EP211 Decoding the Underground: Google's Dual-Lens Threat Intelligence Magic
Feb 17, 2025
auto_awesome
Kimberly Goody, Head of Intel Analysis and Production at Google Cloud, dives into the fascinating world of threat intelligence. She shares how Google's Threat Intelligence Group uniquely combines underground forum data with incident response insights to identify cybercriminal campaigns. Goody explains the challenges of attributing attacks to specific actors and the importance of contextualizing threats. The discussion also highlights the role of AI in enhancing threat analysis and the collaborative efforts across Google's teams to strengthen security.
Google's Threat Intelligence Group enhances cybersecurity by combining technical analysis and interpretative skills to decode complex cyber threats.
Collaboration among various teams within Google creates a coordinated response to emerging cyber threats, improving overall security for users and customers.
Deep dives
Integrating Art and Science in Threat Intelligence
Threat intelligence is characterized by a combination of arts and sciences, emphasizing that effective practice requires not only technical expertise but also interpretative skills. The discussion highlights how understanding the nuances of cyber threats demands the blending of various disciplines, much like a liberal arts education. This multifaceted approach helps practitioners assess threats in a comprehensive manner, considering both the technical characteristics of malware and the behavioral patterns of threat actors. The speakers assert that this balance enriches the field and makes threat intelligence both an art and a science, enhancing overall understanding and responsiveness.
The Role of Contextualization and Prioritization
A three-pronged approach of prioritization, contextualization, and proactiveness shapes Google’s ability to handle cybersecurity threats effectively. By prioritizing research based on observed active intrusions, teams can focus their efforts on the most significant threats currently affecting organizations. Contextualization of attacks provides insights into malware used in intrusions, linking them to underground forums or specific threat actors, thus refining attribution and responses. This layered understanding not only prepares teams for existing threats but also helps anticipate future changes in tactics from adversaries.
Collaborative Intelligence for Enhanced Security
Collaboration across various teams within Google amplifies the effectiveness of threat intelligence and incident response efforts. Incident response information is relayed to various stakeholders, including legal teams, ensuring a coordinated reaction to emerging threats and vulnerabilities. This interconnected system allows the sharing of vital data, which can be used to improve security measures not just within the organization but for its users and customers as well. Examples like the proactive measures taken against the CryptBot malware illustrate how comprehensive intelligence efforts can lead to tangible actions for enhanced security.
Kimberly Goody, Head of Intel Analysis and Production, Google Cloud
Topics:
Google's Threat Intelligence Group (GTIG) has a unique position, accessing both underground forum data and incident response information. How does this dual perspective enhance your ability to identify and attribute cybercriminal campaigns?
Attributing cyberattacks with high confidence is important. Can you walk us through the process GTIG uses to connect an incident to specific threat actors, given the complexities of the threat landscape and the challenges of linking tools and actors?
There is a difficulty of correlating publicly known tool names with the aliases used by threat actors in underground forums. How does GTIG overcome this challenge to track the evolution and usage of malware and other tools? Can you give a specific example of how this "decoding" process works?
How does GTIG collaborate with other teams within Google, such as incident response or product security, to share threat intelligence and improve Google's overall security posture? How does this work make Google more secure?
What does Google (and specifically GTIG) do differently than other organizations focused on collecting and analyzing threat-intelligence? Is there AI involved?