scrutiny as malicious websites are usually new.</li> <li>Unusual domain activities such as switching hosting providers on several occasions in a short period should be examined.</li> </ul> </td> </tr> <tr> <td>Inspect mail servers</td> <td> <ul> <li>Check if Sender Policy Framework (SPF) is configured, as it allows to detect forged email addresses.</li> </ul> </td> </tr> </tbody> </table> </div> <h4>Malware</h4> <p>Malicious software, or simply malware, is a term that describes software or code that is intended to harm computer systems. These programs are capable of stealing sensitive information, deleting important files, or even causing systems to stop working entirely. Based on a study by AV-TEST Institute, the numbers of new malware detected <a href="https://www.av-test.org/fileadmin/pdf/security_report/AV-TEST_Security_Report_2017-2018.pdf" title="SECURITY REPORT 2017/18" target="_blank">have doubled between 2018 and 2017</a>.</p> <div class="common-tbl-wrapper white-paper-tbl-wrapper"> <table class="common-table"> <thead> <tr> <th>Actions</th> <th>Parameters to examine</th> </tr> </thead> <tbody> <tr> <td>Examine infrastructure</td> <td> <ul> <li>Carry out infrastructure analysis of the target domain and inspect its web server, subdomains' servers, mail servers, and name servers — e.g., check subdomains of the target domains, check name servers location, or learn if domain names share the servers with known malicious domains.</li> </ul> </td> </tr> <tr> <td>Scan websites for potentially dangerous files</td> <td> <ul> <li>.exe or .apk files uploaded on the page must be identified and carefully examined. .exe files are capable of running a malicious code while .apk files are potentially harmful and part of Android applications unauthorized by Google Play.</li> </ul> </td> </tr> <tr> <td>Double-check malware databases</td> <td> <ul> <li>Inspect malware databases to see if the website is flagged on any of them.</li> </ul> </td> </tr> <tr> <td>Scrutinize malware scores</td> <td> <ul> <li>A high score means the website is safe to visit while a low one indicates that additional investigation is essential.</li> </ul> </td> </tr> </tbody> </table> </div> <div class="pic-wrapper"> <img src="https://threatintelligenceplatform.com/images/blog/threat-hunting-for-professionals-the-one-stop-guide-to-get-started/best-practices-for-a-productive-hunt.png" title="Best Practices for a Productive Hunt" alt="Best Practices for a Productive Hunt"> </div> <h3 id="Best-practices-for-a-productive-hunt">Best Practices for a Productive Hunt</h3> <p>Now that you are aware of these modern threats, let’s move on to the best practices in threat hunting. So how do you get the most of it?</p> <p><strong>Know your environment</strong> – A prerequisite to spotting abnormal activities in your system is an understanding of its normal operational activities. It’s essential that threat hunters spend a good amount of time examining the whole architecture of their organization.</p> <p><strong>Think like a hacker</strong> – A professional threat hunter must be able to step into the shoes of an attacker in order to anticipate his next moves. More specifically, a good specialist will profile different types of hackers, emulate their motivations, analyze what assets these criminal might be after, and what tactics they are likely to deploy.</p> <p><strong>Use quality data and resources</strong> – Leveraging data from a wide range of sources is important to keep visibility throughout the threat hunting process. This helps hunters comprehend their operational environment and quantify vulnerabilities to prepare plans to counteract incoming threats.</p> <p><strong>Ensure endpoint security</strong> – Threat hunters have to monitor network devices and other endpoints to safeguard their security perimeters and keep control over all activities, authorizations, and software used in the company. Negligence in any area could lead to gaps cybercriminals can exploit elsewhere.</p> <p><strong>Interact with colleagues and IT personnel</strong> – Considering the human factor is crucial to the overall success of the practice. This means threat hunting specialists should collaborate closely with their IT staff not only when incidents occur, but on a regular basis to understand how systems operate and detect their most exploitable weaknesses.</p> <p><strong>Keep up with the cyber landscape</strong> – Threat actors are always looking for new ways to perform attacks and abuse security systems. Keeping up with them requires threat hunters to stay forearmed with up-to-date threat intelligence so they won’t be left behind.</p> <p><strong>Do not let your guard down</strong> – On top of it all, stay alert to signs of suspicious activities, remembering that cybercriminals are getting more creative with their attacks.</p> <h3 id="Demo-Getting-insights-for-the-hunt">Demo: Getting Insights for the Hunt</h3> <p>As part of threat hunting activities, teams need comprehensive data to make sense of the cybersecurity landscape. For that purpose, threat intelligence reports can provide hunters with a wide range of information on risks and threats and help red-flag suspicious items for further investigation.</p> <p>To get a deeper understanding of the topic, here are several ways how Threat Intelligence Platform can enrich threat hunting practices today.</p> <h4>Inspecting a domain’s locations</h4> <p>A threat intelligence analysis report lets you see the graphical distribution of IPs to confirm their locations. For example, imagine that a distributor is looking to sign a deal with a manufacturer. Say, a pharmaceutical company claims to be exclusively operating in one country, but the prospective partner just wants to make sure.</p> <p>After the analysis was made on its networks, it turns out that the manufacturer also has IP addresses in another location. An assigned threat hunter can look further into that and investigate the reason why.</p> <div class="pic-wrapper hovered"> <img src="https://threatintelligenceplatform.com/images/blog/threat-hunting-for-professionals-the-one-stop-guide-to-get-started/image4-23.jpeg" title="Inspecting a domain’s locations" alt="Inspecting a domain’s locations"> </div> <h4>Examining domains connected to a target website</h4> <p>A popular tactic used by hackers is to set up a group of websites under a single IP address. If a threat hunter identifies one as risky, it’s particularly important to do proper research and see whether it’s part of a bigger cluster of dangerous domains.</p> <p>Let’s say a threat hunter named John has identified a suspicious website. He can use a threat intelligence platform to perform a detailed analysis of the target and see what other domains are connected to it.</p> <p>Once he has received a report of all related websites, John can send it off to his cybersecurity specialists who can then input the data into the company’s cyberdefense system – flagging all marked domains as risky to visit or interact with.</p> <div class="pic-wrapper hovered"> <img src="https://threatintelligenceplatform.com/images/blog/threat-hunting-for-professionals-the-one-stop-guide-to-get-started/image5-25.jpeg" title="Examining domains connected to a target website" alt="Examining domains connected to a target website"> </div> <h4>Recognizing potentially dangerous content</h4> <p>Another way a threat hunter can understand the threat landscape is by examining websites for potentially dangerous content.</p> <p>Threat hunter Jane, for instance, wants to make sure that the websites her workmates frequently visit do not contain malware. She uses an analysis tool to check .apk files or programs that can run malicious codes, .exe files or software that can install unwanted applications on systems, or iframes which could be used to inject undesirable scripts.</p> <div class="pic-wrapper hovered"> <img src="https://threatintelligenceplatform.com/images/blog/threat-hunting-for-professionals-the-one-stop-guide-to-get-started/image6-27.jpeg" title="Recognizing potentially dangerous content" alt="Recognizing potentially dangerous content"> </div> <h4>Checking for SSL vulnerabilities</h4> <p>Jim needs to share critical information about his company to a third party, but he is unsure if that party’s site can be trusted. He employs a threat hunting team which performs an SSL configuration analysis on the target before proceeding.</p> <p>The team comes back with a report which shows several warnings. For instance, both the site’s hostname validation and TLS_FALLBACK_SCSV are flagged red. This means that there is some discrepancy in the validity of the target’s security certificate and that the website is not secure from POODLE attacks — making it susceptible to impersonation.</p> <p>He also notices that the heartbeat extension under SSL vulnerabilities is not enabled, opening up the possibility of a Heartbleed bug entering the network and stealing sensitive data.</p> <p>This information makes Jim postpone the decision to work with the third party as it appears to have several exploitable gaps that can result in a data breach.</p> <div class="pic-wrapper hovered"> <img src="https://threatintelligenceplatform.com/images/blog/threat-hunting-for-professionals-the-one-stop-guide-to-get-started/image7-29.jpeg" title="Checking for SSL vulnerabilities" alt="Checking for SSL vulnerabilities"> </div> <div class="pic-wrapper hovered"> <img src="https://threatintelligenceplatform.com/images/blog/threat-hunting-for-professionals-the-one-stop-guide-to-get-started/image8-31.jpeg" title="Checking for SSL vulnerabilities" alt="Checking for SSL vulnerabilities"> </div> <h4>Looking into malware databases</h4> <p>When threat hunters are performing threat intelligence, some processes can be automated to make things simpler. Consider, for instance, threat hunter Mike who has a hypothesis regarding a suspicious website.</p> <p>To confirm or disprove this hypothesis and make sure his company’s network doesn’t get infected, he runs the website through a malware detection process that automatically checks malware data feeds across the Web. The returned report will inform him whether the target domain is considered risky or safe.</p> <p>As seen below, the analysis results came back all green, which means the website Mike had suspicions on doesn’t contain malicious software.</p> <div class="pic-wrapper hovered"> <img src="https://threatintelligenceplatform.com/images/blog/threat-hunting-for-professionals-the-one-stop-guide-to-get-started/image9-33.jpeg" title="Looking into malware databases" alt="Looking into malware databases"> </div> <h4>Deep insights from WHOIS records</h4> <p>Leveraging WHOIS data is another way for threat hunters to gain some knowledge about an online entity. Since domain records contain a number of critical details such as domain registry information, owner’s contact details, location and more, which could be crucial in detecting suspicious activities.</p> <p>Let’s say, Phillip, a business owner, plans to transact with a financial agency claiming to have been in the industry for 10 years. He asks someone in his team with threat hunting experience to look into the case. The hunter then performs threat intelligence analysis and inspects the WHOIS data feed of the report.</p> <p>Upon reviewing the domain record, it turns out that the company has only been around for a few months and that the domain owner’s contact details are not consistent with what is indicated on the agency’s website — possibly meaning that the company hasn’t been totally honest with Phillip who is now having second thoughts about its identity and credibility.</p> <div class="pic-wrapper hovered"> <img src="https://threatintelligenceplatform.com/images/blog/threat-hunting-for-professionals-the-one-stop-guide-to-get-started/image10-35.jpeg" title="Deep insights from WHOIS records" alt="Deep insights from WHOIS records"> </div> <h4>Performing internal infrastructure analysis</h4> <p>Karen, a newly-hired company engineer, is assigned to do a thorough check of her organization’s infrastructure to detect any present vulnerabilities in their website configurations.</p> <p>She starts by performing an infrastructure and malware analysis — looking at connected domains, notably on the same IP. The first two domains on the same IP don’t have any major red flags. However, the urbrandmx.com domain is blacklisted and may potentially contain malware.</p> <div class="pic-wrapper hovered"> <img src="https://threatintelligenceplatform.com/images/blog/threat-hunting-for-professionals-the-one-stop-guide-to-get-started/image11-37.jpeg" title="Performing internal infrastructure analysis" alt="Performing internal infrastructure analysis"> </div> <div class="pic-wrapper hovered"> <img src="https://threatintelligenceplatform.com/images/blog/threat-hunting-for-professionals-the-one-stop-guide-to-get-started/image12-39.jpeg" title="Performing internal infrastructure analysis" alt="Performing internal infrastructure analysis"> </div> <p>Particular attention is paid to the company’s mail servers. The report below shows that Karen’s company doesn’t have DMARC (Domain-based Message Authentication, Reporting, and Conformance) configured. This is particularly important as this validation system is designed to detect and stop email spoofing. Apart from that, Karen is also notified that their mail settings aren’t up to Google’s standards. The good news is that their mail servers aren’t blacklisted anywhere and name servers return identical MX records.</p> <div class="pic-wrapper hovered"> <img src="https://threatintelligenceplatform.com/images/blog/threat-hunting-for-professionals-the-one-stop-guide-to-get-started/image13-41.jpeg" title="Performing internal infrastructure analysis" alt="Performing internal infrastructure analysis"> </div> <p>Next, Karen looks into the name servers. Among other parameters, she checks the name servers’ location and inspects stealth name servers since misconfigurations here might result in unpredictable behavior. As seen from the screenshot below, her company’s name servers successfully passed the configuration check and, for now, they appear safe for use.</p> <p>The only parameter that is not up to the recommended standards is the Minimum TTL (time-to-live) whose value is not within the recommended range. TTL is an essential setting in every DNS record that indicates how long a record has been cached by a DNS server.</p> <div class="pic-wrapper hovered"> <img src="https://threatintelligenceplatform.com/images/blog/threat-hunting-for-professionals-the-one-stop-guide-to-get-started/image14-43.jpeg" title="Performing internal infrastructure analysis" alt="Performing internal infrastructure analysis"> </div> <h3 id="3-Real-word-examples">3 Real-World Examples</h3> <p>In this section, let’s take a closer look at a few known malicious domains to illustrate what red flags and warnings a threat intelligence analysis can unveil.</p> <h4>#1 Malware detected</h4> <p>In 2018, 2SPYWARE, a portal providing cybersecurity news, warned their readers about mail.ru being a potentially dangerous page containing the virus Go.mail.ru. Once downloaded, the virus would operate as a browser hijacker — notably aiming Google Chrome and Mozilla Firefox — and redirect users to unintended web pages and search results.</p> <p>As seen in the screenshots below, the website is flagged as containing phishing and spam content as well as redirects potentially leading to malicious websites. What’s more, the page appears to have scripts attempting to open up new windows without users’ consent.</p> <div class="pic-wrapper hovered w-self"> <img src="https://threatintelligenceplatform.com/images/blog/threat-hunting-for-professionals-the-one-stop-guide-to-get-started/image15-45.jpeg" title="#1 Malware detected" alt="#1 Malware detected"> </div> <div class="pic-wrapper hovered w-self"> <img src="https://threatintelligenceplatform.com/images/blog/threat-hunting-for-professionals-the-one-stop-guide-to-get-started/image16-47.jpeg" title="#1 Malware detected" alt="#1 Malware detected"> </div> <h4>#2 High-risk SSL certificates</h4> <p>In January 2019, ethereumcv.io and etcv-wallet.com were flagged as scam sites after a victim shared his negative experience on Reddit. At first sight, ethereumcv.io looked legitimate and even had a roadmap and a white paper.</p> <p>Upon browsing, however, the page redirected the visitor to his online wallet, prompting him to claim 3 ETVC coins in exchange for 1 ETH. It was during that procedure that private keys were stolen — permitting the theft of 131 ETH coins.</p> <p>Running the domains through a threat intelligence analysis, both corresponding websites failed to validate their SSL certificate and revealed other vulnerabilities including headers not set for HTTP public key pinning extension, non-enforced HTTPS connections, a non-configured TLSA DNS record, and non-enabled OCSP stapling.</p> <p>Furthermore, the “domain check” portion of the report also reveals that both sites are newly-registered with their location of registry identified in Panama and contact details hidden — all of which are potential signs of malicious activities.</p> <div class="pic-wrapper hovered"> <img src="https://threatintelligenceplatform.com/images/blog/threat-hunting-for-professionals-the-one-stop-guide-to-get-started/image17-49.jpeg" title="#2 High-risk SSL certificates" alt="#2 High-risk SSL certificates"> </div> <div class="pic-wrapper hovered"> <img src="https://threatintelligenceplatform.com/images/blog/threat-hunting-for-professionals-the-one-stop-guide-to-get-started/image18-51.jpeg" title="#2 High-risk SSL certificates" alt="#2 High-risk SSL certificates"> </div> <div class="pic-wrapper hovered"> <img src="https://threatintelligenceplatform.com/images/blog/threat-hunting-for-professionals-the-one-stop-guide-to-get-started/image19-53.jpeg" title="#2 High-risk SSL certificates" alt="#2 High-risk SSL certificates"> </div> <h4>#3 Impersonation signs</h4> <p>Unfortunately, fake websites are common nowadays, misleading customers and negatively impacting brand reputation. This is what happened to bakkt.com, a blockchain-based fintech platform, whose website was forged under the domain name bakktplatform.io — where a fake launch date was announced with the goal of tricking users into sending Bitcoin by promising attractive returns.</p> <p>Though the website seemed convincing, there were some initial signs of the offer being a scam including strange statements and typos. Running bakktplatform.io through a threat intelligence analysis instantly showed concerning points.</p> <p>For instance, there were issues with SSL certificates — i.e., host's response not containing HPKP headers and potentially leading to impersonation as well as a non-configured TLSA DNS record and non-supported OCSP stapling.</p> <p>Moreover, upon checking the report under WHOIS, warnings indicate that the registration is recent and it has been performed in an offshore country.</p> <div class="pic-wrapper hovered"> <img src="https://threatintelligenceplatform.com/images/blog/threat-hunting-for-professionals-the-one-stop-guide-to-get-started/image20-55.jpeg" title="#3 Impersonation signs" alt="#3 Impersonation signs"> </div> <div class="pic-wrapper hovered"> <img src="https://threatintelligenceplatform.com/images/blog/threat-hunting-for-professionals-the-one-stop-guide-to-get-started/image21-57.jpeg" title="#3 Impersonation signs" alt="#3 Impersonation signs"> </div> <div class="pic-wrapper hovered"> <img src="https://threatintelligenceplatform.com/images/blog/threat-hunting-for-professionals-the-one-stop-guide-to-get-started/image22-59.jpeg" title="#3 Impersonation signs" alt="#3 Impersonation signs"> </div> <h3 id="Concluding-thoughts">Concluding Thoughts</h3> <p>Threat intelligence provides numerous advantages to companies that take a proactive stance in their cybersecurity and leverage threat hunting practices.</p> <p>Yet in order to make the best out of it, decision-makers should remember that efficient threat hunting always starts with a reliable source of threat intelligence. It’s a continuous process that takes time and dedication before teams start seeing positive results in their activities.</p> <p>As a company owner or a decision-making employee, it’s vital to reinforce your organization’s cybersecurity systems against the ever-growing threats on the Internet. If you’d like to know how Threat Intelligence Platform can help, contact us today at <a href="mailto:service.desk@threatintelligenceplatform.com">service.desk@threatintelligenceplatform.com</a>.</p>
]]></content:encoded>
        </item>
        <item>
            <title>Threat Intelligence Platform Investigation #1: Payoneer Phishing Scam Hunted</title>
            <link>https://threatintelligenceplatform.com/threat-intelligence-platform-investigation-1-payoneer-phishing-scam-hunted</link>
            <pubDate>Tue, 19 Mar 2019 01:00:00 +0000</pubDate>
            <dc:creator>admin</dc:creator>

