News: 1771998576

  ARM Give a man a fire and he's warm for a day, but set fire to him and he's warm for the rest of his life (Terry Pratchett, Jingo)

Threat intelligence supply chain is full of weak links, researchers find

(2026/02/25)


Researchers from Georgia Tech have found that the supply chain for threat intelligence data is susceptible to adversarial action, and proposed a method to improve data sharing that they think will make it stronger.

Brenden Kuerbis, a research scientist at the Georgia Tech's School of Public Policy [1]sketched the proposal on Monday by noting that in January 2026, China appeared to ban security software developed by some US and Israeli firms – probably because it fears data leakage if local firms use the foreign software.

“This move represents more than just another salvo in ongoing tech tensions between the two governments,” he wrote. “It threatens to fracture a foundational practice of internet cybersecurity: the global threat intelligence ecosystem that allows defenders worldwide to collect, analyze, and share information about emerging attacks and responses to cyber threats that know no borders.”

[2]

According to other researchers at the institution, the ecosystem was already weak before China’s action.

[3]

[4]

They will discuss their work at the Network and Distributed System Security (NDSS) Symposium in San Diego, when they present a [5]paper titled “Actively Understanding the Dynamics and Risks of the Threat Intelligence Ecosystem.”

The researchers identified three main players in the ecosystem:

Threat intelligence platforms like VirusTotal and MalwareBazaar;

Antivirus companies that produce their own threat intelligence, and tools to make it usable;

Malware sandbox services that offer analysis-as-a-service to anyone trying to understand the behavior of a binary.

The paper points out that threat intelligence is a big business, but that the quality of information available is not great because different stakeholders release different data.

They reached that conclusion after creating “benign yet suspicious binaries” and sharing them with 30 security vendors. The binaries included code that allowed the researchers to track how the vendors shared the packages.

[6]

That experiment revealed that 67 percent of infosec vendors conduct sandbox analysis of newly discovered malware, but only 17 percent share any threat intelligence they gather with that technique. They also found that many researchers share indicators of compromise, but few share binaries that would let other researchers and defenders develop a better understanding of attacks.

Another finding is that a handful of “nexus vendors” share more threat intelligence than others. While those vendors are very useful, other info-sharing bottlenecks among supply chain participants slow the propagation of information – often by “hours to days” – and therefore increase the amount of time before defenders act against attacks.

[7]North Korea's Lazarus Group targets healthcare orgs with Medusa ransomware

[8]More than 135,000 OpenClaw instances exposed to internet in latest vibe-coded disaster

[9]Singapore spent 11 months booting China-linked snoops out of telco networks

[10]To stop crims, Google starts dismantling residential proxy network they use to hide

The researchers think not all threat intelligence researchers do a great job.

“Our study revealed that while a few vendors thoroughly analyze malware, most conduct shallow analysis and ignore dropped files by the initial binary,” they wrote, and suggest more comprehensive analysis techniques would improve the threat intel supply chain.

Another finding is that some security researchers have hosted infrastructure at the same IP addresses for years, which helps adversarial actors to evade sandboxes.

[11]

The researchers therefore propose a system that securely encodes data about the provenance of threat intelligence, so stakeholders feel more confident sharing it.

Kuerbis thinks the technique described in the paper suggests it will become possible for network operators to “use or filter policy-compliant threat intelligence without necessarily relying on the country of origin.”

If he’s right, that could mean China has nothing to fear from foreign sources of threat intelligence – and perhaps the rest of us could get along with the likes of Kaspersky.

“What’s needed now are governance structures that allow operators, vendors, and researchers to continue cooperating globally while adhering to various governments’ incompatible notions of jurisdictionally-bound identity, sovereignty, and compliance,” he wrote.

“Chinese, American, and other participants (both public and private) will have incentives to use the same provenance system, not out of altruism, but because exclusion from the verifiable pool of TI is operationally costly in a threat environment that remains stubbornly global,” he wrote, before noting that the real challenge is institutional, not technical.

“Secure provenance requires transnational governance structure(s) perceived as legitimate by participants operating under conflicting state mandates – without which threat intelligence risks becoming a zero-sum geopolitical competition.” ®

Get our [12]Tech Resources



[1] https://www.internetgovernance.org/2026/02/23/beyond-borders-how-threat-intelligence-provenance-can-save-global-cybersecurity-from-geopolitical-fragmentation/

[2] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/research&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=2&c=2aZ7WVCNsr7TxmJmbjnozYQAAAYU&t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0

[3] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/research&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=4&c=44aZ7WVCNsr7TxmJmbjnozYQAAAYU&t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0

[4] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/research&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=3&c=33aZ7WVCNsr7TxmJmbjnozYQAAAYU&t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0

[5] https://tillsongalloway.com/ti-ecosystem-ndss.pdf

[6] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/research&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=4&c=44aZ7WVCNsr7TxmJmbjnozYQAAAYU&t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0

[7] https://www.theregister.com/2026/02/24/north_koreas_lazarus_group_healthcare_medusa_ransomware/

[8] https://www.theregister.com/2026/02/09/openclaw_instances_exposed_vibe_code/

[9] https://www.theregister.com/2026/02/10/singapore_telco_espionage/

[10] https://www.theregister.com/2026/01/29/google_ipidea_crime_network/

[11] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/research&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=3&c=33aZ7WVCNsr7TxmJmbjnozYQAAAYU&t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0

[12] https://whitepapers.theregister.com/



Must be nice

Claptrap314

Living in a world where everyone is either friendly, nice, or quite stupid.

Do these people understand that there is an actual war on, with people shooting & being killed & stuff?

Do they understand that Russia, China, and North Korea each have multiple threat groups operating with at least some level of government support? (Yes, so do the US, England, Israel, and every other country with a competent military or spy agency.)

So let's suppose that I'm running one of these offensive groups. What do you suppose I might do if I had access to near-real-time reports of compromise?

These guys should be laughed off stage.

Icon for what apparently they expect everyone to be.

(1) A sheet of paper is an ink-lined plane.
(2) An inclined plane is a slope up.
(3) A slow pup is a lazy dog.

QED: A sheet of paper is a lazy dog.
-- Willard Espy, "An Almanac of Words at Play"