Solved

Low-cost /freeware IOC tools

Posted on 2016-08-21
4
62 Views
Last Modified: 2016-09-03
Anyone has any suggestion for < US$3500 tools for Indicators of Compromise
0
Comment
Question by:sunhux
  • 2
4 Comments
 
LVL 62

Accepted Solution

by:
btan earned 500 total points
ID: 41764798
I suppose you meant scavenging for IOC on system and network. The detection of IOC should be covered by those FW, NIPS, NGFW, UTM, Endpoint security etc. More so if you have a SIEMS that aggregate the logs from these device sources to detect the list of IOC that you are targeting. I supposed the IOC are the malware callbacks to Command/Control ip addresses, blacklisted domain, etc. See this framework

http://blog.sqrrl.com/a-framework-for-threat-hunting-part-1-the-pyramid-of-pain
In fact, Sqrrl has such solution  - http://sqrrl.com/product/sqrrl-enterprise/

I am also see service based such as Recordedfuture as possibility and they can supply IOC in term of Yara rules to your security device to detect and alter on sighting those IOC.

https://www.recordedfuture.com/internal-network-hunting/

But largely searching for IOC is no trivial task, as first off it can be either be a passive means like deploying a honeypot or even extending it to honeynet. See this

https://www.anomali.com/resources/modern-honey-net

Manual inhouse means to search IOC may be possible for a small setup via IOC Finder tool. See this

https://www.fireeye.com/blog/threat-research/2011/12/redline-openioc-build-effective-indicators.html

Otherwise the COTS for such Finder, you likely have to poll the sales support for candidates like Lightcyber for exploited behaviors or Sift Science for fraud related

http://lightcyber.com/why-lightcyber-even-if-i-have-edr/

https://siftscience.com/pricing
0
 
LVL 62

Expert Comment

by:gheist
ID: 41765670
You mean €€€ 3500 per month per year or for lifetime support?
0
 

Author Comment

by:sunhux
ID: 41766796
US$3500 purchase price;  yearly maintenance is separate.

I'm more concerned with Ransomware, phishing and data leakages.
OSSEC is one such tool
0
 
LVL 62

Assisted Solution

by:btan
btan earned 500 total points
ID: 41766826
I am thinking as a whole on two approach
a) Proactive - Setup Honeypot to generate the IOC for further discovery esp on evolved threats since signature and behavioral detection is not foolproof. Need to stop targeted attack and isolate fast to contain damage.

b) Early detection -  Beef up security baseline implemented at system/network/appl level, go beyond just IOC findings instead tap on the reinforced controls to alert you or OPS team instead. Tap on SIEMS to correlate rule to trigger on DLP, IRM, Anti-spam/phishing and Anti-Ransomware related to suspected events. This in a way also "discover" IOC.
0

Featured Post

Windows Server 2016: All you need to know

Learn about Hyper-V features that increase functionality and usability of Microsoft Windows Server 2016. Also, throughout this eBook, you’ll find some basic PowerShell examples that will help you leverage the scripts in your environments!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Compromised PC? 17 220
slow vpn connection 9 66
VLANs and isolation / private networks 3 41
Unauthorized Network Devices Appearing on Home Network 20 112
If you thought ransomware was bad, think again! Doxware has the potential to be even more damaging.
One of the biggest threats facing all high-value targets are APT's.  These threats include sophisticated tactics that "often starts with mapping human organization and collecting intelligence on employees, who are nowadays a weaker link than network…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

803 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question