{"id":15193,"date":"2017-03-15T22:10:18","date_gmt":"2017-03-16T02:10:18","guid":{"rendered":"https:\/\/kasperskydaily.com\/b2b\/?p=6658"},"modified":"2019-11-15T06:49:31","modified_gmt":"2019-11-15T11:49:31","slug":"cyberthreat-x-ray","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/cyberthreat-x-ray\/15193\/","title":{"rendered":"+1 Enterprise Intelligence Service: Introducing Our Cyberthreat X-Ray!"},"content":{"rendered":"<p>Human beings are a curious lot. It\u2019s in their nature to try and get to the \u2018whys\u2019 and \u2018hows\u2019 of everything and anything. And this applies in cybersecurity too; in fact \u2013 doubly so: getting to the \u2018whys\u2019 and \u2018hows\u2019 of cyberthreats is the very basis upon which cybersecurity is built; thus, upon which KL is built.<\/p>\n<p>Getting to the \u2018whys\u2019 and \u2018hows\u2019 for us means meticulously taking apart every cyberattack into its respective constituent pieces, analyzing it all and, if necessary, developing specific protection against it. And it\u2019s always better to do this proactively, based on the mistakes of others, and not waiting until what we protect is attacked.<\/p>\n<p>To solve this challenging task we\u2019ve a slew of <a href=\"https:\/\/www.kaspersky.com\/enterprise-security\/intelligence-services\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">intelligence services<\/a> for enterprises. In this collection of cyber-precision-<a href=\"https:\/\/www.forbes.com\/sites\/eugenekaspersky\/2015\/12\/17\/services-vs-products-which-is-the-main-course-which-the-side-dish\/#5f4266e616a6\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">tools<\/a> there\u2019s <a href=\"http:\/\/media.kaspersky.com\/ru\/enterprise-security\/Leaflet_KSIS_training_RUS_WEB.pdf\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">staff training<\/a>, <a href=\"http:\/\/media.kaspersky.com\/ru\/enterprise-security\/Leaflet_KSIS_threats_info_RUS_WEB.pdf\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">security intelligence<\/a> services to come up with detailed <a href=\"https:\/\/www.kaspersky.com\/enterprise-security\/apt-intelligence-reporting\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">information about discovered attacks<\/a>, <a href=\"http:\/\/media.kaspersky.com\/ru\/enterprise-security\/Leaflet_KSIS_expert_services_RUS_WEB.pdf\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">expert penetration-testing services<\/a>, app-audits, incident investigations, and more.<\/p>\n<p>Well now the \u2018and more\u2019\u00a0includes our new service \u2013 <a href=\"http:\/\/media.kaspersky.com\/pdf\/Kaspersky_Threat_Lookup_EN.pdf\" target=\"_blank\" rel=\"noopener noreferrer nofollow\"><strong>KTL (Kaspersky\u00a0Threat\u00a0Lookup)<\/strong><\/a>\u00a0\u2013 the smart microscope for dissecting suspicious objects and uncovering the sources\/tracking histories of cyberattacks, multivariate correlations, and degrees of danger for corporate infrastructure. Quite the X-ray for cyberthreats.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2017\/03\/06020608\/ktl-1-2-1024x648.jpg\" alt=\"+1 Enterprise Intelligence Service: Introducing Our Cyberthreat X-Ray!\" width=\"1024\" height=\"648\" class=\"aligncenter size-full wp-image-15223\"><\/p>\n<p>Actually, all our users already has the lite-version of this service. The security rating of a file can also be checked with our home products, but enterprise customers need a deeper, more thorough analysis of threats.<\/p>\n<p>To begin with, KTL can be used to check not only files, but also URLs, IP addresses and domains. It can analyze objects for the hallmarks of targeted attacks, behavioral and statistical specifics, WHOIS\/DNS data, file attributes, download chains, and others.<\/p>\n<p>Yep, it\u2019s kinda like a search engine but with the searching being solely for cyberthreats. Dedicated staff need only enter details of a certain suspicious object into it and KTL will return the full low-down on it, including historical, geographical and other aspects, plus connections with other events and objects. All in real-time, 24\/7.<\/p>\n<p><img decoding=\"async\" class=\"aligncenter size-full wp-image-6663\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2017\/03\/06020608\/ktl-2.jpg\" alt=\"+1 Enterprise Intelligence Service: Introducing Our Cyberthreat X-Ray!\" width=\"858\" height=\"584\"><\/p>\n<p>The results, suspicious objects, and other <a href=\"https:\/\/en.wikipedia.org\/wiki\/Indicator_of_compromise\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">IoC<\/a> can be exported in machine-readable sharing formats (STIX, OpenIOC, JSON, Yara, Snort, CSV\u2026) for integration with corporate <a href=\"https:\/\/en.wikipedia.org\/wiki\/Security_information_and_event_management\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">SIEM<\/a>s.<\/p>\n<p><img decoding=\"async\" class=\"aligncenter size-full wp-image-6664\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2017\/03\/06020607\/ktl-3.jpg\" alt=\"+1 Enterprise Intelligence Service: Introducing Our Cyberthreat X-Ray!\" width=\"855\" height=\"573\"><\/p>\n<p>\u00a0<\/p>\n<p>So where does KTL get its data from? There are several sources.