Indicators of Compromise

Indicators of Compromise

Indicators of Compromise

Indicators of compromise?(IOCs) serve as forensic evidence of potential intrusions, unusual activities on a host system or network.

§?These artifacts enable?(InfoSec) professionals to detect intrusion attempts or other malicious activities. Security researchers use IOCs to better analyze a particular malware’s techniques and behaviors.

§?Anomalous user behaviour, unwarranted file activities, unusual network traffic, and more

§?IOCs also provides actionable threat intelligence.

§?InfoSec professionals and IT/system administrators also employ various tools that monitor IOCs to help mitigate, prevent, breaches or attacks.


Some of these artifacts are found on event logs and timestamped entries in the system, as well as on its applications and services

DNS

§?DNS request anomalies

§?Tampered file, Domain Name Servers (DNS) and registry configurations as well as changes in system settings, including those in mobile devices

?

Data | Database

§?Rise in database read volume

§?Large amounts of compressed files or data bundles in incorrect or unexplained locations

?

Network

§?Unusual traffic going in and out of the network

§?Network traffic that traverses in unusually used ports

§?IP Addresses

§?Mismatched port-application traffic

§?Web Traffic with Unhuman Behavior

?

User Accounts

§?Anomalies in administrator or privileged user accounts, including requests for additional permissions

§?Other login red flags

§?An uptick in incorrect log-ins or access requests that may indicate brute force attacks

§?Dubious log-ins, access, and other network activities that indicate probing or brute force attacks

?

Geographical irregularities

§?Irregular activities such as traffic in countries an organization doesn’t do business with

§?Traffic Congestion at a Specific Site or Location

?

Files | Applications

§?Unknown files, applications, and processes in the system

§?Anomalous spikes of requests and read volume in company files

§?Suspicious registry or system file changes

§?Increased request for the same file


Others

§?Large amounts of compressed files and data unexplainably found in locations where they shouldn’t be

§?Vulnerability Exploitation

§?Malware Exploitation

§?Cyber Threat Signatures

§?HTML response sizes

§?Unauthorized settings changes, including mobile device profiles

§?Unexpected Patching Of Systems

§?Signs Of DDoS Activity

§?Domains, URLs, hashes, e-mail addresses or file names.


Indicators of Attack (IOA)

§?Credential Theft

§?Credential Exploitation

§?Lateral Movements

§?Data Exfiltration

§?C&C Communication

要查看或添加评论,请登录

Rajeev kumar的更多文章

  • Network Security Attack Types

    Network Security Attack Types

    Glossary Description ARP spoofing is the process of linking an attacker’s MAC address with the IP address of a…

  • Apache Tomcat Security Best Practices:

    Apache Tomcat Security Best Practices:

    . Don't run Tomcat as the root user This line of er accounts with a high level of administrative access.

  • Data Privacy

    Data Privacy

    Data Privacy Day, January 28 In 2006, the Council of Europe decided to launch a Data Protection Day, to be celebrated…

  • Spam vs Phishing

    Spam vs Phishing

    It is not surprising that most of us have encountered numerous spam and phishing emails in our inbox and believe it or…

  • Slack (Messenger) Security Best Practices

    Slack (Messenger) Security Best Practices

    While Slack gives us immense flexibility and convenience while connecting with people, it gives a gateway to bad actors…

  • Remote Workers - Cyber Security Advice

    Remote Workers - Cyber Security Advice

    Unfortunately, remote working and cybersecurity concerns go hand in hand. Individuals and corporations continue to face…

  • How To Handle Phishing Emails

    How To Handle Phishing Emails

    1. If you receive a phishing e-mail message, do not respond to it.

  • GCP - Security Best Practices

    GCP - Security Best Practices

    Summary of Topics A. Using IAM Securely B.

  • Firewall Rules – Best Practices

    Firewall Rules – Best Practices

    1. Document your firewall rules - Use Comments to Explain the Purpose of Special Rules Anyone who works on your IT…

  • Bypassing MFA

    Bypassing MFA

    Bypassing MFA Independent of which authentication technology you use, implementation flaws and misconfigurations can…

社区洞察

其他会员也浏览了