Understanding Vectra AI
Understanding Vectra AI
Understanding Vectra AI
Vectra AI
The attack may also have you as its intended target, something that
is rarer, but also more threatening – in this case, the infected host will
orient itself in your network (Reconnaissance), spread laterally to get
closer to your crown jewels (Lateral Movement) and steal your data
and send it to an outside system (Exfiltration).
Hosts and accounts categorized as Critical or High severity have a high potential for doing
damage to business operations and exhibit behaviors associated with actively unfolding
attacks that warrant investigation. Accounts categorized as Low or Medium severity are
exhibiting less directly observed risks and can be leveraged for starting points in threat hunting
efforts rather than immediate investigation.
In addition to the severity ranking, threat and certainty scores are calculated for each prioritized
account based on the correlated behaviors to enable finer-grain ordering.
Detections also receive threat and certainty scores that characterize detection-specific
severities based on the threat of the associated behavior and certainty of the underlying
detection models. Details of how each detection’s threat and certainty are calculated are
presented on their respective detections one-pagers.
100 1 Initiate
50
Triggers
T1005 Data from Local • An internal host is connecting to an external server and the pattern looks reversed from
System normal client to server traffic; the client appears to be receiving instructions from the server
T1115 Clipboard Data and a human on the outside appears to be controlling the exchange
T1071 Application Layer • The threat score is driven by the quantity of data exchanged and longevity of the connection
Protocol • The certainty score is driven by the ratio of data sent by the internal host compared to data
T1125 Video Capture received from the server and the longevity of the connection
T1090 Proxy
T1113 Screen Capture Possible Root Causes
T1010 Application Window • A host includes malware with remote access capability (e.g. Meterpreter, Poison Ivy) that
Discovery
connects to its C&C server and receives commands from a human operator
T1037 Boot or Logon • A user has intentionally installed and is using remote desktop access software and is
Initialization Scripts
accessing the host from the outside (e.g. GotoMyPC, RDP)
T1111 Two-Factor
Authentication Interception • This behavior can also be exhibited through very active use of certain types of chat software
that exposes similar human-driven behavior
T1572 Protocol Tunneling
T1573 Encrypted Channel
T1048 Exfiltration Over Business Impact
Alternative Protocol • Presence of malware with human-driven C&C is a property of targeted attacks
T1204 User Execution • Business risk associated with outside human control of an internal host is very high
T1056 Input Capture • Provisioning of this style of remote access to internal hosts poses substantial risks as
T1001 Data Obfuscation compromise of the service provides direct access into your network
T1571 Non-Standard Port
T1059 Command and Steps to Verify
Scripting Interpreter • Look at the detection details and the PCAP to determine whether this may be traffic from
T1518 Software Discovery chat software
T1176 Browser Extensions • Check if a user has knowingly installed remote access software and decide whether the
T1123 Audio Capture resulting risk is acceptable
T1008 Fallback Channels • Scan the computer for known malware and potentially reimage it, noting that some remote
T1219 Remote Access access toolkits leave no trace on disk and reside entirely in memory
Software
T1105 Ingress Tool Transfer
T1133 External Remote
Services
T1095 Non-Application Layer
Protocol
T1132 Data Encoding
100
Hidden Tunnel
50
C&C
10-70 10-80
Threat Certainty
Triggers
T1005 Data from Local • An internal host is communicating with an outside IP using DNS where another protocol is
System running over the top of the DNS sessions
• This represents a hidden tunnel involving multiple sessions over longer periods of time
T1071 Application Layer
Protocol mimicking normal DNS traffic
• The threat score is driven by the quantity of data sent and received via the tunnel
T1010 Application Window • The certainty score is driven by the similarity of the packet-level patterns to those of DNS
Discovery
tunnels
T1037 Boot or Logon
Initialization Scripts
Possible Root Causes
T1572 Protocol Tunneling • A targeted attack may use hidden tunnels to hide communication with command and control
servers
T1573 Encrypted Channel
• A user is utilizing tunneling software to communicate with Internet services which might not
T1056 Input Capture otherwise be accessible
T1001 Data Obfuscation • Intentionally installed software is using a hidden tunnel to bypass expected firewall rules
Steps to Verify
• Check to see if the destination domain of the tunnel is an entity you trust for your network
• Ask the user of the host whether they are using hidden tunnel software for any purpose
• Before removing the offending software via antivirus or reimaging, take a memory snapshot
for future analysis of the incident
• If the behavior reappears shortly after a reimaging, this may be a hardware/BIOS tunnel
100
Hidden Tunnel
50
C&C
10-60 10-80
Threat Certainty
Triggers
T1005 Data from Local • An internal host is communicating with an outside IP using HTTP where another protocol is
System running over the top of the HTTP sessions
T1115 Clipboard Data • This represents a hidden tunnel involving multiple sessions over longer periods of time
mimicking normal Web traffic
T1071 Application Layer • The threat score is driven by the quantity of data sent via the tunnel
Protocol
• The certainty score is driven by the number and persistence of the sessions
T1185 Man in the Browser
100
Hidden Tunnel
50
C&C
10-70 10-80
Threat Certainty
Triggers
T1005 Data from Local • An internal host is communicating with an outside IP using HTTPS where another protocol is
System running over the top of the HTTPS sessions
T1115 Clipboard Data • This represents a hidden tunnel involving one long session or multiple shorter sessions over
a longer period of time mimicking normal encrypted Web traffic
T1071 Application Layer • When it can be determined whether the tunneling software is console-based or driven via a
Protocol
graphical user interface, that indicator will be included in the detection
T1185 Man in the Browser • The threat score is driven by the quantity of data sent via the tunnel
• The certainty score is driven by the combination of the persistence of the connection(s) and
T1125 Video Capture
the degree to which the observed volume and timing of requests matches up with training
T1113 Screen Capture samples
T1010 Application Window
Discovery Possible Root Causes
T1037 Boot or Logon • A targeted attack may use hidden tunnels to hide communication with command and control
Initialization Scripts servers over SSL on port 443
• A user is utilizing tunneling software to communicate with Internet services which might not
T1111 Two-Factor
otherwise be accessible
Authentication Interception
• Intentionally installed software is using a hidden tunnel to bypass expected firewall rules
T1572 Protocol Tunneling
100
50
C&C
0
Downloading Malware
65-75 75-99
Threat Certainty
Triggers
T1105 Ingress Tool Transfer • An internal host is downloading and installing software from the Internet
• The downloads are over HTTP, appear to be machine- driven, and follow a suspicious
pattern of checking for availability of files before downloading them
• The threat score is driven by the number of executable files being downloaded
• The certainty score is driven by the pattern of machine- generated HTTP requests
Business Impact
• An infected host can attack other organizations (e.g. spam, DoS, ad clicks) thus causing
harm to your organization’s reputation, potentially causing your IP addresses to be black
listed and impacting the performance of business-critical applications
• If this is a targeted attack, it can spread further into your network and ultimately exfiltrate
data from it
• The malware which infected the host can create nuisances and affect user productivity
Steps to Verify
• Look up the domain and IP address to which the communication is being sent via reputation
services to see if this is known malware; such lookups are supported directly within the UI
• Search for the domain + “virus” via a search engine; this is effective for finding references to
known adware or spyware
• Download the supplied PCAP and look at the HTTP payload being sent to see if any data is
being leaked in clear text or whether the identity of the program is visible
100
50
HTTPS CDN C&C
Domain
0 X, Y, and Z
40‒95 50‒95
Threat Certainty
Triggers
T1005 Data from Local • An internal host is communicating with an outside IP using HTTPS where another protocol is
System running over the top of the HTTPS sessions. The sessions appear to go to different domains
T1115 Clipboard Data but are all served by a single Content Delivery Network (CDN) and all utilize a JA3 hash
which is only used by this host with this one CDN.
