Before the heyday of the internet, I had to leave my apartment and actually haunt the back aisles of strip mall video game stores to figure out how to get past the boss fight at the end of my favorite first-person shooter game. If I had better behavioral intelligence on the NPCs in “Wolfenstein,” I would have had an innate sense of their movements and strategies.

Alas, in the early 1990s, I was more focused on passing particle dynamics at Georgia Tech and looking good in flannel, so I resorted to cheat codes.

In an ideal world, we could set our security systems to “God Mode” and take all the hits from attackers; at the very least, we could turn on “notarget” and slip under the attackers’ radar. In the absence of those strategies, though, security teams must find ways to develop that innate sense of attacker movements and apply it their defenses.

Integrate to Identify Anomalies

The closest we get to security God Mode is integrating network, endpoint and user data so security analysts can see active and historical user and device anomalies. By pairing a behavioral intelligence solution with a security intelligence solution, analysts can analyze behavior patterns for indicators of advanced and insider threats to enable rapid investigation and response before a breach even occurs.

If you have the IBM QRadar Security Intelligence platform, a wide range of complementary apps are available on the IBM Security App Exchange to extend those capabilities and increase the value of your security investment. E8 Security, one of QRadar’s partners in the App Exchange, ingests and analyzes data collected by QRadar. Through machine-learning, E8 determines patterns and prioritizes behavioral intelligence indicators of compromise (IOCs) that policy- and signature-based solutions are likely to miss.

Immerse Your Security in Threat Intelligence — Watch the on-demand webinar

E8 Security App: More Than Extra-Life Tokens

The E8 Security App for QRadar uses a customer’s own data to augment existing security products. It adds a sort of prevention superpower to security teams by drastically increasing their effectiveness. The app allows teams to quickly draw conclusions from avalanches of disparate log events in minutes and prevents a breach even when enforcement products can’t.

The E8 Security App provides behavioral threat intelligence by automatically drawing connections between seemingly unrelated incidents. Security analysts can easily visualize relationships between targets, explore divergent hypotheses and uncover hidden attack patterns. This level of insight gives security teams a unique view into what’s going on within their organization on a granular level, including telltale signs of internal and external threats.

The app provides security teams with visibility into existing users, devices and traffic, and points out when they change — for instance, when new users and devices come online or access an application for the first time or from a different location. This visibility is essential to noticing when someone or something is acting in a way they shouldn’t, and informing changes to existing policies to prevent those risky actions in the future.

E8 also detects and prioritizes threatening and suspicious indicators that may not be obvious to security teams. It does so by using data science and machine learning to understand and report unknown indicators for which there aren’t existing policies or signatures — kind of like providing cheat codes that make teams more powerful against targeted and insider threats.

This enables analysts to easily hunt for sophisticated threats in their environment by automatically correlating data patterns, visualizing relationships between disparate data sets, and making it quick and easy to search for and understand targets and attack stages, including lateral movement. What would normally take security teams hours only takes a few minutes with E8’s app, which means response times decrease dramatically and incidents are remediated right away.

Winning the Boss Fight Against a Backpacker

For one client, E8 Security detected backpacking in a customer environment. Backpacking occurs when an insider uses their system or application access to copy data onto removable media, such as a USB drive, and exfiltrates the data by carrying it out of the building.

The first indicator was a significant uptick in logins to new systems that the employee had historically never visited. This was shown in the E8 app as a behavior graph that illustrated the volume of login events for that user over time.

There were two spikes in the number of logins, separated by eight days, that stood out. Because the E8 app is able to profile entities by tying users to devices and modeling their normal behaviors, the customer was alerted to this employee’s abnormal actions.

The customer’s suspicions about this employee were reinforced when the employee turned in their resignation shortly after the last instance of unusual logins. The customer was able to confront the employee with the evidence of their activity and then reclaim the stolen data. The E8 Security app used log data the customer already had to provide real intelligence, prioritized appropriately with a view of the employee’s historical behavior, so the customer could address it before it became a big problem.

Learn More About Behavioral Intelligence

For more information on the E8 Security App for QRadar, visit the E8 Security website, read the data sheet or schedule a demo. You can also watch the on-demand webinar, “IBM Security App Exchange Spotlight: Immerse Your Security in Threat Intelligence,” to learn more about E8 and QRadar integrations.

More from Intelligence & Analytics

Email campaigns leverage updated DBatLoader to deliver RATs, stealers

11 min read - IBM X-Force has identified new capabilities in DBatLoader malware samples delivered in recent email campaigns, signaling a heightened risk of infection from commodity malware families associated with DBatLoader activity. X-Force has observed nearly two dozen email campaigns since late June leveraging the updated DBatLoader loader to deliver payloads such as Remcos, Warzone, Formbook, and AgentTesla. DBatLoader malware has been used since 2020 by cybercriminals to install commodity malware remote access Trojans (RATs) and infostealers, primarily via malicious spam (malspam). DBatLoader…

New Hive0117 phishing campaign imitates conscription summons to deliver DarkWatchman malware

8 min read - IBM X-Force uncovered a new phishing campaign likely conducted by Hive0117 delivering the fileless malware DarkWatchman, directed at individuals associated with major energy, finance, transport, and software security industries based in Russia, Kazakhstan, Latvia, and Estonia. DarkWatchman malware is capable of keylogging, collecting system information, and deploying secondary payloads. Imitating official correspondence from the Russian government in phishing emails aligns with previous Hive0117 campaigns delivering DarkWatchman malware, and shows a possible significant effort to induce a sense of urgency as…

X-Force releases detection & response framework for managed file transfer software

5 min read - How AI can help defenders scale detection guidance for enterprise software tools If we look back at mass exploitation events that shook the security industry like Log4j, Atlassian, and Microsoft Exchange when these solutions were actively being exploited by attackers, the exploits may have been associated with a different CVE, but the detection and response guidance being released by the various security vendors had many similarities (e.g., Log4shell vs. Log4j2 vs. MOVEit vs. Spring4Shell vs. Microsoft Exchange vs. ProxyShell vs.…

Unmasking hypnotized AI: The hidden risks of large language models

11 min read - The emergence of Large Language Models (LLMs) is redefining how cybersecurity teams and cybercriminals operate. As security teams leverage the capabilities of generative AI to bring more simplicity and speed into their operations, it's important we recognize that cybercriminals are seeking the same benefits. LLMs are a new type of attack surface poised to make certain types of attacks easier, more cost-effective, and even more persistent. In a bid to explore security risks posed by these innovations, we attempted to…