Knowing the most common indicators of compromise (IoCs) can improve your key threat detection and response (TDIR) metrics. π And, if you are keeping an eye out for common IOCs, then you're able to take a more proactive approach to #security. So, let's dig in and learn all about IOCs! π
IoCs fall into the following categories:
πΉ Network-based
πΉ Host-based
πΉ Email-based
πΉ Behavioral
πΉ Third-party
In this blog we outline 17 common indicators of compromise, including:
π¦ Network traffic anomalies
π» Unusual sign-in attempts
πΊοΈ Geographical anomalies
β οΈ Privilege account irregularities
π Changes to systems configurations
π₯οΈ Unexpected software installations or updates
π Numerous requests for the same file
π«΄ Unusual Domain Name Systems (DNS) requests
π Swells in database read volume
β HTML response sizes
π₯ Mismatched port-application traffic
π€ Suspicious registry or system file changes
π§ Influx of spam emails
β¬
οΈ Moved or aggregated data
π€ Non-human website traffic
π± Changes to mobile devices
π« System outages or reduced performance
Read on and learn about the details for each of these 17 common IoCsβso that you can be ready to search your environment for clues that will help you confirm security incidents and/or data breaches.
https://graylog.org/post/17-common-indicators-of-compromise/ #threatdetection #incidentresponse #cybersecurity #GraylogLabs