T1071 Application Layer • This represents a hidden tunnel involving multiple shorter sessions over a longer period of
Protocol
time mimicking normal encrypted Web traffic
T1125 Video Capture • The threat score is driven by the amount of data transfer spikes over the baseline beacon
and the number of unique second-level domains contacted
T1113 Screen Capture
• The certainty score is driven by the communication persistence, the total connection
T1010 Application Window volume, and how the traffic is spread across the different domains
Discovery
100
C&C
50
20-70 10-95
Threat Certainty
Triggers
• An internal host is communicating with a set of external IP addresses with a pattern and low
T1090 Proxy
data rate common to peer-to-peer command and control
• The threat score is driven by the length of time over which communication with peers occurs
• The certainty score is driven by the number of reachable and unreachable peers
Business Impact
• An infected host can attack other organizations (e.g. spam, DoS, ad clicks) thus causing
harm to your organization’s reputation, potentially causing your IP addresses to be black
listed and impacting the performance of business-critical applications
• The host can also be instructed to spread further into your network and ultimately exfiltrate
data from it
• Software which infected the host can create nuisances and affect user productivity
Steps to Verify
• If the detection is generated as a result of a purposely installed peer-to-peer application,
make sure the software complies with IT security policy
• If the detection cannot be attributed to such an application, the host is likely infected with a
malware and should be fixed through the use of AV software or reimaged
100
50
C&C
20-50 10-95
Threat Certainty
Triggers
T1071 Application Layer • An internal host is sending data to an external system in multiple HTTP Post requests
Protocol without being referred and without software identification
• These posts appear to be machine generated since they occur with a regular timing pattern
• The threat score is driven by the number of overall sessions and length of their duration
• The certainty score is driven by the number and persistence of HTTP Post requests
Business Impact
• An infected host can attack other organizations (e.g. spam, DoS, ad clicks) thus causing
harm to your organization’s reputation, potentially causing your IP addresses to be black
listed and impacting the performance of business-critical applications
• The host can also be instructed to spread further into your network and ultimately exfiltrate
data from it
• Software which infected the host can create nuisances and affect user productivity
Steps to Verify
• Look up the domain and IP address to which the communication is being sent via VirusTotal
or other reputation services to see if this is known malware; such lookups are supported
directly within the UI
• Search for the domain + “virus” via a search engine – this is effective for finding references
to known adware or spyware
• Download the supplied PCAP and look at the HTTP payload being sent to see if any data is
being leaked in clear text or whether the identity of the program is visible in the payload
100
DNS
Domain
50
Domain
IP
0
10-90 10-90
Threat Certainty
Triggers
T1568 Dynamic Resolution • An internal host is looking up suspicious external domains
• Suspicious activity may involve looking up machine-generated domain names or non-
existent domain names in rapid succession
• The threat score is driven by successful lookups
• The certainty score is driven by the breadth of domain lookups and the characteristics of
successful lookups
Business Impact
• An infected host can attack other organizations (e.g. spam, DoS, ad clicks) thus causing
harm to your organization’s reputation, potentially causing your IP addresses to be black
listed and impacting the performance of business-critical applications
• The host can also be instructed to spread further into your network and ultimately exfiltrate
data from it
• Software which infected the host can create nuisances and affect user productivity
Steps to Verify
• Do not go directly to the listed domain as it is likely to be malicious
• Look up the domain and IP address to which the communication is being sent via reputation
services to see if this is known malware; such lookups are supported directly from the UI
• Inquire whether the user of the host would likely have gone to the listed domain
• Check to see if the host is also exhibiting other detected behaviors to understand the intent
of the malware
100
HTTP
50
C&C
10-70 10-90
Geo Beacon
Threat Certainty
Triggers
T1071 Application Layer • Software on an internal host is initiating one or more suspicious HTTP requests which form
Protocol a pattern typically observed in command and control communications in recent malware
samples
• The suspicious pattern may be the result of any combination of the following: (a) incorrect
or malformed User-Agent, (b) absence or presence and order of a variety of HTTP headers,
(c) presence and regularity of beaconing of the request and (d) connections to geographies
which have a higher likelihood of hosting command and control servers
• While beaconing is a key driver of the threat score, the presence of all four factors causes
the threat score to be at the top of the range. Combinations with fewer factors will score
successively lower with combinations that don’t include beaconing being at the very low
end of the range.
• Suspicious User-Agent and suspicious HTTP header contribute strongly to the certainty
score while geo and beaconing contribute weakly. Suspicious HTTP communication to
multiple domains further increases the certainty score.
Business Impact
• An infected host can attack other organizations (e.g. spam, DoS, ad clicks) thus causing
harm to your organization’s reputation, potentially causing your IP addresses to be black
listed and impacting the performance of business-critical applications
• The host can also be instructed to spread further into your network and ultimately exfiltrate
data from it
• Software which infected the host can create nuisances and affect user productivity
100
1 3
50
30‒95 10‒95 2 4
Threat Certainty
Triggers
• This host appears to be acting as a relay for communication between an external system to
T1090 Proxy
another internal host—relays of this type involve a first (external) leg and a second (internal)
T1104 Multi-Stage Channels leg
• This host also has another active command and control detection
• The threat score is driven by how close the durations of the connections involved in relay
activity are on the two legs of the relay
• The certainty score is driven by how close the ratio of sent to received bytes are in the two
legs of the relay
Business Impact
• An infected host which is enabling another internal host to hide its communication with the
Internet by acting as a relay represents a high risk as this may allow a host which normally is
not allowed to communicate with the outside to do so
• For hosts that have approved proxy software installed, ensure all the necessary security
controls are in place to prevent unauthorized use
Steps to Verify
• Determine whether this host should be providing relay services to other internal hosts; if not,
this is likely malicious behavior
• Look at the outside destination of the traffic and the payload of traffic, available in the PCAP,
to determine what it being sent and where it is going; this will help further calibrate the risk
100
1 5 7
50
C&C
2
4
3
0
10-70 10-95
Threat Certainty The Onion Router (TOR)
Triggers
• An internal host establishes connections with outside servers where protocol usage
T1090 Proxy
approximates communicating via The Onion Router (TOR)
• The algorithm inspects the protocol handshake of each session and triggers if
characteristics of the session setup are similar to those observed in TOR connections
• The threat score is driven by volume and similarity to command and control traffic; it is
low for browsing, high for command and control or when there is a significant amount of
outbound data observed
• The certainty score is driven by the similarity of the session characteristics to those
observed in TOR sessions
Business Impact
• The use of TOR as part of a targeted attack is meant to slip by most standard perimeter
defenses and indicates attacker sophistication
• The use of TOR as part of a botnet is relatively rare and would indicate a more sophisticated
botnet
• The intentional use of TOR by employees may be allowed, but it does represent significant
risk as the intention of TOR is to mask traffic source and destination
Steps to Verify
• Ask the user of the host whether they are using TOR for any purpose
• Check to see if any TOR-enabled software is installed on the host
• Check the TOR entry nodes listed in the detection against lists of known TOR entry nodes
(e.g., search for “tor entry node list”), but note that these lists are seldom complete and shift
over time
100
50
50‒99 30‒90
Threat Certainty
Triggers
• An internal host is connecting to an external system and the connection has met criteria
specified in one or more configured threat feeds
• The threat score is driven by the combination of the indicator type in the STIX file (with
watchlist and anonymization being lowest, malware artifacts being medium, and C2 channel
and exfiltration being highest) and the quantity of data received on the flagged connections
• The certainty score is specified as part of the threat feed configuration and ranges from low
(30) to medium (60) and high (90)
Business Impact
• Presence of command & control is a property of most attacks that originate from the outside
• The threat intel feed may have included additional context tied to the specific criteria that
the connection met
• Business risk associated with outside control of an internal host is very high
Steps to Verify
• Refer to the information accompanying your threat feed as it may include verification and
remediation instructions
• Determine which process on the internal host is sending the traffic which was flagged; in
Windows systems, this can be done using a combination of netstat and tasklist commands
• Check if a user has knowingly installed remote access software and decide whether the
resulting risk is acceptable
• Scan the computer for known malware and potentially reimage it, noting that some
infections leave no trace on disk and reside entirely in memory
100
50
50‒99 30‒90
Threat Certainty
Triggers
T1008 Fallback Channels • An internal host has been observed either generating DNS activity or making direct
connections associated with malicious external IPs or Domains identified by Vectra Threat
T1041 Exfiltration Over C2
Intelligence.
Channel
• The threat score is driven by the quantity of data received on the flagged connection
T1048 Exfiltration Over • The certainty score is related to Vectra’s confidence in active use of the indicator and ranges
Alternative Protocol
from low (30) to medium (60) and high (90)
T1059 Command and
Scripting Interpreter
Possible Root Causes
T1071 Application Layer • A host is communicating with a confirmed malicious IP or Domain that may be associated
Protocol with staged malware, command and control, or client-side attacks.
