September | 2020

What

Where

When

 

Am I Protecting

• Asset Types

• Employee Groups

• Geographic Locations

• Customer Data

• Secret Projects or IP

 

Am I Defending Against

• TTPs

• Adversary Groups

• Insider Threats

• Customer Fraud

 

Did this Info Come From

• Forums & Markets

• 3rd Party Data Leaks

• Mobile Messaging Apps

• Government Notification

 

 

Am I Defending Against

• TTPs

• Adversary Groups

• Insider Threats

• Customer Fraud

 

Was It Detected

• Reconnaissance

• Initial Compromise

• Early Foothold

• Lateral Movement

• Data Exfiltration

 

Is Action Required

• Immediately

• In the near term

• Longer term

The What, Where & When for Effective Dark Web Threat Hunting

Type

What

Where

When

IntSight Approach

Attack Identification

•Announced intention

•Domain specific malware

•Target lists

•Stolen goods

•Insider recruitment

•Scam pages

•Accounts for sale

•Forums

•Malware repositories

•Black markets

•Paste sites

•IM platforms

•IRC chats

All stages

We use avatars to contact the threat actor, and try to either gain a sample of the data that is offered for sale, or extract more information from them. Then we can understand where the data

came from, and try to understand the scope of the attack and the capabilities of the attacker.

Data Leakage

•Confidential information

•Leaked credentials

•Email

•Paste sites

•Company website

•Data breaches

•Insider leaks

After initial compromise

Varies based on type of leak, but we will investigate source of leak, change passwords and encourage user awareness training and dark web monitoring.

Phishing

•Social engineering

via original domains or domains similar to corporate domains

•Employee or customer targeted emails

•Whois services

•Spam report sites

•Internal IT

•Customer support

•FBI

Initial recon, compromise, and privilege escalation

Block suspicious domains from communicating with email gateways and firewalls.

Remediate domains by contacting registrar and host  service provider. Encourage user awareness training.

 

Brand Security

•Social engineering via unauthorized use of brands aimed at high employees or customers

•Fake account profiles

•Fake corporate apps

•Social media

•Fake spoof sites

•App stores

Preparation stage (before the attack, very early stage or ongoing attack)

Warn employees not to communicate with suspicious profiles or download suspicious apps. Request fake apps be removed from app stores.

Exploitable Data

 

•Unpatched vulnerabilities

•Open ports

•Unencrypted login pages

•Internal pages accessible via IP

•Exposed

•Corp/partner sites

•Vulnerable software

•Bug bounty programs

•Dark web forums

•Zero days exploits

 

After initial compromise

Investigate vulnerable points or open ports, ensure all relevant software updates are downloaded and patched.

Review and secure web and service login pages.

 

VIP

 

•Top executives

•Board members,

•R&D team members

 

•Email

•Social media

•Credential theft

 

All stages

 

Tighter IT controls and improved user awareness training.

The What, Where & When for Effective Dark Web Threat Hunting

About IntSights

Related Articles