• Articles
    • Editorial Articles
    • Research Articles
    • WatchGuard Articles
  • Daily Security Bytes
  • The 443 Podcast
  • Threat Landscape
  • About
    • About Us
    • Contact Us
    • Contribute to Secplicity

Secplicity - Security Simplified

Powered by WatchGuard Technologies

Without Correlation, You Could Be Missing Threats

September 19, 2017 By Stephen Helm

Organizations face a wave of increasingly advanced and evasive malware. Hackers are leveraging zero-days, encrypted communication channels, kernel-level rootkits, and evasion techniques to sneak past network defenses undetected. Daylighting malware in this virulent threat landscape can prove daunting, and so we are starting to see solutions that combine the powers of multiple services in order to root out hidden attacks!

For example, WatchGuard has recently enhanced how it detects malware by adding the ability to send suspicious threats identified with our Threat Detection and Response service to APT Blocker for deep analysis and rescoring in our next-generation cloud sandbox.  This ultimately leads to greater certainty of a threat’s intent, malicious or not, which contributes more effective response actions and faster remediation.

Here’s how:

Correlation and Threat Scoring with ThreatSync

ThreatSync, part of Threat Detection and Response, collects, correlates and analyzes event data from the WatchGuard Firebox, WatchGuard Host Sensor and threat intelligence feeds. Event data from security services on WatchGuard Fireboxes, including APT Blocker, Reputation Enabled Defense (RED), Gateway AntiVirus and WebBlocker, is sent to ThreatSync to be matched with endpoint data collected from the Host Sensor. ThreatSync then analyzes this threat data to provide a comprehensive threat score and rank overall severity.

WatchGuard Threat Scoring Model:

  • 8, 9, 10 Severe
  • 6 & 7 High
  • 3, 4, 5 Suspicious
  • 2 Suspect
  • 1 Remediated
  • 0 Benign

Captured network and endpoint events that ThreatSync determines have a relationship automatically receive the most severe threat score of 10 which equates to an actively executing malicious process, attempting to establish a connection to an external malicious destination, such as a compromised website or command and control botnet.

Triaging Suspicious Threats in APT Blocker

While threat scores provide powerful guidance in dealing with threats, the evolving nature of malware means indicators graded as suspicious (i.e. 3-7) could be early warning signs of yet to be identified malware. TDR now allows administrators to triage threats by manually, or automatically sending suspicious files to APT Blocker for execution.

APT Blocker uses a next-generation sandbox that provides full system emulation (CPU and memory) to get detailed views into the execution of a malware program. After first running through other security services such as gateway antivirus and intrusion prevention, files are fingerprinted and checked against an existing database.  If the file has never been seen before, it is analyzed using the system emulator, which monitors the execution of all instructions. It can spot the evasion techniques that other sandboxes miss.

If APT Blocker confirms that the suspicious file is actually a threat, then ThreatSync automatically increases the threat score to guide response. As a result, you get more threats clearly identified as severe or benign, allowing you to act with confidence.

In today’s threat landscape, cherry-picking and deploying disparate security solutions inevitably leaves gaps, as those siloed solutions operate independently and don’t talk to each other. Additionally, disparate solutions mean more time spent managing and deploying, as well as triaging threats. Instead, a correlated solution from a trusted vendor brings a fully integrated, consolidated security platform, ensuring a higher degree of protection.

To learn more about Threat Detection and Response, visit www.watchguard.com/TDR

Share This:

Related

Filed Under: WatchGuard Articles

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

The 443 Podcast

A weekly podcast featuring the leading white-hat hackers and security researchers. Listen Now
the 443 podcast

Threat Landscape

Filter and view Firebox Feed data by type of attack, region, country, and date range. View Now
threat landscape

Top Posts

  • USA’s Answer to GDPR
  • Rolling PWN

Email Newsletter

Sign up to get the latest security news and threat analysis delivered straight to your inbox

By signing up you agree to our Privacy Policy.


The views and opinions expressed on this website are those of the authors and do not necessarily reflect the policy or position of WatchGuard Technologies.

Stay in Touch

Recent Posts

  • Hacker Summer Camp 2022
  • Private Sector Offensive Actors
  • USA’s Answer to GDPR
  • Rolling PWN
  • Over a Billion Records Leaked in Shanghai National Police Database Hack
View All

Search

Archives

Copyright © 2022 WatchGuard Technologies · Cookie Policy · Privacy Policy · Terms of Use