T1095 Non-Application Layer • A user has been redirected to a site associated with phishing or credential compromise.
Protocol • A host is communicating with a benign service co-hosted on an IP or Domain with a poor or
T1105 Ingress Tool Transfer malicious reputation.
Steps to Verify
• Investigate the host and accounts associated for further indications of compromise.
• Using appropriate operational security and safeguards, verify the risk posed by this known
bad IP or Domain by consulting external third party sources.
• Verify if supplemental preventative security controls protected the asset from full
communication.
• In the case of phishing, verify with the user if credentials may have been compromised
or take appropriate risk-based containment activities to include session revocation and
password resets.
• Verify host integrity, the presence of new, unauthorized, or malicious software, and take
appropriate incident handling or response activities.
100
50
10-30 40-95
Threat Certainty
Triggers
• An internal host is making an unusually high number of login attempts, a behavior which is
T1110 Brute Force
consistent with a brute-force password-guessing attack on one or more external servers
• Such attacks can be performed via a number of different protocols
• The threat score is driven by the rate of attempts and timing at which the attack is
performed
• The certainty score is driven by total number of sessions in the attack
Business Impact
• Botnet activity presents several risks to the organization: (1) it creates noise which may hide
more serious issues; (2) there is a chance your organization’s IP will end up on black lists;
and (3) the compromised host can always be instructed to perform a direct attack on the
organization
• Even if triggered due to a misconfiguration, the identified behavior is creating significant
noise that may mask more serious issues and should be cleaned up
Steps to Verify
• If the internal host should not even be connecting to the external servers, this is likely
malicious behavior
• Determine which process on the internal host is sending traffic to the external IP address(es)
and ports; in Windows systems, this can be done using a combination of netstat and tasklist
commands
• Verify that the process on the infected host should even be running and whether the process
is configured correctly
100
50
10011101001001
11010101001110
11001110110011
10110011101100
0 11101100111010
10-50 90
Threat Certainty
Triggers
• An internal host is mining units of cryptocurrency of which Bitcoin, Litecoin, Ethereum, and
T1496 Resource Hijacking
Monero are some of the most common variants
• Cryptocurrency mining is a common way for botnet operators to make money
• Cryptocurrency mining may involve communication via HTTP or via the Stratum mining
protocol
• The threat score is driven by the rate at which cryptocurrency mining activity is performed
Business Impact
• Botnet activity presents several risks to the organization: (1) it creates noise which may hide
more serious issues; (2) there is a chance your organization’s IP will end up on black lists;
and (3) the compromised host can always be instructed to perform a direct attack on the
organization
• If the user of the host intentionally installed cryptocurrency mining software, the risk may be
minimal, though such a user may also be prone to installing other “money making” software
which may not prove to be as benign
Steps to Verify
• If the user intentionally installed cryptocurrency mining software, decide whether it should
be removed
• If the user did not install cryptocurrency mining software, the host is likely infected and part
of a botnet that performs “silent mining”
• Use anti-virus software or reimage the host to remove the malware
100
50
10-40 10-95
Threat Certainty
Triggers
• An internal host appears to be taking part in a Denial- of-Service (DoS) campaign on an
T1498 Network Denial of
Service external IP address
• The form of DoS detection has two types: “SYN Flood” and “Slowloris”
• The threat score is driven by the volume of data sent in the detected DoS sessions
• The certainty score is driven by the volume of DoS sessions and the length of period the
attack is sustained
Business Impact
• Botnet activity presents several risks to the organization: (1) it creates noise which may hide
more serious issues; (2) there is a chance your organization’s IP will end up on black lists;
and (3) the compromised host can always be instructed to perform a direct attack on the
organization
• The sheer volume of flood attacks may materially affect the amount of bandwidth available
for legitimate functions which need to access the Internet
Steps to Verify
• Explore if there is a legitimate reason for the host to be connecting to the suspected victim
of the attack
• Contact the user of the host to see whether they are trying to perform some unusual task
which might trigger the DoS detection
• Check the host for presence of malware that is participating in a DoS attack
100
50
Port
20-50 10-95
Threat Certainty
Triggers
• An internal host is generating many more unsuccessful attempts to connect to external
T1018 Remote System
Discovery services than successful ones
• The threat score is driven by the breadth of IP addresses scanned and the pace at which the
scan occurs
• The certainty score is driven by the failure rate of outbound connection attempts
Business Impact
• Botnet activity presents several risks to the organization: (1) it creates noise which may hide
more serious issues; (2) there is a chance your organization’s IP will end up on black lists;
and (3) the compromised host can always be instructed to perform a direct attack on the
organization
• A misconfigured internal host may be using unnecessary bandwidth and slowing down both
the host itself and other applications as a result of the traffic it is sending
Steps to Verify
• Look at the pattern of IP addresses being scanned to determine the intent of the scan
• Verify whether there is misconfigured software on the host which is causing the scan
• If the behavior cannot be explained by user action or known software behavior, the host is
likely infected and should be remediated
100
50
20-70 10-95
Threat Certainty
Triggers
• A host accesses a number of file shares significantly in excess of the number of file shares
T1039 Data from Network
Shared Drive normally accessed in the network
• The threat score is proportional to the diversity of shares being mounted with a higher threat
T1119 Automated Collection score for larger number of shares across a few file servers vs. a small number of shares
T1135 Network Share across many file servers
Discovery • The certainty score is driven by the volume of shares mounted
Business Impact
• An enumeration of the available file shares in a network is an effective way for an attacker to
find data to exfiltrate or data that helps further the attack
• Reconnaissance within a network is a precursor to active attacks which ultimately exposes
an organization to substantial risk of data acquisition and exfiltration
• This form of reconnaissance is often a lot less noticeable than a port sweep or a port scan
so attackers feel they can use it with relatively little risk of detection
Steps to Verify
• Ask the user of the host whether they have any knowledge of accessing the listed file shares
• Check the file server logs to see what files were accessed on the shares
• If the file share access continues and remains unexplained, determine which process on
the internal host is accessing the file shares; in Windows systems, this can be done using a
combination of netstat and tasklist commands
100
Dark IP
50
Dark IP
Dark IP
0
Dark IP
30-60 20-80
Threat Certainty
Triggers
• An internal host has contacted a number of internal IPs that have not been active in the
T1082 System Information
Discovery recent past
• Darknet detections cover longer periods than port scans and ignore contact to systems
T1018 Remote System which do not respond to this host, but which are otherwise active
Discovery
• The threat score places large weight on the spread of IPs, medium for spread of ports and
T1072 Software Deployment low for the total number of dark IPs contacted
Tools • The certainty score places equal weight on the spread of IPs, spread of ports and number of
T1046 Network Service dark IPs contacted
Scanning
Business Impact
• Slow reconnaissance of your systems may represent the beginning of a targeted attack in
your network
• Authorized reconnaissance by vulnerability scanners and asset discovery systems should be
limited to a small number of hosts which can be whitelisted for this behavior
Steps to Verify
• Check to see if the detected host should be authorized for network scans
• Look at the pattern of IP addresses being scanned to determine the intent of the scan
• If the pattern appears random and distributed over time, determine which software on the
host could be causing the connection requests
100
50
30-60 30-95
Threat Certainty
Triggers
• A host that does not typically work with weak encryption types receives a service ticket that
T1558.003 Kerberoasting
was signed using a weak cipher.
Business Impact
• Specific Risk: Kerberoasting may result in the discovery of a privileged account’s password.
• Impact: Depending on the level of privilege a cracked account has (e.g. service account with
domain admin), this could lead directly to a full domain compromise.
Steps to Verify
• Investigate the host, user, and service accounts involved when weak ciphers are returned to
a host that doesn’t typically request them.
• Conventionally, service accounts with a sufficiently complex password (cryptographically
random, minimum 25 characters, rotates often) can be ignored, since these take long
enough to crack that the cracked password has likely expired by the time its discovered.
100
50
30-60 30-95
Threat Certainty
Triggers
• A host is observed requesting service tickets for a high volume of SPNs.
T1558.003 Kerberoasting
Business Impact
• Specific Risk: Kerberoasting may result in the discovery of a privileged account’s password.
• Impact: Depending on the level of privilege a cracked account has (e.g. service account with
domain admin), this could lead directly to a full domain compromise.
Steps to Verify
• Investigate the host making requests for high volume of SPNs, this behavior is not typical for
general users and should only be conducted by authorized hosts.