            <guid isPermaLink="false">https://threatintelligenceplatform.com/blog/?p=2100</guid>
            <description><![CDATA[
            <img width="1000" height="750" src="https://threatintelligenceplatform.com/images/blog/threat-intelligence-platform-investigation-1-payoneer-phishing-scam-hunted/threat-intelligence-platform-investigation-1-payoneer-phishing-scam-hunted.jpg" class="webfeedsFeaturedVisual wp-post-image" alt="Threat Intelligence Platform Investigation #1: Payoneer Phishing Scam Hunted" style="display: block; margin: auto; margin-bottom: 25px;max-width: 100%;" />
            <p>It’s no exaggeration to say that cybercrime is plaguing the Internet and, consequently, business operations carried out online. As a response to that challenge, a growing number of businesses have started to move away from reactive cybersecurity practices in favor of new ones, such as threat hunting, which involves the proactive search for threats and exploitable vulnerabilities.</p><p>But even though proactivity is a battle half won, what does a threat hunt look like in practice? This report explores a real-life use case and illustrates how modern perpetrators operate as well as describing the techniques threat hunters can apply to detect and investigate foul schemes.</p>
]]></description>
            <content:encoded><![CDATA[
            <img width="1000" height="750" src="https://threatintelligenceplatform.com/images/blog/threat-intelligence-platform-investigation-1-payoneer-phishing-scam-hunted/threat-intelligence-platform-investigation-1-payoneer-phishing-scam-hunted.jpg" class="webfeedsFeaturedVisual wp-post-image" alt="Threat Intelligence Platform Investigation #1: Payoneer Phishing Scam Hunted" style="display: block; margin: auto; margin-bottom: 25px;max-width: 100%;" />
             <p>It’s no exaggeration to say that cybercrime is plaguing the Internet and, consequently, business operations carried out online. As a response to that challenge, a growing number of businesses have started to move away from reactive cybersecurity practices in favor of new ones, such as threat hunting, which involves the proactive search for threats and exploitable vulnerabilities.</p> <p>But even though proactivity is a battle half won, what does a threat hunt look like in practice? This report explores a real-life use case and illustrates how modern perpetrators operate as well as describing the techniques threat hunters can apply to detect and investigate foul schemes.</p> <div class="custom-hr"></div> <h5>Table of contents</h5> <ul> <li><a href="#The-attack">The attack</a></li> <li><a href="#Hypotheses">Hypotheses</a></li> <li><a href="#Host-analysis-using-Threat-Intelligence-Platform">Host analysis using Threat Intelligence Platform</a></li> <li><a href="#Further-investigation-using-Domain-Research-Suite">Further investigation using Domain Research Suite</a></li> <li><a href="#Takeaways-and-concluding-thoughts">Takeaways and concluding thoughts</a></li> </ul> <div class="custom-hr"></div> <h3 id="The-attack">The Attack</h3> <h5>What happened</h5> <p>In February 2019, a user received three emails from Payoneer, a well-known company providing digital payment services, notifying him of three payments he has received. Even though the user has been the company’s client for a while, he was surprised as he did not expect any money.</p> <p>After a closer look at the emails, the sender seems to be genuine — the company's customer care team. Out of curiosity, the user decides to click on the links provided in the emails and ends up on the pages requesting login details with URLs slightly different from payoneer.com.</p> <p>This is, in fact, a red flag, calling for a threat hunting investigation, notably using the tools offered by <a href="https://threatintelligenceplatform.com" title="Threat Intelligence Platform - Protection Tools, Services, API's">Threat Intelligence Platform</a> and <a href="https://www.whoisxmlapi.com/" title="Whois XML API - Whois Lookup - Domain Name Search" target="_blank">WhoisXML API</a>.</p> <h5>First look at the emails</h5> <p>All three emails were sent from a seemingly credible source — Payoneer Customer Care. At first glance, the sender’s email address (noreply@payoneer.com) and the title ‘Payoneer Customer Care’ are correct:</p> <div class="pic-wrapper hovered w-self"> <img src="https://threatintelligenceplatform.com/images/blog/threat-intelligence-platform-investigation-1-payoneer-phishing-scam-hunted/image2-19.jpeg" title="First look at the emails" alt="First look at the emails"> </div> <div class="pic-wrapper hovered"> <img src="https://threatintelligenceplatform.com/images/blog/threat-intelligence-platform-investigation-1-payoneer-phishing-scam-hunted/image3-21.jpeg" title="First look at the emails" alt="First look at the emails"> </div> <div class="pic-wrapper hovered"> <img src="https://threatintelligenceplatform.com/images/blog/threat-intelligence-platform-investigation-1-payoneer-phishing-scam-hunted/image4-23.jpeg" title="First look at the emails" alt="First look at the emails"> </div> <div class="pic-wrapper hovered"> <img src="https://threatintelligenceplatform.com/images/blog/threat-intelligence-platform-investigation-1-payoneer-phishing-scam-hunted/image5-25.jpeg" title="First look at the emails" alt="First look at the emails"> </div> <p>Yet, further examination revealed the following:</p> <ul> <li>1. All three emails are missing the name of the person they are addressed to.</li> <li>2. The link hovering over the “Continue” button shows similar URLs featuring the “payoneer” keyword. For example: </li> <ul> <li>http://<b>payoneeryv.com</b>/cgi-sys/suspendedpage.cgi?PD=celFI0m19bCmy9</li> <li>http://<b>payoneeryn.com</b>/cgi-sys/suspendedpage.cgi?PD=elFI0m19bCmy1</li> <li>http://<b>vpayoneer.com</b>/sPayoutPage/Gateway/?PD=IslFI0m19bCmy9</li> </ul> <li>3. Quite unusually, the websites corresponding to the domains above do not have SSL encryption and are strangely spelled. </li> <li>4. One of the links in the emails is redirecting the user to this login page: <br> <span class="span-break-all"><em>https://payoneer.com.de/ePayoutPage/Gateway/v/?sessioniDataKey=0ebe5869-0604-4723-b1e6-e80963692ce6&amp;state=c02629f3-b8g9-4cd5-95fc-77d3a0y5b384&amp;client_id=GgF2F1B3J43ARMzcMuf51hProe8a</em></span> </li> <li>5. Clicking on the logo on this same page redirects to yet another login page that looks like an authentic Payoneer login page. <br> <span class="span-break-all"><em>https://login.payoneer.com/?sessionDataKey=800c212c-ef08-48de-b607-d610dd99713c&amp;state=180ce9db-33b4-427f-85ea-f8f21a11f872&amp;client_id=NgK2F1B2J43ARMzhMuf5ohProe8a&amp;redirect_uri=https%3a%2f%2fmyaccount.brand.domain%2flogin%2flogin.aspx</em></span> </li> </ul> <div class="custom-hr"></div> <em><b>Note:</b> It’s important to mention that the forged websites above are no longer online, indicating that the Payoneer security team seems to have tackled the situation head-on.</em> <div class="custom-hr"></div> <h3 id="Hypotheses">Hypotheses</h3> <p>Before the threat hunting team digs deeper into the infrastructure and details behind these pages, they create several hypotheses regarding the attack and its characteristics:</p> <h5>Phishing</h5> <p>‘Phishing’ is the most likely angle of attack here. Login credentials are what perpetrators usually aim to acquire through such communications where they pretend to be a trusted entity in order to obtain sensitive information.</p> <h5>Man in the Middle attack</h5> <p>In parallel, a Man in the Middle (MITM) attack, where communication between contacts is intercepted by a third party to listen in on the ‘conversation’ and perform illegal actions, might be at play. If this hypothesis is valid, then it’s possible that Payoneer indeed sent the original email, yet someone altered its content along the way.</p> <h5>Insider attack</h5> <p>Since the emails sender’s address looks authentic, another plausible hypothesis is that it was an intentional insider attack, for instance, conducted by someone seeking to damage the company’s reputation.</p> <h3 id="Host-analysis-using-Threat-Intelligence-Platform">Host Analysis Using Threat Intelligence Platform</h3> <p>The assigned threat hunting team began verifying these hypotheses by running the suspicious domains through a threat intelligence analysis. Their purpose was to learn more about the infrastructure behind the web names. This analysis examines several parameters:</p> <h5>IPs and domain names</h5> <p>Showing how established a host is, including whether it operates via a dedicated hosting service or a shared one.</p> <h5>Website analysis</h5> <p>Revealing whether a site has poorly-written HTML code, malicious links, weak CMS protection, and other issues which hackers could exploit.</p> <h5>SSL certificates</h5> <p>Helping to understand whether a website is prone to impersonation.</p> <h5>Malware detection</h5> <p>Letting threat hunting teams learn whether the inspected domain is featured in any known malware databases.</p> <h5>WHOIS records</h5> <p>Giving access to the details provided upon the registration of a domain such as the date of registration, expiry date, contact information, and more.</p> <h5>Mail servers</h5> <p>Checking whether a website’s email system is up to standards in terms of encryption and other configurations.</p> <h5>Name servers</h5> <p>Allowing the review of name server configurations and providing information on how resilient the name servers of a particular domain are.</p> <p>With this clarified, let’s examine the red flags that were uncovered.</p> <h4>Payoneer.com.de</h4> <a href="https://threatintelligenceplatform.com/report/payoneer.com.de/fg87BbNSZl">https://threatintelligenceplatform.com/report/payoneer.com.de/fg87BbNSZl</a> <h5>1. Website analysis</h5> <div class="pic-wrapper hovered"> <img src="https://threatintelligenceplatform.com/images/blog/threat-intelligence-platform-investigation-1-payoneer-phishing-scam-hunted/image6-27.jpeg" title="Website analysis" alt="Website analysis"> </div> <p>First of all, the website analysis detected redirects present on the page. The danger of these is that they can lead to potentially harmful websites containing malware or viruses.</p> <h5>2. SSL certificate</h5> <div class="pic-wrapper hovered"> <img src="https://threatintelligenceplatform.com/images/blog/threat-intelligence-platform-investigation-1-payoneer-phishing-scam-hunted/image7-29.jpeg" title="SSL certificate" alt="SSL certificate"> </div> <p>The screenshot above shows that the SSL certificate of the domain has only been acquired recently and has only been valid for a short time — also a potential sign of cybercrime activity.</p> <div class="pic-wrapper hovered"> <img src="https://threatintelligenceplatform.com/images/blog/threat-intelligence-platform-investigation-1-payoneer-phishing-scam-hunted/image8-31.jpeg" title="SSL certificate" alt="SSL certificate"> </div> <p>Furthermore, it was detected that the domain server supports substandard cipher suites, lacks HTTP Public Key Pinning Extension, does not have Force HTTPS connections and is missing its TLSA DNS record configuration. All of these aspects are crucial for secure network connections. Forcing HTTPS, for example, is critical for protection against cookie hijacking and protocol downgrade attacks.</p> <h5>3. Mail servers</h5> <div class="pic-wrapper hovered"> <img src="https://threatintelligenceplatform.com/images/blog/threat-intelligence-platform-investigation-1-payoneer-phishing-scam-hunted/image9-33.jpeg" title="Mail servers" alt="Mail servers"> </div> <p>For its mail servers, the report shows that the Payoneer.com.de domain does not have its AAAA records and DMARC configured. The AAAA records play an important part in the DNS resolution process while DMARC or Domain-based Message Authentication Reporting and Conformance is used for email validation and preventing spoofing.</p> <h5>4. Name servers</h5> <div class="pic-wrapper hovered"> <img src="https://threatintelligenceplatform.com/images/blog/threat-intelligence-platform-investigation-1-payoneer-phishing-scam-hunted/image10-35.jpeg" title="Name servers" alt="Name servers"> </div> <p>This section reports that some name servers of the domain are located on the same network and autonomous system number (ASN) rather than being dispersed to avoid a single point of failure. Such poor configurations sound strange when bearing in mind that the real Payoneer company is well-established and has a large worldwide customer base.</p> <h4>Payoneeryv.com</h4> <a href="https://threatintelligenceplatform.com/report/payoneeryv.com/lbWDfc4xWj">https://threatintelligenceplatform.com/report/payoneeryv.com/lbWDfc4xWj</a> <h5>1. Website analysis</h5> <p>Like for the previous domain, redirects have been found (see the previous screenshot).</p> <h5>2. SSL certificates</h5> <div class="pic-wrapper hovered"> <img src="https://threatintelligenceplatform.com/images/blog/threat-intelligence-platform-investigation-1-payoneer-phishing-scam-hunted/image11-37.jpeg" title="SSL certificates" alt="SSL certificates"> </div> <p>Unlike with Payoneer.com.de, this domain doesn’t seem to have a problem with the validity of its SSL certificate. However, the hostname validation has a ‘Failed’ status as it does not match the certificate provided and thus cannot be used by the target website.</p> <h5>3. WHOIS records</h5> <div class="pic-wrapper hovered"> <img src="https://threatintelligenceplatform.com/images/blog/threat-intelligence-platform-investigation-1-payoneer-phishing-scam-hunted/image12-39.jpeg" title="WHOIS records" alt="WHOIS records"> </div> <p>The analysis of <strong>Threat Intelligence Platform</strong> reports back that the domain has only been registered recently and its country of registration is offshore. This is suspicious since the real Payoneer’s headquarters are in New York.</p> <h4>Payoneeryn.com</h4> <a href="https://threatintelligenceplatform.com/report/payoneeryn.com/2T10D2xQB1">https://threatintelligenceplatform.com/report/payoneeryn.com/2T10D2xQB1</a> <h5>1. Website analysis &amp; SSL certificates</h5> <p>For its website analysis, the domain was also flagged as having redirects. And just like in the prior case, its SSL certificates came back with a failed hostname validation process.</p> <h5>2. WHOIS records</h5> <div class="pic-wrapper hovered"> <img src="https://threatintelligenceplatform.com/images/blog/threat-intelligence-platform-investigation-1-payoneer-phishing-scam-hunted/image13-41.jpeg" title="WHOIS records" alt="WHOIS records"> </div> <p>This page has similar warnings as in the above case with its domain being registered very recently (about a week apart) and the same country of registration — Panama. This may indicate that the same registrant made both of these registrations.</p> <h5>3. Name servers</h5> <div class="pic-wrapper hovered"> <img src="https://threatintelligenceplatform.com/images/blog/threat-intelligence-platform-investigation-1-payoneer-phishing-scam-hunted/image14-43.jpeg" title="Name servers" alt="Name servers"> </div> <p>The SOA record configuration check for this website shows that some of its configurations are not up to the recommended standards. SOA records are usually employed by DNS servers when storing settings regarding how they should operate. They also include a serial number each time a change is made on the DNS records.</p> <h4>Vpayoneer.com</h4> <a href="https://threatintelligenceplatform.com/report/vpayoneer.com/9dc7yKBkSA">https://threatintelligenceplatform.com/report/vpayoneer.com/9dc7yKBkSA</a> <h5>WHOIS records</h5> <div class="pic-wrapper hovered"> <img src="https://threatintelligenceplatform.com/images/blog/threat-intelligence-platform-investigation-1-payoneer-phishing-scam-hunted/image15-45.jpeg" title="WHOIS records" alt="WHOIS records"> </div> <p>Interestingly, in this report, the contact information of the domain owners is publicly available — allowing security teams to retrieve WHOIS records and contact the owners, or forward this data to the proper authorities.</p> <h3 id="Further-investigation-using-Domain-Research-Suite">Further Investigation Using Domain Research Suite</h3> <p>Building on the findings accumulated with <strong>Threat Intelligence Platform</strong>, the threat hunting team continued its investigation using WhoisXML API’s <a href="https://domain-research-monitoring.whoisxmlapi.com/" title="Domain Research Suite" target="_blank">Domain Research Suite</a>, which is composed of a variety of tools:</p> <ul> <li><b>Reverse WHOIS search</b> – Allowing users to identify domains based on their search terms, e.g., company name, phone number, email or else. </li> <li><b>WHOIS history search</b> – Letting the user skim through a historical log of WHOIS records’ changes, for instance, to check a domain’s ownership. </li> <li><b>WHOIS search</b> – Retrieving the actual WHOIS record of the target domain.</li> <li><b>Domain availability check</b> – Enabling users to know which domain names are available for registration. </li> <li><b>Domain monitor</b> – Tracking changes in the selected domain’s WHOIS records while keeping track of both registered and non-registered domains. </li> <li><b>Registrant monitor</b> – Keeping an eye open for domain registrations, renewals, updates or expirations based on the search criteria. </li> <li><b>Brand monitor</b> – Tracking newly-registered and recently-expired domains.</li> </ul> <p>For the case at hand, threat hunters opted for <strong>Reverse WHOIS search</strong>, <strong>WHOIS history search</strong>, and <strong>WHOIS search</strong> to continue the investigation.</p> <h4>Steps of Investigation</h4> <h5>1. Running Payoneeryv.com through WHOIS search and WHOIS history search</h5> <div class="pic-wrapper hovered"> <img src="https://threatintelligenceplatform.com/images/blog/threat-intelligence-platform-investigation-1-payoneer-phishing-scam-hunted/image16-47.jpeg" title="Running Payoneeryv.com through WHOIS search and WHOIS history search" alt="Running Payoneeryv.com through WHOIS search and WHOIS history search"> </div> <p>First of all, the threat hunting team learned that the website had been recently registered, adding to the initial phishing assumption. The report also reveals the name of the registrar, NAMECHEAP INC., giving a hint on who to contact for putting the website down.</p> <div class="pic-wrapper hovered"> <img src="https://threatintelligenceplatform.com/images/blog/threat-intelligence-platform-investigation-1-payoneer-phishing-scam-hunted/image17-49.jpeg" title="Running Payoneeryv.com through WHOIS search and WHOIS history search" alt="Running Payoneeryv.com through WHOIS search and WHOIS history search"> </div> <div class="pic-wrapper hovered"> <img src="https://threatintelligenceplatform.com/images/blog/threat-intelligence-platform-investigation-1-payoneer-phishing-scam-hunted/image18-51.jpeg" title="Running Payoneeryv.com through WHOIS search and WHOIS history search" alt="Running Payoneeryv.com through WHOIS search and WHOIS history search"> </div> <p>Scrolling further down, the experts are presented with the information of the registrant. Here, they notice that the registrant’s name and administrative and technical contacts are not publicly available. Instead, the details have been hidden through a WHOIS privacy protection service called WhoisGuard — a common practice for registrants who wish to keep their identity anonymous.</p> <div class="custom-hr"></div> <em><b>Note:</b> The analysis of payoneer.com.de and vpayoneer.com led to very similar results and is, therefore, not shown here.</em> <div class="custom-hr"></div> <h5>2. Checking other possibly forged domains</h5> <p>The threat hunting team also leveraged the <strong>Reverse WHOIS search</strong> to obtain a list of all domains that might be forged and used for impersonation in the future. In order to do that, they input the word “payoneer” in the search filter.</p> <div class="pic-wrapper hovered"> <img src="https://threatintelligenceplatform.com/images/blog/threat-intelligence-platform-investigation-1-payoneer-phishing-scam-hunted/image19-53.jpeg" title="Checking other possibly forged domains" alt="Checking other possibly forged domains"> </div> <p>The results show that as many as 227 domains match the search parameter. For every match, threat hunters can develop reports and run it through other tools. In this specific case, to verify which of the domains might be fake, specialists make use of the <strong>WHOIS history search</strong> and <strong>WHOIS search</strong> features.</p> <p>Take, for instance, the Payoneer.biz website. It has a similar name and an uncommon TLD, so the experts want to assess the likelihood of it being forged and decide to explore this in detail as per the following screenshots:</p> <div class="pic-wrapper hovered"> <img src="https://threatintelligenceplatform.com/images/blog/threat-intelligence-platform-investigation-1-payoneer-phishing-scam-hunted/image20-55.jpeg" title="Checking other possibly forged domains" alt="Checking other possibly forged domains"> </div> <div class="pic-wrapper hovered"> <img src="https://threatintelligenceplatform.com/images/blog/threat-intelligence-platform-investigation-1-payoneer-phishing-scam-hunted/image21-57.jpeg" title="Checking other possibly forged domains" alt="Checking other possibly forged domains"> </div> <div class="pic-wrapper hovered"> <img src="https://threatintelligenceplatform.com/images/blog/threat-intelligence-platform-investigation-1-payoneer-phishing-scam-hunted/image22-59.jpeg" title="Checking other possibly forged domains" alt="Checking other possibly forged domains"> </div> <p>The team finds out that the site was created in 2010. That’s a long time ago, making it either unlikely for the domain to be malicious, or likely to have been recently seized.</p> <p>The <strong>WHOIS history search</strong> also reveals historic records showing the real registrant organization (Payoneer Inc. or the owner Yuval Tal) which is identical to that of the authentic Payoneer.com domain — indicating that Payoneer may have registered it for another purpose like trademark protection.</p> <h3 id="Takeaways-and-concluding-thoughts">Takeaways and Concluding Thoughts</h3> <p>As a result of a thorough investigation, threat hunters concluded that they were dealing with a phishing attack. The evidence of that included recently registered domains with similar sounding names but slightly different spelling, messages not personally addressing the recipient and prompting immediate actions, websites’ configurations not up to standards, and hidden domains owners’ contacts.</p> <p>Let us emphasize a few critical points. First of all, whenever a malicious incident occurs, it is critical to conduct a threat intelligence analysis so that users can learn more about the perpetrators’ infrastructure and identify patterns in their behavior. It is also important to explore the WHOIS records of suspicious domains in order to assess the likelihood of them being dangerous.</p> <p>Secondly, both individuals and brands targeted by such schemes can benefit from recognizing other potentially harmful domains. For instance, they can utilize the Domain Monitor functionality offered by WhoisXML API to keep track of new domains with similar-sounding names and receive alerts every time one is being registered.</p>
]]></content:encoded>
        </item>
        <item>
            <title>5 Cybersecurity Trends and Threats to Watch Out for in 2019</title>
            <link>https://threatintelligenceplatform.com/5-cybersecurity-trends-and-threats-to-watch-out-for-in-2019</link>
            <pubDate>Mon, 18 Mar 2019 01:00:00 +0000</pubDate>
            <dc:creator>admin</dc:creator>

