Before the heyday of the internet, I had to leave my apartment and actually haunt the back aisles of strip mall video game stores to figure out how to get past the boss fight at the end of my favorite first-person shooter game. If I had better behavioral intelligence on the NPCs in “Wolfenstein,” I would have had an innate sense of their movements and strategies.

Alas, in the early 1990s, I was more focused on passing particle dynamics at Georgia Tech and looking good in flannel, so I resorted to cheat codes.

In an ideal world, we could set our security systems to “God Mode” and take all the hits from attackers; at the very least, we could turn on “notarget” and slip under the attackers’ radar. In the absence of those strategies, though, security teams must find ways to develop that innate sense of attacker movements and apply it their defenses.

Integrate to Identify Anomalies

The closest we get to security God Mode is integrating network, endpoint and user data so security analysts can see active and historical user and device anomalies. By pairing a behavioral intelligence solution with a security intelligence solution, analysts can analyze behavior patterns for indicators of advanced and insider threats to enable rapid investigation and response before a breach even occurs.

If you have the IBM QRadar Security Intelligence platform, a wide range of complementary apps are available on the IBM Security App Exchange to extend those capabilities and increase the value of your security investment. E8 Security, one of QRadar’s partners in the App Exchange, ingests and analyzes data collected by QRadar. Through machine-learning, E8 determines patterns and prioritizes behavioral intelligence indicators of compromise (IOCs) that policy- and signature-based solutions are likely to miss.

Immerse Your Security in Threat Intelligence — Watch the on-demand webinar

E8 Security App: More Than Extra-Life Tokens

The E8 Security App for QRadar uses a customer’s own data to augment existing security products. It adds a sort of prevention superpower to security teams by drastically increasing their effectiveness. The app allows teams to quickly draw conclusions from avalanches of disparate log events in minutes and prevents a breach even when enforcement products can’t.

The E8 Security App provides behavioral threat intelligence by automatically drawing connections between seemingly unrelated incidents. Security analysts can easily visualize relationships between targets, explore divergent hypotheses and uncover hidden attack patterns. This level of insight gives security teams a unique view into what’s going on within their organization on a granular level, including telltale signs of internal and external threats.

The app provides security teams with visibility into existing users, devices and traffic, and points out when they change — for instance, when new users and devices come online or access an application for the first time or from a different location. This visibility is essential to noticing when someone or something is acting in a way they shouldn’t, and informing changes to existing policies to prevent those risky actions in the future.

E8 also detects and prioritizes threatening and suspicious indicators that may not be obvious to security teams. It does so by using data science and machine learning to understand and report unknown indicators for which there aren’t existing policies or signatures — kind of like providing cheat codes that make teams more powerful against targeted and insider threats.

This enables analysts to easily hunt for sophisticated threats in their environment by automatically correlating data patterns, visualizing relationships between disparate data sets, and making it quick and easy to search for and understand targets and attack stages, including lateral movement. What would normally take security teams hours only takes a few minutes with E8’s app, which means response times decrease dramatically and incidents are remediated right away.

Winning the Boss Fight Against a Backpacker

For one client, E8 Security detected backpacking in a customer environment. Backpacking occurs when an insider uses their system or application access to copy data onto removable media, such as a USB drive, and exfiltrates the data by carrying it out of the building.

The first indicator was a significant uptick in logins to new systems that the employee had historically never visited. This was shown in the E8 app as a behavior graph that illustrated the volume of login events for that user over time.

There were two spikes in the number of logins, separated by eight days, that stood out. Because the E8 app is able to profile entities by tying users to devices and modeling their normal behaviors, the customer was alerted to this employee’s abnormal actions.

The customer’s suspicions about this employee were reinforced when the employee turned in their resignation shortly after the last instance of unusual logins. The customer was able to confront the employee with the evidence of their activity and then reclaim the stolen data. The E8 Security app used log data the customer already had to provide real intelligence, prioritized appropriately with a view of the employee’s historical behavior, so the customer could address it before it became a big problem.

Learn More About Behavioral Intelligence

For more information on the E8 Security App for QRadar, visit the E8 Security website, read the data sheet or schedule a demo. You can also watch the on-demand webinar, “IBM Security App Exchange Spotlight: Immerse Your Security in Threat Intelligence,” to learn more about E8 and QRadar integrations.

More from Intelligence & Analytics

X-Force Threat Intelligence Index 2024 reveals stolen credentials as top risk, with AI attacks on the horizon

4 min read - Every year, IBM X-Force analysts assess the data collected across all our security disciplines to create the IBM X-Force Threat Intelligence Index, our annual report that plots changes in the cyber threat landscape to reveal trends and help clients proactively put security measures in place. Among the many noteworthy findings in the 2024 edition of the X-Force report, three major trends stand out that we’re advising security professionals and CISOs to observe: A sharp increase in abuse of valid accounts…

Web injections are back on the rise: 40+ banks affected by new malware campaign

8 min read - Web injections, a favored technique employed by various banking trojans, have been a persistent threat in the realm of cyberattacks. These malicious injections enable cyber criminals to manipulate data exchanges between users and web browsers, potentially compromising sensitive information. In March 2023, security researchers at IBM Security Trusteer uncovered a new malware campaign using JavaScript web injections. This new campaign is widespread and particularly evasive, with historical indicators of compromise (IOCs) suggesting a possible connection to DanaBot — although we…

Accelerating security outcomes with a cloud-native SIEM

5 min read - As organizations modernize their IT infrastructure and increase adoption of cloud services, security teams face new challenges in terms of staffing, budgets and technologies. To keep pace, security programs must evolve to secure modern IT environments against fast-evolving threats with constrained resources. This will require rethinking traditional security strategies and focusing investments on capabilities like cloud security, AI-powered defense and skills development. The path forward calls on security teams to be agile, innovative and strategic amidst the changes in technology…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today