100
50
30-60 50-95
Threat Certainty
Triggers
• A Kerberos client attempts a suspicious amount of authentication requests using a large
T1087 Account Discovery
number of user accounts with many of them failing as a result of non-existent accounts
• The threat score is driven by the number of unique non-existent accounts used in
authentication attempts during the scan
• The certainty score is highest when each non-existent account is used only once and gets
progressively lower the more times each non-existent account is used during the scan
Business Impact
• An account scan to a Kerberos or Active Directory server is an effective way for an attacker
to determine what accounts are available inside an organization’s network
• Reconnaissance within a network is a precursor to active attacks which ultimately exposes
an organization to substantial risk of data acquisition and exfiltration
• This form of reconnaissance is often a lot less noticeable than a port sweep or a port scan
so attackers feel they can use it with relatively little risk of detection
Steps to Verify
• Examine the Kerberos or Active Directory server logs for a more detailed view of activity by
this host
• Inquire whether the host should be utilizing the user accounts listed in the detection
• Verify that the host on which authentication is attempted is not a shared resource as this
could generate a sufficient variety of authentications to resemble an account scan
100
50
30‒60 50‒95
Threat Certainty
Triggers
T1110 Brute Force • A host attempts a suspicious amount of authentication requests using a large number of
user accounts with some of them failing because the accounts don’t exist and others failing
because the password is incorrect
• The threat score is driven by the number of failed authentications for accounts that exist
• The certainty score is driven by the regularity in the frequency of failed authentications for
accounts that exist
Business Impact
• An account brute sweep to a Kerberos or AD server is an effective way for an attacker
to determine what accounts are available inside an organization’s network and to
simultaneously try to guess the accounts’ passwords
• Reconnaissance within a network is a precursor to active attacks which ultimately exposes
an organization to substantial risk of data acquisition and exfiltration
• This form of reconnaissance is often a lot less noticeable than a port sweep, a port scan,
or even the widespread use of RPCs to many hosts, so attackers feel they can use it with
relatively little risk of detection
Steps to Verify
• Examine the Kerberos or Active Directory server logs for a more detailed view of activity by
this host
• Inquire whether the host should be utilizing the user accounts listed in the detection
• Verify that the host on which authentication is attempted is not a shared resource as this
could generate a sufficient variety of authentications to resemble an account brute sweep
100
50
RDP
20-70 10-95
Threat Certainty
Triggers
• A host is making multiple RDP connection attempts with most of the connections failing to
T1033 System Owner/User
Discovery complete
• The connection attempts can target one or more RDP servers
T1018 Remote System • Even when a single RDP server is targeted, multiple accounts may still be involved in the
Discovery
encrypted part of the RDP connection setup
• The threat score is driven by the connection failure rate, which is the ratio of failed
connections to total connection attempts, and the time window over which the failures are
reported
• The certainty score is driven by the total number of failed connection attempts
Business Impact
• A scan via RDP is an effective way for an attacker to determine what accounts are available
inside an organization’s network and which RDP servers accept logins via the accounts
• If one of the targets has not been normally accessed via RDP, the nature of the target server
will provide additional guidance regarding the potential business impact
• Reconnaissance within a network is a precursor to active attacks which ultimately exposes
an organization to substantial risk of data acquisition and exfiltration
• This form of reconnaissance is often a lot less noticeable than a port sweep or a port scan
so attackers feel they can use it with relatively little risk of detection
Steps to Verify
• Inquire whether the target of the RDP connection attempts should even be setup to accept
RDP connections
• Inquire whether this host should be initiating the number of RDP connections to the targets
listed in the detection
• If this host is a jump server, retrieve the logs of the jump server to see what upstream
connections are the originators of the large number of failed RDP connections
100
50
RPC
30-70 10-95
Threat Certainty
Triggers
• This host is making RPC calls to a large number of other hosts
T1082 System Information
Discovery • The number of hosts being contacted far exceeds the number of hosts normally contacted
as observed on this network
T1201 Password Policy • The threat score is driven by how commonly the UUIDs used in the RPCs are seen in
Discovery
reconnaissance tools and how useful they are to creating a map of the network
T1087 Account Discovery • The certainty score is driven by how much the number of hosts contacted exceeds locally
learned normal threshold and how useful the observed UUIDs used in the RPCs are in
T1124 System Time Discovery
performing reconnaissance tasks
T1049 System Network
Connections Discovery
Possible Root Causes
T1007 System Service • An attacker is active inside the network and is mining information from individual hosts in
Discovery order to build a better map of assets in the network
T1057 Process Discovery • The information mined can include what accounts have recently logged into which hosts
and can be used in deciding where to steal privileged account credentials
T1069 Permission Groups
• An admin is completing authorized system management activity
Discovery
• Endpoint management software installed on a central server is performing periodic system
T1033 System Owner/User management activity
Discovery • Specialized hardware, including IoT, is utilizing RPC for peer discovery and identification
T1135 Network Share
Discovery Business Impact
• A scan of neighboring hosts’ information is an effective way for an attacker to complete a
detailed map of what happens where inside the target organization’s network
• Reconnaissance within a network is a precursor to active attacks which ultimately exposes
an organization to substantial risk of data acquisition and exfiltration
• This form of reconnaissance is often a lot less noticeable than a port sweep or a port scan
so attackers feel they can use it with relatively little risk of detection
Steps to Verify
• Examine the local logs on the host making the RPC queries for a more detailed view of
activity by this host
• Inquire whether the host should be contacting the hosts listed in the detection
• If the behavior continues and remains unexplained, determine which process on the internal
host is establishing the connections over which the RPC requests are made; in Windows
systems, this can be done using a combination of netstat and tasklist commands
100
50
RPC
30-70 10‒95
10-80
Threat Certainty
Triggers
T1007 System Service • This host is making one or more RPC function calls indicative of information gathering to
Discovery one or more other hosts
• The RPC function calls related to information gathering being made differ from ones
T1082 System Information
normally made by this host or received by the target host
Discovery
• The threat score is driven by the number of recon functions used during a single connection
T1124 System Time Discovery made by this host and the score is boosted if some of the functions are in the list of
T1077 Windows Admin Shares functions associated with known attacker techniques
• The certainty score is driven by how far the list of RPC functions used during a connection
T1049 System Network
diverges from the list of RPC recon function that were previously observed in use by this
Connections Discovery
host
T1057 Process Discovery
Business Impact
• Retrieval of a key host’s information is an effective way for an attacker to further a “low-and-
slow” attack on an organization’s network
• Reconnaissance within a network is a precursor to active attacks which ultimately exposes
an organization to substantial risk of data acquisition and exfiltration
• This form of reconnaissance is often a lot less noticeable than a port sweep, a port scan,
or even the widespread use of RPCs to many hosts, so attackers feel they can use it with
relatively little risk of detection
100
Account
50
Account
0
Account
20-70 10-95
Threat Certainty
Triggers
• A host rapidly makes use of multiple accounts via the SMB protocol which can be used for
T1087 Account Discovery
file sharing, RPC and other activity
• The threat score is driven by the number of unique IPs or accounts scanned relative to the
total number of accounts scanned
• The certainty score is driven by the number of accounts scanned
Business Impact
• An account scan is an effective way for an attacker to determine what accounts are available
inside an organization’s network
• Reconnaissance within a network is a precursor to active attacks which ultimately exposes
an organization to substantial risk of data acquisition and exfiltration
• This form of reconnaissance is often a lot less noticeable than a port sweep or a port scan
so attackers feel they can use it with relatively little risk of detection
Steps to Verify
• If logs of user session activity are available, examine the logs for a more detailed view of
activity by this host
• Inquire whether the host should be utilizing the user accounts listed in the detection
• Verify that the host from which authentication is attempted is not a shared resource as this
could generate a sufficient variety of account usage to resemble an account scan
100
50
LDAP
20‒70 10‒95
Threat Certainty
Triggers
T1087 Account Discovery • This host is querying Active Directory using the LDAP protocol in a manner that appears like
reconnaissance behavior
T1018 Remote System
• The LDAP queries are either unusually broad in scope or are specifically targeting accounts
Discovery
and groups that have names which imply administrative privilege
T1482 Domain Trust • The threat score is driven by the volume of returned objects across the suspicious queries
Discovery
observed: a high volume of returned objects leads to a higher score and a low volume leads
to a lower score
• The certainty score is driven by the number of suspicious queries observed: hosts that make
multiple suspicious queries will have a higher certainty
Business Impact
• A scan of information in an Active Directory server is an effective way for an attacker to
determine what accounts are privileged inside an organization’s network and what the
names of servers and infrastructure components are
• Reconnaissance within a network is a precursor to active attacks which ultimately exposes
an organization to substantial risk of data acquisition and exfiltration
• This form of reconnaissance is often a lot less noticeable than a port sweep or a port scan
so attackers feel they can use it with relatively little risk of detection
Steps to Verify