            <guid isPermaLink="false">https://threatintelligenceplatform.com/blog/?p=1900</guid>
            <description><![CDATA[
            <img width="1000" height="750" src="https://threatintelligenceplatform.com/images/blog/5-cybersecurity-trends-and-threats-to-watch-out-for-in-2019/5-cybersecurity-trends-and-threats-to-watch-out-for-in-2019.jpg" class="webfeedsFeaturedVisual wp-post-image" alt="5 Cybersecurity Trends and Threats to Watch Out for in 2019" style="display: block; margin: auto; margin-bottom: 25px;max-width: 100%;" />
            <p>When will the number of cyber attacks start to go down? At this point we can’t tell, because in 2019 it will definitely grow.</p><p>With devices and connections spreading among users, criminals will have new means to exploit personal and commercial information. They will also continue to improve their arsenal of tactics and tricks. And of course businesses will remain busy trying to stop them.</p><p>In this article, let’s take a closer look at the most important <strong>cybersecurity trends</strong> and threats that are bound to grab attention in 2019.</p>
]]></description>
            <content:encoded><![CDATA[
            <img width="1000" height="750" src="https://threatintelligenceplatform.com/images/blog/5-cybersecurity-trends-and-threats-to-watch-out-for-in-2019/5-cybersecurity-trends-and-threats-to-watch-out-for-in-2019.jpg" class="webfeedsFeaturedVisual wp-post-image" alt="5 Cybersecurity Trends and Threats to Watch Out for in 2019" style="display: block; margin: auto; margin-bottom: 25px;max-width: 100%;" />
             <p>When will the number of cyber attacks start to go down? At this point we can’t tell, because in 2019 it will definitely grow.</p> <p>With devices and connections spreading among users, criminals will have new means to exploit personal and commercial information. They will also continue to improve their arsenal of tactics and tricks. And of course businesses will remain busy trying to stop them.</p> <p>In this article, let’s take a closer look at the most important <strong>cybersecurity trends</strong> and threats that are bound to grab attention in 2019.</p> <h3>1. Third-Party and Supply Chain Are Hackers’ Sidewalks</h3> <p>One glaring cybersecurity-related fact is that most enterprises can’t do it all by themselves. Today’s business environment is a lot about third-party outsourcing and supply chain management.</p> <p>In 2019, cybercriminals will continue exploiting blind spots from the outside, for instance, by implanting malware in the software products of unsuspecting vendors or altering codes within digital tools to redirect important data towards malicious entities. As a result, it will be inevitable for firms to avoid cybersecurity matters outside of their direct control.</p> <p>Consequently, companies will keep on reinforcing security measures like splitting data access (according to users, tasks, etc.) and preventing data breaches due to third-party negligence.</p> <h3>2. Insider Threats Are Where Businesses Should Get Tougher</h3> <p>Companies learn the hard way that efficient security approaches are often as much about refining the basics as they are about purchasing high-end products — since the most common procedures and human practices can compromise cybersecurity big time.</p> <p>Vulnerabilities mainly result from poor behaviors that companies let pass. E.g., an employee accidentally clicking on a phishing link in an email, working out of office in places where devices could be stolen, sending unencrypted emails for unwelcome parties to check, etc., are just some of the mistakes that hackers take advantage of.</p> <p>So though CSOs know that employees need to be continuously reminded about good cybersecurity habits, companies will have to walk the talk even more than years go. Paying attention to what the staff is doing, security awareness programs, dedicating roles to insider threat management within organizations, and other practices – all of these must be present in 2019.</p> <div class="pic-wrapper"> <img src="https://threatintelligenceplatform.com/images/blog/5-cybersecurity-trends-and-threats-to-watch-out-for-in-2019/security-2019.png" title="Security 2019" alt="Security 2019"> </div> <h3>3. Phishing Is Increasingly Targeted</h3> <p>Cyber perpetrators can get creepy, and targeted phishing illustrates this best. Unfortunately, in 2019, this category of crime will continue to become further targeted.</p> <p>Here, hackers will be interested in people and their relationships, but certainly not because they’re friendly. They will infiltrate into systems with specific goals, including seeking details about victims to gain trust and conduct more precise phishing campaigns.</p> <p>Many will fall for emails mentioning their friend’s name, location, and other confidential personal details, while others will click on seemingly credible links and give out passwords and credit card numbers. This certainly sounds scary, and in order to stay safe in 2019, companies will need to deploy precautionary measures such as comprehensive identity verification to counter these shady social engineering tactics.</p> <h3>4. IoT Is a Weak Spot</h3> <p>Users are widely adopting IoT devices. Yet, at the same time, they are vulnerable entry points. For example, hackers can launch DDoS attacks, infiltrating and exploiting computers and generating massive “fake” traffic that overloads websites. And these threats can escalate if companies are not careful, affecting critical assets like buildings and cars, or even weaponizing IoT systems.</p> <p>So as the year comes, IoT-driven breaches will increase and manufacturers must prioritize the detection and prevention of surrounding attacks. Meanwhile, as business opportunities are becoming more mobile, firms in 2019 need to find new or improved ways to track devices going into and out of their systems.</p> <h3>5. Zero-Trust Model Is On The Rise</h3> <p>Reactive cybersecurity techniques can leave businesses at risk. Perhaps it’s time for a shift in perspective. Instead of passively guarding companies’ systems against the world, zero trust, a model that will continue to gain in popularity in 2019, can be applied.</p> <p> Zero trust puts the spotlight on human actors, networks and other discernible parameters so that no one is an exception to security teams’ scrutiny. The approach cuts across typical organizational structures, abiding by the principle that there are no trustworthy entities, either inside or outside defined security perimeters. It thus considers every individual or separate system and assign them risk scores and corresponding security protocols.</p> <h3>How to Get Ready for 2019</h3> <p>So how can companies respond to these <strong>cybersecurity trends</strong>? Well, here are five viable ways.</p> <h4>1. Think threat intelligence</h4> <p>Threat intelligence can help investigate the threats lurking both inside and outside the organization and check vulnerabilities within perimeters and their connection to third parties, notably by reviewing domain infrastructure, encryption practices, malware level, and WHOIS records.</p> <h4>2. Practice threat hunting</h4> <p>Threat hunting can support companies to be proactive and detect dangerous entities before they strike. As part of threat hunting efforts, you might, for example, want to monitor newly registered domains as criminals often use these to launch phishing attacks.</p> <h4>3. Keep track of domain reputation</h4> <p>To implement zero trust and decrease the probability of insider mistakes, organizations can start small by reviewing domain reputation closely. There are automated tools that can look over multiple parameters through intelligence feeds and calculate a reputation score which can help employees to quickly evaluate a website’s danger level.</p> <h4>4. Secure all IT assets</h4> <p>Devices and gadgets are now all over the place, and companies need to maintain control with relevant practices like strong passwords and two-factor authentication as well as keeping software updated and IT assets protected to avoid data leakage and breaches.</p> <h4>5. Utilize WHOIS information</h4> <p>A WHOIS database is a database that keeps track of existing domain names as well as of domains’ owner details and history. Examining such data can boost threat detection efforts that require the verification of unknown entities.</p> <div class="custom-hr"></div> <p>Many companies realize that staying on top of <strong>cybersecurity trends</strong> is a priority. Traditional blocking tools are no longer enough as threats are evolving — and 2019 will be no exception.</p> <p>Do you want to learn more about threat intelligence solutions for both small and large businesses? Send your questions to <a href="mailto:service.desk@threatintelligenceplatform.com">service.desk@threatintelligenceplatform.com</a>. </p>
]]></content:encoded>
        </item>
        <item>
            <title>How Data Science Helps Threat Intelligence Analysis</title>
            <link>https://threatintelligenceplatform.com/how-data-science-helps-threat-intelligence-analysis</link>
            <pubDate>Mon, 4 Mar 2019 01:00:00 +0000</pubDate>
            <dc:creator>admin</dc:creator>

            <guid isPermaLink="false">https://threatintelligenceplatform.com/blog/?p=1800</guid>
            <description><![CDATA[
            <img width="1000" height="750" src="https://threatintelligenceplatform.com/images/blog/how-data-science-helps-threat-intelligence-analysis/how-data-science-helps-intelligent-threat-analysis.jpeg" class="webfeedsFeaturedVisual wp-post-image" alt="How Data Science helps Intelligent Threat analysis" style="display: block; margin: auto; margin-bottom: 25px;max-width: 100%;" />
            <p>Data science is a major player in today's industries. Its valuable insights in a world powered by information are helping global businesses innovate, expand, and vastly improve. Threat intelligence is one arena where <a href="https://www.forbes.com/sites/cognitiveworld/2018/09/13/why-data-scientists-are-crucial-for-ai-transformation/#4c5af73b3f6f" title="Why Data Scientists Are Crucial For AI Transformation" target="_blank">the integration of data science</a> has offered a myriad of powerful benefits.</p>
]]></description>
            <content:encoded><![CDATA[
            <img width="1000" height="750" src="https://threatintelligenceplatform.com/images/blog/how-data-science-helps-threat-intelligence-analysis/how-data-science-helps-intelligent-threat-analysis.jpeg" class="webfeedsFeaturedVisual wp-post-image" alt="How Data Science helps Intelligent Threat analysis" style="display: block; margin: auto; margin-bottom: 25px;max-width: 100%;" />
            <p>Data science is a major player in today's industries. Its valuable insights in a world powered by information are helping global businesses innovate, expand, and vastly improve. Threat intelligence is one arena where <a href="https://www.forbes.com/sites/cognitiveworld/2018/09/13/why-data-scientists-are-crucial-for-ai-transformation/#4c5af73b3f6f" title="Why Data Scientists Are Crucial For AI Transformation" target="_blank">the integration of data science</a> has offered a myriad of powerful benefits.</p> <p>More and more threat intelligence teams are utilizing data science in their workflows. Helping analysts make better-informed decisions, data science is greatly expanding <a href="https://threatintelligenceplatform.com/blog/all-along-the-watchtower-how-this-solution-can-help-manage-digital-risk" title="All along the Watchtower: How this Solution Can Help Manage Digital Risk">the power of threat intelligence</a>. The uses of artificial intelligence (AI) are many and while it can't entirely replace human involvement in the process, it still offers a powerful tool in the battle against cybercrime.</p> <p>Today’s analysts are faced with daunting tasks like evaluating thousands of datasets from various feeds and sources. The goal is to find insights, patterns, and trends within the data to identify malware campaigns or other deviant behavior that could indicate a threat. The entire process, however, takes a tremendous amount of time and effort for humans, making it inefficient.</p> <h3>Why Data Science is a Hero in Threat Analysis</h3> <p>Automation is valuable in many areas. When it comes to threat intelligence analysis, the ability to analyze, detect patterns and make solid predictions by using data from a proven automated process is a huge benefit. There are several facets within threat intelligence workflows where data science <a href="https://threatintelligenceplatform.com/blog/why-your-threat-intelligence-implementation-cant-wait-another-day" title="Why Your Threat Intelligence Implementation Can’t Wait Another Day">plays a vital role</a>.</p> <div class="pic-wrapper"> <img src="https://threatintelligenceplatform.com/images/blog/how-data-science-helps-threat-intelligence-analysis/threat-intelligence-and-data-science-relationship.jpg" title="Threat Intelligence and Data Science relationship" alt="Threat Intelligence and Data Science relationship"> </div> <h4>Automated Analysis</h4> <p>A huge task that AI does infinitely better and faster than humans, the automatic analysis of large sets of data greatly facilitates the work for the human analyst. Customarily collected in real time so analysts know the information is current, the data can be structured and timed as the analyst wishes and can reveal present moment indicators. With the help of machine learning, they may also be able to send classification or predictive reports.</p> <h4>Data Collections</h4> <p>In order to carry out any of their operations, like spreading malware, threat actors must create data points. Experienced analysts are able to craft a collection utility to track all C2 commands sent by the threat actor.</p> <p>Text is also a prevalent data point. Since the internet is the venue exploited by most threat actors, the individual platform used as a mode of communication is another communication route for data collections. An entire team might be centered around collection, while another team could focus solely on data engineering. They work together to move and process data through the different stages of automated analysis.</p> <h4>Machine Learning</h4> <p><a href="https://www.huffingtonpost.com/entry/taking-machine-learning-to-the-next-level_us_596f5138e4b0376db8b65c72" title="Taking Machine Learning to the Next Level" target="_blank">Machine learning</a> involves some risk-taking because the data collection is dependent on how the results are interpreted. Computers are trained to interpret information without being specifically instructed on how to process it. When it comes to threat intelligence using data science, the resulting data can offer comprehensive, highly useful insights above what keyword searches and automated mathematics could produce.</p> <div class="pic-wrapper"> <img src="https://threatintelligenceplatform.com/images/blog/how-data-science-helps-threat-intelligence-analysis/machine-learning-in-threat-intelligence-analysis.jpg" title="Machine Learning in Threat Intelligence Analysis" alt="Machine Learning in Threat Intelligence Analysis"> </div> <p>When developing machine learning processes for threat intelligence analysis, the subject matter expertise of experienced analysts is crucial. Analysts work with machine learning engineers to craft accurate, exact models with great specificity because when it comes to determining results, domain expertise cannot be underestimated. In instructing a machine to look for and comprehend certain aspects of the cyber threat landscape, analysts benefit from an increased understanding of threat actors, the detection of threat and trend variances, and insights into when a certain malicious event may happen.</p> <h3>Key Processes</h3> <p>Depending on a given issue, there are several methods data scientists may utilize to produce insightful analyses.</p> <h4>Knowledge Graphs</h4> <p>Visual representations of cyber threat analysis, knowledge graphs use edges and nodes like those used in graph theory. Nodes depict the various threats or events while the edges show the defined relationship between them. These are often very useful in prompting further questions and, if fed with new data, can be refined and remodeled to be of great use in identifying threats of all types.</p> <h4>Natural Language Processing</h4> <p>With the scope of text data generated daily, natural language processing (NLP) is being used with increased frequency by threat intelligence teams. With cybercrime being committed in all corners of the globe, being mostly facilitated through online communications, NLP machine learning analysis can prove very useful. There are several NLP methods used by threat intelligence teams like topic modeling.</p> <h4>Probability and Statistics</h4> <p>Simple tools are often the most effective ones. Moving averages can be used to understand the trends of threat points in a time series like mentions of a specific virus or piece of malware in particular forums previously. <a href="https://threatintelligenceplatform.com/threat-intelligence-analysis-docs/website-analysis" title="Website analysis | Threat intelligence analysis docs">Further analysis</a> can take the trace further in detecting and comprehending the aftermath of given cyber events.</p> <div class="pic-wrapper"> <img src="https://threatintelligenceplatform.com/images/blog/how-data-science-helps-threat-intelligence-analysis/threat-intelligence-probability-and-statistics.jpeg" title="Threat Intelligence probability and statistics" alt="Threat Intelligence probability and statistics"> </div> <h4>Supervised and Unsupervised Techniques</h4> <p>In the cyberthreat arena, analysts must be ready to get involved when a threat is predicted. The level of involvement will depend on the machine learning technique that made the prediction. If it was an unsupervised process, the results are latent and can offer not a definitive answer but rather a scenario that's more subjective and left to the interpretation of the analysts. Supervised methods offer forecasts within a discrete target label space and the results don't require a ruling. Machine answerability is still vital here.</p> <h3>The Future of Data Science in Threat Intelligence</h3> <p>Threat intelligence using data science will only continue to grow, which is a good thing given the rate at which cybercrime is growing. Data scientists are developing many comprehensive tools to <a href="https://threatintelligenceplatform.com/blog/5-more-examples-of-threat-intelligence-platform-use-cases" title="5 More Examples of Threat Intelligence Platform Use Cases">help businesses detect threats</a> so they can develop solid plans of action and better protect themselves.</p> <p>Suites of APIs, services, and tools like those offered by Threat Intelligence Platform can provide businesses with optimal threat detection and comprehensive analysis at reasonable prices. When one factors in the potential cost of a potential cybercrime attack on a business, investing in strong preventive measures make sense.</p> <p>Thanks to the exponential growth of AI, we can manage the growing crush of data produced each day. It better equips data scientists in their fight against cybercrime so they can help businesses protect themselves.</p>
]]></content:encoded>
        </item>
        <item>
            <title>2019: Beware a New Wave of Crypto Mining Abuse</title>
            <link>https://threatintelligenceplatform.com/2019-beware-a-new-wave-of-crypto-mining-abuse</link>
            <pubDate>Mon, 18 Feb 2019 01:00:00 +0000</pubDate>
            <dc:creator>admin</dc:creator>

