VirusTotal_Enablement
VirusTotal_Enablement
Confidential Information
Subject to NDA
1
VirusTotal Partner
Enablement - India
www.virustotal.com/contact
Event Agenda
1
What is VirusTotal and Threat Intelligence
2
Use Cases & Sales Play
3
VT Bundles/ Feeds
4 Q&A
01
What is VirusTotal and Threat
Intelligence
What is Threat
Intelligence?
NIST Defines Threat intelligence as threat information
that has been aggregated, transformed, analyzed,
interpreted, or enriched to provide the necessary context
for decision-making processes.
Proprietary + Confidential
~ 10K API lookups per second, with US Cyber Command’s vehicle to share
ubiquitous technology integrations threat intel with the community [+]
40M+ manual (human-driven) IoC 80K+ browser extension users, including
searches per month feedback loop
3M+ users per month and 1.5M+ No.1 integration in Palo Alto Cortex
registered users XSOAR and other marketplaces [+]
Vision statement
To make breaches insignificant by becoming the leading threat
intelligence sharing hub, orchestrating global threat response
across world-wide distributed security teams.
ELEMENTS
1 Breaches: flag any kind of malicious Internet behaviors, not only malicious files. Understand all the
steps of the cyber kill chain.
Sharing hub: crowdsource and aggregate findings, move beyond passive role, actively push out
2
curated security information.
3 Leading: richest and most actionable threat intelligence. Comprehensive, accurate, timely, diverse,
explainable, contextual, applicable, scalable.
Orchestrate: seamlessly inform corporate stacks in a collective immune system fashion through
4
integrations and coordinate industry action against attacks.
Security teams: VirusTotal becomes an indispensable layer in corporate security and Intelligence
5
Community programs, beyond just security vendors.
Mission statement
TI one-stop-shop
Detection Static analysis
rules tools Operational/Strategic Intelligence
Threat Graph, Threat Campaigns,
Adversaries, TTPs, Rules, Trends
National Data exchange STIX/TAXII +
CERTs partnerships Sensitive files vetting bring-your-own-key
Reputation + context for integrations for long-tail
Google Known bad & non-shareable files
Crawler Known good
VT4Browsers overlaying
where no integrations
Security vendors
SOC/CTI teams
Sysadmins and IT staff
Community users
Discover and
investigate threats
? mkSandboxService.exe
MACHINE X | USER A ?
What techniques did Are there any other indicators
the attackers use ? I should know about ?
Can I do anything to
detect future attacks?
? What are the
attackers motivations ? Could this be a
false positive ?
Confidential and Proprietary
Daily New Data uploaded: 2M+ file, 3M+ URL
Data source
● Security Partners: anti-virus engines, url scanner, sandbox/dynamic analysis, etc
● Public Community: 3M+ people(both security professionals and public crowd) around the
world uploading files
EDR / AV
IDS/IPS
Proxy
VT GUI
RESPOND PREVENT virustotal.com|
Incident response
& Forensic Analysis
SOC investigations, alert
escalations, DFIR, IoC
identification for remediative
actions etc. Unprecedented
pivoting and threat data
aggregation.
Anti-phishing,
Anti-fraud, brand
monitoring
Phishing campaign study,
banking trojan analysis,
malicious observations related
to a corporate brand, data loss
early warning.
Vulnerability
Prioritization
Triage vulnerability reports,
smart patching strategy based
on in-the-wild exploitation,
CVEs that need attention, early
warning using the power of VT
API.
go/vt-cve-dash
Integrate VT into security The “Google” of malware Apply YARA rules to live Explore VT’s dataset visually, map
tools uploads, get notifications campaigns
PBs of data queryable in
Automate workflows with VT seconds Run YARA rules back in time, Automatic commonality and
track attackers pattern discovery
Programmatic enrichment of Download files for further
alerts scrutiny Generate automatic YARA rules Share and collaborate on
for groups of files investigations
Any kind of threat Pivot to similar and related
observable observables Download matches for offline Assisted investigation and
study expansion playbooks
Free public service | 70+ Antiviruses | Vet suspicious files | 1M+ new files per day
See suspicious files through
VirusTotal’s eyes, privately
Get a second opinion on suspicious files,
automatically extract IoCs and assess
impact to your org.