• Examine the Kerberos or Active Directory server logs for a more detailed view of activity by
this host
• Inquire whether the host should be making the queries listed in the detection
• If the LDAP queries continue and remain unexplained, determine which process on
the internal host is making the queries; in Windows systems, this can be done using a
combination of netstat and tasklist commands
100
50
30-60 10-80
Threat Certainty
Triggers
• An internal host has attempted contact with many ports on a small number of internal IP
T1082 System Information
Discovery addresses
• The threat score is driven by the number of ports being scanned
T1018 Remote System • The certainty score is driven by the number and frequency of scanning attempts
Discovery
Business Impact
• Reconnaissance of individual systems may represent the beginning of a targeted attack in
your network
• If the system being scanned is an important or critical asset, any unauthorized scan should
be treated with utmost suspicion
• Authorized reconnaissance by vulnerability scanners and asset discovery systems should
be limited to a small number of hosts which can be whitelisted for this behavior using triage
filters
Steps to Verify
• Check to see if the detected host is authorized to perform port scans on the target hosts
• Look at the pattern of ports being scanned to try to determine what the detected host may
be searching for
• If the pattern appears random and distributed over time, it is likely some form of
reconnaissance and should be dealt with before the attack progresses further
100
50
Port
30-60 10-80
Threat Certainty
Triggers
T1082 System Information • An internal host has attempted contact with a large number of internal IP addresses on a
Discovery small number of ports
• The threat score is lower for scattered scans and higher when a single port is scanned
T1018 Remote System
across many IP addresses
Discovery
• The certainty score is driven by the number and frequency of scanning attempts
T1072 Third Party Software
Business Impact
• Reconnaissance of your systems may represent the beginning of a targeted attack in your
network
• Authorized reconnaissance by vulnerability scanners and asset discovery systems should
be limited to a small number of hosts which can be whitelisted for this behavior using triage
filters
Steps to Verify
• Check to see if the detected host is authorized to perform port sweeps
• Look at the pattern of ports being scanned to determine the intent of the scan
• If the pattern appears random and distributed over time, it is likely some form of
reconnaissance and should be dealt with before the attack progresses further
100
50
22-67 22-72
Threat Certainty
Triggers
• An internal host is sending very similar payloads to several internal targets
T1072 Software Deployment
Tools • This may be the result of an infected host sending one or more exploits to other hosts in an
attempt to infect them
T1210 Exploitation of Remote • The certainty score is driven by the number of targeted hosts and the detection of an
Services
upstream propagator
• The threat score is driven by the number of targeted hosts and number of different exploits,
particularly exploits on different ports
Business Impact
• Internal spreading of botnet-related malware often is repeated by the next infected host,
thus mimicking a computer worm and rapidly infecting all possible hosts
• A wide scale spread of botnet-related malware will incur significant remediation costs
• Lateral spread which is part of a targeted attack makes the attack more resilient and gets it
closer to your crown jewels
Steps to Verify
• Look at the protocol and port listed in the detection to determine what network service is
being exploited
• Determine if there’s any reason for this host to be communicating these services on the
listed targets
• Try to ascertain what software on this host would emit the traffic being seen
• Examine the packet capture file to see if this appears to be a network discovery attempt
100
50
30-80 40-95
Threat Certainty
Triggers
• An internal host is making many login attempts on an internal system, behavior which is
T1110 Brute Force
consistent with a brute-force password attack
• Such attacks can be performed via different protocols (e.g. RDP, VNC, SSH) and may also
be a Heartbleed attack (e.g. memory scraping)
• The threat score is driven by the number of attempts and timing with which the attack is
performed
• The certainty score is driven by the total number of sessions in the attack
Business Impact
• Successful harvesting of account credentials (usernames and password) of other accounts,
particularly more privileged accounts, is a classic progression of a targeted attack
• Even if triggered due to a misconfiguration, the identified misconfiguration is creating
significant stress on the target system and should be cleaned up
Steps to Verify
• Determine whether the internal host in question should be connecting to the target host; if
not, this is likely malicious behavior
• Determine which process on the internal host is sending traffic to the internal IP address(es)
and ports; in Windows systems, this can be done using a combination of netstat and tasklist
commands
• Verify that the process should be running on the infected host and whether the process is
configured correctly
100
50
0 Service
20‒55 30‒95
Threat Certainty
Triggers
T1078 Valid Accounts • A privileged account is used to access a privileged service, but is doing so from a host
which the account has not been observed on but where the host (using other accounts) has
T1098 Account Manipulation
been seen accessing the service
T1552 Unsecured Credentials • The threat score is driven by the privilege scores of the three entities (account, host, and
T1555 Credentials from service)
Password Stores • The certainty score is driven by the observed stability of the account, host, and service
T1040 Network Sniffing clusters and the extent of the abnormality of the access and is inversely affected by the
number of hosts on which the account is used
T1033 System Owner/User
Discovery
Possible Root Causes
T1212 Exploitation for
• The privileged account has been compromised and is being used to access a privileged
Credential Access
service normal for the account, but from a host that the account is typically not used from;
T1484 Group Policy additionally, the host used for the access is itself a normal place from which to connect to
Modification
the privileged server, just not with this account
T1556 Modify Authentication • A privileged employee has borrowed another privileged user’s machine (either due to their
Process primary laptop crashing or because they are away from their desk) to perform what is
T1558 Steal or Forge Kerberos otherwise normal work for the account
Tickets
100
50
0 Service
30‒75 30‒95
Threat Certainty
Triggers
T1078 Valid Accounts • An account is used to access a service from a host which the account is not usually on
and from which the service is not usually accessed and at least the service (and likely the
T1098 Account Manipulation
account) has a high privilege score OR the privilege score of the host is suspiciously low in
T1552 Unsecured Credentials
comparison to the privilege levels of the account and service
T1555 Credentials from • The threat score is driven by the privilege scores of the three entities (account, host and
Password Stores service) OR the closeness of the privilege score of the most privileged entity to the threshold
T1040 Network Sniffing denoting high privilege
• The certainty score is driven by the observed stability of the account, host and service
T1033 System Owner/User
Discovery clusters and the number of entities in each relationship (e.g. the number of services the
account has been observed to access) and the extent of the abnormality of the host
T1212 Exploitation for
compared to the hosts typically used with the account and the service OR the number of
Credential Access
times the anomaly is triggered
T1484 Group Policy
Modification
Possible Root Causes
T1556 Modify Authentication
• The account is under the control of an attacker and is being used from an unusual host to
Process
connect to one or more services which are normal for the account but abnormal from the
T1558 Steal or Forge Kerberos host
Tickets
• An employee or contractor with approved access to the network who pretty consistently
T1550 Use Alternate works from a particular set of hosts has been assigned a new host or has temporarily
Authentication Material decided to work from another host
T1539 Steal Web Session
Cookie Business Impact
T1003 OS Credential Dumping • Lateral movement within a network involving privileged accounts, hosts or services exposes
an organization to substantial risk of data acquisition and exfiltration
T1136 Create Account
• Unexplained unusual patterns of use of privileged accounts, hosts and services are involved
in almost all major breaches
• Attacks carried out by rogue insiders will often exhibit unusual patterns of use as well
• The accounts and hosts used and the services accessed provide a possible perspective on
the potential business impact
100
50
0 Service
55‒75 30‒95
Threat Certainty
Triggers
T1078 Valid Accounts • An account which is typically used from this host is accessing a service which the account
has not been observed accessing from any host and at least two entities (account and
T1098 Account Manipulation
service) have high privilege scores
T1552 Unsecured Credentials
• The threat score is driven by the privilege scores of the three entities (account, host and
T1555 Credentials from service)
Password Stores • The certainty score is driven by the observed stability of the account, host and service
T1040 Network Sniffing clusters and the number of entities in each relationship (e.g. the number of services the
account has been observed to access) and the extent of the abnormality of the service
T1033 System Owner/User
Discovery compared to the services typically used with the account and the host
100
50
0 Privileged Service
20–50 10‒60
Threat Certainty
Triggers
T1078 Valid Accounts • An account with a low privilege score is used from a host that has a low privilege score to
access a service which has a substantially higher privilege score
T1098 Account Manipulation
• The threat score is driven by the privilege scores of the three entities (account, host and
T1552 Unsecured Credentials
service) when the service privilege is high; for medium privilege services being accessed
T1555 Credentials from from low privileged hosts and accounts, the threat score is driven by the degree of mismatch
Password Stores in the privilege scores
T1040 Network Sniffing • The certainty score is driven by the observed stability of the account, host and service
clusters and the number of entities in each relationship (e.g. the number of services the
T1033 System Owner/User
Discovery account has been observed to access) and the extent of the abnormality of the service
compared to the services typically used with the account and the host; for medium privilege
T1212 Exploitation for
services being accessed from low privileged hosts and accounts, the certainty score is
Credential Access
driven by the number of anomalous transactions observed
T1484 Group Policy
Modification
Possible Root Causes
T1556 Modify Authentication
