Page 43 - index
P. 43







• Initiate legal procedures to control domain ownership.

• Block access to malicious websites using URL filters.

• Report URLs to anti-phishing companies.

With the rise of Mobile computing, rogue mobile apps portrayed to be associated to an
organization are a real threat. XYZ Corp found numerous apps that used their company name
and logo available on several Appstores. An investigation concluded that the Apps weren’t
actually harmful scamware in this particular incident. However, do you really want an App out
there which could pose as a potential liability?

• A future update to the application could reveal its true criminal intent.

• Your customer service line may receive calls regarding the application.

XYZ Corp learned of the existence of these Apps through Mobile App Monitoring intelligence
and took action by having them removed from the Appstores.

Malware Intelligence

The industry has seen Malware spread stealthy and harmlessly, in some cases for years until it
found its way into a target’s environment.

Unfortunately, Antivirus products don’t offer enough protection because the existence of these
threats remains unknown until it’s too late. Malware Threat intelligence allows organizations to
proactively identify these threats. This is accomplished when Malware analysis or reversing
discovers parameters associated to an entity such as their:

• Domain name and Domain SID


• Internal IP and IP Ranges

• Network naming conventions

An entity can work with law enforce to try and locate benefactors of the malware in order to take
legal action. The entity can also work with security software companies to make the threat
recognizable by their products.
Conclusion


In 2014, we’ve all witnessed or fell victim to some of the most sophisticated cyber-attacks ever
seen. These attacks brought large organizations and governments down to its knees and
subsequently caused billions of dollars in damage.

Threat intelligence is no longer just a military approach. Companies, small and large, should
seek timely, high-quality insight and actionable intelligence for protecting their assets.



43 Cyber Warnings E-Magazine – December 2014 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide

   38   39   40   41   42   43   44   45   46   47   48