            <guid isPermaLink="false">https://threatintelligenceplatform.com/blog/?p=1700</guid>
            <description><![CDATA[
            <img width="1000" height="750" src="https://threatintelligenceplatform.com/images/blog/2019-beware-a-new-wave-of-crypto-mining-abuse/2019-beware-a-new-wave-of-crypto-mining-abuse.jpg" class="webfeedsFeaturedVisual wp-post-image" alt="2019: Beware a New Wave of Crypto Mining Abuse" style="display: block; margin: auto; margin-bottom: 25px;max-width: 100%;" />
            <p>Crypto Mining is the critical component that built the very foundation of cryptocurrency and blockchain. Fortunes have been made and lost in the world of cryptocurrency and the satellite industries that surround this exciting space. <span class="span-no-wrap">It seems</span> however that anywhere that trade and technologies exist, malfeasance soon finds its way to them. Cryptocurrency is no different. Malware has long been one of the security banes of organizations everywhere. At some point, malware combined with crypto mining and security organizations were faced with a new plague known as “cryptojacking” ever since.</p>
]]></description>
            <content:encoded><![CDATA[
            <img width="1000" height="750" src="https://threatintelligenceplatform.com/images/blog/2019-beware-a-new-wave-of-crypto-mining-abuse/2019-beware-a-new-wave-of-crypto-mining-abuse.jpg" class="webfeedsFeaturedVisual wp-post-image" alt="2019: Beware a New Wave of Crypto Mining Abuse" style="display: block; margin: auto; margin-bottom: 25px;max-width: 100%;" />
             <p>Crypto Mining is the critical component that built the very foundation of cryptocurrency and blockchain. Fortunes have been made and lost in the world of cryptocurrency and the satellite industries that surround this exciting space. It seems however that anywhere that trade and technologies exist, malfeasance soon finds its way to them. Cryptocurrency is no different. Malware has long been one of the security banes of organizations everywhere. At some point, malware combined with crypto mining and security organizations were faced with a new plague known as “cryptojacking” ever since.</p> <p>In late 2018, McAfee Labs reported that cryptojacking malware activity <a href="https://www.mcafee.com/enterprise/en-us/about/newsroom/press-releases/press-release.html?news_id=20181218005639&amp;clickid=0g-2NcXSPw3EQc9V3qSG4zQCUkgW1%3AWs1z8Ly00&amp;lqmcat=Affiliate:IR:null:74047:10078:10078:null&amp;sharedid=" title="McAfee Report Examines Cybercriminal Underground" target="_blank">rose by 4,000 percent</a> in this year alone. Four Thousand Percent. Cryptojacking malware hijacks a user’s system in order to use its resources and mining power to mine cryptocurrencies. The object of this type of malware is to remain undetected, to re-infect, and to remain under the control of the attacker.</p> <h3>IoT Frontiers</h3> <p>The Internet of Things (IoT) is extolled for its power, information, utility, and flexibility. Across the globe, IoT can be described as simple, interconnected endpoint collectors and distributors of information such as sensors, temperature indicators, surveillance systems, and more. The staggering scale of these IoT systems is now numbered in billions. As a result of lax security standards and low to non-existent management, many of these IoT devices are justifiably perceived as vulnerable.</p> <p>In late 2016, the Mirai botnet exploited the very nature of IoT systems and in the process, brought a considerable part of the internet to a grinding halt. Poorly secured devices proved to be at fault in the Mirai botnet case. The attack leveraged default passwords deployed on millions of endpoint devices to create a controlled Distributed Denial of Service (DDoS) attack against core DNS systems. As a result, a sustained interruption of availability was experienced throughout the United States and beyond.</p> <h3>IoT cryptojacking</h3> <p>It is reasonable to predict that with the rise in cryptojacking being reported, IoT will soon be the next platform under its scope. That is because the security measures in this field are by nature easily defeated and poorly managed.</p> <p>Among the various benefits of cryptocurrency, perceived anonymity, security, and privacy features are particularly attractive. For the very same reasons, cryptocurrency also appeals to cyber criminals.</p> <p>Additionally, the scale of benefit versus engineering effort of an attack poses a tempting picture. While most IoT endpoints are low-processing, low-power in nature, the fact remains that most endpoints only use a fraction of its available power and at scale with hundreds, thousands, even millions of devices under their control, the impact of a potential IoT cryptojacker is collectively significant.</p> <h3>Reactions and Prevention</h3> <p>It is certainly not feasible that an organization can be expected to protect IoT devices out in the wild, particularly from other manufacturers and outside parties. The IoT cryptojacking threat is an external threat that could manifest in ways designed to propagate, disrupt, and exfiltrate with the leverage of scale wielded against an unsuspecting organization. Within the organization, cryptojacking may potentially emerge from a variety of sources including web pages, software installs, desktop infections, email attachments, and many more.</p> <p>The best defense against internal threats is to turn controls and observation inward, to detect activity and incidents that originate within the network itself and act accordingly. Protections such as multi-factor authentication, roles-based account administration, network hardening, and web application firewalls create an enhanced protection profile.</p> <p>Additionally, the threat from the outside as is the case of IoT malware is too significant to ignore. Attacks affecting an organization are typically sourced and/or targeted at systems throughout the web. As part of a threat intelligence program, a tool such as Threat Intelligence Platform can help identify rogue networks, untrusted sources, and add context to suspicious behaviors within and against a company’s network.</p> <p>Threat intelligence should be linked to every incident response as a post-mortem or research action. Security teams leverage the power of information to find suspicious sources of network activity, such as those that surround cryptojacking. For example, much of a cryptojacker’s malicious activity may be encrypted through hijacked or unsigned keys, making normal detection extremely difficult. However, as the information available through analysis in the <a href="https://threatintelligenceplatform.com" title="Threat Intelligence Platform - Protection Tools, Services, API's">Threat Intelligence Platform</a> detects, the correlating of target and source information makes the identification of activity and relative risks a simpler task that produces actionable results.</p> <p>For 2019, Threat Intelligence Platform recommends a <a href="https://threatintelligenceplatform.com/pricing?plan=16" title="Pricing of Threat Intelligence Platform &amp; API Services">trial subscription</a> to help organizations strengthen and establish internal threat intelligence programs while heading off potential attacks.</p>
]]></content:encoded>
        </item>
        <item>
            <title>Building Threat Intel Security</title>
            <link>https://threatintelligenceplatform.com/building-threat-intel-security</link>
            <pubDate>Tue, 12 Feb 2019 01:00:00 +0000</pubDate>
            <dc:creator>admin</dc:creator>

            <guid isPermaLink="false">https://threatintelligenceplatform.com/blog/?p=1600</guid>
            <description><![CDATA[
            <img width="1000" height="750" src="https://threatintelligenceplatform.com/images/blog/building-threat-intel-security/building-threat-intel-security.jpg" class="webfeedsFeaturedVisual wp-post-image" alt="Building Threat Intel Security" style="display: block; margin: auto; margin-bottom: 25px;max-width: 100%;" />
            <p>A new year is upon us, along with new opportunities to step up the security game. Predictions cover the gambit of possibilities for the year ahead and accordingly, most security practitioners have adopted the principle of expecting the unexpected. Ranking high in most predictions for the year, advanced threats present a unique challenge. Be it desktop, malware, phishing, spam, and a variety of other threat types, malicious incidents can only continue to rise in every category.</p>
]]></description>
            <content:encoded><![CDATA[
            <img width="1000" height="750" src="https://threatintelligenceplatform.com/images/blog/building-threat-intel-security/building-threat-intel-security.jpg" class="webfeedsFeaturedVisual wp-post-image" alt="Building Threat Intel Security" style="display: block; margin: auto; margin-bottom: 25px;max-width: 100%;" />
            <h3><em>Starting a threat intel program</em></h3> <p>A new year is upon us, along with new opportunities to step up the security game. Predictions cover the gambit of possibilities for the year ahead and accordingly, most security practitioners have adopted the principle of expecting the unexpected. Ranking high in most predictions for the year, advanced threats present a unique challenge. Be it desktop, malware, phishing, spam, and a variety of other threat types, malicious incidents can only continue to rise in every category.</p> <h3>Hunting Season</h3> <p>With so much riding on the line, a company’s intelligence, livelihoods, and reputation are in the crosshairs of malicious actors. That is one reason why threat intelligence has become such an integral component in the security team toolkit. In this world of cat and mouse, offense is sometimes the best defense. That means putting together a cyber hunt program for threats and information ahead of incidents. To be clear, we are talking about threat intelligence, matching security personnel with the tools they need to discover new threats, profile risks, and acting upon them accordingly.</p> <p>Proactive and iterative in nature, security teams leverage threat intelligence to detect and isolate advanced threats, especially those that naturally fall outside of standard security solutions.</p> <h3>Getting the Whole Threat Picture</h3> <p>Subscription-based, third party, and open source information compose a great foundation of threat data for the emerging threat intelligence program. But that’s only one resource in a wide-angle multi-dimensional matrix. A threat intelligence program’s design incorporates valuable contextual information that is critical in evaluating security incidents. For example:</p> <ul> <li>Information about the type of threat;</li> <li>Statistical information across systems, applications, and networks;</li> <li>Logged information from operating systems, applications, accounts, and networking;</li> <li>Threat initiation information, duration, and cessation;</li> <li>Location information;</li> <li>Available source information.</li> </ul> <h3>Why Specific Information is Better</h3> <p>As is the case with many things surrounding technology, tempting shortcuts to establish threat intelligence security programs abound. As previously stated, third-party threat intelligence feeds are some of these shortcuts to starting a program, but it’s just a beginning.</p> <p>The reason behind it is that external parties and open-source systems simply offer a reference point, with little to no context about an organization’s specific constructs, assets, applications, and issues. It should be painfully obvious, but every environment is different, from systems procurement and industry type to systems architecture, to vulnerabilities, to team capabilities, and more.</p> <p>Today’s attacks are way too micro-targeted against its potential victims to take a generalized protection approach. Relevant information simply cannot purely come from an outside source, as the scale is both too large and too non-specific to rely on this information alone.</p> <h3>Threat Intelligence Platform</h3> <p>Security programs benefit from active research tools, such as those that Threat Intelligence Platform <a href="https://threatintelligenceplatform.com/threat-intelligence-api" title="Threat Intelligence API - 6 Different Security Analysis APIs">provides</a>. Anywhere in the sequence of pre-emptive, ongoing, and post-mortem attacks, security teams leverage Threat Intelligence Platform to discover information about their potential attacks, isolated anomalous behavior, suspicious activities, and to identify attack types by referencing information sourced throughout the enterprise.</p> <p><a href="https://threatintelligenceplatform.com" title="Threat Intelligence Platform - Protection Tools, Services, API's">Threat Intelligence Platform</a> helps teams find potential and actionable threat information, prevent spam, protect against password attacks, act on network probes, and more. By analyzing factors such as IP reputation, TOR nodes, anonymous proxy detection, domain and DNS history, date information, network source information, and more, Threat Intelligence Platform provides a valuable tool that should be part of all threat intelligence in the new year.</p> <h3>Get Help</h3> <p>The Threat Intelligence Platform is a system that embraces the community aspect of enhanced security while enabling the individual organization to gather and research its own specialized scenarios and events cast against its security baseline. We recommend a free trial for organizations of all types.</p>
]]></content:encoded>
        </item>
        <item>
            <title>2019: New Vulnerabilities Increase Threat Levels</title>
            <link>https://threatintelligenceplatform.com/2019-new-vulnerabilities-increase-threat-levels</link>
            <pubDate>Thu, 07 Feb 2019 01:00:00 +0000</pubDate>
            <dc:creator>admin</dc:creator>

            <guid isPermaLink="false">https://threatintelligenceplatform.com/blog/?p=1500</guid>
            <description><![CDATA[
            <img width="1000" height="750" src="https://threatintelligenceplatform.com/images/blog/2019-new-vulnerabilities-increase-threat-levels/2019-new-vulnerabilities-increase-threat-levels.jpg" class="webfeedsFeaturedVisual wp-post-image" alt="2019: New Vulnerabilities Increase Threat Levels" style="display: block; margin: auto; margin-bottom: 25px;max-width: 100%;" />
            <p>The security industry is always trying to anticipate all that the threat landscape may bring and the beginning of a new year is an opportune time to take inventory of what’s out there, what’s coming, and what we can do about it. Try as we may, it’s probably best to stick to the principle of “expect the unexpected”, which means that a spectrum of flexible security options and tools are realities of the model security practice.</p>
]]></description>
            <content:encoded><![CDATA[
            <img width="1000" height="750" src="https://threatintelligenceplatform.com/images/blog/2019-new-vulnerabilities-increase-threat-levels/2019-new-vulnerabilities-increase-threat-levels.jpg" class="webfeedsFeaturedVisual wp-post-image" alt="2019: New Vulnerabilities Increase Threat Levels" style="display: block; margin: auto; margin-bottom: 25px;max-width: 100%;" />
            <p>The security industry is always trying to anticipate all that the threat landscape may bring and the beginning of a new year is an opportune time to take inventory of what’s out there, what’s coming, and what we can do about it. Try as we may, it’s probably best to stick to the principle of “expect the unexpected”, which means that a spectrum of flexible security options and tools are realities of the model security practice.</p> <p>Due to resource constraints, lack of experience, and a variety of other factors, not every tool out there is a viable option. Organizations are often forced to pick and choose according to their own needs, resources, and capabilities. That’s why security predictions, based on ongoing events and evolving threats are so important. Draw your own conclusions, measure your own risk, and follow along as we explore some of the security threats and vulnerabilities that are potentially coming our way.</p> <h3>1. Software deaths and flaws</h3> <p>Along with major operating and software systems destined for sunset in 2019, the widely utilized nearly-ubiquitous enterprise database system by Microsoft known as SQL Server 2008 will go into End of Support in July. Despite long periods of warning and industry news, reports indicate that many organizations are unable to migrate or upgrade due to resource constraints, timing, and more. In the course of systems inventory and assessments, it isn’t uncommon to discover that over a decade’s worth of production usage, instances and deployments on this platform may be unknown to the organization and even worse, the deployments are often inextricably tied to critical processes throughout the environment.</p> <p>Without support and ongoing patching, these systems will require enhanced monitoring, vigilance, and incident response – capacities that are commonly only available to organizations that would have probably migrated to the next platform at this point. This is only one example of an ongoing list of vulnerable and outdated systems, soon-to-be obsolete platforms that are susceptible to code exploitation, serving as backdoor channels into target networks.</p> <h3>2. Rise of State Sponsored Threats in Elections</h3> <p>2019 is a prelude to a major national election and a harbinger of potential breach attempts against political parties, affiliated organizations, and even voters themselves. Expect heightened efforts to secure and educate the public and organizations on the potential of influence-seeking attacks. Data is the key factor, and threats may emerge from social networks, applications, and communications systems.</p> <p>As 2016 controversially proved, cyber threat and information campaigns are tempting and subversive realities that must be accounted for and protected against in our election process.</p> <h3>3. Enhanced Threat Emulation</h3> <p>The year ahead is destined to see widespread adoption of methodologies that emulate attacks and infiltration. Powered by disposable and constructible cloud and virtual-based environments, research and simulations will provide insight into vulnerabilities using known and potential threat tactics against similar constructs found in the production states of participating organizations. This cutting-edge frontier of threat prevention utilizes forensic details in combination with threat intelligence to compose a specialized threat prevention program. Initial participants in this field include financial institutions, government applications, and SaaS software providers.</p> <h3>4. Identity solutions in the Cloud</h3> <p>Corporate identities – thou art loosed! Identity tools and services have historically been hosted onsite at organizations due to the desire to control sensitive access and privilege. As cloud technologies have evolved into a multi-cloud and hybrid cloud status, the need for cloud-integration created hybrid and replication scenarios to address account needs.</p> <p>Today, trends suggest that the dawn of a hyper-connected Identity Access Management (IAM) standard is upon us. Capabilities in the application landscape both in the cloud and on-premise call for integrations throughout and across cloud platforms.</p> <h3>5. Mobile Authentication Boom</h3> <p>Authentication has always been built around the tenets of something you can identify, something you know, something you have and something you are. Translated into human constructs, those are, in no particular order, account, password, token, and biometrics. With mobile smartphones throughout the enterprise, mobile access is higher than ever before and the need for enhanced security increased dramatically. Mobile devices are capable of integrating PIN numbers, MFA, thumbprint identification, iris identification, token applications, facial recognition, and endpoint configuration. Smartphones are increasingly becoming a passport to the enterprise world.</p> <h3>6. Cryptojacking</h3> <p>Combine the leverage of scale with an unwitting army of vulnerable systems and you have a formula that is fit for exploitation. Despite the ongoing woes of an uncertain cryptocurrency market, cryptocurrency is an attractive target for malware and those with bad intent. Cryptojacking is a method of silently controlling widespread numbers of target systems in order to use system resource to mine cryptocurrency. While the effect is not directly malicious, the actions of cryptojacking are unpredictable and cause resource waste. Expect cryptojacking in IoT systems, as the scale and low security make this an appealing target.</p> <h3>7. Threat Intelligence</h3> <p>We wouldn’t be great content producers if we didn’t offer an honest and simultaneously humble pop for our arena of security product. We feel the industry is filled with far too much FUD (Fear, Uncertainty, and Doubt) but our product stands out from that construct. The industry knows that threats are on the rise and they also know they need tools that can uncover suspicious activity and threat research relative to their own technological landscapes.</p> <p><a href="https://threatintelligenceplatform.com" title="Threat Intelligence Platform - Protection Tools, Services, API's">Threat Intelligence Platform</a> predicts organizations will improve on their threat intelligence programs and in doing so, will require the ability to perform in-depth, accurate information gathering that is accessible to the key personnel throughout the organization.</p>
]]></content:encoded>
        </item>
        <item>
            <title>Putting Threat Intelligence into Action</title>
            <link>https://threatintelligenceplatform.com/putting-threat-intelligence-into-action</link>
            <pubDate>Mon, 04 Feb 2019 01:00:00 +0000</pubDate>
            <dc:creator>admin</dc:creator>

            <guid isPermaLink="false">https://threatintelligenceplatform.com/blog/?p=1400</guid>
            <description><![CDATA[
            <img width="1000" height="750" src="https://threatintelligenceplatform.com/images/blog/putting-threat-intelligence-into-action/putting-threat-intelligence-into-action.jpg" class="webfeedsFeaturedVisual wp-post-image" alt="Putting Threat Intelligence into Action" style="display: block; margin: auto; margin-bottom: 25px;max-width: 100%;" />
            <p>One of the most compelling components of modern security operation is threat intelligence. The practice of compiling relevant, actionable data and actionizing this information into the organization’s cyber-defense protections has protected enterprises across the spectrum. Making threat intelligence a reality however is an entirely different matter. A properly deployed program can be difficult to implement and once implemented, if not focused on valuable information, the program could become ineffective.</p>
]]></description>
            <content:encoded><![CDATA[
            <img width="1000" height="750" src="https://threatintelligenceplatform.com/images/blog/putting-threat-intelligence-into-action/putting-threat-intelligence-into-action.jpg" class="webfeedsFeaturedVisual wp-post-image" alt="Putting Threat Intelligence into Action" style="display: block; margin: auto; margin-bottom: 25px;max-width: 100%;" />
            <p class="first-child">One of the most compelling components of modern security operation is threat intelligence. The practice of compiling relevant, actionable data and actionizing this information into the organization’s cyber-defense protections has protected enterprises across the spectrum. Making threat intelligence a reality however is an entirely different matter. A properly deployed program can be difficult to implement and once implemented, if not focused on valuable information, the program could become ineffective.</p> <p>Attacks come in waves and they can follow a wide range of varieties. Attackers leverage cutting-edge and everyday techniques to infiltrate and extract target information. That’s not really news, but what is interesting is that attackers often have to stack and scale attacks for sake of efficiency, timeliness, and effect.</p> <ul> <li>Step 1: Conduct reconnaissance</li> <li>Step 2: Find vulnerabilities</li> <li>Step 3: Exploit</li> <li>Step 4: Remove data</li> <li>Step 5: Clean tracks or re-infection (optional)</li> </ul> <h3>Cyberthreat, interrupted</h3> <p>Most cyber security tools are reactive, as they respond to detected actions and threats before acting accordingly. But what if the chain of events could be stopped anywhere before the fourth (most damaging) step? That’s where threat intelligence comes in.</p> <p>By using a tool such as Threat Intelligence Platform, a security team can give a score to suspicious sources. Threat intelligence may be applied throughout an organizational environment, but it is most powerful at points of egress, including messaging and application gateways.</p> <h3>Threat data vs threat intelligence</h3> <p>Organizations that utilize simple, traditional security tools alone regularly fail to secure their networks against malicious cyber activity. Note that threat data is slightly yet tactically different from threat intelligence. Threat data is a tremendous informational resource that helps many organizations better protect their environments. Subscription models provide the latest shared security information about known threats, giving subscribers data on what to block and what to look out for. You will find things like:</p> <ul> <li>Malicious websites;</li> <li>Malicious domains;</li> <li>IP addresses/blocks that should be blocked;</li> <li>Threat behavior information, etc.</li> </ul> <p>On the other hand, threat intelligence adds a contextual element to the security picture. In threat intelligence, information is culled from a variety of sources, both internal and external. At this point, the data is analyzed and strategically used by the defenses of an organization. What this means is that relevant information from throughout the organization’s specific environment becomes part of the security ecosystem.</p> <h4>Putting Threat Intelligence Together</h4> <p>One of the core tenets of a security program is the identification, risk classification, and protection of key core assets. The “crown jewels”, if you will. It makes sense then to protect the entire system of assets with a principle that incorporates the totality of the environment, both internal and external. Sources of information include:</p> <ul> <li>External threat information (Open source, proprietary, security research, reputation lists);</li> <li>Internal log files (system, network, DNS, security systems, firewall, etc.);</li> <li>SIEM integration;</li> <li>Service desk history;</li> <li>Audit information (File and account);</li> <li>Internal research (incident investigation, deployment);</li> </ul> <h3>A powerful asset</h3> <p>As you enable security teams by putting threat intelligence into action, <a href="https://threatintelligenceplatform.com" title="Threat Intelligence Platform - Protection Tools, Services, APIs">Threat Intelligence Platform</a> (TIP) becomes an indispensable tool. TIP enables security teams to research security incidents, research suspicious traffic, suspicious behavior, and to validate the security of networks and applications.</p> <p>Once the organization couples threat intelligence, with the information and knowledge that TIP applies, it achieves a better defense of network-based assets.</p> <p>Both in the heat of attack or within the act of preparations, the analysis of source information through <a href="https://threatintelligenceplatform.com" title="Threat Intelligence Platform - Protection Tools, Services, APIs">Threat Intelligence Platform</a> information helps create a virtual consciousness of security awareness and vigilance built on reputation, suspicious registrant information, and more. Being better informed means better protection and actionable conscious decisions.</p>
]]></content:encoded>
        </item>
        <item>
            <title>The Importance of Threat Intelligence</title>
            <link>https://threatintelligenceplatform.com/the-importance-of-threat-intelligence</link>
            <pubDate>Wed, 30 Jan 2019 01:00:00 +0000</pubDate>
            <dc:creator>admin</dc:creator>