• The host is under the control of an attacker and the account on the host is being used to
Process
connect to one or more higher privileged services
T1558 Steal or Forge Kerberos
• The account is under the control of an attacker and is being used from multiple hosts to
Tickets
connect to one or more higher privileged services
T1550 Use Alternate • A new admin has been hired and as the account used by the admin is new and the machine
Authentication Material
assigned to the admin is new, both have low privilege scores; when the admin then begins
T1539 Steal Web Session to perform legitimate work, detections are triggered until the privilege scores of the admin’s
Cookie account and host are raised based on observed activity
T1003 OS Credential Dumping • A new service is being rolled out and it was initially only used by higher privileged admin
accounts (and thus considered to be a high privilege service) but then release for use by a
T1136 Create Account
broader set of lower privileged accounts
• A rarely used service is generally accessed by higher privileged accounts, but is technically
also available to lower privileged accounts is accessed by one such low privileged accounts
Steps to Verify
• Examine the Kerberos or Active Directory server logs for a more detailed view of activity by
this host and account since if the host is compromised, the account must be considered to
be compromised as well
• Carefully inquire into whether the owner of the host in question should be using the specified
accounts to access the listed services
• Verify that the host from which authentication is attempted is not a shared resource as this
could mean that the attacker is using it as a pivot point
100
50
0 Service
20‒50 30‒95
Threat Certainty
Triggers
T1078 Valid Accounts • A privileged account is used to access a privileged service, and is doing so from a host
which the account has been observed on but where the host has not been seen accessing
T1098 Account Manipulation
the service
T1552 Unsecured Credentials
• The threat score is driven by the privilege scores of the three entities (account, host, and
T1555 Credentials from service)
Password Stores • The certainty score is driven by the observed stability of the account, host, and service
T1040 Network Sniffing clusters and the extent of the abnormality of the access and is inversely affected by the
number of hosts on which the service is used
T1033 System Owner/User
Discovery
100
50
0 Service
60‒95 30‒95
Threat Certainty
Triggers
T1078 Valid Accounts • An account is used from a host to request access to a service where none of the pairings
(account-host, account-service and host-service) are consistent with prior observed
T1098 Account Manipulation
behavior and at least the service is considered privileged
T1552 Unsecured Credentials
• The threat score is driven by the privilege scores of the three entities (account, host and
T1555 Credentials from service)
Password Stores • The certainty score is driven by the observed stability of the account, host and service
T1040 Network Sniffing clusters and the number of entities in each relationship (e.g. the number of services the
account has been observed to access) and the extent of the abnormality of the transaction
T1033 System Owner/User
Discovery with regards to each of the three entities involved
100
A B C
50
0 C B A
50-99 50-99
Threat Certainty
Triggers
• An internal host is connected to one or more file servers via the SMB protocol and is rapidly
T1486 Data Encrypted for
Impact reading files and writing files of roughly the same size and with roughly the same file name
• This pattern is highly correlated with how ransomware interacts with file servers
• Given the potential for damage, the threat score for detections of this type is high
• The certainty score is driven by the volume and persistence of the observed activity
Business Impact
• Ransomware encrypts files and transmits the encryption key to the attacker
• The attacker then attempts to extract a ransom (typically payable in an untraceable cyber
currency) from the organization in return for a promise to release the encryption key which
allows the files to be recovered
• Even if your organization is willing to pay the ransom, there is no guarantee that the
encryption key will be provided by the attacker
• Absent the encryption key, files will have to be restored from a backup and any changes
since the last backup will be lost
Steps to Verify
• Examine the sample files referenced in the detection and see if the original files are missing
and the files that have replaced them carry strange but similar file names or file extensions
• Check the directory in which the files reside for ransom notes with instructions on how to
pay the ransom and retrieve the encryption key
100
50
20-70 10-95
Threat Certainty
Triggers
• An internal host is utilizing the SMB protocol to make many login attempts using the same
T1110 Brute Force
account(s), behavior which is consistent with a brute-force password attack
• Many, though not necessarily all, of these authentications are observed to fail
• The threat score is driven by the rate of login attempts
• The certainty score is driven by the overall number of login attempts
Business Impact
• Successful harvesting of account credentials (usernames and passwords) of other accounts,
particularly more privileged accounts, is a classic progression of a targeted attack
• Even if triggered due to a misconfiguration, the identified behavior is creating significant
stress on the target system and should be cleaned up
Steps to Verify
• Determine whether the internal host in question should be connecting to the target host
using the indicated account(s); if not, this is likely malicious behavior
• Determine which process on the internal host is initiating the SMB requests; in Windows
systems, this can be done using a combination of netstat and tasklist commands
• Verify that the process should be running on the internal host and whether the process is
configured correctly
100
50
20-70 10-70
Threat Certainty
Triggers
• The host is communicating in an unusual manner with an internal server on a port that has
T1205 Traffic Signaling
previously shown a stable pattern for requests and responses
• The request sent to the internal server and the response received from it don’t conform to
any of the previously observed patterns
• The threat score is driven by either the duration of the connection between the client and the
server; if the server returns a null response, the threat score is driven by the size of the client
request
• The certainty score is driven by the level of dissimilarity between normal patterns of
communication and the flagged communication
Business Impact
• Port hijacking is a technique attackers use to enable communication to a compromised
server without raising alarms which may go off when a new port is used on an existing
server
• Compromised servers are often more valuable than compromised laptops as they remain
on the network at all times and are often located in the data center where most of an
organization’s important data resides
100
50
20-70 10-70
Threat Certainty
Triggers
• The server is communicating in an unusual manner with an internal client on a port that has
T1205 Traffic Signaling
previously shown a stable pattern for requests and responses
• The request received by the server and the response sent by it don’t conform to any of the
previously observed patterns
• The threat score is driven by either the duration of the connection between the client and the
server; if the server returns a null response, the threat score is driven by the size of the client
request
• The certainty score is driven by the level of dissimilarity between normal patterns of
communication and the flagged communication
Business Impact
• Port hijacking is a technique attackers use to enable communication to a compromised
server without raising alarms which may go off when a new port is used on an existing
server
• Compromised servers are often more valuable than compromised laptops as they remain
on the network at all times and are often located in the data center where most of an
organization’s important data resides
100
50
30-80 10-95
Threat Certainty
Triggers
• An internal host sends requests to a Web server and embeds SQL fragments into HTTP Post
T1190 Exploit Public Facing
Application data or the URL to gain access to the backend database; the requests appear machine-
generated due to the large volume and rate of arrival
• The threat score is driven by the volume of HTTP requests containing SQL fragments and
the size of the returned data
• The certainty score is driven by the number of requests sent and their classification as SQL
fragments
Business Impact
• Probing and potentially exploiting an internal Web application’s vulnerabilities can be a
prelude to a targeted attack getting access to data and then exfiltrating it
• Application software that passes SQL statements in HTTP Post data or as part of a URL
may be vulnerable to attackers as they can send very different input than the application
writer expects
Steps to Verify
• Verify systems identified as the source of SQL injection attacks should be communicating
directly with SQL servers; download the PCAP to see the entire HTTP Post data or the URL
to determine if its behaving as expected
• If this pattern is coming from neither an IT-run vulnerability scanner nor from software that by
design sends SQL statements in requests, check for presence of malware on the host
100
50
30‒90 50‒95
Threat Certainty
Triggers
T1210 Exploitation of Remote • The detection results from the observation of two closed sessions where an internal host is
Services attacking another internal host by uploading a payload which causes the destination host to
T1570 Lateral Tool Transfer connect back to the initial host to download additional stages of software
• The threat score is higher if the count of connections made back to the initial host’s callback
port is low; it is also higher the smaller the time-gap is between the initial payload upload
connection and the connection made to download the stage; and callback ports of 4444 or
1337 (commonly used in post-exploit command and control) further boosts the threat score
• The certainty score is driven by the similarity of the exchange to a model trained on
malicious samples—the model includes bytes sent, bytes received, time-gap between initial
payload and callback, protocol-difference between the two connections, and the durations
for both first and second connection
Business Impact
• Lateral movement within a network expands an attacker’s footprint and exposes an
organization to substantial risk of data acquisition and exfiltration
• Lateral movement through exploits or leveraging stolen credentials is involved in almost all
high-profile breaches
• The destination host which is attacked provides a possible perspective on the potential
business impact
100
50
90 20
Threat Certainty
Triggers
• Either a new or non-domain controller host successfully triggered an anomalous Active
TA0006 Credential Access
T1207 Rogue Domain Control Directory replication request against a legitimate domain controller. This functionality is
normally limited to usage by domain controllers and limited high-privilege service accounts.
