Operational threat intelligence with Maltego Transform Hub

Blue

“I’m drowning in data, but starving for information.” Ever feel that way? Recently, I heard a CISO use this as a description of his company’s information security posture. Today, enterprises are littered with data collection sensors and data aggregation systems, creating an unrelenting deluge of non-contextual indicators. Somewhere in this jumble of alerts and indicators are gold nuggets, the kind of nuggets that make the difference between being the frazzled poster child for the latest breach, and hearing about it on the news while eating dinner at home with your family. Increasingly, the key to unlocking these gold nuggets to sort the proverbial wheat from the chaff is actionable threat intelligence.

Operationalizing threat intelligence is one of the first and greatest challenges organizations face when deciding to embrace an intelligence-driven security model. There are myriad formats that threat intelligence may come in, and many of the enterprise products used today have proprietary formats for ingesting and consuming externally sourced data. While whole volumes can be written on suggested methodologies or strategies for incorporating threat intelligence, there are some really great products out there today that make utilization of threat intelligence a breeze.

Data visualization is a powerful tool for conducting investigations or hunting for anomalous activity. Our friends at Paterva (http://www.paterva.com/) have a product used by many information security professionals today. Their data visualization and charting software Maltego has utility in everything from Penetration Testing to Incident Response. The CrowdStrike Intelligence team uses Maltego to map out complex relationships as well as to incorporate data from disparate sources into our investigations. Existing Maltego Chlorine users can access Falcon Intelligence data to perform attribution on 70+ adversary groups, to include nation-state, hacktivist, activist, and criminal threat actors.

Visualize Threat Intelligence

Use Maltego to visualize and pivot into detailed indicators of compromise related to threat actors targeting an organization.

For additional information on how to access CrowdStrike Falcon Intelligence using Maltego, please contact: sales@crowdstrike.com.

Adam Meyers

Adam Meyers has authored numerous papers for peer-reviewed industry venues and has received awards for his dedication to the information security industry. As Vice President of Intelligence for Crowdstrike, Meyers oversees all of CrowdStrike’s intelligence gathering and cyber-adversarial monitoring activities. Previously, Meyers was the Director of Cyber Security Intelligence with the National Products and Offerings Division of SRA International where he provided technical expertise at the tactical level and strategic guidance on overall security program objectives.

 

Stop Breaches with CrowdStrike Falcon request a live demo