true
Blog Unveiling Our New Blockchain Research Tool at Black Hat Arsenal and DEF CON Recon Village 2018

Unveiling Our New Blockchain Research Tool at Black Hat Arsenal and DEF CON Recon Village 2018

bitcoin research

Las Vegas, Aug. 06, 2018 (GLOBE NEWSWIRE)  The data science team behind TruSTAR will be presenting the only blockchain research tool selected for both research villages at Black Hat and DEF CON 2018, two of the largest, most highly-regarded cybersecurity conferences in the U.S.

Data Science Lead Nicolas Kseib and Engineering Lead Olivia Thet will demonstrate how the Bitcoin public ledger can be leveraged to track emerging malware and ransomware campaigns. The research demos will take place at Mandalay Bay Convention Center and Caesar's Palace in Las Vegas from August 9-11.

The "White Rabbit" research tool provides near real-time contextual awareness of a specific ransomware campaign, monitoring surges or declines by tracking Bitcoin transaction rates associated with the attack. Threat researchers and malware hunters can quickly determine if a particular ransomware campaign is gaining momentum and prioritize associated indicators of compromise (IOCs) to detect and block the attack. The White Rabbit tool aligns with TruSTAR’s portfolio of threat intelligence solutions that allow enterprises to extract, enrich, visualize, and prioritize threat intelligence, saving security operation teams valuable time and resources.

Bitcoin public ledger data can be used as a marker of malware traction because it is frequently used as a payment method in ransomware campaigns due to its pseudo-anonymous nature and its ability to be easily transferred across state and national territories. TruSTAR is the first threat intelligence platform to track Bitcoin addresses as an indicator of compromise (IOC).

"As the blockchain evolves and potentially plays a bigger role in cyberattacks, the security community will have to dramatically rethink the current concepts of tracking adversaries,” said Nicolas Kseib, Lead Data Scientist at TruSTAR.

“We’re fighting the wrong fight in trying to deanonymize the blockchain – we should be looking at the bigger picture instead,” said Olivia Thet, Software Engineer at TruSTAR. “Security analysts who are using TruSTAR are far more interested in how Bitcoin wallet addresses are correlating with the other IOCs they’re tracking versus who is actually implementing the ransomware campaigns.”

To build the blockchain dataset, TruSTAR’s data science team collected a list of seed Bitcoin addresses involved in illegal activities. Using these addresses as a starting point, the researchers reconstructed a cluster of connected "dirty" addresses that could be tracked to determine if a ransomware campaign is gaining momentum. A full breakdown of the research abstract and methodology can be found here.

White Rabbit Demo schedule:


About TruSTAR

TruSTAR is an intelligence platform that helps organizations leverage multiple sources of threat intelligence and fuse it with historical event data to prioritize and enrich investigations. Built for security and fraud teams, TruSTAR uses machine learning and automation to operationalize data throughout an analyst’s workflow, freeing up time for higher-priority events. The most valuable security data is often locked inside silos in and across companies. TruSTAR breaks down these silos with its Enclave knowledge management architecture. Enclaves give complex teams customization, integration, and granular access controls that enable collaboration. TruSTAR is the technology infrastructure that powers many of the U.S.’s largest ISACs and ISAOs, and has enterprise customers that span across Finance, Retail, Healthcare, Aerospace, and IT. Learn more at www.trustar.co and follow us on Twitter at @TruSTARtech.

Come find us this week here.

We've Made It Easier For You To Find High-Priority Indicators Today we’re announcing a major update to our IOC management feature to help security teams identify high-priority indicators while investigating ... Read More
Improve Efficiency of Intelligence Analysis Using IOC Management Feature Cyber observables and IOCs are the building blocks of intelligence analysis. They're critical to making accurate decisions throughout the ... Read More
Introducing TruSTAR’s New Source Scoring Model Having confidence in your intelligence sources is essential to running successful security operations. But measuring the effectiveness of how your ... Read More