Ransomware Defense

Comprehensive, Timely, 
and Actionable Ransomware Feed

A Better Feed Enables Better Results

ReversingLabs Ransomware Feed

All threat intelligence teams should use Ransomware feeds, but some feeds are better than others. 

The Ransomware Feed from ReversingLabs is focused on giving cybersecurity professionals the information they need quickly and correctly, allowing them to focus on mitigation rather than research.

Because ReversingLabs is a leader in threat intelligence serving industry, government, and commercial customers, our Ransomware feed creates superior Indicators of Compromise (IoC) to add to your security controls, providing significant advantages over our competitor's more limited feeds.

Comprehensive Metadata

Comprehensive Metadata

Unlike other feeds that provide IoCs without any context, the Ransomware Feed from ReversingLabs provides extensive metadata, such as MITRE ATT&CK tags, ports, and protocols related to IP addresses and malware family names, so your SOC operators can focus on the alert rather than researching the IoC.

Distinct IOCs

Distinct IOCs

Due to ReversingLabs' broad network with other cybersecurity providers, it can detect unique IoCs not present in other, more limited feeds. These previously undetected IoCs could serve as an early alert to potential reconnaissance activities by criminals probing your security defenses.

Aggressive Aging and Proactive Lifecycle Management of IoCs

Aggressive Aging of IOCs

Instead of perpetually retaining IoCs to boost their count, as many feeds do artificially, ReversingLabs prioritizes the removal of inactive IoCs to concentrate on active malware. This approach spares your SOC team from spending unnecessary hours investigating obsolete threats.

Low False Positive Rate

Low False-Positive Rate

By combining aggressive aging and active filtering of obsolete threats, the Ransomware Feed from ReversingLabs provides a very low false-positive rate. This enables efficient resource allocation, reduced alert fatigue, trust in security controls, faster mitigation, and a more optimized security operation.

Understand Ransomware Attack Progression

Understand Ransomware Attack Progression

EARLY STAGE
In its initial phase, malware is typically basic and less resource-intensive, employing a limited number of MITRE ATT&CK techniques. The Ransomware Feed from ReversingLabs offers indicators for ports, payload links, and other early-stage IoCs. With its exhaustive perspective on IoCs, including unique malware, ReversingLabs empowers teams to thwart upcoming attacks preemptively.

MIDDLE STAGE
Concentrating on active malware rather than lists of obsolete attacks, SOC teams can utilize the Ransomware Feed from ReversingLabs to actively monitor and inhibit lateral progression within the organization.

LATE STAGE
Expansion, entrenchment, extortion, encryption, and exfiltration happen in late-stage ransomware attacks. The Ransomware Feed from ReversingLabs gives SOC teams active context to the IoC; they can focus on rapid mitigation rather than wasting valuable time researching malware, dealing with false positives, and rechecking results.

Learn More
Deeper & Better Threat Intelligence

Deeper & Better Threat Intelligence

CHALLENGE:
To prevent ransomware attacks, SOC teams must develop an in-depth understanding of a ransomware group’s tooling, capabilities, and behaviors before, during, and after a ransomware infection.

SOLUTION:
The Ransomware Feed from ReversingLabs offers comprehensive metadata of IoCs, presenting a holistic view of the malware family, its potential protocols and ports, and its alignment with the MITRE framework through ATT&CK (Adversarial Tactics, Techniques, and Common Knowledge) tags. 

SOC teams can address significant threats by concentrating solely on recent malware instead of squandering their time. Observing uncommon or even unique IoCs can serve as an alert for an impending attack. A very low false-positive rate gives SOC teams confidence in their tools, eliminating the need to re-verify every incident.

Threat Model with MITRE ATT&CK

Threat Model with MITRE ATT&CK

CHALLENGE:
Formulating threat models for ransomware gang operations is challenging yet crucial for any SOC team aiming to thwart a ransomware attack. The MITRE framework is one of the most effective strategies for predicting the future actions of criminals.

SOLUTION:
The Ransomware Feed from ReversingLabs offers comprehensive metadata about IoCs, which is used to create network and file indicator lists. These indicators are automatically aligned with standardized MITRE ATT&CK tags, simplifying the threat modeling process and providing a more holistic view of cyber risk throughout the organization.

Timely & Relevant

Timely & Relevant

CHALLENGE:
SOC teams struggle to balance a quick response against a more well-thought-out and researched mitigation. Act too slowly, and the malware will be successful but respond incorrectly, and it could be worse.

SOLUTION:
The Ransomware Feed from ReversingLabs contains timely information because it has aged out inactive malware. The feed can also include distinct IoCs not seen previously, allowing the SOC to respond quickly.

At the same time, the feed also provides full metadata, which offers extensive context to the SOC about the attack and how best to respond. Its low false-positive rate also gives the SOC team confidence in their actions. This enables a well-thought-through response.

Learn More

How to Consume the ReversingLabs Ransomware Feed

Anomali
Azure Sentinel
Cortex Xsoar
Cyware
Threat Connect

Solution Insights

How to Evaluate Threat Intelligence Feeds

How to Evaluate Threat Intelligence Feeds

Learn how to evaluate the many open source and commercial Threat Intelligence Feeds that provide information about cyber threats (malware, ransomware etc.) and threat actors that you and your team can use to identify malicious events.

Learn More