Wednesday, June 10, 2020
Kaspersky today announces the release of its new threat intelligence solution aimed at helping SOC analysts and incident responders attribute malware samples to previously revealed APT groups. Using its proprietary method, Kaspersky Threat Attribution Engine matches malicious code against one of the largest databases of malware in the industry. Based on code similarities, the solution links malicious activity to a specific APT group or campaign. This information helps security experts prioritize high-risk threats over less serious incidents.
By knowing which threat group is attacking their company, and for what purpose, security teams can quickly tailor their incident response plan for the attack. However, unveiling the actor who is behind an attack is a challenging task that requires not only a large amount of collected threat intelligence (TI), but also the right skills to interpret it. To automate the classification and identification of sophisticated malware, Kaspersky presents its new Threat Attribution Engine.
This solution has evolved from an internal tool used by Kaspersky’s Global Research and Analysis Team (GReAT), a world-renowned team of experienced threat hunters, and was leveraged in the investigations of the iOS implant LightSpy, TajMahal, ShadowHammer, ShadowPad and Dtrack campaigns.
In order to determine if a threat is related to a known APT group or campaign and identify which one, Kaspersky Threat Attribution Engine automatically decomposes a newly found malicious file into small binary pieces. Then, it compares these pieces with the ones from Kaspersky’s collection of more than 60,000 APT related files. For more accurate attribution, the solution also incorporates a large database of whitelisted files. This significantly improves the quality of the malware triage and attack identification and facilitates incident response.
Depending on how similar the analyzed file is to the samples in the database, Kaspersky Threat Attribution Engine calculates its reputational score and highlights its possible origin and author with a short description and links to both private and public resources, outlining the previous campaigns. Kaspersky APT Intelligence Reporting subscribers can see a dedicated report on tactics, techniques and procedures used by the identified threat actor, as well as further response steps.
Kaspersky Threat Attribution Engine is designed to be deployed on a customer’s network, “on premise,” rather than in a third-party cloud environment. This approach grants a customer control over data sharing.
In addition to the threat intelligence available “out of the box,” customers can create their own database and fill it with malware samples found by in-house analysts. In doing so, Kaspersky Threat Attribution Engine will learn to attribute malware analogous with those in a customer’s database while keeping this information confidential.
“There are several ways to reveal who is behind an attack,” said Costin Raiu, director of the Global Research & Analysis Team at Kaspersky. “For example, analysts can rely on artifacts in the malware which can determine attackers’ native language or IP addresses that suggest where they might be located. However, it’s easy for a skilled attacker to manipulate these, leading a researcher to become bogged down in an investigation, as we have already seen in many cases. Our experience shows that the best way is to look for shared code that the samples have in common with others identified in previous incidents or campaigns. Unfortunately, such manual investigation may take days or even months. To automate and speed up this task, we created Kaspersky Threat Attribution Engine, which is now available for the company’s customers.”
Kaspersky Threat Attribution Engine is commercially available globally. More information about the solution is available via this link.
Kaspersky is a global cybersecurity company founded in 1997. Kaspersky’s deep threat intelligence and security expertise is constantly transforming into innovative security solutions and services to protect businesses, critical infrastructure, governments and consumers around the globe. The company’s comprehensive security portfolio includes leading endpoint protection and a number of specialized security solutions and services to fight sophisticated and evolving digital threats. Over 400 million users are protected by Kaspersky technologies and we help 270,000 corporate clients protect what matters most to them. Learn more at usa.kaspersky.com.