At Red Canary, we’re constantly improving how we display the intelligence we provide our customers to make it more intuitive and actionable. Today we’re announcing two big improvements to our detection view.
Our new detection timeline weaves together indicators of compromise with relevant endpoint activities, such as the relationship between processes and related system changes – all annotated by our expert analysts.
One of our objectives with this new design is to provide a comprehensive view of the entire event chain, while making it easy to see how the pieces fit together. Every piece of intelligence that we present to our customers is intended to have a dramatic effect on the speed of response. This new view makes it easier than ever to follow the progression of threat-related events while taking great care to not overload the responder with irrelevant details.
Following a process
It can be difficult to discern which process did what when looking at what may be many related processes and associated actions.
We assign a new color to each process, and then use that color to denote which actions that process performed.
More meaning with enrichments
Each item in the timeline is unique and may contain many data points that change how one reacts to a particular threat.
For example, we use an “IOC” badge to differentiate Indicators of Compromise from processes and actions that are relevant to the timeline, but not inherently malicious.
Other examples include binary signing status, links to Carbon Black and metadata from threat intelligence sources where applicable.
Red Canary’s team of expert analysts carefully review each potentially threatening event and craft detection notifications when a threat is confirmed.
Our analysts annotate items within the timeline to include information relevant to an understanding of the threat.
These annotations may include command-line arguments, information about malware families or threat actors, or reference data.
Detection engine observations
In addition to the redesign of our details section, we now expose additional information about why our threat detection engine identified the threat in the first place.
Showing why our engine flagged a specific event helps the detection jump off the page with categories such as “Privilege escalation”, “Installation and improvement of persistence mechanisms”, and “Exfiltration of data”.
Endpoint descriptors and user context make it possible to rapidly triage and assign a meaningful severity or impact to a detection when combined with our threat classification.
These improvements give our customers the ability to respond even more efficiently and effectively.
All 2021 Threat Detection Report content is fully available through this website. If you prefer to download a PDF, just fill out this form and let us know what email to send it to.
Thanks for your interest!
Check your inbox, the 2021 Threat Detection Report is headed your way.
Privacy & Cookies Policy
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.