{"id":20818,"date":"2022-12-15T05:21:05","date_gmt":"2022-12-15T13:21:05","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2022\/12\/15\/news-14551\/"},"modified":"2022-12-15T05:21:05","modified_gmt":"2022-12-15T13:21:05","slug":"news-14551","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2022\/12\/15\/news-14551\/","title":{"rendered":"SophosLabs Intelix now integrates with OpenCTI"},"content":{"rendered":"<p><strong>Credit to Author: Doug Aamoth| Date: Thu, 15 Dec 2022 12:00:15 +0000<\/strong><\/p>\n<div class=\"entry-content lg:prose-lg mx-auto prose max-w-4xl\">\n<p>The <a href=\"https:\/\/www.sophos.com\/en-us\/content\/security-threat-report\">Sophos 2023 Threat Report<\/a> highlights how modern attackers are becoming increasingly organized as the cybercrime economy continues to transform into an industry. A major opportunity whereby defenders can better protect against new &#8220;malware-as-a-service\u201d is by sharing threat intelligence.<\/p>\n<p>This is one of the core tenets of Sophos\u2019 security philosophy and a vision behind the <a href=\"https:\/\/www.sophos.com\/en-us\/intelix\">SophosLabs Intelix<\/a> platform. From supporting the initiative of releasing the largest-ever production scale malware research dataset for the general security community to providing access to powerful threat analysis functionality of the Intelix platform to CompTIA members, Sophos has demonstrated a significant commitment to innovate and collaborate for cyber threat intelligence efforts.<\/p>\n<h2>Understanding the integration with OpenCTI<\/h2>\n<p>After extending the Intelix platform\u2019s threat intelligence and analysis functionality to MISP, ThreatQuotient, and CompTIA\u2019s ISAO, we&#8217;ve added another way for customers to consume our threat intelligence: through integration with OpenCTI.<\/p>\n<p><a href=\"https:\/\/opencti.io\/\">OpenCTI<\/a> is an open-source and freely accessible platform that allows security practitioners and security teams to manage, ingest, and normalize valuable cyber threat intelligence. This includes knowledge about various threat actors\u2019 current TTPs and behaviors, ongoing malicious campaigns, and the monitoring of new malware threats and vulnerabilities.<\/p>\n<p>ANSSI, the French national agency for information systems security, and the Computer Emergency Response Team for the EU (CERT-EU) remain the primary contributors to the OpenCTI project. It has been built to structure, store, organize, and visualize technical and non-technical information about cyber threats. Find out more about OpenCTI by watching this <a href=\"https:\/\/www.youtube.com\/watch?v=2tBDnZYwmBs\">video<\/a>.<\/p>\n<p>Integration with SophosLabs Intelix will provide the OpenCTI community with easy to understand threat intelligence that fosters better informed security decisions for a wide range of threat artifacts, including files, web pages, and IP addresses, covering both known threats as well as previously unseen risks.<\/p>\n<p>The below example shows the OpenCTI dashboard where a user is leveraging SophosLabs Intelix threat intelligence to enrich file and URL data.<\/p>\n<p><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/OpenCTI.png\"><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter wp-image-88672 size-full\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/OpenCTI.png\" alt=\"\" width=\"940\" height=\"314\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/OpenCTI.png 940w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/OpenCTI.png?resize=300,100 300w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/OpenCTI.png?resize=768,257 768w\" sizes=\"auto, (max-width: 940px) 100vw, 940px\" \/><\/a><\/p>\n<p>The highlighted selection in the left column, which says \u201cObservations,\u201d represents stateful properties such as the hash of a file or lookup reputation data for a URL. When combined with contextual or actionable threat intelligence sources like the Intelix platform, such observables help identify indicators of compromise (IOCs) for various threat artifacts.<\/p>\n<p>See another illustration given below, which explains how the integration of SophosLabs Intelix threat intelligence provides more drill-down data to OpenCTI users.<\/p>\n<p><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/OpenCTI-detail.png\"><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter wp-image-88673 size-full\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/OpenCTI-detail.png\" alt=\"\" width=\"1278\" height=\"857\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/OpenCTI-detail.png 1278w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/OpenCTI-detail.png?resize=300,201 300w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/OpenCTI-detail.png?resize=768,515 768w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/12\/OpenCTI-detail.png?resize=1024,687 1024w\" sizes=\"auto, (max-width: 1278px) 100vw, 1278px\" \/><\/a><\/p>\n<p>In the wake of the growing sophistication and complexity of threats and IT tools, security practitioners and threat researchers find little help with text-intensive and semi-structured threat intelligence data. By combining SophosLabs Intelix\u2019s accurate and actionable threat intelligence with OpenCTI\u2019s interactive visual analytics, security professionals can significantly aid threat detection, investigation, and response actions.<\/p>\n<p>To leverage Intelix data in the OpenCTI environment, users are required to add their API key for SophosLabs Intelix (<a href=\"https:\/\/aws.amazon.com\/marketplace\/pp\/prodview-k4jb2agd65ses\">from AWS Marketplace<\/a>) into the OpenCTI configuration for enrichments.<\/p>\n<p>If you have any questions, please post a comment below or reach out to me directly.<\/p>\n<\/p><\/div>\n<p><a href=\"https:\/\/news.sophos.com\/en-us\/2022\/12\/15\/sophoslabs-intelix-now-integrates-with-opencti\/\" target=\"bwo\" >http:\/\/feeds.feedburner.com\/sophos\/dgdY<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2019\/12\/intelix.png\"\/><\/p>\n<p><strong>Credit to Author: Doug Aamoth| Date: Thu, 15 Dec 2022 12:00:15 +0000<\/strong><\/p>\n<p>Customers can enrich their internal tools with data from SophosLabs.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10377],"tags":[22058,24552],"class_list":["post-20818","post","type-post","status-publish","format-standard","hentry","category-security","category-sophos","tag-intelix","tag-security-operations"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/20818","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=20818"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/20818\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=20818"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=20818"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=20818"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}