            <guid isPermaLink="false">https://threatintelligenceplatform.com/blog/?p=1300</guid>
            <description><![CDATA[
            <img width="1000" height="750" src="https://threatintelligenceplatform.com/images/blog/the-importance-of-threat-intelligence/is-only-having-an-anti-virus-software-a-good-enough-solution.jpg" class="webfeedsFeaturedVisual wp-post-image" alt="Is only having an anti virus software a good enough solution" style="display: block; margin: auto; margin-bottom: 25px;max-width: 100%;" />
            <p>Today, the internet has become <a href="http://www.klientsolutech.com/importance-of-internet-in-business/" title="Internet importance in Business – Internet Business Bazaar" target="_blank">an essential tool for most businesses</a> and the general public. After all, the internet holds possibilities for worldwide communication, commerce, socializing, education, and many other usages. Like anything useful, the internet is not without its dangers. Various threats are invented and implemented every day and they can severely compromise individuals and businesses on the internet. If you are one of the millions of people who prefer to <a href="https://threatintelligenceplatform.com/blog/all-along-the-watchtower-how-this-solution-can-help-manage-digital-risk" title="All along the Watchtower: How this Solution Can Help Manage Digital Risk">use the internet with less risk of being infected</a> by these threats, Threat Intelligence could be the solution for you.</p>
]]></description>
            <content:encoded><![CDATA[
            <img width="1000" height="750" src="https://threatintelligenceplatform.com/images/blog/the-importance-of-threat-intelligence/is-only-having-an-anti-virus-software-a-good-enough-solution.jpg" class="webfeedsFeaturedVisual wp-post-image" alt="Is only having an anti virus software a good enough solution" style="display: block; margin: auto; margin-bottom: 25px;max-width: 100%;" />
            <p class="first-child">Today, the internet has become <a href="http://www.klientsolutech.com/importance-of-internet-in-business/" title="Internet importance in Business – Internet Business Bazaar" target="_blank">an essential tool for most businesses</a> and the general public. After all, the internet holds possibilities for worldwide communication, commerce, socializing, education, and many other usages. Like anything useful, the internet is not without its dangers. Various threats are invented and implemented every day and they can severely compromise individuals and businesses on the internet. If you are one of the millions of people who prefer to <a href="https://threatintelligenceplatform.com/blog/all-along-the-watchtower-how-this-solution-can-help-manage-digital-risk" title="All along the Watchtower: How this Solution Can Help Manage Digital Risk">use the internet with less risk of being infected</a> by these threats, Threat Intelligence could be the solution for you.</p> <h4>What is Threat Intelligence?</h4> <p>Threat Intelligence is essentially knowledge of potential threats. In terms of the internet, threat intelligence can include knowledge of how a threat works, what it is trying to accomplish, and how it goes about threatening your system. Threat Intelligence of a virus, for example, would let you know how the software works, how it infects your computer systems, what the sender gains by sending it to you, and how to best keep it out of your system.</p> <h3>Aren’t Anti-Viruses Good Enough?</h3> <p>While installation of a quality anti-virus is always a recommended first step, threat intelligence goes beyond reactive software to block increasingly complex attacks. <a href="https://threatintelligenceplatform.com/blog/the-6-types-of-threat-actors-you-need-to-know" title="The 6 Types of Threat Actors You Need to Know">Cyber threat actors</a> are constantly coming up with new, creative ways to manipulate systems. Threat Intelligence looks at all aspects of your system and keeps your computers and software safe by analyzing the many ways that threats can come in and negating them in strategic ways. With the inclusive information gathered about potential threats, experts in providing <a href="https://threatintelligenceplatform.com/blog/5-benefits-of-cyber-threat-intelligence-services-for-your-business" title="5 Benefits of Cyber Threat Intelligence Services for Your Business">Threat Intelligence services for businesses</a> are able to consistently save systems from current attacks and prevent potential dangers in the future.</p> <h3>What Kinds of Threat Intelligence Are There?</h3> <p>There are several types of Threat Intelligence available to those looking to ensure the safety of their systems. There is <a href="https://threatintelligenceplatform.com/threat-intelligence-analysis-docs/ip-resolutions" title="Threat intelligence analysis docs">threat analysis</a> that takes an in-depth look into particular dangers. The analysis brings back detailed information on what the threat is and how to prevent it. Additionally, there are <a href="https://threatintelligenceplatform.com/threat-intelligence-api" title="Threat Intelligence API - 6 Different Security Analysis APIs">Threat APIs</a>. API stands for application programming interface, and simply refers to two programs that are able to freely exchange information. A Threat API systematically analyzes everything your computer is doing and reports on or removes potential threats.</p> <div class="pic-wrapper"> <img src="https://threatintelligenceplatform.com/images/blog/the-importance-of-threat-intelligence/benefit-of-threat-intelligenece-over-other-security-solutions.jpg" title="Benefit of Threat intelligence over other security solutions" alt="Benefit of Threat intelligence over other security solutions.jpg"> </div> <h3>What is the Benefit of Threat Intelligence over Other Protective Software?</h3> <p>Having Threat Intelligence gives you a head start on threats. Much of the time, anti-virus and other protective software is solely reactive. That is to say, when a threat is noted, the software takes steps to block it and keep it from infecting your computer. Threat Intelligence can do this, but it also <a href="https://threatintelligenceplatform.com/blog/how-does-threat-intelligence-benefit-your-organization" title="How Does Threat Intelligence Benefit Your Organization?">tracks threats to their source and prevents them from continuing to interfere with your computer systems</a>. By keeping track of the essential information about who is sending threats to your system, why they are doing it, and what methods they are using, Threat Intelligence can creatively remove threats from accessing your system, so you never have to know they’re there.</p> <h4>Threat Security for Peace of Mind</h4> <p><a href="https://www.pcmag.com/article/361587/tech-addiction-by-the-numbers-how-much-time-we-spend-online" title="Tech Addiction By the Numbers: How Much Time We Spend Online" target="_blank">Because we spend so much of our life on the internet</a>, it is essential to be able to navigate the web safely. Extra protection can not only keep data and software safe, but it can give you the confidence you need to perform the essential tasks that make your life or business work.</p>
]]></content:encoded>
        </item>
        <item>
            <title>Your 2019 Security Task List</title>
            <link>https://threatintelligenceplatform.com/your-2019-security-task-list</link>
            <pubDate>Thu, 24 Jan 2019 01:00:00 +0000</pubDate>
            <dc:creator>admin</dc:creator>

            <guid isPermaLink="false">https://threatintelligenceplatform.com/blog/?p=1200</guid>
            <description><![CDATA[
            <img width="1000" height="750" src="https://threatintelligenceplatform.com/images/blog/your-2019-security-task-list/your-2019-security-task-list.jpg" class="webfeedsFeaturedVisual wp-post-image" alt="Your 2019 Security Task List" style="display: block; margin: auto; margin-bottom: 25px;max-width: 100%;" />
            <p>As we kick off another year, security practitioners look for information to make their environments safer, and easier to protect. Incidentally, most environments need better ways to enhance security to add value and capability, both technologically and practically.</p>
]]></description>
            <content:encoded><![CDATA[
            <img width="1000" height="750" src="https://threatintelligenceplatform.com/images/blog/your-2019-security-task-list/your-2019-security-task-list.jpg" class="webfeedsFeaturedVisual wp-post-image" alt="Your 2019 Security Task List" style="display: block; margin: auto; margin-bottom: 25px;max-width: 100%;" />
            <h3>Getting better through better threat detection and response</h3> <p>As we kick off another year, security practitioners look for information to make their environments safer, and easier to protect. Incidentally, most environments need better ways to enhance security to add value and capability, both technologically and practically.</p> <p>We could go down the track of highlighting all the stuff that is easily found in SANS and CISSP sources, and we encourage you to check an endless array of sources for what common things you need to do and put together. We’re doing things differently, to get you in and out of here, to get you the information you need for the right mindset and for your horizons to open to different solutions.</p> <p>Systems and Network security have been a challenge for as long as they first existed. As technology progressed, capabilities undoubtedly got better, but the goalposts keep on shifting. Today, securing the modern environment is more difficult than ever before, thanks to a good deal of coinciding factors.</p> <h3>Attackers are Getting Better</h3> <p>Attackers are using more sophisticated and scalable tools than ever before. We live in an age where DDoS attacks can be purchased on the web, thus eliminating the need for technical knowledge. Pick your target, pay for it, schedule it, and the rest, as they say, is history.</p> <p>As “script kiddies” and amateurs abound, sophisticated attackers are also scaling and transforming their efforts, challenging the best of security products and practices across the landscape.</p> <h3>That Powerful Infrastructure</h3> <p>A big change that has happened in that traditional infrastructure continues to fade in favor of scaled, hyperconverged, virtual, and cloud-based systems. This new construct of infrastructure presents a radically different concept of security perimeter, especially when it is compared to the four-wall boundary concepts of the past. Today’s security practices focus on identity and access controls built into the environment itself rather than hardening and rulesets alone.</p> <h3>Business and Security</h3> <p>Once relegated to the domain of information technology teams, security is now the concern of business units throughout the organization. We’ve all seen security incidents, massive breaches, and loss of data reported in the news. When those things happen, heads roll and insurance is paid out, causing companies money and reputation.</p> <br> <h2>Your 2019 Task List</h2> <h3>Find Analytics</h3> <p>By all means, if you are at a nexus point where a technology refresh or opportunity is at hand, it is important to score analytics high up on your list of features. Security teams benefit from heightened analytic capabilities and these features are becoming more common and more powerful everyday tools. In addition, intelligent tools integrate orchestration and automation features that match up well with modern cloud and virtualized environments.</p> <h3>Integrated Security</h3> <p>One of the most promising trends in the industry today is the ability to leverage integrated security throughout the infrastructure product set. Virtual appliances and firewalls are turning up throughout the fabric options that comprise today’s infrastructures. Azure features a variety of pre-built security images, third-party firewall products, and features such as monitoring/auditing. AWS hosts a similar lineup of security-focused applications. Essentially, security controls are now available wherever infrastructure exists, protecting access throughout the mobile, flexible nature of cloud, hybrid, and multi-cloud environments.</p> <h3>Find Threats with Domain Threat Investigation</h3> <p>For all of the sophisticated, intelligent tools out there, in many situations the best defense systems should implement domain threat investigation techniques. In an age where countless pools of domains are registered and leveraged daily, the power of leveraging deep information about domains and the networks behind them is critical. Best of all, this process is simple and enabling security teams with this valuable tool reaps scalable rewards.</p> <p>Domain Threat Investigation analysis can disclose a variety of factors such as time, certificate validity, parent/child relationships between domains, historical registrant information, crawl analysis, domain activity, domain status, registration information and more. That information is built into our Threat Intelligence Platform. After all, data is only useful when it is multi-dimensional and non-linear.</p> <hr> <p><b>Case in point:</b> Let’s say you found a domain from system logs (example: chansfound.com) that you want to investigate, perhaps, from a web server, or log-on attempts on the system itself. What you’re looking for is a potential prelude to an attack. Are you dealing with a malicious domain? If it doesn’t turn up there, is it possible that the domain is affiliated with other malicious domains?</p> <ul> <li>1. Submit to TIP <div class="pic-wrapper"> <img src="https://threatintelligenceplatform.com/images/blog/your-2019-security-task-list/submit-to-tip.png" title="Submit to TIP" alt="Submit to TIP"> </div> </li> <li>2. Gather and review alerts <div class="pic-wrapper"> <img src="https://threatintelligenceplatform.com/images/blog/your-2019-security-task-list/gather-and-review-alerts.png" title="Gather and review alerts" alt="Gather and review alerts"> </div> <ul> <li>a. General Info: <div class="pic-wrapper"> <img src="https://threatintelligenceplatform.com/images/blog/your-2019-security-task-list/general-info.png" title="General Info" alt="General Info"> </div> </li> <li>b. Web Alert: ports and services <div class="pic-wrapper"> <img src="https://threatintelligenceplatform.com/images/blog/your-2019-security-task-list/web-alert.png" title="Web Alert: ports and services" alt="Web Alert: ports and services"> </div> Specific concern: <div class="pic-wrapper"> <img src="https://threatintelligenceplatform.com/images/blog/your-2019-security-task-list/specific-concern.png" title="Specific concern" alt="Specific concern"> </div> </li> <li>c. SSL Alert: <div class="pic-wrapper"> <img src="https://threatintelligenceplatform.com/images/blog/your-2019-security-task-list/ssl-alert-1.png" title="SSL Alert" alt="SSL Alert"> </div> <div class="pic-wrapper"> <img src="https://threatintelligenceplatform.com/images/blog/your-2019-security-task-list/ssl-alert-2.png" title="SSL Alert" alt="SSL Alert"> </div> </li> <li>d. Domain check: <div class="pic-wrapper"> <img src="https://threatintelligenceplatform.com/images/blog/your-2019-security-task-list/domain-check.png" title="Domain check" alt="Domain check"> </div> </li> <li>e. Mail <div class="pic-wrapper"> <img src="https://threatintelligenceplatform.com/images/blog/your-2019-security-task-list/mail.png" title="Mail" alt="Mail"> </div> </li> </ul> </li> <li>3. Analyze: <ul> <li>a. We have a domain that was registered on December 16, 2018;</li> <li>b. The certificate is self-signed, and valid from 11/16/2018 to 11/16/2028;</li> <li>c. The site features strange MySQL strings;</li> <li>d. The mail information for the domain is suspiciously tied to unreachable entries.</li> </ul> </li> <li>4. Score:<br><br> Although it isn’t registered in malware or spam blocklists, the domain chansfound.com should be considered highly suspicious. <ul> <li>A self-signed certificate, with a 10-year validity and with a one-year backdate in comparison to domain registration is a red flag.</li> <li>Mail configuration information that cannot be found is of major concern, another red flag.</li> <li>Strange MySQL ports and services are suspicious and should be also seen as a red flag.</li> </ul> </li> <li>5. Act:<br><br> At a minimum, traffic to and from this domain should be closely monitored at all points of egress and ingress. Vigilant organizations should block this traffic. </li> </ul> <h3>Research value</h3> <p>One of the most effective information technology security tools in the year ahead is the investigative power of organic, custom information-driven threat intelligence and the powerful, up-to-date information that is built into the Threat Intelligence Platform. Actionable data means better security – as simple as that.</p> <p>As practitioners hunt threats in the wild throughout the year, practical security measures are expected to be in high demand in the face of ever-increasing threats. Access to intuitively presented and compiled information can help quickly discover issues and protect assets accordingly, as events are taking place. When attacks are multi-faceted or multi-layered, remember that common behavior shows how attackers are looking to leverage and scale attacks, which limits the number of sources they might execute their attacks from. It takes effort to create attacks and their vectors, making isolating incidents to networks and domains a mission-critical security priority.</p> <p>Threat Intelligence Platform is designed to produce rapid insights, with detailed drill-down information for the best possible analysis of threats that are tied to domains, certificates, networks, and more. Better still, as part of a complete threat intelligence program, the information and research gleaned from the program means that the risk is relative and specific to what is going on within your enterprise and not generalized threat information.</p> <p>The list (and your assignment) goes like this:</p> <ul> <li>1. Demand and score analytic capabilities;</li> <li>2. Look for integrated security features in prospective and existing products;</li> <li>3. Implement customized threat intelligence information into your security process.</li> </ul> <hr> <p>Thanks for the ride, we’ll be here throughout the year with more tips, so don’t forget to <a href="https://threatintelligenceplatform.com/signup">sign up</a> for a trial account!</p>
]]></content:encoded>
        </item>
        <item>
            <title>3 Reasons Cyber threats Against Healthcare Are Increasing</title>
            <link>https://threatintelligenceplatform.com/3-reasons-cyber-threats-against-healthcare-are-increasing</link>
            <pubDate>Mon, 21 Jan 2019 00:00:00 +0000</pubDate>
            <dc:creator>admin</dc:creator>

