February 5, 2018 By Christian Falco 4 min read

One of the top data breach trends tracked by our IBM X-Force team in 2017 was trouble with patching. Despite this reoccurring headache in cybersecurity, enterprises around the world are falling victim to malware exploiting known vulnerabilities. Top of mind in 2017 were the WannaCry and NotPetya ransomwares, for which Microsoft had issued a patch nearly two months prior to the first attack.

Whether it’s a new vulnerability or the next big zero-day ransomware, the first thing you should ask as a security analyst, chief information security officer (CISO) or CEO is: “Am I affected?” The nature of this question often extends beyond cybersecurity — it could be a bad traffic report ahead of your commute or an incoming weather forecast. When it comes to major threats that lock down your infrastructure and demand payment, it’s important to know whether your enterprise is affected. The IBM X-Force Exchange (XFE), IBM’s threat intelligence sharing platform, is here to help.

Stay Current on Vulnerabilities With Watchlists

Whether you are a large or small enterprise, your environment has a lot of tools that need to be constantly updated and maintained. More than 15,000 vulnerabilities were reported in 2017, many of which require cross-referencing against internal infrastructure to mitigate the impact.

To provide some aid, the IBM X-Force Exchange watchlist feature provides early warning notifications regarding newly released vulnerabilities. Just plug in your software and receive alerts in real time.

Get the Latest Research From Collections

XFE collections are repositories of curated threat intelligence, drawing insights from a mix of human and machine-generated sources. When a new attack hits the wire, check X-Force Exchange to see what the experts are saying.

Our X-Force research team, in conjunction with managed services and incident response, provides higher-order intelligence on campaigns, actors, tactics, techniques and procedures (TTPs), and indicators of compromise (IoCs). You can act on this information by importing it programmatically into your security tools using the X-Force Exchange API or STIX/TAXII protocols.

Am I Affected by a Zero-Day Vulnerability?

New to X-Force Exchange is the Am I Affected button. In a single click, IBM QRadar users are quickly notified of any malicious indicators captured within X-Force Exchange collections. The architecture correlates QRadar log activities to determine whether any events and flows — and soon, vulnerabilities and offenses — are related to IoCs captured within public or private collections. The user can quickly assess the impact via graphical and tabular reporting with the option to pivot back to QRadar for a more thorough investigation. Best of all, it’s now free for all IBM QRadar users.

First, provide a QRadar console IP and token (QRadar Admin > Authorized Services) to set up the integration. Keys will be saved for future use in Settings > QRadar Integration, but no log activity will be stored on the XFE servers since the integration is solely browser-based.

Second, select a time limit from the default options to search against your QRadar activity. Clicking Custom enables a more tailored search by year, month, day and time. Once you select the time limit, the search will start and X-Force Exchange will query against IPs (source/destination), URLs (hostname) and malware hashes in your QRadar environment.

Third, view the report. While the results’ metadata will appear in the toaster window, opening the report will provide a tabular and graphical analysis of the impact. If the indicators from X-Force Exchange are captured in QRadar logs, an Am I Affected report will render. Select a category to inspect (e.g., host names) and choose from three interactive graphs to better understand the results of your investigation.

  • The percentage view shows the breakdown of the selected category in your QRadar logs — for example, the percentage of traffic that was occupied by connecting to or from the host names.
  • The timeline shows when logs are captured by category and can infer the strength of communication either to or from the specific indicator.
  • The quantity view shows the total count of logs by category. Hovering over and clicking on a specific bar in the chart will show the affiliated data in the table.

Indicators highlighted in blue reflect data captured within X-Force Exchange collections, thus depicting impact. You can hover over these indicators to see the risk score. At any point, you can pivot to QRadar and it will automatically filter to produce the same categorical view. For analysts who want to answer the what and the how, X-Force Exchange and QRadar provide this visibility.

If you notice some errors with the feature, don’t be alarmed. We have a detailed FAQ to support troubleshooting with Am I Affected and have been able to narrow some issues down to central causes.

Visit the IBM X-Force Exchange

More from

Airplane cybersecurity: Past, present, future

4 min read - With most aviation processes now digitized, airlines and the aviation industry as a whole must prioritize cybersecurity. If a cyber criminal launches an attack that affects a system involved in aviation — either an airline’s system or a third-party vendor — the entire process, from safety to passenger comfort, may be impacted.To improve security in the aviation industry, the FAA recently proposed new rules to tighten cybersecurity on airplanes. These rules would “protect the equipment, systems and networks of transport…

Protecting your digital assets from non-human identity attacks

4 min read - Untethered data accessibility and workflow automation are now foundational elements of most digital infrastructures. With the right applications and protocols in place, businesses no longer need to feel restricted by their lack of manpower or technical capabilities — machines are now filling those gaps.The use of non-human identities (NHIs) to power business-critical applications — especially those used in cloud computing environments or when facilitating service-to-service connections — has opened the doors for seamless operational efficiency. Unfortunately, these doors aren’t the…

Communication platforms play a major role in data breach risks

4 min read - Every online activity or task brings at least some level of cybersecurity risk, but some have more risk than others. Kiteworks Sensitive Content Communications Report found that this is especially true when it comes to using communication tools.When it comes to cybersecurity, communicating means more than just talking to another person; it includes any activity where you are transferring data from one point online to another. Companies use a wide range of different types of tools to communicate, including email,…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today