After completing these activities you should be able to:
Most cybersecurity tools and technologies are reactive, waiting for something malicious to occur before taking action. Heuristic-based security software, such as antivirus, Intrusion Detection/Prevention Systems (IDS/IPS), and Access Control List (ACL)-based boundary security tools, are pervasive examples of this reactive posture. These tools are designed to detect, quarantine, and eliminate malware *after* it has been introduced to a network. Often, the logs from these tools become the primary evidence for observing an attack in progress or investigating a breach long after the initial compromise. The time an adversary remains undetected in a network, known as "dwell time," remains a significant challenge. In 2023, the median dwell time for ransomware attacks was just 5 days, while the overall median dwell time across all intrusions was 13 days, a significant decrease from previous years, showcasing improved detection but also faster-acting adversaries [1].
Cyber Threat Intelligence (CTI) is the evidence-based knowledge, including context, mechanisms, indicators, implications, and actionable advice, about an existing or emerging menace or hazard to assets. This intelligence is used to inform decisions regarding the subject's response to that menace or hazard [2]. CTI does not prevent a cyber attack by itself, but the information sharing and the understanding of adversary Tactics, Techniques, and Procedures (TTPs) enable organizations to shift from a reactive to a proactive defense. This proactive stance significantly increases an organization's ability to anticipate and prevent attacks, thereby reducing risk and shortening dwell times.
To fully grasp CTI, we must understand its component parts:
Cyber - The cyberspace domain consists of the interdependent networks of information technology infrastructures and resident data, including the Internet, telecommunications networks, computer systems, and embedded processors and controllers. It is often described in three layers: the physical network (hardware), the logical network (software and protocols), and the cyber-persona (digital identities) [3].
Before intelligence can be used, it must be produced through a structured process known as the intelligence cycle. This iterative process ensures that the intelligence is relevant, timely, and actionable.
The maturity and structure of a cybersecurity program dictate how CTI is managed. A small organization might rely on a single IT security professional, while a large enterprise may have a dedicated Cyber Fusion Center (CFC) that integrates intelligence with other security functions.
The U.S. military and Department of Defense (DoD) are at the forefront of CTI development and application. Their approach is formalized and integrated into joint military doctrine. The military views cyberspace as a warfighting domain, and CTI is critical for achieving mission objectives and maintaining information superiority.
U.S. Cyber Command (USCYBERCOM) leads the DoD's cyberspace operations and relies heavily on CTI. The process is often framed within the Joint Intelligence Preparation of the Operational Environment (JIPOE) framework, which is adapted for cyberspace. This involves four major steps:
CTI is categorized into three main levels, each serving a different purpose and audience.
Strategic CTI. High-level intelligence for executive leadership. It focuses on the "who" and "why" of threats, addressing business risk, threat actor motivations, and geopolitical trends.
Reliable sources of CTI are crucial. Government agencies like the Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) provide authoritative public alerts. Commercial threat intelligence services from companies like CrowdStrike, Mandiant (now part of Google), and Recorded Future offer deep, curated intelligence for subscribers. Open-source platforms like VirusTotal provide invaluable tools for analyzing files and URLs against a vast repository of data.
Threat hunting is a proactive search through networks to detect and isolate advanced threats that evade existing security solutions. Let's run through a basic threat hunting process using a real-world IOC.
Run through the step-by-step threat hunting process below to look into an IOC that would feed into the CTI and response teams.
Threat modeling is a structured process for identifying and prioritizing potential threats to a system and validating mitigations. It's a proactive exercise to "think like an attacker."
Common frameworks include:
Cyber threat actors are the individuals or groups behind a threat. Understanding their motivations and capabilities is central to CTI.
Advanced Persistent Threats (APTs): Highly sophisticated, well-resourced groups, often sponsored by a nation-state. Their goals are typically espionage, data theft, or disruption (e.g., Volt Typhoon).
Organized Crime: Financially motivated groups that operate like a business. They are responsible for most ransomware attacks, data theft for resale, and financial fraud (e.g., ALPHV/BlackCat, LockBit).
Hacktivists: Individuals or groups driven by a political, social, or ideological cause. Their goal is to bring attention to an issue by disrupting or defacing a target's web presence.