<\/p>\n<p>First, there\u2019s our <a href=\"https:\/\/eugene.kaspersky.com\/2012\/09\/18\/crowdsourcing-security\/\" target=\"_blank\" rel=\"noopener noreferrer\">cloud-based KSN<\/a>, which contains anonymized signals about the epidemiological situation from hundreds of millions of users all around the world. In using it, customers not only look after themselves (participation in KSN automatically increases quality of protection), but also help fulfill an important humanitarian mission: to look after others too, and in doing so reducing the overall cyberthreat level across the Internet.<\/p>\n<p>Second, there\u2019s our technology that analyzes network activity, including spam traps, <a href=\"https:\/\/www.forbes.com\/sites\/eugenekaspersky\/2015\/12\/17\/services-vs-products-which-is-the-main-course-which-the-side-dish\/#77481d4116a6\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">botnet monitoring<\/a>, web crawlers, various network sensors, and smart robots powered by <a href=\"https:\/\/eugene.kaspersky.com\/2016\/09\/26\/laziness-cybersecurity-and-machine-learning\/\" target=\"_blank\" rel=\"noopener noreferrer\">machine learning<\/a>. And of course there are the results of investigations of complex targeted attacks by the <a href=\"https:\/\/www.kaspersky.com\/blog\/tag\/great\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">GReAT<\/a> cyber-ninjas.<\/p>\n<p>Third, there are our partner software developers. Incidentally, the role of these will grow over time, to eventually become predominant. Yep, we have big plans for the future, but I\u2019ll not go into details here just yet.<br>\n<img decoding=\"async\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2017\/03\/06020607\/ktl-4-1024x542.jpg\" alt=\"+1 Enterprise Intelligence Service: Introducing Our Cyberthreat X-Ray!\" width=\"1024\" height=\"542\" class=\"aligncenter size-full wp-image-15226\"><\/p>\n<p>For now \u2013 a bit on our near-future plans\u2026<\/p>\n<p>We\u2019re currently working on adding to KTL functions of analysis of suspicious objects in a secure environment \u2013 a <em>cloud sandbox<\/em>.<\/p>\n<p>For example, a file is placed in the sandbox and run on a special virtual machine (with a patented logging system). The virtual machines are fully isolated from each other and from internal networks, and have limited external connectivity too. The virtual machines are identical to physical computers so that the objects feel safe to do as they would in the real world. The machines then note down all the actions performed by an run object (much like our <a href=\"https:\/\/www.kaspersky.com\/enterprise-security\/anti-targeted-attacks\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">KATA<\/a> protection from targeted attacks). All results are compiled in a detailed report; here is shown how the file would have acted if it was in a real-world situation, and a review of the full scope of the threat behavior is given too.<\/p>\n<p>Also in the pipeline are Next Gen tools for working with metadata files and URLs. In upcoming versions there\u2019ll be added the ability to extract different metadata and make customized searches in this metadata. Thus, it will be possible to conduct deep investigations of malware based on similarities across various parameters so as to understand the overall picture of sophisticated attacks. For example, with the help of this tool it will be possible to ask it to: \u2018find me files that when launched do this or that\u2019, or \u2018find me all files with such a name\u2019, or \u2018find me files that are detected under this or that verdict of an AV engine\u2019, or \u2018find me files whose code contains this or that line\u2019.<\/p>\n<p>So, as you can see, we\u2019ve got a multi-function cyber-X-ray in development, but some of its functionality can already be used right now (so you could recommend new useful features:).<\/p>\n<p>More details about KTL \u2013 <a href=\"http:\/\/media.kaspersky.com\/pdf\/Kaspersky_Threat_Lookup_EN.pdf\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">here<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>We&#8217;ve got a multi-function cyber-X-ray in development, but some of its functionality can already be used right now. <\/p>\n","protected":false},"author":13,"featured_media":15222,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,3052],"tags":[2452,2642,422,2483],"class_list":{"0":"post-15193","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"tag-cyberintelligence","10":"tag-next-gen","11":"tag-threats","12":"tag-true-cybersecurity"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/cyberthreat-x-ray\/15193\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/cyberthreat-x-ray\/15193\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/cyberthreat-x-ray\/15193\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/true-cybersecurity\/","name":"True Cybersecurity"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/15193","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=15193"}],"version-history":[{"count":13,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/15193\/revisions"}],"predecessor-version":[{"id":30026,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/15193\/revisions\/30026"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/15222"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=15193"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=15193"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=15193"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}