{"id":16676,"date":"2019-10-24T03:30:03","date_gmt":"2019-10-24T11:30:03","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2019\/10\/24\/news-10415\/"},"modified":"2019-10-24T03:30:03","modified_gmt":"2019-10-24T11:30:03","slug":"news-10415","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2019\/10\/24\/news-10415\/","title":{"rendered":"Threat Intelligence Portal: We need to go deeper"},"content":{"rendered":"<p><strong>Credit to Author: Eugene Kaspersky| Date: Thu, 24 Oct 2019 11:04:36 +0000<\/strong><\/p>\n<p>I understand perfectly well that for 95% of you this post will be of no use at all. But for the remaining 5%, it has the potential to greatly simplify your working week (and many working weekends). In other words, we&#8217;ve some great news for cybersecurity pros\u00a0\u2013 SOC teams, independent researchers, and inquisitive techies: the tools that our <a href=\"https:\/\/eugene.kaspersky.com\/2011\/10\/28\/number-of-the-month-70k-per-day\/\" target=\"_blank\" rel=\"noopener noreferrer\">woodpeckers<\/a> and GReAT guys use on a daily basis to keep churning out the <a href=\"https:\/\/securelist.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">best cyberthreat research in the world<\/a> are now available to all of you, and <strong>free<\/strong> at that, with the lite version of our <a href=\"https:\/\/opentip.kaspersky.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Threat Intelligence Portal<\/a>. It&#8217;s sometimes called TIP for short, and after I&#8217;ve said a few words about it here, immediate bookmarking will be mandatory!<\/p>\n<p> <a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2019\/10\/24070111\/open-tip-featured.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-29040\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2019\/10\/24070111\/open-tip-featured.jpg\" alt=\"\" width=\"1460\" height=\"960\" \/><\/a> <\/p>\n<p>The Threat Intelligence Portal solves two main problems for today&#8217;s overstretched cybersecurity expert. First: &#8216;Which of these several hundred suspicious files should I choose first?&#8217;; second: &#8216;Ok, my antivirus says the file&#8217;s clean\u00a0\u2013 what&#8217;s next?&#8217;<\/p>\n<p> <a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2019\/10\/24065934\/open-tip-screen1.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-29037\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2019\/10\/24065934\/open-tip-screen1.png\" alt=\"A free version of the Kaspersky Threat Intelligence Portal\" width=\"939\" height=\"499\" \/><\/a> <\/p>\n<p>Unlike the &#8216;classics&#8217; \u2013 <a href=\"https:\/\/go.kaspersky.com\/Global_Trial_Advanced_SOC.html?utm_source=kdaily&#038;utm_medium=blog&#038;utm_campaign=gl_kesbkb_ey0081_organic&#038;utm_content=link&#038;utm_term=gl_kdaily_organic_ey0081_link_blog_kesbkb\" target=\"_blank\">Endpoint Security<\/a>\u2013class products, which return a concise Clean\/Dangerous verdict, the analytic tools built into the <a href=\"https:\/\/opentip.kaspersky.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Threat Intelligence Portal<\/a> give detailed information about <em>how <\/em>suspicious a file is and in <em>what specific aspects<\/em>. And not only files. Hashes, IP addresses, and URLs can be thrown in too for good measure. All these items are quickly analyzed by <a href=\"https:\/\/eugene.kaspersky.com\/2016\/12\/07\/a-billion-in-the-cloud\/\" target=\"_blank\" rel=\"noopener noreferrer\">our cloud<\/a> and the results on each handed back on a silver platter: what&#8217;s bad about them (if anything), how rare an infection is, what known threats they <em>even remotely<\/em> resemble, what tools were used to create it, and so on. On top of that, executable files are run in our <a href=\"https:\/\/eugene.kaspersky.com\/2019\/08\/26\/a-honeytrap-for-malware\/\" target=\"_blank\" rel=\"noopener noreferrer\">patented<\/a> cloud sandbox, with the results made available in a couple of minutes.<\/p>\n<p> <a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2019\/10\/24070008\/open-tip-screen2.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-29038\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2019\/10\/24070008\/open-tip-screen2.png\" alt=\"\" width=\"974\" height=\"650\" \/><\/a> <a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2019\/10\/24070047\/open-tip-screen3.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-29039\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2019\/10\/24070047\/open-tip-screen3.png\" alt=\"\" width=\"924\" height=\"737\" \/><\/a> <\/p>\n<p>At this point I can hear the 5% screaming: &#8216;It&#8217;s just VirusTotal!&#8217;<\/p>\n<p>Yes\u00a0\u2013 and no.