Insider Threats: A current or former employee, contractor, or partner who has or had authorized access and uses it, intentionally or unintentionally, to harm the organization.
Script Kiddies: Amateur attackers who use pre-made scripts and tools developed by others. They typically lack deep technical skills and are often motivated by curiosity, a desire for attention, or causing low-level disruption rather than significant financial gain or espionage.
| Country/Entity | CrowdStrike | Microsoft | Mandiant (Google) | AKA |
|---|---|---|---|---|
| Russia | BEAR | Blizzard | APT28, APT29 | Fancy Bear, Cozy Bear, Energetic Bear, Voodoo Bear, Ember Bear, ... |
| China | PANDA | Typhoon | APT41, APT10 | Volt Typhoon, Flax Typhoon, Vixen Panda, Panda Dynamite, ... |
| Iran | KITTEN | Sandstorm | APT33, APT34, APT35 | Charming Kitten, Helix Kitten, Twisted Kitten, Ferocious Kitten, ... |
| North Korea | CHOLLIMA | Sleet | APT38, APT37 | Lazarus Group, Ricochet Chollima, Labyrinth Chollima, ... |
| Financial | SPIDER | Tempest | FIN6, FIN7, FIN12 | Scattered Spider, ALPHV/BlackCat, LockBit |
| Hacktivists | JACKAL | Based upon objective | Anonymous |
The cyber threat landscape is a continuously evolving environment. To stay ahead of threat actors, organizations must continually adapt their cybersecurity measures, optimizing capabilities and technologies through the effective use of cyber threat intelligence and threat modeling.
[1] Mandiant. (2024). *M-Trends 2024*. Google Cloud. https://cloud.google.com/security/resources/m-trends-2024
[2] Gartner. (n.d.). *Gartner Glossary: Threat Intelligence*. Retrieved July 10, 2025, from https://www.gartner.com/en/information-technology/glossary/threat-intelligence
[3] Joint Chiefs of Staff. (2018). *Joint Publication 3-12, Cyberspace Operations*. U.S. Department of Defense. https://www.jcs.mil/Portals/36/Documents/Doctrine/pubs/jp3_12.pdf
[4] ISO/IEC. (2018). *ISO/IEC 27000:2018 Information technology — Security techniques — Information security management systems — Overview and vocabulary*. International Organization for Standardization. https://www.iso.org/standard/73906.html
[5] Heuer, R. J. (1999). *Psychology of Intelligence Analysis*. Center for the Study of Intelligence, Central Intelligence Agency. https://www.cia.gov/resources/csi/books-monographs/psychology-of-intelligence-analysis/
[6] U.S. Army. (2017). *ATP 2-01.3, Intelligence Preparation of the Battlefield/Battlespace*. Department of the Army. https://armypubs.army.mil/epubs/DR_pubs/DR_a/pdf/web/ARN1519_ATP%202-01.3%20FINAL%20WEB.pdf
[7] U.S. Cyber Command. (n.d.). *About USCYBERCOM*. Retrieved July 10, 2025, from https://www.cybercom.mil/About/
[8] Cybersecurity and Infrastructure Security Agency (CISA). (2024). *PRC State-Sponsored Actors Compromise and Maintain Persistent Access to U.S. Critical Infrastructure*. https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-038a
[9] AhnLab. (2024, January 25). *ALPHV Ransomware Group Actively Exploiting Recent T-Mobile Vulnerability*. AhnLab Security Emergency response Center (ASEC). https://asec.ahnlab.com/en/61277/
[10] Symantec. (2023). *Scattered Spider: The Modus Operandi of a Prolific Threat Actor*. Broadcom. https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/scattered-spider-threat-group-modus-operandi
[11] AcumenCyber. (2025, May 28). *Cyber Threat Intelligence Digest: Week 21*. https://acumencyber.com/cyber-threat-intelligence-digest-may-2025-week-21?utm_source=chatgpt.com
[12] MITRE. (n.d.). *Groups*. MITRE ATT&CK®. Retrieved July 10, 2025, from https://attack.mitre.org/groups/