
Hello @Andre Kurtz ,
we have tested at least two paid threat intelligence feeds and unfortunately I have to say that they are all very prone to throw false positives.
Especially with the modern internet architecture with highly flexible content delivery networks, cloud servers etc. an IP address which hosted a malware in the morning can be a legitimate amazon server in the evening. So those feeds are outdated very fast and thus will trigger false positives.
Often, the malware servers are also very short-lived because they consist of hacked wordpress instances that are taken offline with an abuse message to the web hosting provider.
In addition, each threat feed provider can only update the current information with a certain delay. This means that in some cases the firewall logs that contain information about a C2 connection were still "clean" according to the threat feed at the time the logs arrived in the SIEM.
From this follows that at the time of enrichment after log normalization no threat feed information is added to the logs. And since the volume of the firewall logs is usually very high, the alert rules that may use "process ti()" should not run on too high time ranges.
In summary, these threat feeds should be treated with caution. If you have enough manpower to process the amount of false positives, you can try it out.
5 comments