Blog post

On Threat Intelligence Sources

By Anton Chuvakin | February 26, 2014 | 0 Comments

threat intelligencesecurity

Where does threat intelligence (TI) come from? Yes, we all know that little gnomes living in the clouds make threat intelligence out of seagulls’ poo. But apart from that, where DOES it come from?

Let’s delve into this, starting from the high level. Some types of TI are simply the results of somebody else’s security monitoring. They see it, they share it, you pay them to see it too. The proverbial “they” may have bigger networks, better tools or simply be in that business for hard cold cash. Other TI comes from people who go actively crawl for threats, browse sites for malware, run honeypots, spam traps, sinkholes, etc or even actively “engage” the threat actors and/or infiltrate their ranks. Different processes – different TI (all fitting our broad TI definition).

In general, categorizing the TI sources as “technical” and “human” is a bit artificial, since many of the sources are in essence produced by a tight collaboration of humans AND machines (e.g. a smart TI analyst armed with data visualization and entity linking software) with various fractions of contributions from each. Still, mostly technical sources include:

  • Network monitoring (NIDS, NBA, etc)
  • Server and client honeypots [some vendors want to say they use “next gen honeypots” which really means that they use … honeypots :-)]
  • Spam (and phishing email) traps
  • Live botnet connections
  • Link crawling for malware and exploit code
  • Malware reversing and observation
  • Social network monitoring
  • BGP observation [ooooh…fun!]
  • Tor usage monitoring

However, some of the juicier intel does not come from automated tools, but from people (admittedly, equipped with tools). For example, you don’t simply wget a Russian cybercrime forum for future analysis. A human needs to actively work to get in. Similarly, you don’t simply sniff IRC traffic or intercept emails between attackers, a lot of “very human” work is involved before this task can be completed. Some TI vendors whisper about infiltration and “aggressive techniques” (as I suspect, some hacking across state borders aimed at malicious infrastructure may in fact be legal [or at least unlikely to ever be charged] in the source country).

This set of sources includes examples such as:

  • Public internet, IRC, newsgroup monitoring [crawlers + human analysts/translators]
  • Attacker online community infiltration (web forum, “private” social media, IRC, etc)
  • Leaked data about attacker’s infrastructure (such as leaks by other attackers)
  • Direct compromise of attackers systems.

Furthermore, if you are buying/receiving TI from somebody else (government, regional CERT, sharing club, security vendor, TI vendor) the intel you receive is ultimately produced by a blend of the above sources. Of course, you may also be producing your very own TI from local incident artifacts – a subject of the next post in this series…

Have I missed any major threat intel sources?

Or, better, can you think of a better way to classify and organize them?

Posts related to this research project:

The Gartner Blog Network provides an opportunity for Gartner analysts to test ideas and move research forward. Because the content posted by Gartner analysts on this site does not undergo our standard editorial review, all comments or opinions expressed hereunder are those of the individual contributors and do not represent the views of Gartner, Inc. or its management.

Comments are closed