<\/p>\n<p>On the one hand, the aim is the same\u00a0\u2013 to give specialists additional tools for analyzing a concrete incident and making an informed decision. On the other, our approach is completely different.<\/p>\n<p>VirusTotal was conceived as a simple multiscanner\u00a0\u2013 it aggregates various antivirus engines and feeds them with user-uploaded files.\u00a0For that reason, the accusation &#8216;you don&#8217;t detect file X&#8217; often gets hurled at all vendors, including us; but it&#8217;s more accurate to say that we don&#8217;t detect X <em>with a traditional file scanner<\/em>. As it later transpires, we successfully detect it using other tools. But on VirusTotal you simply won&#8217;t see that. Sure, additional tools have appeared on VirusTotal, but the general focus remains on broad coverage of engines employing a very conservative technology that was created 30-plus years ago.<\/p>\n<p>As experts in <em>deep<\/em> analysis of complex threats, we strive to make this very <em>depth<\/em> available to the entire specialist community. The only engine that analyzes artifacts in the Threat Intelligence Portal belongs to the company that bears my name. And it happens to be the <a href=\"https:\/\/kaspersky.com\/top3\" target=\"_blank\" rel=\"noopener noreferrer\">best in the world<\/a>. It combines dozens of advanced analysis technologies (<a href=\"https:\/\/eugene.kaspersky.com\/2019\/08\/26\/a-honeytrap-for-malware\/\" target=\"_blank\" rel=\"noopener noreferrer\">see here<\/a>, <a href=\"https:\/\/eugene.kaspersky.com\/2011\/09\/15\/features-youd-normally-never-hear-about\/\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>, <a href=\"https:\/\/eugene.kaspersky.com\/2012\/11\/15\/finding-the-needle-in-the-haystack-introducing-astraea\/\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>, <a href=\"https:\/\/eugene.kaspersky.com\/2019\/10\/16\/guess-which-company-made-the-top-100-global-innovators\/\" target=\"_blank\" rel=\"noopener noreferrer\">and so on<\/a>) and then lets you take a look at the detailed results. Of course, in comparison with the part of our engine that resides on VirusTotal, TIP gives a very different detection level.<\/p>\n<p>In addition to that, it may be worthwhile to scan files with VirusTotal as well \u2013 a second, third, and fourth opinion is never a bad thing. But it&#8217;s vital to know how to properly weigh these opinions. Incidentally, if we ever decide to expand the Threat Intelligence Portal with information from a partnership with other vendors, our due diligence will be extra strict.<\/p>\n<p>Another difference between the Threat Intelligence Portal and VirusTotal is&#8230; how to describe it&#8230; \u2013 the <em>limited distribution of information<\/em>. Files uploaded to VirusTotal are available to a wide range of subscribers, whereas with our Threat Intelligence Portal there are no subscribers with access to other people&#8217;s files.<\/p>\n<p>On the topic of subscriptions:<\/p>\n<p>There is a <a href=\"https:\/\/www.kaspersky.com\/enterprise-security\/threat-intelligence\" target=\"_blank\" rel=\"noopener noreferrer\">paid version<\/a> of the Threat Intelligence Portal, which is much richer \u2013 in part because of the detailed reports on detected cyberthreats written up by our top analysts it gives access to. And if it turns out that an uploaded file resembles, say, a known piece of financial malware, the freshest and most detailed info about how its cyber-villain developers attack victims, what tools they use, and so forth, is available right there in the full version of the service.<\/p>\n<p><a href=\"https:\/\/www.kaspersky.com\/blog\/open-tip\/29036\/\" target=\"bwo\" >https:\/\/blog.kaspersky.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2019\/10\/24070111\/open-tip-featured.jpg\"\/><\/p>\n<p><strong>Credit to Author: Eugene Kaspersky| Date: Thu, 24 Oct 2019 11:04:36 +0000<\/strong><\/p>\n<p>We\u2019ve made a free version of our Threat Intelligence Portal for detailed analysis of potential threats.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10425,10378],"tags":[1001,12177,10427,18052,12321,12040],"class_list":["post-16676","post","type-post","status-publish","format-standard","hentry","category-kaspersky","category-security","tag-business","tag-enterprise","tag-products","tag-sandbox","tag-smb","tag-threat-intelligence"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/16676","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=16676"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/16676\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=16676"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=16676"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=16676"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}