            <guid isPermaLink="false">https://threatintelligenceplatform.com/blog/?p=900</guid>
            <description><![CDATA[
            <img width="1000" height="750" src="https://threatintelligenceplatform.com/images/blog/3-reasons-cyber-threats-against-healthcare-are-increasing/valuable-information-within-the-healthcare-industry.jpg" class="webfeedsFeaturedVisual wp-post-image" alt="Valuable information within the healthcare industry" style="display: block; margin: auto; margin-bottom: 25px;max-width: 100%;" />
            <p>Did you know that healthcare organizations are among the cybercriminals’ favorite targets? <a href="https://threatintelligenceplatform.com/blog/just-how-secure-is-your-organization-in-todays-digital-world" title="Just How Secure Is Your Organization in Today's Digital World?">When it comes to cyber threats, you need to take them seriously with the right threat intelligence, especially in today’s digital world</a>. Medical data and <a href="https://threatintelligenceplatform.com/blog/exactis-data-breach-takes-cybersecurity-professionals-back-to-basics" title="Exactis Data Breach Takes Cybersecurity Professionals Back to Basics">personal data could be stolen by hackers</a> and when it’s stolen, it could be devastating for both your organization and the patient. What you may want to know is why cyber threats are on the increase in the healthcare industry. Here are three of those reasons.</p>
]]></description>
            <content:encoded><![CDATA[
            <img width="1000" height="750" src="https://threatintelligenceplatform.com/images/blog/3-reasons-cyber-threats-against-healthcare-are-increasing/valuable-information-within-the-healthcare-industry.jpg" class="webfeedsFeaturedVisual wp-post-image" alt="Valuable information within the healthcare industry" style="display: block; margin: auto; margin-bottom: 25px;max-width: 100%;" />
            <p class="first-child">Did you know that healthcare organizations are among the cybercriminals’ favorite targets? <a href="https://threatintelligenceplatform.com/blog/just-how-secure-is-your-organization-in-todays-digital-world" title="Just How Secure Is Your Organization in Today's Digital World?">When it comes to cyber threats, you need to take them seriously with the right threat intelligence, especially in today’s digital world</a>. Medical data and <a href="https://threatintelligenceplatform.com/blog/exactis-data-breach-takes-cybersecurity-professionals-back-to-basics" title="Exactis Data Breach Takes Cybersecurity Professionals Back to Basics">personal data could be stolen by hackers</a> and when it’s stolen, it could be devastating for both your organization and the patient. What you may want to know is why cyber threats are on the increase in the healthcare industry. Here are three of those reasons.</p> <h3>1. Highly Valuable Information</h3> <p><a href="https://techcrunch.com/2018/08/09/the-healthcare-industry-is-in-a-world-of-cybersecurity-hurt/?guccounter=1" title="The healthcare industry is in a world of cybersecurity hurt" target="_blank">Cyber threats are common in the medical industry</a> because there is so much valuable content. Just think about it: medical organizations keep social security numbers, insurance information, dates of birth and medical history. All of this information could be even more valuable than financial information. Part of this is because a thief can steal an identity, see a doctor and get prescribed drugs or file insurance claims.</p> <p>Criminals prey on vulnerable people and see patients as even more vulnerable. Sometimes, a hacker might pretend to be an insurance agent to collect the money or pretend to be a company representative offering identity theft protection. In the latter case, the hackers will get patients to pay to have their information returned.</p> <h3>2. Less Cybersecurity</h3> <p>Unfortunately, healthcare organizations often lag behind the latest threat intelligence. Given that there are many applications used by healthcare systems, there are often outdated applications and operating systems that can no longer be supported. The main goal of a healthcare provider is to focus on patient care and because of this, cybersecurity isn’t always a priority, and institutions have to make do with outdated systems and applications. Without updated tools, criminals pose a real risk.</p> <p>In addition to outdated technology, healthcare organizations don’t normally undergo the same type of pressure to <a href="https://threatintelligenceplatform.com/blog/6-reasons-to-put-cyber-threat-intelligence-services-to-work-for-your-company" title="6 Reasons to Put Cyber Threat Intelligence Services to Work for Your Company">invest in cybersecurity</a> as financial institutions do. Cybersecurity cannot be a priority over patient care but organizations have to take good care of it. <a href="https://threatintelligenceplatform.com/blog/why-your-threat-intelligence-implementation-cant-wait-another-day" title="Why Your Threat Intelligence Implementation Can’t Wait Another Day">When an organization doesn’t pay attention to threat intelligence, the business is more likely to suffer multiple attacks</a>.</p> <h3>3. Easy Targets</h3> <p>It might sound like hard news to hear but health organizations are easy targets. The reason for this is because a healthcare organization has a large surface for attack. The system is complex and there are a lot of medical devices that have little to no protection. Likewise, medical organizations have a lot of different types of patient data with a lot of people who have access to that data. Healthcare organizations also have a lot of students, vendors and temporary workers, which makes the organization even more vulnerable. The more vulnerable a company is, the more likely it is that a hacker will try to find a way into the company to steal information.</p> <div class="pic-wrapper"> <img src="https://threatintelligenceplatform.com/images/blog/3-reasons-cyber-threats-against-healthcare-are-increasing/healthcare-organizations-are-vulnarable-which-makes-it-easier-for-hackers-to-steal-medical-information.jpg" title="Healthcare organizations are vulnarable which makes it easier for hackers to steal medical information" alt="Healthcare organizations are vulnarable which makes it easier for hackers to steal medical information"> </div> <p>Cyber threats are increasing in almost every industry, but they’re becoming even more common in the healthcare organization. There are a lot of reasons for this. On one hand, healthcare organizations do not usually invest in the latest threat intelligence and cybersecurity. Also, there tends to be a lot of valuable information for criminals to get their hands on. In order to <a href="https://threatintelligenceplatform.com/blog" title="Threat Intelligence &amp; Cybersecurity Prevention Blog">avoid cyber threats</a>, updating the systems and investing in better cybersecurity is the best way out.</p>
]]></content:encoded>
        </item>
        <item>
            <title>5 Cyber Security Threats Domain Malware Check API Can Monitor</title>
            <link>https://threatintelligenceplatform.com/blog/5-cyber-security-threats-domain-malware-check-api-can-monitor</link>
            <pubDate>Wed, 09 Jan 2019 00:00:00 +0000</pubDate>
            <dc:creator>admin</dc:creator>

            <guid isPermaLink="false">https://threatintelligenceplatform.com/blog/?p=800</guid>
            <description><![CDATA[
            <img width="1000" height="750" src="https://threatintelligenceplatform.com/images/blog/5-cyber-security-threats-domain-malware-check-api-can-monitor/5-cyber-security-threats-domain-malware-check-api-can-monitor.jpeg" class="webfeedsFeaturedVisual wp-post-image" alt="5 Cyber Security Threats Domain Malware Check API Can Monitor" style="display: block; margin: auto; margin-bottom: 25px;max-width: 100%;" />
            <p>Malware is the sickness of computers. Its attack is hard to detect and its effects can be absolutely devastating and costly for any business. In fact, in 2017, companies <a href="https://www.accenture.com/ma-en/insight-cost-of-cybercrime-2017?src=SOMS" target="_blank" title="2017 COST OF CYBER CRIME STUDY">were altogether paying US $3.82 million per attack</a> in an effort to contain the harm.</p>
]]></description>
            <content:encoded><![CDATA[
            <img width="1000" height="750" src="https://threatintelligenceplatform.com/images/blog/5-cyber-security-threats-domain-malware-check-api-can-monitor/5-cyber-security-threats-domain-malware-check-api-can-monitor.jpeg" class="webfeedsFeaturedVisual wp-post-image" alt="5 Cyber Security Threats Domain Malware Check API Can Monitor" style="display: block; margin: auto; margin-bottom: 25px;max-width: 100%;" />
            <p class="first-child">Malware is the sickness of computers.</p> <p>Its attack is hard to detect and its effects can be absolutely devastating and costly for any business. In fact, in 2017, companies <a href="https://www.accenture.com/ma-en/insight-cost-of-cybercrime-2017?src=SOMS" target="_blank" title="2017 COST OF CYBER CRIME STUDY">were altogether paying US $3.82 million per attack</a> in an effort to contain the harm.</p> <p>Organizations need cost-effective solutions to protect their business from being victimized by this ever-present threat. One tool that allows them to automatically check domains not just for malware but other dangerous cyber threats as well is <a href="https://threatintelligenceplatform.com/threat-intelligence-apis/domain-malware-check-api" title="Domain Malware Check API - Check Websites for Malware">Domain Malware Check API</a>.</p> <p>In this post, let’s take a look at malware together with other destructive cyber threats and how the API can help businesses detect them and safeguard their data and online assets.</p> <h3>Phishing</h3> <p>Phishing occurs when attackers manipulate unaware targets, many of whom employees, into revealing confidential data. Email is the most common phishing tool, with 60% of organizations listing phishing emails as <a href="https://www.wipro.com/content/dam/nexus/en/service-lines/applications/latest-thinking/state-of-cybersecurity-report-2018.pdf" title="State of Cyber Security Report 2018" target="_blank">the primary source for endpoint attacks</a>. Massive financial losses, not to mention the reputational damages, result from phishing activities.</p> <p><strong>Domain Malware Check API</strong> helps companies prevent phishing through its connections with various cybersecurity databases.</p> <h3>Ransomware</h3> <p>Just like its name implies, ransomware hijacks data and keeps it hostage until ransom has been paid. Global damage caused by ransomware attacks are predicted to reach <a href="https://cybersecurityventures.com/global-ransomware-damage-costs-predicted-to-exceed-8-billion-in-2018/" title="Global Ransomware Damage Costs Predicted To Exceed $8 Billion In 2018" target="_blank">$11.5 billion annually by 2019</a>. Businesses are particularly vulnerable to this devastating threat that could lock down important operational features. What’s worse, unresolved attacks are also bound to recur with even more devastating effects.</p> <p><strong>Domain Malware Check API</strong> can detect dangerous websites and prevent a ransomware attack with malware databases. Monitors IP addresses, domain names, and URLs that are associated with the threat in order to help companies track, avoid, and block the malicious traffic.</p> <div class="pic-wrapper"> <img src="https://threatintelligenceplatform.com/images/blog/5-cyber-security-threats-domain-malware-check-api-can-monitor/virus.jpeg" title="5 Cyber Security Threats Domain Malware Check API Can Monitor" alt="5 Cyber Security Threats Domain Malware Check API Can Monitor"> </div> <h3>Virus</h3> <p>A virus is distinct from other malware because it replicates itself to spread and corrupt computer networks. It can propagate through removable devices, shared networks, file attachments, and Internet downloads.</p> <p>Viruses need to be contained fast before the damage gets out of hand and businesses suffer. Domain Malware Check API helps address this issue as it receives virus alerts coming from various databases which analyzes URLs for malicious content or activity, checks a website’s safety and warns users against dubious links.</p> <h3>Trojan</h3> <p>Just like in the Greek tale, the Trojan Horse malware disguises itself as a safe program only to sneak in and perform undesirable activities. Trojan is a prolific threat, accounting for <a href="https://www.wipro.com/content/dam/nexus/en/service-lines/applications/latest-thinking/state-of-cybersecurity-report-2018.pdf" title="State of Cyber Security Report 2018" target="_blank">55% of the detected malware</a> in 2017. Its cousin, the backdoor trojan, is a particularly dangerous type because it enables attackers to have remote access to a computer.</p> <p><strong>Domain Malware Check API</strong> has connections with specific databases involved in detecting and monitoring trojans.</p> <h3>Spamming</h3> <p>Spam is any unsolicited email sent with malicious intent, ranging from deploying tracking bugs to inflicting malware. What’s more, it is on the rise. Over <a href="https://resource.elq.symantec.com/LP=5840?cid=70138000000rm1eAAA" target="_blank">55 percent of all emails sent</a> were identified as spam in 2017. Usually, such emails go straight to the spam folder. However, some manage to sneak into the main inboxes. And the more they do so, the higher the likelihood of them causing harm.</p> <p><strong>Domain Malware Check API</strong> helps companies block the spread of spam with alerts from the StopForumSpam database, a platform that monitors spammers, reports their activities, and blocks any malicious addresses.</p> <h3>Why Get Domain Malware Check API?</h3> <p>Domains and domain names are fundamental blocks for any website, so it makes sense to utilize them when it comes to security tracking. This is particularly true for protecting the digital infrastructure of businesses.</p> <h4>Threat detection</h4> <p>Through its connections with 10 important malware databases, the API helps detect malicious websites and therefore avoid harmful consequences. Getting information about why certain domains are blacklisted allows administrators to take measures against specific threats.</p> <h4>Saving time and money</h4> <p><strong>Domain Malware Check API</strong> helps save precious business time by automatically conducting checks through malware databases, making it unnecessary to monitor them manually. And as it is simultaneously connected to 10 of them, that equates to savings as there is no more need to pay for malware feeds separately or hire specialists to search through them one by one.</p> <h4>Intuitive results</h4> <p><strong>Domain Malware Check API</strong> is an efficient and uncomplicated cybersecurity tool. Utilizing it on a regular basis enables employees and managers to access important data and evaluate the risks themselves, notably by quickly checking websites’ overall safety score.</p> <div class="custom-hr"></div> <p>Malware is a destructive threat, and businesses must leverage every possible resource to prevent it from causing huge losses. A domain malware checker goes a long way to keep the threat at bay.</p> <p>Want to learn more about the benefits of <a href="https://threatintelligenceplatform.com/threat-intelligence-apis/domain-malware-check-api" title="Domain Malware Check API - Check Websites for Malware">Domain Malware Check API</a> for your security protocols? Well, it’s about time! Contact us at <a href="mailto:service.desk@threatintelligenceplatform.com">service.desk@threatintelligenceplatform.com</a> or <a href="https://threatintelligenceplatform.com/signup">sign up for a free trial</a>.</p>
]]></content:encoded>
        </item>
        <item>
            <title>Threat Intelligence Feeds: Relevant and Evolving</title>
            <link>https://threatintelligenceplatform.com/blog/threat-intelligence-feeds-relevant-and-evolving</link>
            <pubDate>Mon, 10 Dec 2018 00:00:00 +0000</pubDate>
            <dc:creator>admin</dc:creator>

            <guid isPermaLink="false">https://threatintelligenceplatform.com/blog/?p=600</guid>
            <description><![CDATA[
            <img width="1000" height="750" src="https://threatintelligenceplatform.com/images/blog/threat-intelligence-feeds-relevant-and-evolving/strong-cyber-security.jpg" class="webfeedsFeaturedVisual wp-post-image" alt="Strong cyber security" style="display: block; margin: auto; margin-bottom: 25px;max-width: 100%;" />
            <p><a href="https://www.information-age.com/evolution-cyber-security-wake-digitalisation-123470747/" title="Securing the future: The evolution of cyber security in the wake of digitalisation" target="_blank">As cyber threats are becoming more complicated and difficult for companies to handle, it’s no surprise that people want stronger cybersecurity</a>. In a time where everything is digitalized, there are more threats than before. Traditional security isn’t enough. Threat intelligent feeds, however, can be. As more businesses turn digital, <a href="https://threatintelligenceplatform.com/blog/the-6-types-of-threat-actors-you-need-to-know" title="The 6 Types of Threat Actors You Need to Know">cybercriminals</a> have more targets.</p>
]]></description>
            <content:encoded><![CDATA[
            <img width="1000" height="750" src="https://threatintelligenceplatform.com/images/blog/threat-intelligence-feeds-relevant-and-evolving/strong-cyber-security.jpg" class="webfeedsFeaturedVisual wp-post-image" alt="Strong cyber security" style="display: block; margin: auto; margin-bottom: 25px;max-width: 100%;" />
            <p class="first-child"><a href="https://www.information-age.com/evolution-cyber-security-wake-digitalisation-123470747/" title="Securing the future: The evolution of cyber security in the wake of digitalisation" target="_blank">As cyber threats are becoming more complicated and difficult for companies to handle, it’s no surprise that people want stronger cybersecurity</a>. In a time where everything is digitalized, there are more threats than before. Traditional security isn’t enough. Threat intelligent feeds, however, can be. As more businesses turn digital, <a href="https://threatintelligenceplatform.com/blog/the-6-types-of-threat-actors-you-need-to-know" title="The 6 Types of Threat Actors You Need to Know">cybercriminals</a> have more targets.</p> <p>An internet security team is there to block any potential threats of the system being entered. To understand cybersecurity, you need to understand how threat intelligence works, <a href="https://threatintelligenceplatform.com/blog/an-examination-of-the-5-most-effective-threat-intelligence-use-cases" title="An Examination of the 5 Most Effective Threat Intelligence Use Cases">the evolution of threat intelligence</a> and how to evaluate threat feeds.</p> <h3>How Intelligence Feeds Work</h3> <p>Threat intelligence feeds or TI feeds are a stream of data regarding threats to an organization’s cybersecurity. These threats may be current or they can be potential hazards to a business. Intelligence is simply information that an organization can use to <a href="https://threatintelligenceplatform.com/blog/how-does-threat-intelligence-benefit-your-organization" title="How Does Threat Intelligence Benefit Your Organization?">keep an advantage over threats</a>. With a constant feed of updated information, organizations are safer. When it comes to threat intelligence data, here are a few ways that companies gather it:</p> <ul> <li>Indicator feeds;</li> <li>Paid feeds;</li> <li>Internal intelligence gathering;</li> <li>Strategic partnerships;</li> <li>Bulletins.</li> </ul> <p>As far as the gathered information is concerned, there is a difference between threat data and threat intelligence. <a href="https://threatintelligenceplatform.com/threat-intelligence-api" title="Threat Intelligence API - 6 Different Security Analysis APIs">Threat intelligence goes through a process of analyzation</a>. Now, when looking at different feeds, there are differences between paid and free feeds. The free feeds are not always accurate, whereas paid feeds and bulletins undergo testing, with investigated domains.</p> <h3>How Security Has Become Faster and Stronger</h3> <p>Threat intelligence feeds have to be smarter. As technology advances, so does the need for cybersecurity. It’s important for IT security to be smart and effective. In the recent past, a threat intelligence feed was mostly about the data. Nowadays, it’s worth more than that. What the data tells you is as important as the data itself.</p> <h3>How IT Isn’t the Only Security</h3> <p>Cybersecurity used to be a concern that only workers in IT had. Nowadays, most employers and employees recognize that cyber threats are real. With technology upgrading, the security needs to upgrade along with it as cybersecurity impacts the entire organization. Threat intelligence platforms and feeds must be able to stretch beyond department to identify assets that may be a target in the future.</p> <h3>How to Evaluate Evolving Threat Feeds</h3> <p>To develop threat intelligence, you need the right feed. Some of this boils down to preference. Plenty of feeds are used by nearly all companies. However, there are also intelligence feeds that are pointless or even sketchy. For some, choosing a free threat feed is an easy decision to make as there’s no real commitment and you have nothing to lose. However, these free feeds sometimes have little value – if any value at all. If you choose a paid feed, keep in mind that you need a <a href="https://en.wikipedia.org/wiki/Data_architect" title="Data architect" target="_blank">data architect</a> to be able to evaluate your feed.</p> <p>In the past, businesses were able to get away with being reactive. Nowadays, cyberthreats have evolved and, luckily, so has the technology to fight them. <a href="https://threatintelligenceplatform.com/blog/just-how-secure-is-your-organization-in-todays-digital-world" title="Just How Secure Is Your Organization in Today's Digital World?">If a company wants to be safe</a>, it considers a good cyber security system. Threat intelligence feeds are always evolving alongside the rest of technology. As cybercrime evolves, so must security.</p>
]]></content:encoded>
        </item>
        <item>
            <title>Connected Domains API: Cutting the Ties</title>
            <link>https://threatintelligenceplatform.com/blog/connected-domains-api-cutting-the-ties</link>
            <pubDate>Mon, 26 Nov 2018 00:00:00 +0000</pubDate>
            <dc:creator>admin</dc:creator>

