April 7, 2017 By David Strom 2 min read

Threat intelligence sharing services have been around almost since the earliest days of malware, but lately they seem to be gaining traction among IT professionals. In mid 2015, we noted that Facebook had set up its own exchange to share threat information. Since then, nearly 500 organizations have joined the effort, and the social networking company has added enhancements such as a tagging schema and real-time notifications.

The Threat Intelligence Explosion

Facebook is a great example of how threat sharing programs have quickly expanded. IBM continues to enhance its own X-Force Exchange with new notification features and additional information. A “curated list of awesome threat intelligence resources” hosted on GitHub includes several dozen different exchanges, along with numerous standards for sharing specific details about malware and a variety of tools that leverage these exchanges, such as CollabNet, SpiceWorks, OpenPhish, Metadefender and Spamhaus, just to name a few.

This explosion can be attributed to the ineffectiveness of traditional pattern-matching solutions. Cybercriminals leverage tools to produce unique patterns for malware infections, and new strains are becoming adept at hiding in memory, making detection more difficult. This means that defenders have to become better organized.

Community Outreach

IT teams can become more effective with these exchange-based tools, but it will require some effort. First, management must buy into sharing efforts and understand their value. Without top-level support, the whole notion of sharing might become a political issue rather than a technical one.

The main lesson passed from Ken Weston, senior security analyst at Tripwire, to eSecurity Planet was that “before threat exchanges can be useful, you need a solid infrastructure that provides visibility into your network and log activity picked up by intrusion detection systems.” Without this level of visibility, exchanges are worthless since you won’t know whether a threat has already appeared across your network.

Next, you must decide which community you want to participate in. Not all communities support all log formats, and some are designed to work with a particular vendor’s intrusion detection systems. A few communities are also more open than others. Programs from IBM, Imperva, Microsoft and McAfee, for example, all require customers to register, while open source tools are more inclusive. You should pick the community that uses the same tools you already have in place to simplify information transfer.

Finally, you need to understand the standards employed by the particular reporting formats of your chosen community. Make sure your logs can be converted into the appropriate format without a lot of effort, otherwise you will have less incentive to share threat intelligence information.

Visit the IBM X-Force Exchange

More from Risk Management

Researchers develop malicious AI ‘worm’ targeting generative AI systems

2 min read - Researchers have created a new, never-seen-before kind of malware they call the "Morris II" worm, which uses popular AI services to spread itself, infect new systems and steal data. The name references the original Morris computer worm that wreaked havoc on the internet in 1988.The worm demonstrates the potential dangers of AI security threats and creates a new urgency around securing AI models.New worm utilizes adversarial self-replicating promptThe researchers from Cornell Tech, the Israel Institute of Technology and Intuit, used what’s…

What should Security Operations teams take away from the IBM X-Force 2024 Threat Intelligence Index?

3 min read - The IBM X-Force 2024 Threat Intelligence Index has been released. The headlines are in and among them are the fact that a global identity crisis is emerging. X-Force noted a 71% increase year-to-year in attacks using valid credentials.In this blog post, I’ll explore three cybersecurity recommendations from the Threat Intelligence Index, and define a checklist your Security Operations Center (SOC) should consider as you help your organization manage identity risk.The report identified six action items:Remove identity silosReduce the risk of…

Obtaining security clearance: Hurdles and requirements

3 min read - As security moves closer to the top of the operational priority list for private and public organizations, needing to obtain a security clearance for jobs is more commonplace. Security clearance is a prerequisite for a wide range of roles, especially those related to national security and defense.Obtaining that clearance, however, is far from simple. The process often involves scrutinizing one’s background, financial history and even personal character. Let’s briefly explore some of the hurdles, expectations and requirements of obtaining a…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today