Benign Detection
• A new domain controller has been deployed and hasn’t had enough history to be identified
as a domain controller.
Business Impact
• Specific Risk: Successful execution of either attack results in access to both usernames
and hashed passwords of the targeted Active Directory infrastructure. An attacker can then
perform offline attacks against the hashed passwords to escalate access.
• Impact: These attacks likely result in a full domain compromise due to malicious actor
having access to privileged account hashed passwords which will either be cracked or used
to authenticate (NTLM) to other services/hosts.
Steps to Verify
• Investigate the host involved in the alert, verify if the host is a true domain controller through
either an internal CMDB or Active Query of Domain Controller hosts on your environment.
100
50
25-70 10-95
Threat Certainty
Triggers
T1003 OS Credential • The host is using protocols correlated with administrative activity (RDP, SSH, IPMI, iDRAC,
Dumping etc.) in ways which are considered suspicious
• The threat score is driven by the number of other administrative connections made by this
T1078 Valid Accounts
host
T1212 Exploitation For • The certainty score is driven by the number of other recognized administrators of the target
Credential Access systems using the same administrative protocol
T1552 Unsecure Credentials
Business Impact
• Administrative protocols are a primary tool for attackers to move laterally inside a network in
which they have already established a toehold
• Given that administrative connections are typically used in conjunction with administrative
credentials, the attacker may have almost unconstrained access to systems and data that
are the organization’s key assets
• Unexpected and unexplained administrative connections represent a huge potential risk in
the lifecycle of a major breach
100
Keyboard
50 RDP
0
Product ID
20-70 10-70
Threat Certainty
Triggers
• A host connects to an internal RDP server with a keyboard layout or a product ID different
T1003 OS Credential
Dumping than the one usually seen in conjunction with the specified RDP client token
• A host connects to an internal RDP server with a keyboard layout that is unusual for that
T1078 Valid Accounts RDP server
T1212 Exploitation For • The threat score is driven by the types of anomalies observed with keyboard anomalies
Credential Access scoring higher and product ID anomalies scoring lower
• The certainty score is driven by the duration an RDP client token or server has been
T1552 Unsecure Credentials
monitored for construction of the baseline with a higher quality baseline resulting in a higher
T1555 Credentials From certainty
Password Stores • A host connects to an internal RDP server with a keyboard layout that is different from those
T1021 Remote Services usually seen on the network
Business Impact
• Along with SSH, RDP is one of the most useful lateral movement protocols for attackers as it
allows remote control of the target as well as the copying of files across the connection
• This type of control and data acquisition may happen well in advance of actual exfiltration
attempts and represents a great chance to head off attacks before any substantial damage
occurs
100
RPC
50
20-70 10-95
Threat Certainty
Triggers
• An internal host is utilizing the SMB or DCE RPC protocol to make one or more suspicious
T1569 System Services
RPC requests and referencing functions related to remote execution of code
T1021 Remote Services • The combination of source host, destination host, user account and RPC UUID has not
T1047 Windows Management previously been observed
Instrumentation • The threat score is driven by the number of destinations that received suspicious RPC
requests
T1053 Scheduled Task/Job
• The certainty score is lower if the RPC UUID is broadly used and higher when it is not
T1078 Valid Accounts commonly used
T1570 Lateral Tool Transfer
Business Impact
• Lateral movement via remote execution is a key element of many different attacks and the
SMB channel allows both for the copying of executables and the use of RPCs to execute
them
• Even systems which are permitted to perform remote execution should be monitored
because those systems are the most valuable for an attacker to compromise
100
50
50‒99 30‒90
Threat Certainty
Triggers
• An internal host has initiated communications with another internal host and the connection
has met criteria specified in one or more configured threat feeds
• The threat score is driven by the combination of the indicator type in the STIX file (with
watchlist and anonymization being lowest, malware artifacts being medium and C2 channel
and exfiltration being highest) and the quantity of data sent and received on the flagged
connections
• The certainty score is specified as part of the threat feed configuration and ranges from low
(30) to medium (60) and high (90)
Business Impact
• The internal connection may be used by the originating host to compromise the target host
or to maintain communication with a previously compromised host
• If the connection is to a target host which contains important data, this may represent an
attempt to acquire data for later exfiltration
• The threat intel feed may have included additional context tied to the specific criteria that
the connection met
• Lateral movement and data acquisition are present in almost all large-scale breaches
Steps to Verify
• Refer to the information accompanying your threat feed as it may include verification and
remediation instructions
• Determine which process on the internal host is sending the traffic which was flagged; in
Windows systems, this can be done using a combination of netstat and tasklist commands
• Check if a user has knowingly installed remote access software and decide whether the
resulting risk is acceptable
• Scan the computer for known malware and potentially reimage it, noting that some
infections leave no trace on disk and reside entirely in memory
100
50
30-70 50-95
Threat Certainty
Triggers
• Pre-exfiltration behaviors have been observed on a host that has received abnormally high
T1213 Data From Information
Repositories amounts of data from one or more hosts within a short period of time.
• The certainty score is based on a combination of how abnormal the data gathered volume
T1074 Data Staged and the relative data gathered versus data sent volume is from the host’s baselines.
T1119 Automated Collection • The threat score is based on the total volume of data gathered and the number of hosts from
Alternative Protocol which data was gathered from.
Business Impact
• Failure to identify and respond to pre-exfiltration activities in an organization increases the
likelihood of data loss.
• When successful, data exfiltration places an organization at the risk of the loss of intellectual
property, financial data, or other regulated or sensitive data sources.
Steps to Verify
• Verify if the data gathered supports valid and authorized business activities.
• Investigate the host and associated accounts for other signs of compromise.
