How to Investigate Emerging Cyber Threats in 2024 – SOC/DFIR Team Guide
In the rapidly evolving world of cybersecurity, emerging threats
As cybercriminals continually refine their methods, businesses must stay informed and proactive to protect their assets. One powerful tool in this effort is the Threat Intelligence (TI) Lookup service from ANY.RUN, which provides valuable insights into these emerging threats.
Emerging threats differ from persistent threats in several ways:
Why Monitoring Emerging Threats is Crucial
Many organizations struggle to handle emerging threats due to a lack of awareness, resources, or expertise. These threats can disrupt operations, lead to data breaches, and erode customer trust. Staying informed about emerging threats and taking proactive measures
How Threat Intelligence Lookup Assists
ANY.RUN's Threat Intelligence Lookup is a valuable resource for organizations looking to stay ahead of emerging threats. Powered by a global community of 400,000 security experts, the service provides access to a vast database of indicators of compromise (IOCs) and other threat data. Users can search through this data using various parameters to gather information on malware and phishing threats.
Key Features of TI Lookup:
Examples of Emerging Threats and Investigation Methods
1. New Phishing Threats
Cybercriminals continually devise new phishing tactics, often abusing legitimate services to deceive users. For example, a recent campaign exploited Amazon Simple Email Service (SES) accounts to distribute phishing emails.
Example: Abuse of SES Accounts by Tycoon 2FA Phish-kit?
Recently, ANY.RUN researchers?spotted a phishing campaign?exploiting compromised Amazon Simple Email Service (SES) accounts to distribute phishing emails.??
By using TI Lookup, security teams can identify and analyze such campaigns, gathering data on domains, IPs, and files involved.
2. New and Evolving Malware Families
New malware strains, like the recently discovered DeerStealer, pose significant threats. These malware types often employ advanced evasion techniques
Example: DeerStealer Malware?
In July 2024, ANY.RUN discovered a new malware family called DeerStealer. This malware was distributed through a phishing campaign that mimicked the Google Authenticator website.
Using Threat Intelligence Lookup, we can efficiently gather information on the latest DeerStealer samples by utilizing YARA Search. This tool allows us to apply custom YARA rules to identify samples based on their content.
领英推荐
According to ANY.RUN analysis, The service provides four samples with their corresponding sandbox sessions, allowing us to take a closer look at how the threat operates and collect valuable intelligence.?
3. Tactics, Techniques, and Procedures (TTPs)
Attackers frequently update their tactics to exploit vulnerabilities and avoid detection. For instance, the new version of HijackLoader includes a User Account Control (UAC) bypass. TI Lookup can identify such updates using queries based on the MITRE ATT&CK framework.
Example: Samples of New HijackLoader Version?
Earlier in 2024, HijackLoader received an update featuring a User Account Control (UAC) bypass
To find samples of the new HijackLoader version, you can use the following query in TI Lookup:?MITRE:"T1548.002" AND threatName:"hijackloader".
4. Exploitation of World Events
Cybercriminals often exploit global events to launch attacks. During the CrowdStrike outage, attackers launched phishing campaigns
Example: CrowdStrike Incident?
ANY.RUN analysts were quick to identify threats exploiting a recent security incident, with TI Lookup playing a key role. One of their search queries (domainName:"crowdstrike" AND threatLevel:"malicious") successfully detected domains mimicking the official CrowdStrike domain, which surfaced shortly after the event.
Additional Investigation Techniques with TI Lookup
Effective investigation of emerging threats relies on comprehensive threat intelligence. ANY.RUN's TI Lookup provides a wealth of data, enabling organizations to better understand and mitigate these threats.
By leveraging this tool, businesses can enhance their cybersecurity posture and ensure the safety and integrity of their systems.
About ANY.RUN
ANY.RUN supports over 400,000 cybersecurity professionals worldwide with its interactive sandbox and threat intelligence products, including TI Lookup, YARA Search, and Feeds. These tools help organizations quickly respond to incidents and learn more about emerging threats.
Staff Consultant at NOC | SOC | | Incident Coordinator| Cybersecurity | Ethical Hacking, Cloud Security.
7 个月Very informative
Bilingual Computer Support Specialist. Help Desk, Customer Service,
7 个月I enjoyed reading this article. Thanks
Very Informative ??
attend COMPUTER SCIENCE FAST NUCES
7 个月Good point!
Security Analyst | SIEM | SOC | Blue team |Cyber Security Analyst | IOT Analyst | Vulnerability Assessment | XDR |EDR | Firewall|sumologic| kibana|cisco firepower | check point|splunk enterprise| Vmware Administrator
7 个月i love any run sandbox