Las Vegas, Aug. 06, 2018 (GLOBE NEWSWIRE) — The data science team behind TruSTAR will be presenting the only blockchain research tool selected for both research villages at Black Hat and DEF CON 2018, two of the largest, most highly-regarded cybersecurity conferences in the U.S.
Data Science Lead Nicolas Kseib and Engineering Lead Olivia Thet will demonstrate how the Bitcoin public ledger can be leveraged to track emerging malware and ransomware campaigns. The research demos will take place at Mandalay Bay Convention Center and Caesar's Palace in Las Vegas from August 9-11.
The "White Rabbit" research tool provides near real-time contextual awareness of a specific ransomware campaign, monitoring surges or declines by tracking Bitcoin transaction rates associated with the attack. Threat researchers and malware hunters can quickly determine if a particular ransomware campaign is gaining momentum and prioritize associated indicators of compromise (IOCs) to detect and block the attack. The White Rabbit tool aligns with TruSTAR’s portfolio of threat intelligence solutions that allow enterprises to extract, enrich, visualize, and prioritize threat intelligence, saving security operation teams valuable time and resources.
Bitcoin public ledger data can be used as a marker of malware traction because it is frequently used as a payment method in ransomware campaigns due to its pseudo-anonymous nature and its ability to be easily transferred across state and national territories. TruSTAR is the first threat intelligence platform to track Bitcoin addresses as an indicator of compromise (IOC).
"As the blockchain evolves and potentially plays a bigger role in cyberattacks, the security community will have to dramatically rethink the current concepts of tracking adversaries,” said Nicolas Kseib, Lead Data Scientist at TruSTAR.
“We’re fighting the wrong fight in trying to deanonymize the blockchain – we should be looking at the bigger picture instead,” said Olivia Thet, Software Engineer at TruSTAR. “Security analysts who are using TruSTAR are far more interested in how Bitcoin wallet addresses are correlating with the other IOCs they’re tracking versus who is actually implementing the ransomware campaigns.”
To build the blockchain dataset, TruSTAR’s data science team collected a list of seed Bitcoin addresses involved in illegal activities. Using these addresses as a starting point, the researchers reconstructed a cluster of connected "dirty" addresses that could be tracked to determine if a ransomware campaign is gaining momentum. A full breakdown of the research abstract and methodology can be found here.
White Rabbit Demo schedule:
- Black Hat Arsenal - Thursday, August 9 - 2:30–3:50 p.m. PT - Mandalay Bay
- DEF CON Recon Village - Saturday, August 11 - 4:05–4:35 p.m. PT - Caesar’s Palace
TruSTAR is an intelligence platform that helps organizations leverage multiple sources of threat intelligence and fuse it with historical event data to prioritize and enrich investigations. Built for security and fraud teams, TruSTAR uses machine learning and automation to operationalize data throughout an analyst’s workflow, freeing up time for higher-priority events. The most valuable security data is often locked inside silos in and across companies. TruSTAR breaks down these silos with its Enclave knowledge management architecture. Enclaves give complex teams customization, integration, and granular access controls that enable collaboration. TruSTAR is the technology infrastructure that powers many of the U.S.’s largest ISACs and ISAOs, and has enterprise customers that span across Finance, Retail, Healthcare, Aerospace, and IT. Learn more at www.trustar.co and follow us on Twitter at @TruSTARtech.