August 25, 2016
Joe Franscella

Five Facts About Open Source Cyber Threat Intelligence

<p>With the persistence with which cyber-crime is affecting individuals and large enterprises alike, you would think that escalating online threats would be in the news more. These threats aren’t “fun facts” but we wish to shine a light on them anyway.</p><ol><li>Hackers for hire will perpetuate a <a href="" target="_blank">DDoS attack for as little as $2/hour</a>, and DDoS attacks are on the rise. Many hands make light work, be it for good or bad. An army of compromised computers can send a deluge of traffic to a company’s domain, rendering it inaccessible to actual users. With open source cyber threat intelligence, you can detect signs of a pending denial of service attack.</li><li>Mobile and device hacking is taking off. Hackers have discovered that your <a href="">phone and other smart devices</a> are a weak link in many security plans. Cell phone theft is rising at a greater rate in comparison to losses reported. With all of the personally identifying data contained within, it’s no wonder. Over <a href="" target="_blank">1/3 of users polled</a> haven’t taken steps to protect mobile privacy. There are several ways you can secure your mobile phone against attacks:<br/> a. Set a 6 or 8-digit passcode at the lock screen<br/> b. Enable a data wipe after several unsuccessful open attempts<br/> c. Back your data up to the cloud and secure it<br/> d. Use password encryption tools<br/> e. Install a mobile-locator app, preferably one that lets you wipe the phone clean remotely<br/> f. Use a security application<br/> g. Avoid public wifi - download media at home before starting your commute or heading to the café.If you still experience a mobile hack, you have options for recourse. Using your open source cyber threat intelligence<br/> platform, you can track the hackers’ movement from your mobile to the network and investigate the source of the attack.</li><li>“Location, location, location” – Mobile GPS tracking has enhanced our apps and adds another dimension of opportunity for hackers, too. Many users install locative apps without fully understanding the data collected. The more games, shopping apps and the like that you have enabled on your mobile, the more vulnerable you are to a mobile hack.</li></ol><p>The power of geolocation can work for you, too. When you leverage information about known threats together with peers, you will likely discover you have common enemies. It is possible for your open source cyber threat intelligence platform to <a href="">pool IOCs and analyze them by location</a>, producing a map of threats.</p><ol start="4"><li>Ransomware is not going anywhere, not just yet. Ransomware attacks exploded in 2015 with experts predicting even more prevalent attacks of malware holding entire enterprise networks hostage. Networks ranging in size from individual terminals up to multi-site networks have been frozen pending untraceable e-currency payments.</li></ol><p>Many hackers using ransomware attacks initially get a foothold via phishing emails. Ransomware attacks are difficult to stop once in progress, so prevention is a more reliable strategy. When your cyber-security system can study a honeypot email account or examine email traffic, the likelihood of phishing scams getting through is reduced.</p><ol start="5"><li>The hackers we see portrayed on the screen usually seek easy money or hack for personal gratification, but the real drama is international espionage. Government hackers are after information such as military secrets and medical or scientific developments. These governments are able to spend a lot of time and resources going after information undetected.</li></ol><p>A well configured open source cyber threat intelligence platform will notify you of problematic patterns such as traffic from suspicious sources or unusually timed logins. If you are sharing intelligence with peers, you may be able to benefit from their experience and take proactive measures before they attempt the same tactics on your organization.</p><p>These facts help to illustrate the need for security programs based on evidence-based reasoning. Whatever threats the future brings, intelligence strategies are keeping up with detection and prevention.</p><p>Let's dig deeper into what a successful threat intelligence program looks like. Download the complimentary whitepaper!</p><p><span class="hs-cta-wrapper" id="hs-cta-wrapper-f68f0b2e-fb62-48eb-acd6-8b2ad6455083"><span class="hs-cta-node hs-cta-f68f0b2e-fb62-48eb-acd6-8b2ad6455083" data-hs-drop="true" id="hs-cta-f68f0b2e-fb62-48eb-acd6-8b2ad6455083" style="visibility: visible; display: block; text-align: center;"><a class="cta_button" cta_dest_link="{page_3451}" href=";placement_guid=f68f0b2e-fb62-48eb-acd6-8b2ad6455083&amp;portal_id=458120&amp;redirect_url=APefjpEmuPWDpPuheemo8bO1WAKeHU5fV5sSyOH6hXlJguwXaD5TzuTi7-fl2wDhuwYratdSUa67Y_CAMLrxrRPcUPQVfo6HowQ25S-THFw_1geXS9-KgbOS7xg4RG9LswwvelTeQJI8oAqt78-9DaGGOBpOzKPFwtHUoQNmpJf7JMjxE0hSObmdvT-rTEiWsl_EXTPA4ju7Eekyt7LIlAxoMNA2cbntsqDn8MSdXO5WSU-Gduqcst2aivypS7QZqH7wvMLi_0x1o41bxABaB6ATiOTzQDd_uhlF5UQlq43sHVok_i13lyhishkZ39FwCTT7HsTarsx9lRzexQQUi1q8XE0Pfy8rIw&amp;hsutk=2767d93d6471d657e0c9f660e4b58ef8&amp;;;pageId=4298798599&amp;__hstc=41179005.2767d93d6471d657e0c9f660e4b58ef8.1456736058655.1478822660171.1478831861868.179&amp;__hssc=41179005.26.1478831861868&amp;__hsfp=1335165674" id="cta_button_458120_0a81b108-0c35-466f-8ccb-36ff661bc040" style="margin: 20px auto;" target="_blank" title="View It Here">View It Here </a> </span> <script charset="utf-8" src=""></script> <script type="text/javascript">hbspt.cta.load(458120, 'f68f0b2e-fb62-48eb-acd6-8b2ad6455083', {});</script> </span></p>

Get the Latest Anomali Updates and Cybersecurity News – Straight To Your Inbox

Become a subscriber to the Anomali Newsletter
Receive a monthly summary of our latest threat intelligence content, research, news, events, and more.