Back to Tech Center

Threat Intelligence the CrowdStrike Way

January 2, 2019

Tech Center
CrowdStrike Tech Center

Introduction

This document and video will provide an overview of CrowdStrike’s Intelligence services and the importance of consumable intelligence.

Video

Intelligence Services Overview

Threat Intelligence is a key component of CrowdStrike’s effective approach. It is critical that organizations have consumable Intelligence so that they can understand the adversary, learn from attacks and take action on indicators to improve their overall defenses.  

That approach goes beyond being just another threat feed. Starting with a customer onboarding process, CrowdStrike works to understand your business, third party tools and existing processes so that the Intelligence information provided is both relevant and useful.  Below are a few examples of how CrowdStrike’s Intelligence Services are different than the competition.

Ease of Use

The Intelligence Dashboard provides an overview of the latest information and reports.  You can drill down into this report to view specific items or use the map to perform your own searches starting with country.  

Intelligence Dashboard

 

After clicking on a given country, you see additional filter options so that you can research the latest alerts based on the target countries, target industries, actors or motivations.

Intelligence Alerts

 

From the Intelligence menu, you can also elect to have a subscription to receive these alerts directly via email.

Intelligence Menu Subscriptions

 

That menu gives you the option to set the frequency of email updates along with your areas of interest as shown below.

Intelligence Subscriptions

Customized Intelligence

CrowdStrike provides customized content including business sector briefs and tailored intelligence. During the onboarding process, CrowdStrike will collect information on key phrases, product names, critical infrastructure, terms or people.  

Below, you see the option for “Tailored Intelligence” in the Intelligence application on the left menu.

Tailored Intelligence Menu

That option takes you to a list of all the monitored key works for your organization. With the information gathered during onboarding, CrowdStrike will monitor the Internet and report on any mentions that could indicate a targeted attack on your organization.

Tailored Intelligence

You can drill down on the “Keyword Names” to see the full list of hits.  You can view the details of each hit including date, time and complete text.

Intelligence Keywords

Access to Experts

CrowdStrike’s Intelligence experts track the activity of over one hundred threat actors around the world. That information can help you understand the adversary and their motivations while also empowering you to take action to improve you organizations defenses. You will see an option to do research by “Actors” in the Intelligence menu.

Intelligence Actors Menu

 

Like before, the Actor search includes a filter option so that you can hone in on your specific areas of concern.

Intelligence Actors

 

For each actor, you will also find a detailed profile that summarizes the findings of CrowdStrike’s Intelligence experts including the commonly targeted industries and countries for each actor. Also included are any known Command & Control addresses and frequency leverages vulnerabilities. That kind of information can help you bolster your existing defenses against a specific adversary.

From the actor profile, you will also find links to related alerts and Tipper reports. Tipper reports are very detailed including additional Indicators of Compromise as well as hunting tools like yara rules.

Intelligence Actor Profile

 

In the event that you need to do research on a specific sample, Intelligence customers also have the option to submit malware files for CrowdStrike analysis.

Intelligence Menu Submissions

 

The “Submit Malware” page allows you to upload a file along with a description to CrowdStrike’s Intelligence team for complete analysis. This is more than the “request for detection” that other vendors offer.  The result of this request is a complete report detailing the behavior of the file. It could even result in a Tipper report or Intelligence alert.

Intelligence Submissions

Conclusion

As you have seen, CrowdStrike’s Intelligence offerings give you customized intelligence that is accessible and easy to use.  It is much more than just another threat feed. CrowdStrike provides a solution tailored for your organization to maximize the usefulness of the data, improve your response capabilities and reduce the risk of breach.

More resources

Related Content