            <guid isPermaLink="false">https://threatintelligenceplatform.com/blog/?p=500</guid>
            <description><![CDATA[
            <img width="1000" height="750" src="https://threatintelligenceplatform.com/images/blog/connected-domains-api-cutting-the-ties/connected-domains-api-cutting-the-ties.jpg" class="webfeedsFeaturedVisual wp-post-image" alt="Connected Domains API: Cutting the Ties" style="display: block; margin: auto; margin-bottom: 25px;max-width: 100%;" />
            <p>Cybercriminals continue to grow in sophistication and daring, and traditional cybersecurity methods are no longer enough to contain them. Most Internet users share this view, as confirmed by a 2017 study where only <a href="https://cdn2.hubspot.net/hubfs/468115/Campaigns/2017-Ponemon-Report/barkly-2017-state-of-endpoint-security-risk-ponemon-institute-final.pdf" title="The 2017 State of Endpoint Security Risk" target="_blank">31% of respondents</a> said traditional solutions provide the protection their organizations need. In such a landscape, it is prudent to be proactive and take advantage of emerging cybersecurity approaches, and TIP’s <a href="https://threatintelligenceplatform.com/threat-intelligence-apis/connected-domains-api" title="Connected Domains API - Check Domain Names on Same IP Address">Connected Domains API</a> is one of them.</p>
]]></description>
            <content:encoded><![CDATA[
            <img width="1000" height="750" src="https://threatintelligenceplatform.com/images/blog/connected-domains-api-cutting-the-ties/connected-domains-api-cutting-the-ties.jpg" class="webfeedsFeaturedVisual wp-post-image" alt="Connected Domains API: Cutting the Ties" style="display: block; margin: auto; margin-bottom: 25px;max-width: 100%;" />
            <p class="first-child">Cybercriminals continue to grow in sophistication and daring, and traditional cybersecurity methods are no longer enough to contain them. Most Internet users share this view, as confirmed by a 2017 study where only <a href="https://cdn2.hubspot.net/hubfs/468115/Campaigns/2017-Ponemon-Report/barkly-2017-state-of-endpoint-security-risk-ponemon-institute-final.pdf" title="The 2017 State of Endpoint Security Risk" target="_blank">31% of respondents</a> said traditional solutions provide the protection their organizations need.</p> <p>In such a landscape, it is prudent to be proactive and take advantage of emerging cybersecurity approaches, and TIP’s <a href="https://threatintelligenceplatform.com/threat-intelligence-apis/connected-domains-api" title="Connected Domains API - Check Domain Names on Same IP Address">Connected Domains API</a> is one of them.</p> <p>Connected domains occur in an infrastructure where hosts, IP addresses, and servers are shared or when registrants have similar names and email addresses. The API retrieves a list of these domains and subdomains so as to enable you to check whether your website is at risk.</p> <p>This post highlights the importance of examining the connections and the benefits you can derive from the results.</p> <h3>Ensure Effective Cybersecurity</h3> <p>Like spiders that create extensive webs to trap their targets, hackers set up a net of malicious domains under the same IP address.</p> <p><strong>Connected Domains API</strong> checks whether a domain is part of a malicious cluster of domains, allowing cybersecurity teams to warn employees about potentially dangerous websites, and promptly configure firewalls to block traffic from the cluster.</p> <h3>Protect Your Reputation</h3> <p>The success of your business, sales, and strategic partnerships depends on your good reputation. And reputation is built upon many factors, on top of which are the associations that you knowingly, or unknowingly, enter into.</p> <p>Sharing a host server or IP address can get you in bad company as your neighbors may be engaged in publishing inappropriate content or running a gambling or adult site. As a result, you may be mistaken as being in cahoots which can significantly damage your reputation.</p> <p><strong>Connected Domains API</strong> checks your IP neighborhood, allowing you to take both proactive and protective measures when it's positive for malicious activities — e.g., opt for a different domain or transfer your website to a new hosting service.</p> <h3>Improve Email Delivery</h3> <p>The smooth flow of email communication is crucial to your business, but it may stop if your neighbors’ email practices flagrantly violate the rules. Malicious sites may spread spam emails which are eventually blocked by email service providers.</p> <p>If you share the same address with the culprits, your email marketing efforts could get blocked as well. <strong>Connected Domains API</strong> allows you to check your neighborhood, detect and avoid spammers thus ensuring seamless email delivery.</p> <h3>Learn About Third-Party Credibility</h3> <p>Businesses would find it impossible to operate without third-party support. They perform crucial functions in information technology and financial transactions processing and are trusted with confidential data and sensitive information.</p> <p>However, these close associates may be vulnerable too if not involved in dubious activities themselves. Connected Domains API can research third-party credibility by checking the domains they are connected with. It will reveal if they are linked to known malevolent entities or if their neighbors’ activities might result in potential issues for the collaboration.</p> <div class="pic-wrapper"> <img src="https://threatintelligenceplatform.com/images/blog/connected-domains-api-cutting-the-ties/conduct-brand-research.jpg" title="Conduct Brand Research" alt="Conduct Brand Research"> </div> <h3>Conduct Brand Research</h3> <p>Before launching a new business or a new product line, it is important to conduct research on a chosen domain to ensure strong cybersecurity and excellent brand reputation.</p> <p><strong>Connected Domains API</strong> allows you to see which other domains are connected to the one your company wishes to purchase. This will help reveal the entities behind them and whether they are associated with cybercriminals. The API also allows you to check similar-sounding domain names and their network of connections.</p> <h3>Protect Against Phishing</h3> <p>Employees of target companies may easily believe emails that purportedly come from respected organizations but which, in fact, come from hackers. As a result, confidential data might get exposed and money transferred to fraudster accounts.</p> <p>Once such phishing scams are made public through the media or from warnings shared by partners, you can use <strong>Connected Domains API</strong> to research names that are similar to the perpetrators and the domains connected to them. The result would be a list of all the suspect domains which you must immediately check and block if needed.</p> <h3>Avoid Impersonation</h3> <p>Hackers can impersonate you to trick your customers into sharing their sensitive information. If they succeed and media gets wind of it, the bad publicity can put a dent on your reputation in the eyes of customers, third parties, and the public at large.</p> <p>You can avoid an impersonation attack by using <strong>Connected Domains API</strong> to check all the domains connected to yours. You can also look for variations of your domain and subdomain names and the domains connected to those in order to evaluate the risk of impersonation, take timely precautionary measures and alert your customers.</p> <h3>Assist During Investigation</h3> <p><strong>Connected Domains API</strong> is an excellent tool to investigate fraudulent networks. Connecting the dots of similar domains and shared IP addresses traces the extent of malicious activities and leads to other domains owned by a cybercriminal. Discovering the networks of dubious websites and their handlers might result in their subsequent prosecution and eventual shutdown.</p> <p>Hackers operate through malicious networks of connected domains which you may unknowingly be part of or vulnerable to. <strong>Connected Domains API</strong> enables you to research your connections and cut the ties to protect your business reputation.</p> <p>Find out more about how TIP can help you counter connected domains and other threats. Contact us at <a href="mailto:service.desk@threatintelligenceplatform.com">service.desk@threatintelligenceplatform.com</a> or <a href="https://threatintelligenceplatform.com/signup">sign up for a free trial</a>.</p>
]]></content:encoded>
        </item>
        <item>
            <title>6 Reasons Why You Should Care about Domain’s Infrastructure Analysis</title>
            <link>https://threatintelligenceplatform.com/blog/6-reasons-why-you-should-care-about-domains-infrastructure-analysis</link>
            <pubDate>Mon, 12 Nov 2018 00:00:00 +0000</pubDate>
            <dc:creator>admin</dc:creator>

            <guid isPermaLink="false">https://threatintelligenceplatform.com/blog/?p=400</guid>
            <description><![CDATA[
            <img width="1000" height="750" src="https://threatintelligenceplatform.com/images/blog/6-reasons-why-you-should-care-about-domains-infrastructure-analysis/6-reasons-why-you-should-care-about-domains-infrastructure-analysis.jpg" class="webfeedsFeaturedVisual wp-post-image" alt="6 Reasons Why You Should Care about Domain’s Infrastructure Analysis" style="display: block; margin: auto; margin-bottom: 25px;max-width: 100%;" />
            <p>Location, location, location. That's the advice you hear when you're contemplating on opening up a business. You should be near where your customers are, they say, or you will be ignored. Well, the same principle applies when setting up a domain on the Internet. You should be near your targets. And the way to find whether you are is through Threat Intelligence <a href="http://tip.loc.com/threat-intelligence-apis/domains-infrastructure-analysis-api" title="Domain's Infrastructure Analysis API">Domain’s Infrastructure Analysis API</a>.</p>
]]></description>
            <content:encoded><![CDATA[
            <img width="1000" height="750" src="https://threatintelligenceplatform.com/images/blog/6-reasons-why-you-should-care-about-domains-infrastructure-analysis/6-reasons-why-you-should-care-about-domains-infrastructure-analysis.jpg" class="webfeedsFeaturedVisual wp-post-image" alt="6 Reasons Why You Should Care about Domain’s Infrastructure Analysis" style="display: block; margin: auto; margin-bottom: 25px;max-width: 100%;" />
             <p class="first-child">Location, location, location. That's the advice you hear when you're contemplating on opening up a business. You should be near where your customers are, they say, or you will be ignored. Well, the same principle applies when setting up a domain on the Internet. You should be near your targets. And the way to find whether you are is through Threat Intelligence <a href="https://threatintelligenceplatform.com/threat-intelligence-apis/domains-infrastructure-analysis-api" title="Domain's Infrastructure Analysis API">Domain’s Infrastructure Analysis API</a>.</p> <p>But the tool is not only useful for checking locations. In fact, it helps you go through the process of understanding the different elements that comprise a domain and reveals details that you probably take for granted but which are actually key to your website's visibility, security, and credibility.</p> <p>This article looks closer into the domain’s infrastructure analysis and will walk you through 6 ways in which it can benefit businesses.</p> <h3>What is Domain Infrastructure Analysis?</h3> <p>In very simple terms, a domain or domain name is a web address. But behind the name are different hosts or servers that help it do its job. <strong>Domain’s Infrastructure Analysis API</strong> researches these elements, which include:</p> <ul> <li>Web server – The system that delivers content or services to end users. Browsing would be <span class="span-no-wrap">impossible without it</span>.</li> <li>Nameserver – It converts a domain name into an IP address. Take it away and we'd have to memorize all the IP addresses of the domains we'd like to reach. </li> <li>Mail server – Sends and receives email using standard email protocols. No email, no life.</li> <li>Subdomains – If a domain was a parent, a subdomain would be its child. It helps create a memorable address for unique or country-specific content. </li> </ul> <p>For each of these servers and subdomains, the API provides such details as the Ipv4 address, host kind, subnetwork(s), and geolocation information.</p> <h3>Why Does Domain’s Infrastructure Analysis Matter?</h3> <p>How does looking into the above details help companies?</p> <p>For one, it will answer a lot of questions like how safe your data is, how you can improve your SEO rankings, how to keep your visitors happy, etc. It will also help you ensure that your servers are in the right location.</p> <div class="pic-wrapper"> <img src="https://threatintelligenceplatform.com/images/blog/6-reasons-why-you-should-care-about-domains-infrastructure-analysis/why-does-domains-infrastructure-analysis-matter.jpg" title="Why Does Domain’s Infrastructure Analysis Matter?" alt="Why Does Domain’s Infrastructure Analysis Matter?"> </div> <p>Once you do so, you'll enjoy the following benefits:</p> <ul> <li><strong>Enhanced user experience</strong><br> Data is stored on servers but it’s the geolocation of the hosting server makes all the difference in the quality and speed of the information being distributed. As a rule, the farther the server location, the slower the website you’re trying to reach. That's because the data has to pass through more loops and switches before pages are uploaded. <br> Poor user experience spells disaster, given that <a href="https://www.akamai.com/uk/en/about/news/press/2017-press/akamai-releases-spring-2017-state-of-online-retail-performance-report.jsp" title="AKAMAI ONLINE RETAIL PERFORMANCE REPORT: MILLISECONDS ARE CRITICAL" target="_blank">53% of mobile users dump a website</a> if it takes more than 3 seconds to load. And <a href="https://blog.hubspot.com/marketing/page-load-time-conversion-rates" title="How Page Load Time Affects Conversion Rates: 12 Case Studies" target="_blank">79% of those who've had a bad experience</a> with slow websites never return. Making sure that your server is near your target market means there'd be fewer loops, faster loading, and happier customers. </li> <li><strong>Better online reputation</strong><br> A hosting server located nearby gives your domain a good name. Again, that's because close proximity translates to faster loading speed which delights users who are most likely to repeat the experience. This is good for business since Google gives websites with fast loading speed high SEO rankings. </li> <li><strong>Compliance with data processing laws</strong><br> Different countries have different data protection regulations. The EU, for example, has passed the stringent General Data Protection Regulation (GDPR) which slaps companies hefty fines for the misuse of personal data. <br> Knowing where your servers are located will alert you to the applicable laws of the hosting countries and prevent being penalized for practices that you may not know are prohibited. </li> <li><strong>Integration of new online assets</strong><br> Businesses acquiring a new website can use <strong>Domain’s Infrastructure Analysis API</strong> to make sure that all the legal, financial, and technical considerations have been taken into account before making a decision. Knowing the location of the servers allows you to determine how data will be structured, the website speed, and overhead costs. </li> <li><strong>Starting point for deeper analysis</strong><br> Domain’s infrastructure analysis API provides context in the investigation of malicious domains. It can shed light on how cybercriminal networks are organized, where their servers are located, how they are dispersed, and what kinds of data they are distributing. <br> The API can also help users decide whether to develop one global website or several of them with country-level subdomains, what new product lines to launch in a particular market, and whether their names or subdomains are aligned with the branding strategy. </li> <li><strong>Third-party monitoring</strong><br> Checking the infrastructure behind the domains of third-party associates can give you insights on the safety and reliability of their systems, how they are operating, and, most importantly, where their mail and name servers are situated. This especially valuable if a third-party is responsible for storing confidential or highly sensitive information. </li> </ul> <p>Knowing the architecture behind your data helps businesses improve the delivery of services and avoid potential threats. <a href="https://threatintelligenceplatform.com/threat-intelligence-apis/domains-infrastructure-analysis-api" title="Domain's Infrastructure Analysis API">Domain’s infrastructure analysis</a> reveals the best position to take to keep companies and their clients well connected.</p> <p>If you are interested in how TIP and our APIs can help your business revamp their online presence and ensure better cybersecurity contact us at <a href="mailto:service.desk@threatintelligenceplatform.com">service.desk@threatintelligenceplatform.com</a> or <a href="https://threatintelligenceplatform.com/signup">sign up for a free trial</a>.</p>
]]></content:encoded>
        </item>
        <item>
            <title>SSL Configuration Analysis API: 5 Cyber Threats It Can Protect You From</title>
            <link>https://threatintelligenceplatform.com/blog/ssl-configuration-analysis-api-5-cyber-threats-it-can-protect-you-from</link>
            <pubDate>Tue, 06 Nov 2018 00:00:00 +0000</pubDate>
            <dc:creator>admin</dc:creator>

            <guid isPermaLink="false">https://threatintelligenceplatform.com/blog/?p=300</guid>
            <description><![CDATA[
            <img width="1000" height="750" src="https://threatintelligenceplatform.com/images/blog/ssl-configuration-analysis-api-5-cyber-threats-it-can-protect-you-from/ssl-configuration-analysis-api.jpg" class="webfeedsFeaturedVisual wp-post-image" alt="SSL Configuration Analysis API: 5 Cyber Threats It Can Protect You From" style="display: block; margin: auto; margin-bottom: 25px;max-width: 100%;" />
            <p>Conducting business over the Internet is all about trust. It's not like going on a blind date, but rather about making sure that you won't end up being harmed or disappointed. This entails conducting a background check, lots of verification, and, finally, securing valid certification by ensuring that the people you're dealing with are who they say they are and that your confidential data will be safe with them.</p>
]]></description>
            <content:encoded><![CDATA[
            <img width="1000" height="750" src="https://threatintelligenceplatform.com/images/blog/ssl-configuration-analysis-api-5-cyber-threats-it-can-protect-you-from/ssl-configuration-analysis-api.jpg" class="webfeedsFeaturedVisual wp-post-image" alt="SSL Configuration Analysis API: 5 Cyber Threats It Can Protect You From" style="display: block; margin: auto; margin-bottom: 25px;max-width: 100%;" />
            <p class="first-child">Conducting business over the Internet is all about trust. It's not like going on a blind date, but rather about making sure that you won't end up being harmed or disappointed. This entails conducting a background check, lots of verification, and, finally, securing valid certification by ensuring that the people you're dealing with are who they say they are and that your confidential data will be safe with them.</p> <p>This process of authentication can be accomplished through <a href="https://threatintelligenceplatform.com/threat-intelligence-apis/ssl-configuration-analysis-api" title="SSL Configuration Analysis API">SSL configuration analysis API</a>, analyzing domains’ SSL connection — i.e., certificate validation, hostname validation, self-signed certificates, and more — and how it is configured to check for signs that can help businesses avoid cyber threats such as the 5 ones below.</p> <h3>Heartbleed Vulnerability</h3> <p>The Heartbleed bug poses a serious threat because it can steal a limitless amount of memory. It arises from the OpenSSL code's vulnerability and owes its name to the “Heartbeat extension” to the Transport Layer Security (TLS) where this vulnerability exists. This encryption weakness let hackers read the memory of a compromised system, spoof websites, and steal sensitive information such as passwords, credit card numbers, usernames, tokens, and even private keys. Worse still, it leaves no apparent traces of malicious activity, making it difficult to determine whether a system has been compromised or not.</p> <p><strong>SSL configuration analysis API</strong> can warn businesses against the Heartbleed bug by verifying whether the Heartbeat extension is enabled as well as performing a Heartbleed vulnerability check. The latter allows verifying if the host's OpenSSL version is fixed, solving for the bug. Updating the OpenSSL certificate and generating new private cryptographic keys – all crucial to prevent attacks.</p> <h3>Poodle Attacks</h3> <p>POODLE stands for “Padding Oracle On Downgraded Legacy Encryption”. This bug forces browsers that support SSL to downgrade to the outdated SSL 3.0 encryption protocol where a security hole is exploited by a hacker to hijack browser sessions and decrypt sensitive transactions. And even if you try to use TLS, hackers could exploit the bug to keep you downgraded, and, therefore, open to attacks.</p> <p>The Poodle vulnerability is particularly harmful if you are using SSL to connect to public Wi-Fi networks. It is a favorite hunting ground for attackers seeking to intercept confidential data and impersonate websites in order to hijack accounts without even needing victims' passwords.</p> <p>You can use the <strong>SSL configuration analysis API</strong> to check if the TLS_FALLBACK_SCSV is supported by the host to protect against Poodle attacks. The vulnerability of being downgraded and open to attack can be addressed once and for all by making a timely update to new versions of TLS encryption.</p> <h3>Beast Attacks</h3> <p>BEAST is short for Browser Exploit Against SSL/TLS. It's a vulnerability that targets the confidentiality of an HTTPS connection to gain access to the HttpOnly cookies and hijack the session. A BEAST attack can take place when there is a flaw in Java's Same Origin Policy, when there is network sniffing of the connection, and when an outdated version of SSL is used.</p> <p>A successful attack allows a hacker to obtain real data exchanged between a web server and the web browser over HTTPS.</p> <p><strong>SSL configuration analysis API</strong> is a useful instrument that allows checking if the host supports vulnerable SSL protocols and can alert users about the Beast vulnerability. Protection from the bug is possible by setting the HttpOnly property on cookies. More importantly, an upgrade from a TLS/1.0 flaw is required within the browser.</p> <h3>Impersonation</h3> <p>An impersonation attack is a malicious practice of assuming the identity of an employee, a third party personality, or a business entity to steal money or confidential data. This type of cyber attack is becoming widespread and causing substantial financial losses.</p> <p>Corporate employees are easily getting duped into providing sensitive information to hackers masquerading as trusted company vendors. Businesses are also suffering from the fallout as their online users are victimized — causing costly damage suits, pilfered funds, and ruined reputations.</p> <p>The <strong>SSL configuration analysis API</strong> is helping organizations block this threat through hostname and certificate validation and HTTP Public Key Pinning Extension protocols. The API's availability across departments will enable employees to look up target websites and check for configurations that can warn them of impersonation attacks.</p> <div class="pic-wrapper"> <img src="https://threatintelligenceplatform.com/images/blog/ssl-configuration-analysis-api-5-cyber-threats-it-can-protect-you-from/man-in-the-middle-attacks.jpg" title="Man-in-the-Middle Attacks" alt="Man-in-the-Middle Attacks"> </div> <h3>Man-in-the-Middle Attacks</h3> <p>A man-in-the-middle attack is a type of cyber attack where a hacker secretly intercepts and even alters the communication between two parties to take financial or confidential information. Hackers can take control of a public WiFi connection and have a field day snatching bank account details, passwords, credit card numbers, and login details – any information that can be used for financial or business gain.</p> <p><strong>SSL configuration analysis API</strong> can help alert businesses about man-in-the-middle attacks and provides insights on how to foil them notably by being wary of self-signed certificates, checking whether or not SSLv2 is supported, and that the public key certificates should not be present in the Debian blacklist as certificates generated on Debian Linux systems are weak and allow for MITM attacks.</p> <div class="custom-hr"></div> <p><a href="https://threatintelligenceplatform.com/threat-intelligence-apis/ssl-configuration-analysis-api" title="SSL Configuration Analysis API">SSL configuration analysis API</a> is paving the way for a more secure business landscape in the face of cyber threats. Trusting its insights will lead to safer connections and better decisions.</p> <p>If you want to learn more about how our APIs can help you mitigate online threats and ensure better security, contact us at <a href="mailto:service.desk@threatintelligenceplatform.com">service.desk@threatintelligenceplatform.com</a> or <a href="https://threatintelligenceplatform.com/signup" title="Sign up">sign up for a free trial</a>.</p>
]]></content:encoded>
        </item>
        <item>
            <title>SSL Certificates Chain Analysis API: Exploring the Chain</title>
            <link>https://threatintelligenceplatform.com/blog/ssl-certificates-chain-analysis-api-exploring-the-chain</link>
            <pubDate>Mon, 29 Oct 2018 00:00:00 +0000</pubDate>
            <dc:creator>admin</dc:creator>

