Indicators of Compromise 2.4 Flashcards

1
Q

An event that indicates an intrusion is called an […]

Ex:
- Unusual amount of network Traffic
- Change to file hash values
- Irregular international traffic
- Change to DNS data

A

Indicator of Compromise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

IoC - […]

  • Credentials aren’t working
  • Exceeded login attempts
  • Account possibly administratively disabled
A

Account lockout

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

IoC - […]

  • Having two of the same user accounts logged in at different locations
A

Concurrent session usage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

IoC - […]

  • Once an attacker gains access to systems, they might disable:
  • Auto Updates
  • Links to Security Patches
  • Anti Malware sites / removal tools
A

Blocked Content

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

IoC - […]

  • Login in Vernon, NJ (Headquarters)
  • Three minutes later a login from Russia
  • Log analysis
A

Impossible travel / logins from very far away

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

IoC - […]

  • Every attackers action has an equal and opposite reaction
  • An unusual network spike at 3am (File Transfer from attacker)
  • Firewall logs showing and outbound transfer to an unknown IP address
A

Resource Consumption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

IoC […]

  • A server is down
  • The network is not functional
  • Encrypted data (Ransomware)
  • Brute force attack that locks account access
A

Resource Inaccessibility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

IoC - […]

  • Logs are sent in the wrong timeframe
  • Essentially logs that are out of place (You didn’t do it so why is it there?)
A

Out of Cycle Logging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

IoC - […]

  • An attacker will try to cover their tracks by removing these
A

Missing Logs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

IoC - […]

  • Private organizational data is exfiltrated and posted
  • Either a portion of it or all of it is posted, usually for ransomware
A

Published / Documented

How well did you know this?
1
Not at all
2
3
4
5
Perfectly