Indicator of Compromise (IoC) Flashcards
1
Q
What are the network-related IoCs?
A
- malicious domains and/or IP addresses
- sudden large bandwidth utilization (unusual traffic spikes)
- beaconing
- irregular P2P communication
- activity on unusual ports
- network scanning and reconnaissance
- unusual HTTP/DNS/TLS/FTP activity
- signs of data exfiltration
2
Q
What are the host-related IoCs?
A
- unusually high processor consumption
- unusually high memory consumption
- unusually high drive capacity consumption
- unauthorized software
- unusual processes with strange names
- unauthorized changes (configuration)
- unauthorized privileges
- abormal OS process behavior
- file system changes (new directories, modification of current ones)
- registry changes
- unauthorized scheduled tasks
3
Q
What are the application-related IoCs?
A
- unauthorized access
- unusual network traffic
- suspicious database queries
- unauthorized modifications to code
- unauthorized access to sensitive data
- unauthorized execution of priviledged actions
- unauthorized creation of user accounts
- unexpected application behavior
- unauthorized use of application resources
- unauthorized installation of software
- unauthorized configuration changes
- unauthorized access to application logs
4
Q
What is intelligence
?
A
enriching information gathered from outside sources that are associated with the IoCs
5
Q
Why is intelligence
important when dealing with a security incident?
A
gathering already known information about the malware helps organizations to make decisions when handling the incident
6
Q
There is a consistent surge in file write operations on your server on a daily basis. What type of attack is likely to blame?
A
Ransomware attack