20 March 2024
GLIMPS and SEKOIA.IO: an example of interoperability against malware
Articles
GLIMPS and Sekoia.io combine AI-based malware analysis (GLIMPS Malware Expert) with the Sekoia Defend platform, which merges threat intelligence anticipation and automated detection and response to accelerate detection and enrich analyst workflows.
This integration was born through the Open XDR Platform and continues within the OXA framework, enabling SOC teams to automate file analysis, enrich alerts with behavioral verdicts, and trigger actionable responses, all within Sekoia.io and GLIMPS solutions. This collaboration enables rapid and coordinated responses to sophisticated cyber threats.
The integration of SEKOIA.IO in GLIMPS Malware enriches analysis results
GLIMPS Malware Expert natively integrates a SEKOIA.IO connector, providing a first level of automatic enrichment for certain analyses. This integration gives Malware Expert users an overview of certain contextual information relating to malware identified by GLIMPS and known by SEKOIA.IO.
And in practice?
After analysis by GLIMPS Malware Expert, you have access to the complete threat characterization displayed in your interface. Thanks to the integration with SEKOIA and if the threat is known by SEKOIA Intelligence, you also have a first level of information about the threat with the presentation of the malware sheet.
With a single click, users who are SEKOIA Intelligence customers can continue their journey through the SEKOIA.IO platform and benefit from all the known elements associated with the malicious code analyzed, such as its modus operandi, its targets, or the indicators that characterize it. This makes it much easier to choose the right actions to detect and remediate the threat.
To visualize the results provided by SEKOIA, you need to have a SEKOIA Intelligence API key.
Preview of the threat description provided by SEKOIA
Preview of known IOCs from SEKOIA and observables, with pivot links allowing you to switch from the GLIMPS Malware Expert interface to that of another tool (including SEKOIA).
Preview of the interface accessed through the pivot link to SEKOIA
The added value: enhanced threat understanding
The use of SEKOIA Intelligence operational intelligence enables the analyst to immediately understand the nature of the threat identified by the GLIMPS detection engine in order to:
– consolidate cross-referenced information on the targeted threat in a single interface
– accelerate tactical decision-making and operational responses by providing context around the identified threat.
The combination of GLIMPS’ detection power and SEKOIA Intelligence’s knowledge enables analysts to immediately understand the scale of the threat. Mean Time to Detect (MTTD) is greatly accelerated.
Switching over to the full SEKOIA.IO interface for SEKOIA Intelligence customers enables them to benefit from the full CTI knowledge of the identified threat to counter it. This time, the “Mean Time to React” (MTTR) has improved significantly.
The integration of GLIMPS Malware in SEKOIA Defend to automate doubt resolution and in-depth analysis
The aim of this integration is to automate the investigation and in-depth analysis of files linked to alerts from different sources, directly in the SEKOIA Defend console.
The GLIMPS connector in SEKOIA Defend can be configured in a matter of seconds using two elements:
– the URL of a GLIMPS Malware instance
– A GLIMPS API key
Once configured, an enrichment and analysis playbook is then available in SEKOIA Defend, making it easy to call up GLIMPS Malware to access existing analyses.
In just a few seconds, a “simple” result is obtained, including:
– File status: Malicious |Suspect | Safe
– Threat score
– Malware family
– Link to the full GLIMPS interface