cs0-003 Lesson 02
cs0-003 Lesson 02
Lesson 2
Exploring Threat Intelligence and
Threat Hunting Concepts
Topic 2A
Exploring Threat Actor Concepts
4
Advanced Persistent Threat (APT)
• Threat Actors • Targets
• Nation State • Large organizations
• Organized Crime • Government
• Tools
• Command and Control
• Rootkits
• Custom Crafted Tools
5
Tactics, Techniques, and Procedures
• TTPs: the study of threat actor behavior
• Identify threat actors
• Understand methods attackers use
• MITRE ATT&CK
6
MITRE Attack Matrix
8
Lab Activity
• Assisted Lab: Reviewing IoC and Threat Intelligence Sources
9
Lesson 2
Topic 2B
Identifying Active Threats
11
Open-Source Intelligence (OSINT) cont.
• Social media
• Facebook, LinkedIn, etc.
• Posts or user profiles that give away sensitive information
12
Open-Source Intelligence (OSINT) cont.
• HTML code
• HTML on a web page provides:
• IP addresses
• Names of web servers
• Operating system versions
• File paths
• Names/emails of developers and administrators
• The layout and organization of the code reveals:
• development practices, capabilities
• level of security awareness
13
Open-Source Intelligence (OSINT) cont.
• Documents may not directly divulge sensitive information
• Metadata
• Metadata scans on publicly available documents
• Fingerprinting Organizations with Collected Archives (FOCA)
• Finds and extracts metadata
• File author names
• Names of users that made changes to a document
• Software name and version info (adobe Acrobat Office 2019, etc.)
• File paths and hostnames
• Usernames
14
Defensive OSINT
• Intelligence gathering that focuses on identifying threats
• Government bulletins
• CERT
• CSIRT
• Deep/Dark web
• Internal sources
15
Proprietary/Closed-Source Intelligence Sources
• Paid data feeds
• Special Interest and "member only" groups
• Threat intelligence data depends on three important attributes
• Timeliness
• Relevancy
• Accuracy
16
Information Sharing and Analysis Centers (ISACs)
• Provide cybersecurity information and services for critical
infrastructure teams
• All US-based ISACs: https://www.nationalisacs.org/member-isacs-3
• Critical Infrastructure
• The DHS identifies 16 critical infrastructure sectors
• https://www.dhs.gov/cisa/critical-infrastructure-sectors
17
Threat Intelligence Sharing
• Crucial for cyber defense teams
• Threat intelligence sharing goals
• Identifying indicators of compromise
• Tracking threat actor groups
• Documenting findings
• Discussing strategies
• Distributing knowledge
18
Review Activity: Active Threats
1. True or False. Open-Source intelligence describes the use of Linux
to identify potential attackers.
19
Lesson 2
Topic 2C
Exploring Threat-Hunting Concepts
21
Explain Indicators of Compromise (IoC)
• Suggest that a security incident may have occurred
• Sources of IoC
• System and applications logs
• Network monitoring software
• Endpoint protection tools
• Security Information and Event Management (SIEM) platforms
22
Explain Indicators of Compromise (IoC) cont.
• Provide a summary of malicious actions
• Identify the potential source of incident
• Inform a response plan
• Identify the systems and services to isolate or monitor
23
Digital Forensics
• Applying threat-hunting
techniques often requires using
data provided by information-
sharing platforms and "field
notes" created by professional
incident responders.
24
Decoy Methods and Concepts
• Active Defense
• Honeypots
• Redirect malicious traffic away
(decoys)
• Provide an early warning for
ongoing attacks
• Collect intelligence on the
attackers (Reproduced with permission of GitHub, Inc. COPYRIGHT ©
2023 All Rights Reserved.)
25
Review Activity: Threat-Hunting Concepts
1. What activity is best defined by the "assume breach" mindset?
2. What term describes when an attacker has successfully moved to
another system within the environment after gaining initial
access?
3. True or False. Indicators of attack (IoA) depend upon forensic
evidence to identify that unauthorized access has occurred.
26
Lab Activity
• Assisted Lab: Performing Threat Hunting
27
Cysa+ (CS0-003)
Lesson 2
Summary