Knowing the most common indicators of compromise (IoCs) can improve your key threat detection and response (TDIR) metrics. ๐ And, if you are keeping an eye out for common IOCs, then you're able to take a more proactive approach to #security. So, let's dig in and learn all about IOCs! ๐
IoCs fall into the following categories:
๐น Network-based
๐น Host-based
๐น Email-based
๐น Behavioral
๐น Third-party
In this blog we outline 17 common indicators of compromise, including:
๐ฆ Network traffic anomalies
๐ป Unusual sign-in attempts
๐บ๏ธ Geographical anomalies
โ ๏ธ Privilege account irregularities
๐ Changes to systems configurations
๐ฅ๏ธ Unexpected software installations or updates
๐ Numerous requests for the same file
๐ซด Unusual Domain Name Systems (DNS) requests
๐ Swells in database read volume
โ HTML response sizes
๐ฅ Mismatched port-application traffic
๐ค Suspicious registry or system file changes
๐ง Influx of spam emails
โฌ
๏ธ Moved or aggregated data
๐ค Non-human website traffic
๐ฑ Changes to mobile devices
๐ซ System outages or reduced performance
Read on and learn about the details for each of these 17 common IoCsโso that you can be ready to search your environment for clues that will help you confirm security incidents and/or data breaches.
https://graylog.org/post/17-common-indicators-of-compromise/ #threatdetection #incidentresponse #cybersecurity #GraylogLabs