{"id":12194,"date":"2016-02-17T13:55:59","date_gmt":"2016-02-17T21:55:59","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=12194"},"modified":"2016-02-17T15:08:21","modified_gmt":"2016-02-17T23:08:21","slug":"are-threat-indicators-enough-or-should-we-be-looking-at-threat-dna","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2016\/02\/are-threat-indicators-enough-or-should-we-be-looking-at-threat-dna\/","title":{"rendered":"Are Threat Indicators Enough or Should We Be Looking at Threat DNA?"},"content":{"rendered":"<p>As the speed and volume of threats today shows no abatement, there is much discussion that the only way to keep pace is through automation and self-learning. Although the answer sounds simple, the tough part is figuring out how we achieve this.<\/p>\n<p>Most attackers look at the broad dossier of attack techniques today and, like any playbook, take some of what has been done before and try to sprinkle in a hint of their personalization to make it unique.\u00a0\u00a0In today's world this is no longer about simply creating a bad binary object and emailing it around with a smart, socially engineered subject line.<\/p>\n<p><!--more--><\/p>\n<p>Take, as an example, Cryptowall v3.0. Ransomware is a simple concept; but, to succeed at that, attackers have had to leverage multiple campaigns with over 4,000 iterations of the attack binary using multiple exploits, including exploit tools such as the Angler exploit kit, compromising large numbers of public WordPress sites and building a complex array of over 800 command and control sites, just to name some of the aspects of the overall attack.\u00a0\u00a0Once compromised, payments could hop through up to 80 bitcoin wallets before reaching their final destination.\u00a0Why is all of this so important? The more we can map out attackers, the better we can find and block future iterations of their attacks.<\/p>\n<p>In the physical world, criminals typically look just like every other person; and, today, with over 7 billion people on the planet, finding them can seem like an impossible task. Over the years, law enforcement experts have built techniques to uniquely identify criminal, such as photofits and, now, DNA.\u00a0Such techniques not only uniquely identify criminals but also help link them to the crimes they have committed.<\/p>\n<p>The same concepts apply in cyber, but today under a less mature guise.\u00a0We rely on tools to identify unique characteristics much like looking for eye or hair color. The challenge being, when you look at any such characteristics in isolation, such as looking for a bad email characteristics or a certain hair color, the level of false alerts can be unreal.\u00a0The once unique binary is like a face with makeup, so many different permutations are quickly achieved.\u00a0As such we need to look at all the attributes and try to see the whole face of the attack \u2013 better still, the DNA of the attack.\u00a0If we can do this, we can start to see existing attacks more accurately, allowing us to automate. The more we can automate the quicker we can detect. And, if we can gather the whole DNA, we can start to identify new attacks as they happen by their genetic links.<\/p>\n<figure id=\"attachment_12195\" aria-describedby=\"caption-attachment-12195\" style=\"width: 350px\" class=\"wp-caption alignleft\"><a href=\"https:\/\/en.wikipedia.org\/wiki\/DNA\" rel=\"nofollow,noopener\"  target=\"_blank\"><div style=\"max-width:100%\" data-width=\"350\"><span class=\"ar-custom\" style=\"padding-bottom:97.43%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"  wp-image-12195 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/02\/Security-DNA-1-500x487.png\" alt=\"Security DNA 1\" width=\"350\" height=\"341\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/02\/Security-DNA-1-500x487.png 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/02\/Security-DNA-1-230x224.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/02\/Security-DNA-1-308x300.png 308w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/02\/Security-DNA-1-41x40.png 41w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/02\/Security-DNA-1-32x32.png 32w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/02\/Security-DNA-1.png 533w\" sizes=\"auto, (max-width: 350px) 100vw, 350px\" \/><\/span><\/div><\/a><figcaption id=\"caption-attachment-12195\" class=\"wp-caption-text\">Source: Wikipedia<\/figcaption><\/figure>\n<p>Going back to CryptoWall, when v4 came out, it had some enhancements. Of course the email messages delivering it changed, as did the binary, requiring many traditional approaches to need an update. However, most of the underlying infrastructure stayed the same.\u00a0In the sci-fi film Jurassic Park, they filled in the DNA gaps to rebuild dinosaurs. Here we have the ability to make fiction into fact by mapping out the whole attack lifecycle (the DNA of the attack), which includes all of the indicators aligned to it (rather than just the indicators we see as compromising the victim), we can better detect and block not just the current attack but all future instances, forcing the attack to effectively create a whole new dinosaur. Effectively, we use the broader attack architecture DNA to fill in the gaps created by the dynamic components, such as the changing binary and delivery wrapping.<\/p>\n<p>Why don't we all do this today? DNA analysis happens in one lab; most security solutions simply look for an element of the attack. Much like the criminal photofit, they look at maybe the eyes or the nose or the hair -- perhaps all three.\u00a0But they typically don't see the whole face, and they certainly don't gather the entire DNA. It\u2019s like having a bunch of labs looking at different atoms trying to join together the strands, which was not historically their goal. Their goal was to block the attack, not understand what makes the attack function in the broader sense.<\/p>\n<p>To identify the DNA, we need to be able to join the right elements together. This means analyzing and correlating these characteristics; looking at the known and mapping against the unknown, we need to pull this into a single point of analysis so we can see the big picture.\u00a0To achieve this at a vendor level, you need solutions that were nativity designed to talk the same language; otherwise they are not comparing like for like.<\/p>\n<p>No vendor spans all the security requirements today. This is why protocols such as STIX, TAXII and Cybox have been developed to allow multiple vendors to collaborate in a virtual common lab, such as the <a href=\"http:\/\/cyberthreatalliance.org\" rel=\"nofollow,noopener\"  target=\"_blank\">Cyber Threat Alliance<\/a>, acting as the interpreter to automatically exchange big data through a common translation structure to support better mapping of the attack DNA.\u00a0Through this approach, the Cyber Threat Alliance worked collaboratively to uncover CryptoWall 3.<\/p>\n<p>There are many ways of trying to keep pace with today\u2019s threats; each has its own advantages and disadvantages. The challenge, however, is that most are still looking to improve the identification of a characteristic. To better spot the criminal among the billions of faces, we need to leverage every aspect we can to make them stand out as unique and at the same time identify commonality. What's more important is that, with big data tools and common frames of reference, we can then look for these attributes to find their future faces.\u00a0At the end of the day, you can easily change individual aspects of your appearance, but it's extremely hard to change your DNA.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>As the speed and volume of threats today shows no abatement, there is much discussion that the only way to keep pace is through automation and self-learning. Although the answer sounds simple, &hellip;<\/p>\n","protected":false},"author":150,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1766,155],"tags":[834,221,1631],"coauthors":[1466],"class_list":["post-12194","post","type-post","status-publish","format-standard","hentry","category-cso-perspective","category-cybersecurity-2","tag-cryptowall","tag-ransomware","tag-threat-landscape"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/12194","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/150"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=12194"}],"version-history":[{"count":8,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/12194\/revisions"}],"predecessor-version":[{"id":12203,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/12194\/revisions\/12203"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=12194"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=12194"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=12194"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=12194"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}