            <guid isPermaLink="false">https://threatintelligenceplatform.com/blog/?p=200</guid>
            <description><![CDATA[
            <img width="1000" height="750" src="https://threatintelligenceplatform.com/images/blog/ssl-certificates-chain-analysis-api-exploring-the-chain/ssl-certificates-chain-analysis-api-exploring-the-chain.jpg" class="webfeedsFeaturedVisual wp-post-image" alt="SSL Certificates Chain Analysis API: Exploring the Chain" style="display: block; margin: auto; margin-bottom: 25px;max-width: 100%;" />
            <p>Trust is the bond that connects the many interactions on the web but it is only given after a company or website has been proven worthy of it. In this context, proof comes from SSL certificates provided through a chain of issuing authorities — checked for authenticity link by link through <a href="https://threatintelligenceplatform.com/threat-intelligence-apis/ssl-certificates-chain-api" title="SSL Certificates Chain API">SSL Certificates Chain Analysis API</a>.</p>
]]></description>
            <content:encoded><![CDATA[
            <img width="1000" height="750" src="https://threatintelligenceplatform.com/images/blog/ssl-certificates-chain-analysis-api-exploring-the-chain/ssl-certificates-chain-analysis-api-exploring-the-chain.jpg" class="webfeedsFeaturedVisual wp-post-image" alt="SSL Certificates Chain Analysis API: Exploring the Chain" style="display: block; margin: auto; margin-bottom: 25px;max-width: 100%;" />
             <p class="first-child">Trust is the bond that connects the many interactions on the web but it is only given after a company or website has been proven worthy of it. In this context, proof comes from SSL certificates provided through a chain of issuing authorities — checked for authenticity link by link through <a href="https://threatintelligenceplatform.com/threat-intelligence-apis/ssl-certificates-chain-api" title="SSL Certificates Chain API">SSL Certificates Chain Analysis API</a>.</p> <p>Only when every element in the chain is correct can full trustworthiness be earned. So let’s dig in and look at it more closely.</p> <h3>What Is the SSL Certificate Chain?</h3> <p>An SSL Certificate Chain is a chronological collection of all SSL certificates that comprise the SSL certificates chain. <span class="span-no-wrap">It consists of</span>:</p> <ul> <li><strong>Server certificate</strong><br> The chain begins with the server certificate (SSL certificate) which is used to identify a server and provides the basis for encrypting and decrypting content. </li> <li><strong>Intermediate certificate</strong><br> It's the signer/issuer of the server certificate. It sits between the server certificate and the root certificate and must be installed on the server to make the SSL certificate compatible with all the clients. Otherwise, some browsers, applications, and mobile devices may not trust the SSL certificate. </li> <li><strong>Root CA certificate</strong><br> It's the signer/issuer of the intermediate certificate which is put at the end of the chain. It is always signed by the Certificate Authority itself. </li> <li><strong>Certificate Authority (CA)</strong><br> It is a trusted third-party entity that issues digital SSL certificates and public keys that are used for encrypting information in a public network. </li> </ul> <h3>How Does SSL Certificates Chain Analysis API Work?</h3> <p>You can start working with <strong>SSL Certificates Chain Analysis API</strong> by inputting the domain name to be analyzed. This will open an ordered list of all SSL certificates issued to that domain beginning with the end user SSL certificate on one end, all the intermediate certificates in the middle, and the root SSL certificate on the other end.</p> <p>As a result, each SSL certificate in the chain is provided with a number of important details, including:</p> <ul> <li>The position in the certificates chain — End-user, Intermediate, or Root</li> <li>The type of validation (Domain, Organization or Extended) and validation dates</li> <li>The issuer — the person who issues the certificate</li> <li>The subject — to whom the certificate is issued</li> <li>The list of allowed purposes a certificate can be used for</li> <li>Public key information and extensions</li> </ul> <p>In turn, each of these parameters is checked against existing records to see whether the certificate was issued by a trusted source.</p> <h3>What Happens if the Chain Is Invalid?</h3> <p>Improperly configured SSL chain might create various issues. First of all, misconfigurations detected during the SSL Certificates Chain Analysis may automatically cause certificate errors in browsers. These result in warnings that can lead to poor user experience or, worse, drive website visitors away. Additionally, misconfigured chains might not work in some browsers and can be hard to debug.</p> <div class="pic-wrapper"> <img src="https://threatintelligenceplatform.com/images/blog/ssl-certificates-chain-analysis-api-exploring-the-chain/what-happens-if-the-chain-is-invalid.jpg" title="What Happens if the Chain Is Invalid?" alt="What Happens if the Chain Is Invalid?"> </div> <h3>So Why Do Companies Need an SSL Certificates Chain Analysis?</h3> <p>A proper certificate chain analysis result validates a company's trustworthy standing in the web community and serves as a ticket to enjoy a host of advantages.</p> <ul> <li><strong>Guaranteed encryption</strong> – A correct chain ensures an encrypted link between a web server and a browser. It means that all online transactions that are exchanged between the web server and browsers remain confidential and protected from hackers, which is crucial for businesses conducting their interactions online. </li> <li><strong>Fail-safe identification</strong> – You can rest assured that the computer or web server you're talking to is one that you can trust. This is especially relevant in the face of rampant impersonation attacks that businesses often fall victims of. </li> <li><strong>Trustworthiness validation</strong> – Passing the strict SSL Certificates Chain Analysis validates a domain's trustworthiness in dealing with confidential information or financial transactions online. For example, checking certificates validation type when interacting with an e-commerce website can detect if the business pays attention to securing the sensitive data through an Extended Validation certificate. </li> <li><strong>Data security</strong> – SSL Certificates Chain Analysis confirms a domain's secure browser-server connection by authenticating its SSL certificate. This protects companies from man-in-the-middle attacks ensuring that no one can interfere in data security across all applications and platforms. </li> <li><strong>Increased Google rankings</strong> – A domain that has passed the verification of SSL Certificates Chain Analysis runs no risk of being blocked and increases its prospects for higher Google rankings. In fact, in 2017, <a href="https://moz.com/blog/half-page-one-google-results-https" title="Half of Page-1 Google Results Are Now HTTPS" target="_blank">50% of page 1</a> Google organic search results featured secure (HTTPS) websites. </li> <li><strong>Enhanced customer trust</strong> – A verified SSL certificate chain assures customers of the reliability of a domain's SSL sign. This is good for business as customers have fewer apprehensions about sharing their data. </li> <li><strong>Improved conversion rate</strong> – Websites with a clean bill of SSL health can improve their products' conversion rate as visitors are encouraged to visit, thereby increasing the likelihood of an online purchase. </li> </ul> <p>The web is built upon a chain of trust. Find out if you, a close third party, or any online entity you interact with measure up to the exacting standards of the chain by letting domains go through the SSL Certificates Chain Analysis API.</p> <p>If you wish to learn more about how our APIs can help your business improve online security and safeguard sensitive information, contact us at <a href="mailto:service.desk@threatintelligenceplatform.com">service.desk@threatintelligenceplatform.com</a> or <a href="https://threatintelligenceplatform.com/signup" title="Sign up">sign up for a free trial</a>.</p>
]]></content:encoded>
        </item>
        <item>
            <title>Cyber Threat Intelligence can help you Manage Digital Risks</title>
            <link>https://threatintelligenceplatform.com/blog/all-along-the-watchtower-how-this-solution-can-help-manage-digital-risk</link>
            <pubDate>Mon, 22 Oct 2018 00:00:00 +0000</pubDate>
            <dc:creator>admin</dc:creator>

            <guid isPermaLink="false">https://threatintelligenceplatform.com/blog/?p=1</guid>
            <description><![CDATA[
            <img width="1000" height="750" src="https://threatintelligenceplatform.com/images/blog/all-along-the-watchtower-how-this-solution-can-help-manage-digital-risk/the-internet-of-things-and-daily-data-creation.jpg" class="webfeedsFeaturedVisual wp-post-image" alt="Cyber Threat Intelligence can help you Manage Digital Risks" style="display: block; margin: auto; margin-bottom: 25px;max-width: 100%;" />
            <p>Every single day, over 2.5 quintillion bytes of data are created. The Internet of Things (IoT) world of connected, smart devices is growing rapidly, and there’s estimated to be <a href="https://www.intel.com/content/dam/www/public/us/en/images/iot/guide-to-iot-infographic.png" title="A guide to the Internet of Things" target="_blank">26 smart objects per human</a> on earth by 2020, with most of these devices being used in factories, business and healthcare. The enterprise application market could reach $288 billion by 2024.</p>
]]></description>
            <content:encoded><![CDATA[
            <img width="1000" height="750" src="https://threatintelligenceplatform.com/images/blog/all-along-the-watchtower-how-this-solution-can-help-manage-digital-risk/the-internet-of-things-and-daily-data-creation.jpg" class="webfeedsFeaturedVisual wp-post-image" alt="Cyber Threat Intelligence can help you Manage Digital Risks" style="display: block; margin: auto; margin-bottom: 25px;max-width: 100%;" />
            <p class="first-child">Every single day, over 2.5 quintillion bytes of data are created. The Internet of Things (IoT) world of connected, smart devices is growing rapidly, and there’s estimated to be <a href="https://www.intel.com/content/dam/www/public/us/en/images/iot/guide-to-iot-infographic.png" title="A guide to the Internet of Things" target="_blank">26 smart objects per human</a> on earth by 2020, with most of these devices being used in factories, business and healthcare. The enterprise application market could reach $288 billion by 2024.</p> <p>This exponential growth in data and technology helps companies increase efficiency, achieve new goals and reduce costs. However, these global trends also <a href="https://threatintelligenceplatform.com/blog/just-how-secure-is-your-organization-in-todays-digital-world" title="Just How Secure Is Your Organization in Today's Digital World?">come with more complex digital risks</a> that require more sophisticated threat intelligence strategies. Building a watchtower is one of the best ways of monitoring and protecting your business’ data and future.</p> <h3>What Is Digital Risk?</h3> <p>There are many sources of digital risk. While most risks revolve around data collection, storage and delivery, breaking the risks down into additional categories can help you build an informed threat intelligence strategy.</p> <ul> <li><strong>Data:</strong> This category includes any cyberattacks, leakages, theft or other breaches of sensitive data. It can include items such as customers’ financial data or proprietary company code. </li> <li><strong>Infrastructure:</strong> This covers everything that keeps your company running from on-site, automated manufacturing processes to hardware and software. </li> <li><strong>Personnel:</strong> While a thorough interview process can help you hire employees who will adhere to company risk management strategies, negligence or theft of employee credentials represent a risk. Also, there’s always a chance that an upset employee could turn on the company and expose it to more digital risk. </li> <li><strong>Supply chain:</strong> Working with third parties could expose you to more risk since they may have different security protocols. </li> </ul> <h4>How Can You Protect Against These Risks?</h4> <p>An active approach to risk management is always a better approach than waiting for something to happen. Most <a href="https://threatintelligenceplatform.com/pricing" title="Pricing of Threat Intelligence Platform &amp; API Services">threat intelligence plans</a> will outline potential risks as well as solutions to various scenarios. While you can never plan for all possible issues, this will help you be more prepared if something does happen.</p> <div class="pic-wrapper"> <img src="https://threatintelligenceplatform.com/images/blog/all-along-the-watchtower-how-this-solution-can-help-manage-digital-risk/protect-your-company-from-cyber-attacks.jpg" title="Protect your company from cyber attacks" alt="Protect your company from cyber attacks"> </div> <p>The old approach used to advocate building a wall that cuts off potential intruders, but this is next to impossible with the amount of data and tech that companies use. Instead, building a watchtower is a <a href="https://threatintelligenceplatform.com/blog/how-does-threat-intelligence-benefit-your-organization" title="How Does Threat Intelligence Benefit Your Organization?">much more comprehensive and manageable approach</a> to management. The watchtower should be able to automatically collect data from multiple sources, analyze it using advanced data science and machine learning and be able to incorporate protocols for mitigating different situations.</p> <h4>How Do Threat Intelligence Platforms Help?</h4> <p>Fortunately, there are companies that specialize in developing <a href="https://threatintelligenceplatform.com" title="Threat Intelligence Platform - Protection Tools, Services, API's">customized threat intelligence solutions</a>, also called “watchtowers” to help your company defend its valuable assets. Solution providers should have the capability to automatically collect, monitor and analyze different data sources to identify and resolve potential threats. These platforms should at least:</p> <ul> <li>Analyze host infrastructure and domain SSL certificates</li> <li>Investigate content and WHOIS records</li> <li>Check configuration of DNS MX records and name services.</li> </ul> <p>Digital risk can negatively impact a company much more quickly than more traditional risks, so it’s important to develop a <a href="https://threatintelligenceplatform.com/blog/5-more-examples-of-threat-intelligence-platform-use-cases" title="5 More Examples of Threat Intelligence Platform Use Cases">comprehensive threat intelligence management strategy</a>. Watchtowers offer a compelling solution given its robust capabilities to analyze large amounts of data and adapt to different situations. Working with an experienced and dedicated security company can help you keep pace with the evolving, technologically-driven world.</p>
]]></content:encoded>
        </item>
        <item>
            <title>4 Essential Threat Intelligence Tools to Keep Your Servers Safe</title>
            <link>https://threatintelligenceplatform.com/blog/4-essential-threat-intelligence-tools-to-keep-your-servers-safe</link>
            <pubDate>Mon, 15 Oct 2018 00:00:00 +0000</pubDate>
            <dc:creator>admin</dc:creator>

            <guid isPermaLink="false">https://threatintelligenceplatform.com/blog/?p=11</guid>
            <description><![CDATA[
            <img width="1000" height="750" src="https://threatintelligenceplatform.com/images/blog/4-essential-threat-intelligence-tools-to-keep-your-servers-safe/research-aids-can-keep-your-company-away-from-cyber-attack-reach.jpg" class="webfeedsFeaturedVisual wp-post-image" alt="4 Essential Threat Intelligence Tools to Keep Your Servers Safe" style="display: block; margin: auto; margin-bottom: 25px;max-width: 100%;" />
            <p>Owning a business in the 21st century means maintaining an effective and useful web site for potential clients to find and engage with your business. Unfortunately, a web presence <a href="https://threatintelligenceplatform.com/blog/just-how-secure-is-your-organization-in-todays-digital-world" title="Just How Secure Is Your Organization in Today's Digital World?">follows a risk of cyber-attacks</a> so it’s essential that your business be properly protected. Whether you’re a large corporation with a sizable cyber security unit, or you’re a small business and your own cyber security team, <a href="https://threatintelligenceplatform.com" title="Threat Intelligence Platform - Protection Tools, Services, API's">getting the right threat intelligence tools</a> is vital. Taking advantage of these tools can make a difference between another successful day of operations and a major compromising incident which costs you both time and money.</p>
]]></description>
            <content:encoded><![CDATA[
            <img width="1000" height="750" src="https://threatintelligenceplatform.com/images/blog/4-essential-threat-intelligence-tools-to-keep-your-servers-safe/research-aids-can-keep-your-company-away-from-cyber-attack-reach.jpg" class="webfeedsFeaturedVisual wp-post-image" alt="4 Essential Threat Intelligence Tools to Keep Your Servers Safe" style="display: block; margin: auto; margin-bottom: 25px;max-width: 100%;" />
            <p class="first-child">Owning a business in the 21st century means maintaining an effective and useful web site for potential clients to find and engage with your business. Unfortunately, a web presence <a href="https://threatintelligenceplatform.com/blog/just-how-secure-is-your-organization-in-todays-digital-world" title="Just How Secure Is Your Organization in Today's Digital World?">follows a risk of cyber-attacks</a> so it’s essential that your business be properly protected. Whether you’re a large corporation with a sizable cyber security unit, or you’re a small business and your own cyber security team, <a href="https://threatintelligenceplatform.com" title="Threat Intelligence Platform - Protection Tools, Services, API's">getting the right threat intelligence tools</a> is vital. Taking advantage of these tools can make a difference between another successful day of operations and a major compromising incident which costs you both time and money.</p> <h3>1. Research Aids</h3> <p>The first step in keeping your company safe and secure is ensuring that you always know what risks you are facing. <a href="https://threatconnect.com/blog/7-threat-intelligence-tools-your-cybersecurity-team-needs/" title="7 Threat Intelligence Tools Your Cybersecurity Team Needs" target="_blank">Utilizing a research network</a> not only allows you to find solutions to problems which pop up based on prior success for others, but also helps to track developing trends which may indicate the next wave in cyber-attacks. Staying one step ahead of attackers is an important part of threat intelligence.</p> <h3>2. Network Traffic Monitoring</h3> <p>Knowing what to look for doesn’t do you any good if you’re not creating some way to monitor what is going on and apply that knowledge. With a log of all the connections made to your network, it is possible to spot outside entities attempting to access your server in ways they should not. You can also use your logs to search for other potential problems you are on the lookout for from your research assistance.</p> <h3>3. Malware Databases</h3> <p>The cyber security field is one built on collaboration. Problems you discover and find solutions to will be helpful to others in the future, and problems you’re having now may have already been fixed by those who’ve dealt with it previously. Threat intelligence tools like a malware search engine allows you to directly seek out information about the threat you are facing in order to begin working toward a solution more efficiently.</p> <div class="pic-wrapper"> <img src="https://threatintelligenceplatform.com/images/blog/4-essential-threat-intelligence-tools-to-keep-your-servers-safe/threat-intelligence-apis-to-help-you-protect-company-data.jpg" title="Threat Intelligence APIs to help you protect company data" alt="Threat Intelligence APIs to help you protect company data"> </div> <h3>4. Threat Intelligence APIs</h3> <p>The <a href="https://threatintelligenceplatform.com/blog/an-examination-of-the-5-most-effective-threat-intelligence-use-cases" title="An Examination of the 5 Most Effective Threat Intelligence Use Cases">most effective way to protect your company’s web site</a> is to be utilizing security APIs to protect your network. Installing a trusted and reliable set of threat intelligence APIs on your network’s systems makes it easier to get the information you need to identify threats as they occur, and avoid potential problems. Many of the <a href="https://threatintelligenceplatform.com/threat-intelligence-api" title="Threat Intelligence API - 6 Different Security Analysis APIs">best threat intelligence API</a> providers offer services which include analyzing the security certificates of sites and finding any malware present. These services can help to prevent computers on your network from accessing other infected networks, which lowers the risk of issues for your network as it reduces the likelihood of malware being transferred.</p> <h4>The Need of Implementing Cyber Threat Intelligence</h4> <p>Don’t let you and your company become the victims of cyber-attacks. There is no feeling more helpless than falling prey to cyber threats and not knowing what to do to fix it. Just because you’ve never dealt with an attack doesn’t mean you never will, so <a href="https://threatintelligenceplatform.com/pricing" title="Pricing of Threat Intelligence Platform &amp; API Services">look into the best threat intelligence tools for your company today</a> before it’s too late.</p>
]]></content:encoded>
        </item>
    </channel>
</rss>
