Cyber Threat Intelligence
Cyber Threat Intelligence
Cyber Threat Intelligence
Cyber Threat
Intelligence
MIS 689
Cyber Warfare
Capstone
Module Objectives
Fundamental CTI
Exploring & Collecting Hacker Community Data
Exploring AZSecure Hacker Assets Portal: Identifying Threats, Actors,
and Targets
CTI Visualization via Tableau (Your Own Analysis)
Fundamental CTI
CTI process
Phase 2: Data Phase 4: Intel
Phase 1: Intel Phase 3: Threat
Collection and Usage and
Planning/Strategy Analytics
Aggregation Dissemination
Tutorials
Features
Youtube
Tutorials Sold in
Method of batch
Payment: Liberty
Reserve Blank Credit/Debit Cards (Plastics)
Collection Challenges
Anti-crawling measures
IP address blacklisting
User-agent check
User/password authentication & CAPTCHA validation
Denial of service for too many requests
Markets on Tor that sell Early indicator for breached • These tools help hackers conduct
illicit goods via companies; in-depth
DNMs cryptocurrency understanding of underground
cyber-attacks to attain sensitive
economy data such as credit card and SSN.
Shops selling stolen Monitoring trafficking of internet • Finally, hackers load stolen data to
Carding credit/debit cards and fraud industry; precaution of
Shops sensitive data breaches before happen DNMs and/or carding shops for
financial gain.
Table 1. Hacker Community Platform Summary
Data Collection Overview: Hacker Forums
Ransomware
description
Poster
information
Ransomw
are code
Information of one
card for carders
DNM 12 markets
249,597
English/
Russian/
51 hacker forums,
listings
French 13 IRC channels,
Carding
26 shops 8,674,078 English
12 DNMs
Shops listings
26 carding shops
Figure 6. (a) scorecard of active and expired cards, (b) Figure 7. (a) frequency of cards per shop, (b) banks of stolen
locations, (3) search, sort, and filter functions, and (d) cards, (c) average card prices, (d) filter capabilities, and (e)
frequency of cards based on zip code card issuers with most stolen cards
Exploring AZSecure Hacker Assets Portal:
Identifying Threats, Actors, and Targets
(Samtani, et al., JMIS, 34(4), 2017)
Hacker Asset Examples
Hackers and Hacker Assets
19
Introduction – Hacker Asset Examples
Figure 1. Forum post with source code to create botnets Figure 2. Forum post with BlackPOS malware attachment
System Analytics
Latent Dirichlet Allocation (LDA) and
Support Vector Machine (SVM) Analytics
987 tutorials, 15,576 source code, and Cyber Threat Intelligence VirusTotal Malware Analysis
14,851 attachments Dashboard
(a) Searching
(b) Sorting (e) Browsing: Raw Code
(c) Browsing
Cyber Threat Intelligence (CTI) Dashboard
Cyber Threat Intelligence (CTI) Example – Bank Exploits
1. Filtering on 2014, when BlackPOS was posted, shows assets and threat actors at that time.
2. Filtering the actor who posted BlackPOS reveals that he posts other bank exploits (e.g., Zeus).
• Provides intelligence on which hacker to monitor.
Cyber Threat Intelligence (CTI) Example – Crypters
1
2
3
1. Filtering for 2016 mobile malware shows assets and threat actors at that time.
2. Filtering on a specific actor (BH-HACKER) allows us to see the assets posted.
CTI Data Exploration &
Visualization via Tableau
(Your Own Analysis)
Tableau Background
Tableau is a powerful data visualization software.
Dimensions
Data fields that cannot
be aggregated
Qualitative values (such
as names, dates, or Drag-n-drop
geographical data)
Measures
Data
Data fields that can be
measured, aggregated,
or used for math Worksheet
Format/
operations Encode Plot types
Numeric, quantitative
values
Tabs
https://onlinehelp.tableau.com/current/pro/desktop/en-us/datafields_typesandroles.htm
Walkthrough Example: NFL Sports
Analytics
The data used in this example is an Excel spreadsheet about NFL
Offensive players from 1999-2013. It contains:
~40,000 rows of data
Player information (physically measurable traits, birthplace, college attended)
Positions played
Wins achieved in career
Connecting to a Data Source
1
Suppose we want to know which major college conferences have most combined wins since 1999.
1. First, drag the “Conference” dimension into the “Rows” bar, and the “College Wins” into the
columns. Hit the drop down on the “College Wins” and select “Sum.”
2. Second, select bar chart on the right hand side.
3. To add a little bit of color, drag the “Conference” into the “Color” mark.
Creating a Word Cloud
1
Suppose now we want to get a general sense of the most popular conferences in
terms of player enrollment is concerned. A word cloud is a great way to visually
represent this.
1. First, switch the “Marks” option to “Text”.
2. Second, drag the “Conference” dimension into the “Text” marks box.
1. Then drag the “Conference” dimension into the “Size” marks box.
2. Adjust the measurement on this by hitting the drop down and selecting “Measure (Count)”
Creating a Geospatial Visualization
Consider now that we are 1
interested in the birthplaces of all
of the NFL players.
We can easily create a map
representation.
1. Drag the “Longitude” dimension
to columns, and “Latitude” 2
dimension to the rows. Select
the map visualization.
2. Add in some color by dragging
the “Birth Zip Code” into the
“Color” Marks.
Combining Visualizations into a Dashboard
To tell a more comprehensive
story, we can create a
dashboard combining all of the
visualizations.
Reference book:
Tableau Your Data!: Fast and Easy Visual Analysis with Tableau Software. Daniel Murray, 2 nd edition,
2015.
Available online through UA Library
Companion materials: http://tableauyourdata.com/downloads/