- Products & Solutions
- Access choices
- Application performance management
- Dedicated Services
- Internet services
- IP address management
- Managed network services
- Virtual Private Network Services
- Network services solutions
- Business technology services
- CRM professional services
- IT professional services
- Unified communications professional services
- Identity and Access Management
- Managed security services
- Security Consulting
- Security Intelligence
- Security solutions
- Cloud contact centres
- Contact recording and analytics
- Inbound services
- Onsite contact centres
- Self-service and queue-management platforms
- CRM solutions
- Why BT
Our position and recognition in published analyst reports.
We believe in the power of communication to make a better world
We are proud that our work is recognised time and again by customers, analysts and professional organisations
Our company overview: how we're bringing it all together around the world
Who we’ve helped, and how. Learn how organisations just like yours get better when they work with us.
Join us to explore fresh ideas
Explore and debate the big issues with us as we bring together the latest insight on the hottest IT trends.
From press releases to local news
Great thinking from across the company
Our range of showcases offers you an online or face-to-face insight into our portfolio and its capabilities.
- Let's Talk
- My Account
BT Assure Threat Intelligence:
Defending against cyber threats
A credible threat
In the summer of 2013 a hacker began bragging on Twitter about his exploits. He claimed to have attacked 50 websites in the space of a single fortnight, launching distributed denial of service (DDoS) attacks against government and commercial systems throughout the UK.
Apparently affiliated to the notorious hacker network calling itself Anonymous, he obviously thought he was invincible and untraceable. Yet within weeks he was under arrest – thanks largely to the vigilance of security experts at BT Assure.
Kevin Brown, general manager, threat intelligence and investigations at BT Global Services, says: “To protect our own networks and those of our customers, our security specialists constantly monitor the internet and social media for signs of potential threats. It was boasts from the hacker that put him on our radar.”
To assess how serious a threat he posed, BT Assure experts tried to access the websites the hacker had threatened. Sure enough, over a two-week period 24 out of 50 were unreachable at the precise times he had promised to target them. These ranged from banks and financial institutions to political parties, local government and even the security services.
The BT Assure team identified that the hacker was now threatening a BT client and were, within minutes, able to verify and ensure appropriate mitigation was in place (although the system was protected and the attack was unsuccessful).
How to catch a hacker
Simultaneously, forensic experts at BT Assure were closing the net. From his Twitter account they deduced that he was a UK resident living in the North West and had been in dispute with his neighbours.
“He had posted photographs, apparently taken from his home, suggesting that he lived in a cul-de-sac,” explains Kevin. “Our experts scoured Google Earth for likely streets, scrutinising photographs posted by the hacker to find a match.”
Having identified the address the team could use the public internet to find who lived there. None of the listed residents was a BT customer. But one had posted several entries on websites relating to his dispute with his neighbours, his mental health and encounters with the police and social services. This explained some of the DDoS targeting and Twitter comments.
Now the BT Assure team had all the evidence they needed. The file was handed to the police, with whom BT works closely. This later led to a man being arrested on suspicion of offences under section 3 of the Computer Misuse Act (1990).
Thanks to BT Assure, the hacker was anonymous no longer. And the internet was a slightly safer place.
About BT Assure Threat Intelligence
As one of the world’s largest network operators BT devotes huge resources to protecting its own systems from possible attack. It employs hundreds of security specialists who regularly scan thousands of information sources – ranging from social media to specialist blogs and underground forums – for anything that could impact or interrupt its services. The company also has strategic partnerships with intelligence-gathering organisations around the world.
All this gives BT a unique insight into global and local security threats that is not obtainable from any other single source. Now the company is offering to share this insight with its customers as part of its BT Assure Threat Intelligence service, providing weekly intelligence reports detailing likely threats and their level of seriousness.
Customers can also choose to receive bespoke intelligence reports relating to their own operations, and ad-hoc reports on key threats as they emerge. At its highest level, BT Assure Threat Intelligence also offers technical intelligence, customer workshops to establish intelligence requirements, and regular reviews of these requirements with the customer’s own security professionals.
Armed with these insights customers can better identify their key current vulnerabilities and mitigate these before they can be exploited – or, in plain English, shut the stable door before the horse has bolted.
- BT Assure Threat Intelligence