<span id="hs_cos_wrapper_post_body" class="hs_cos_wrapper hs_cos_wrapper_meta_field hs_cos_wrapper_type_rich_text" style="" data-hs-cos-general-type="meta_field" data-hs-cos-type="rich_text" ><p style="text-align: justify;">ThreatSTOP security analysts work around the clock to ensure our threat intelligence include the most relevant and critical indicators of compromise (IOCs). Their analysis and research ensures TS block these IOCs and by extension protect customers from the vast spectrum of cyber threats and related <span style="font-size: 12px;">infrastructure</span>. <span style="font-weight: normal;">We've asked our analysts to share their favorite free analysis tools for every step of the threat analysis journey, as well as tips and analysis use cases on infamous malware variants. You can view all this awesome info in our <a href="https://info.threatstop.com/hubfs/7%20OPEN%20SOURCE%20ANALYSIS%20TOOLS,%20TIPS%20&amp;%20USE%20CASES.pdf" rel="noopener" target="_blank">Open Source Analysis Tools Infographic</a>, or below in our more extensive blog series.&nbsp;</span></p> <span style="font-weight: bold;"><!--more--></span> <p style="text-align: justify;">The first step in our IOC analysis journey is <a href="/free-open-source-ioc-analysis-tools-why-use-iocs" rel="noopener">understanding IOCs </a>in the first place - what they are, how to analyze them, and why everyone should be using them to block known threats. These pieces of data, oftentimes posted online for free on community platforms, are invaluable in making sure threats do not infiltrate your network in the first place. And even if they do - blocking traffic to C2 server IOCs will make sure that data exfiltration malware or ransomware on your machine can't send your sensitive data back home to the attackers.</p> <p style="text-align: justify;">Next, our analysts recommend their favorite <a href="/threat-exchanges-ioc-sharing" rel="noopener">threat exchanges for IOC sharing</a>. These community platforms allow researchers to post and find IOCs as they run in to them in the wild, or find out about them on cybersecurity forums. That way, the community is constantly up to date with the latest suspicious and malicious IOCs. While these exchanges are a security analyst's goldmine, not enough use them to collect valuable IOCs for analysis and actionable protection.</p> <p style="text-align: justify;">After you have found some neat, valuable IOCs on these platforms, you should go ahead and <a href="/analyzing-threat-infrastructure" rel="noopener">analyze the threat <span style="font-size: 12px;">infrastructure</span></a>. Is the domain you have found malicious from the get-go, or is it a legitimate website that has been compromised? Is your newly found IP hosting any important domains that you do not want to block? Before confirming the IOC should be blocked,&nbsp; decide how long it should be blocked based on its nature, severity and risk levels.</p> <p style="text-align: justify;">So you've uncovered some shiny new IOCs that should definitely be blocked from communicating with your network? <span style="font-size: 12px;">Congratulations</span>! But one cool next step could bring much more value to your analysis - <a href="/enrichments-connecting-the-dots" rel="noopener">enrichments </a>using analysis tools. While threat exchange posts and news articles offer a very good starting point for threat <span style="font-size: 12px;">infrastructure </span>protection, sometimes there are parts of the <span style="font-size: 12px;">infrastructure </span>that remain undiscovered. Using enrichment techniques, analysts can discover hidden parts of cyber attackers' threat <span style="font-size: 12px;">infrastructure </span>to further widen protection coverage from these threats. This can be as simple as starting out with one malicious IP and finding others on the same address space that also show malicious activity, or a more advanced domain relations analysis to find common registration and syntax patterns, adding additional new malicious domains to your blocklist.</p> <p style="text-align: justify;">&nbsp;</p> <p style="text-align: justify;"><span style="font-weight: bold;">Want to see which tools our analysts recommend for every step of this process?</span> <span style="font-weight: normal;">Check out ThreatSTOP's Free Open Source Analysis Tools, Tips and Use Cases blog series:&nbsp;</span></p> <p><span style="font-weight: bold;">Part 1:</span> <a href="/free-open-source-ioc-analysis-tools-why-use-iocs" rel="noopener">Why Use IOCs?</a></p> <p style="direction: ltr;"><span style="font-weight: bold;">Part 2:</span> <a href="/threat-exchanges-ioc-sharing" rel="noopener">Threat Exchanges &amp; IOC Sharing</a></p> <p style="direction: ltr;"><span style="font-weight: bold;">Part 3:</span> <a href="/analyzing-threat-infrastructure" rel="noopener">Analyzing Threat Infrastructure</a></p> <p><span><span style="font-weight: bold;">Part 4:</span>&nbsp;<a href="https://blog.threatstop.com/enrichments-connecting-the-dots">Enrichments and Connecting the Dots</a></span></p> <p><span><span style="font-weight: bold;">Part 5:</span>&nbsp;<a href="https://blog.threatstop.com/emotet-banking-trojan-use-case" rel="noopener" target="_blank">Emotet Banking Trojan Use Case</a></span></p> <p><span><span style="font-weight: bold;">Part 6:</span>&nbsp;</span><a href="https://blog.threatstop.com/use-case-guildma-information-stealer" rel="noopener" target="_blank"><span>Guildma Information Stealer Use Case</span></a></p> <p><span style="font-weight: bold;">Part 7:</span> <a href="/blog/apt-10-use-case" rel="noopener">APT10 Use Case</a></p> <p>&nbsp;</p> <p style="direction: ltr;">Prefer quick, one-page access to all of this awesome information? Check out our infographic.</p> <p style="direction: ltr;"></p> <p style="direction: ltr;">&nbsp;</p> <p style="text-align: center; font-weight: bold;"><em>Ready to try ThreatSTOP in your network? Want an expert-led demo to see how it works?</em></p> <p style="text-align: center; font-weight: normal;">&nbsp; &nbsp; &nbsp; </p></span>