Know Ourselves Before Knowing Our Enemies: Threat Intelligence at the Expense of Asset Management
好的,我现在需要帮用户总结一篇文章的内容,控制在100个字以内。用户已经提供了文章的标题和内容,以及一个示例的总结。我得先仔细阅读文章,理解其主要观点。 文章标题是“资产管理:网络防御的无名英雄”。内容主要讨论了资产管理在网络安全中的重要性。作者提到威胁情报虽然有用,但如果缺乏良好的资产管理,威胁情报的效果就会大打折扣。资产管理包括网络资产的清点、监控和管理,如软件补丁、系统更新等。作者认为资产管理是IT安全的基础,但因为不够吸引人而常常被忽视。 接下来,我需要将这些要点浓缩到100字以内。要确保涵盖资产管理的重要性、其组成部分以及它在网络防御中的基础作用。同时,要避免使用“文章内容总结”之类的开头语。 可能的结构是:介绍资产管理的重要性,说明它如何作为基础防御措施,以及为什么它虽然关键却常被忽视。 现在尝试组织语言: “资产管理是网络安全的基础。通过清点、监控和管理网络资产,组织能够有效防御威胁。尽管不如威胁情报引人注目,但良好的资产管理能显著降低感染风险。” 这样大约60字左右,符合要求。 </think> 资产管理是网络安全的基础。通过清点、监控和管理网络资产(如软件补丁、系统更新),组织能够有效防御威胁。尽管不如威胁情报引人注目,但良好的资产管理能显著降低感染风险。 2025-11-5 00:0:2 Author: unit42.paloaltonetworks.com(查看原文) 阅读量:34 收藏

Asset Management: The Boring Hero of Cyber Defense

Cyber threat intelligence is often touted as a way to help defend an organization's IT environment. If we better understand the threats that might target our networks, we can better defend ourselves against those threats. This is true, but threat intelligence is only effective if an organization also properly manages its IT assets.

Asset management consists of:

  • Inventory and tracking of hosts on an organization's network
  • Monitoring hosts on an organization's network
  • Administering hosts on an organization's network (software patches, OS and hardware updates, endpoint defense solutions, etc.)

While not entirely a security function, asset management should be at the base of any IT security pyramid. As I wrote in 2019 for SANS Internet Storm Center (ISC), "Without inventory management, we cannot properly secure our infrastructure, because we don't fully understand everything on our network." An unknown or improperly managed host within an organization's network could provide a window for attackers to establish a foothold in the environment.

Unfortunately, asset management isn't as exciting as the cyberthreats we face. Reading about a particular threat is often more intriguing than taking the practical steps needed to defend against it.

Patch, Protect, Prevent: Why It Still Matters

I first noticed this as a volunteer handler at the ISC. During my time with the ISC, I frequently wrote diaries that provided examples of Windows-based malware infections and the associated indicators. My lab environment consisted of purposefully vulnerable hosts, so I ended these diaries with best practices to help protect against the threat. A key part of these final words included a statement advising that properly administered and up-to-date Windows hosts were much less likely to become infected.

Readers would occasionally leave favorable comments about the technical content regarding the threats, but sometimes they commented on how frustrating it was to see the same preventative measures over and over again in my diaries.

However, these preventative measures are the best security practices. When implemented, they were often effective against prominent malware families like Emotet and Qakbot (Qbot). In my diaries about these malware families, the samples in my lab could easily have been prevented through various vendors' endpoint security solutions. However, these malware families were responsible for millions of malware infections worldwide. In the 2023 takedown of Qakbot's infrastructure, the malware family was reportedly responsible for more than 700,000 infections. In a disruption of Emotet's infrastructure in 2021, it was reportedly responsible for over 1.6 million infections.

Some of this can be attributed to the cat-and-mouse game of cybercriminals trying to stay ahead of security vendors. But many of these infections could've been detected or prevented with proper asset management.

Asset Management: Your First Line of Defense, Not the Last

Knowing the threat posed by malware families like Emotet and Qakbot may be part of an effective defense, but without the bedrock of asset management, threat intelligence about those attacks is far less effective. The bedrock of asset management is necessary to better defend an organization against any IT threat.

Although attacks have evolved, we see many time-honored tactics that remain the same. For example, an ongoing tactic is using SEO poisoning to deliver malware disguised as legitimate software. For an Akira ransomware infection in August 2025, the initial access vector was SEO poisoning that led to a Bumblebee malware infection. This is a classic case of an initial infection leading to lateral movement and a domain controller takeover, where the attackers deployed ransomware across the network.

My advice? Know ourselves before we know the enemy, because the enemy is always looking for weaknesses in our defense.

Without comprehensive asset management, attackers can find avenues into our networks. Palo Alto Networks Unit 42 Attack Surface Assessment can help find these potential access paths before attackers can take advantage of them.


文章来源: https://unit42.paloaltonetworks.com/asset-management/
如有侵权请联系:admin#unsafe.sh