1/9
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
Indicators of Compromise
Indicators of Compromise (IoC)
- An event that indicates an intrusion
- Confidence is key
- He's calling from inside the house
Indicators
- Unusal amount of network activity
- Change to file hash values
- Irrelegular international traffic
- Changes to DNS data
- Uncommon login patterns
- Spikes of read requests to certain files
Account Lockout
• Credentials are not working
- It wasn't you this time
• Exceeded login attempts
- Account is automatically locked
• Account was administratively disabled
- This would be a larger concern
• This may be part of a larger plan
- Attacker locks account
- Calls support line to reset the password
Concurrent session usage
• It's challenging to be two places at one time
- Laws of physics
• Multiple account logins from multiple locations
- Interactive access from a single user
- You don't have a clone
• This can be difficult to track down
- Multiple devices and desktops
- Automated processes
Blocked Content
• An attacker wants to stay as long as possible
- Your system has been unlocked
- Keep the doors and windows open
• There's probably a security patch available
- Time to play keep-away
• Blocked content
- Auto-update connections
- Links to security patches
- Third-party anti-malware sites
- Removal tools
Impossible travel
• Authentication logs can be telling
- Logon and logoff
• Login from Omaha, Nebraska, United States
- The company headquarters
• Three minutes later, a login from Melbourne, Australia
- Alarm bells should be ringing
• This should be easy to identify
- Log analysis and automation
Resource Consumption
Every attacker's action has an equal and opposite reaction
- Watch carefully for significant changes
File transfers use bandwidth
- An unusual spike at 3A,
Firewall logs show the outgoing transfer
- IP addresses, timeframes
Often the first real notification of an issue
- the attacker may have been here for months
Resouce inaccessibility
The server is down
- Not responding
Network disruption
- A cover for the actual exploit
Server outage
- Result of an exploit gone wrong
Encrypted data
- A potential ransomware attack begins
brute force attack
- Locks account access
Out-of-Cycle Logging
• Out-of-cycle - Occurs at an unexpected time
• Operating system patch logs
- Occurring outside of the normal patch day
- Keep that exploited system safe from other attackers!
• Firewall log activity
- Timestamps of every traffic flow
- Protocols and applications used
Missing logs
• Log information is evidence
- Attackers will try to cover their tracks by removing logs
• Information is everywhere
- Authentication logs
- File access logs
- Firewall logs
- Proxy logs
- Server logs
• The logs may be incriminating
- Missing logs are certainly suspicious
- Logs should be secured and monitored
Published/documented
• The entire attack and data exfiltration may go unnoticed
- It happens quite often
• Company data may be published online
• The attackers post a portion or all data
- This may be in conjunction with ransomware
• Raw data may be released without context
- Researchers will try to find the source