Security teams are often confronted with an
unknown file and asked to (1) understand if it is
malicious, (2) make sense of an attack. Without
further context, it is virtually impossible to
determine attribution, build effective defenses
against other strains of the attack, or understand
the impact of a given threat in your organization.
Privacy preserving scanning bridges the gap and
generates insights to neutralize threats.
Analysis components
ATT&CK
Downloadable Artifacts MITRE ATT&CK TTPs Deep dynamic tracing
PCAPS | Windows EVTX | Memory dumps | Tactics | Techniques | Verbose descriptions | API call level | High-level summaries and
Screenshots | Self-contained detailed HTML report Main corpus pivoting detailed reports
Multiple OS, single license Same OS, multi-sandbox
What Makes VT Support for Windows, OS X, Two different sandboxes for
Private Scanning Linux and Android at no extra
cost, spend your monthly file
each OS, each one leveraging
orthogonal monitoring
Different
analysis allotment however techniques to improve
you wish. Any file type. resilience against evasion.
● How do you make sure that your team’s time is spent wisely?
Are you entirely sure that L1’s are not addressing tasks that
could be automated? Are you sure that L3’s are not undertaking
tasks that could be performed by an L1?
Use cases by Team
Common Objections
“I am worried about uploading my data to VT” “We don’t have enough people in the team to explore
other new functionalities, we are a very small team”
● Your data won’t appear on VT unless you want it to.
Only files are shown in VT and it has to be ● VT provides all the needed tools to precisely save
deliberately uploaded through the API or manually for hours of work, both with automation and by using our
it to appear on VT. There are no agents or endpoints platform. The use is very intuitive and provides junior
that ingest your data. If you upload something by analysts with the capability to solve problems that
accident, please email [email protected] and would take a long time to solve even for more
they’ll take it down right away. experienced security experts. Additionally, all tools
and data are found and integrated in a single place.
“I conduct all my operations in a TIP/SIEM case “We are not looking to replace our SOC analysts
management system, etc. I don't want yet another through automation”
interface”
● Automatic security telemetry enrichment is just one of
● Their security solution might already have a default VT’s use cases.
integration API key based integration with ● VirusTotal is not only used for security telemetry
● VirusTotal for automated enrichment. If not, they enrichment, but rather to empower your SOC analysts and
might be able to code it themselves. make them more efficient, enabling them to make faster
and more confident decisions.
Business Benefits
VT Hunting Retrohunt jobs (90 Day lookback) 2/mo 5/mo 25/mo 1k/mo
VT Hunting VTDIFF automatic YARA rule jobs 5/mo 25/mo 100/mo 10K/mo
Threat Landscape / Adversary Intelligence Not included Not included Included Included
Bi-monthly threat intel briefings Not included Not included Not included Included
VT File Feeds
The file feed allows you to sync historical events with VirusTotal’s brain in order to
unearth undetected threats that originally flew under the radar. This is how mature
security teams make breaches insignificant. Additionally, the feed incorporates rich IoC
relationships that can be fed into your perimeter defenses in order to implement a
preventative strategy, or to simply enjoy the best of VirusTotal on-premise.
VT IP Feeds
The IP feed helps provide analyses for security professionals insights to proactively
stop malicious attacks, as well as the context needed to investigate them.
VT URL Feeds
The URL feed allows you to sync past recordings with VirusTotal’s brain in order to
unearth undetected threats that originally flew under the radar. The URL feed also
powers anti-phishing operations, as it is one of the world-largest streams of phishing
and malware CnC infrastructure, coming not only from our open community but also
from partnerships and other sources. E.g. All URLs seen when detonating files
submitted to VirusTotal in sandboxes get published in the feed
VT Domain Feeds
The domain intelligence feed provides reputation and context related to any domain
that VirusTotal analyzes, live, as the scans conclude. This real-time stream includes
botnet C&Cs, ransomware & exploit kit infrastructure, domains delivering malware,
phishing domains, etc. Add a second opinion to your multi-layered defense-in-depth
strategy and find threats before they find you
VT Behavioural Feeds
Investment Option to the Partner
SMBs
Enterprises Key prospects
Small requests
(BigTech, Security Partnerships, Government)
04
Q and A
THANK YOU!
www.virustotal.com/contact