100
50
60-95 10-95
Threat Certainty
Triggers
• An internal host is acquiring a large amount of data from one or more internal servers and is
T1041 Exfiltration Over C2
Channel subsequently sending a significant amount of data to an external system
• The threat score is driven by the amount of data transmitted
T1213 Data From Information • The certainty score is driven by the relationship between the time and size of the data
Repositories
acquired and the time and size of the data sent
T1560 Archive Collected Data
Steps to Verify
• Decide whether this may be a malicious insider or an infected host
• If the signs point to an infected host, contact the user to inquire if they initiated the
uploading behavior in question
• For potential malicious insiders, perform a complete analysis of recent behavior
• Look up the external system IP addresses and domain names on sites that maintain
reputation lists as this may provide a clear indication that the internal host is infected; such
lookups are supported directly within the UI
100
Hidden Tunnel
50
C&C
30-95 10-80
Threat Certainty
Triggers
T1005 Data from Local • An internal host is communicating with an outside IP using DNS where another protocol is
System running over the top of the DNS sessions
• This represents a hidden tunnel involving multiple sessions over longer periods of time
T1115 Clipboard Data
mimicking normal DNS traffic
T1071 Application Layer • The threat score is driven by the quantity of data sent via the tunnel
Protocol • The certainty score is driven by the distinctness of the names being looked up, with more
T1125 Video Capture distinctness resulting in higher certainty
Business Impact
• The use of a hidden tunnel by some software may be benign, but it represents significant
risk as the intention is to bypass security controls
• Hidden tunnels used as part of a targeted attack are meant to slip by your perimeter security
controls and indicate a sophisticated attacker
• Hidden tunnels are rarely used by botnets, though more sophisticated bot herders with more
ambitious goals may utilize them
Steps to Verify
• Check to see if the destination domain of the tunnel is an entity you trust for your network
• Ask the user of the host whether they are using hidden tunnel software for any purpose
• Before removing the offending software via antivirus or reimaging, take a memory snapshot
for future analysis of the incident
• If the behavior reappears shortly after a reimaging, this may be a hardware/BIOS tunnel
100
Hidden Tunnel
50
C&C
30-95 10-80
Threat Certainty
Triggers
T1005 Data from Local • An internal host is communicating with an outside IP using HTTP where another protocol is
System running over the top of the HTTP sessions
• This represents a hidden tunnel involving multiple sessions over longer periods of time
T1115 Clipboard Data
mimicking normal Web traffic
T1071 Application Layer • The threat score is driven by the quantity of data sent via the tunnel
Protocol • The certainty score is driven by the number and persistence of the sessions
T1125 Video Capture
Steps to Verify
• Check to see if the destination IP address or domain of the tunnel is an entity you trust for
your network
• Ask the user of the host whether they are using hidden tunnel software for any purpose
• Before removing the offending software via antivirus or reimaging, take a memory snapshot
for future analysis of the incident
• If the behavior reappears shortly after a reimaging, this may be a hardware/BIOS tunnel
100
Hidden Tunnel
50
C&C
30-95 10-80
Threat Certainty
Triggers
T1005 Data from Local • An internal host is communicating with an outside IP using HTTPS where another protocol is
System running over the top of the HTTPS sessions
• This represents a hidden tunnel involving one long session or multiple shorter sessions over
T1115 Clipboard Data
a longer period of time mimicking normal encrypted Web traffic
T1071 Application Layer • When it can be determined whether the tunneling software is console-based or driven via a
Protocol graphical user interface, that indicator will be included in the detection
T1125 Video Capture • The threat score is driven by the quantity of data sent via the tunnel
• The certainty score is driven by the combination of the persistence of the connection(s) and
T1113 Screen Capture
the degree to which the observed volume and timing of requests matches up with training
T1572 Protocol Tunneling samples
T1123 Audio Capture
Business Impact
• The use of a hidden tunnel by some software may be benign, but it represents significant
risk as the intention is to bypass security controls
• Hidden tunnels used as part of a targeted attack are meant to slip by your perimeter security
controls and indicate a sophisticated attacker
• Hidden tunnels are rarely used by botnets, though more sophisticated bot herders with more
ambitious goals may utilize them
Steps to Verify
• Check to see if the destination IP or domain of the tunnel is an entity you trust for your
network
• Ask the user of the host whether they are using hidden tunnel software for any purpose
• Before removing the offending software via antivirus or reimaging, take a memory snapshot
for future analysis of the incident
• If the behavior reappears shortly after a reimaging, this may be a hardware/BIOS tunnel
100
50
60-95 10-95
Threat Certainty
Triggers
T1041 Exfiltration Over C2 • A host transmits unusually large volumes of data to destinations which are not considered
Channel normal for this network
• The threat score is driven by the number of IPs the destination domain maps to and if this
T1213 Data From Information
Repositories host is on a public IP also takes into account whether the destination is in another country
• The certainty score is driven by the rate of data being exfiltrated
T1560 Archive Collected Data
Steps to Verify
• Check to see if the destination IP or domain to which data was moved is an entity you trust
for your network
• Ask the user of the host whether they have any knowledge of the data transfer
• If the data transfer is unexplained and your endpoint security solution logs such things,
determine what software on the host was responsible for the data transfer
100
50
50‒99 30‒90
Threat Certainty
Triggers
• An internal host is connecting to an external system and the connection has met criteria
specified in one or more configured threat feeds
• The threat score is driven by the combination of the indicator type in the STIX file (with
watchlist and anonymization being lowest, malware artifacts being medium, and C2
channel and exfiltration being highest) and the quantity of data transmitted on the flagged
connections
• The certainty score is specified as part of the threat feed configuration and ranges from low
(30) to medium (60) and high (90)
Business Impact
• The detection signals exfiltration of company data
• The host from which the data was sent, the destination to which the data was sent and the
volume of data transmitted may provide some clues to what data was transmitted
• The threat intel feed may have included additional context tied to the specific criteria that
the connection met
• If the external service to which data was uploaded is not an IT-sanctioned service, the
potential business risk is high
Steps to Verify
• Refer to the information accompanying your threat feed as it may include verification and
remediation instructions
• Determine which process on the internal host is sending the traffic which was flagged; in
Windows systems, this can be done using a combination of netstat and tasklist commands
• Check if a user has knowingly installed remote access software and decide whether the
resulting risk is acceptable
• Scan the computer for known malware and potentially reimage it, noting that some
infections leave no trace on disk and reside entirely in memory
Business Impact
• Investigations of entities matching this profile should be prioritized in alignment with
malware remediation procedures and urgency
• Failure to take timely steps to respond to entities that match this profile may allow
crypto-mining activities to persist, or open the door to more aggressive attacks from the
compromised host over time
When determining a behavioral profile for a host, only active detections are considered – this
means that if detections on a host are triaged as marked-as-custom, marked-as-fixed, or
become inactive, that host’s behavioral profile may change.
Business Impact
• Investigations of entities matching this profile may generally be prioritized in alignment with
addressing the presence of unauthorized IT Services, or with risks associated with data
exfiltration and data loss
When determining a behavioral profile for a host, only active detections are considered – this
means that if detections on a host are triaged as marked-as-custom, marked-as-fixed, or
become inactive, that host’s behavioral profile may change.
Business Impact
• Investigation of entities matching this profile should be considered urgent
• Failure to take timely steps to respond to entities that match this profile may increase the
risk of a breach
When determining a behavioral profile for a host, only active detections are considered – this
means that if detections on a host are triaged as marked-as-custom, marked-as-fixed, or
become inactive, that host’s behavioral profile may change.
Business Impact
• Investigations of entities matching this profile should be prioritized above less critical
severity tasks
• Failure to take timely steps to respond to entities that match this profile may increase the
risk of unauthorized or malicious activities
When determining a behavioral profile for a host, only active detections are considered – this
means that if detections on a host are triaged as marked-as-custom, marked-as-fixed, or
become inactive, that host’s behavioral profile may change.
Business Impact
• Investigations of entities matching this profile should be prioritized in alignment with
organizational tolerance to data loss
• Failure to take timely steps to respond to entities that match this profile may allow for the
loss of intellectual property, competitive advantage, legally protected, or regulated data
When determining a behavioral profile for a host, only active detections are considered – this
means that if detections on a host are triaged as marked-as-custom, marked-as-fixed, or
become inactive, that host’s behavioral profile may change.
Business Impact
• Investigations of entities matching this profile may generally be prioritized after more urgent
activities are complete
• Failure to take timely steps to investigate may allow the perpetuation of unauthorized IT
Discovery Services
When determining a behavioral profile for a host, only active detections are considered – this
means that if detections on a host are triaged as marked-as-custom, marked-as-fixed, or
become inactive, that host’s behavioral profile may change.
Business Impact
• Investigations of entities matching this profile may generally be prioritized after more urgent
activities are complete
• Failure to take timely steps to investigate may allow the perpetuation of unauthorized IT
Services
When determining a behavioral profile for a host, only active detections are considered – this
means that if detections on a host are triaged as marked-as-custom, marked-as-fixed, or
become inactive, that host’s behavioral profile may change.
Business Impact
• Investigations of entities matching this profile may generally be prioritized in alignment
with addressing the presence of unauthorized IT Services, or Unwanted or Unauthorized
Software, or Policy and Acceptable Use violations.
When determining a behavioral profile for a host, only active detections are considered – this
means that if detections on a host are triaged as marked-as-custom, marked-as-fixed, or
become inactive, that host’s behavioral profile may change.
Business Impact
• Investigation of entities matching this profile should be considered urgent
• Failure to take timely steps to respond to entities that match this profile may increase risk of
loss of data and system availability
When determining a behavioral profile for a host, only active detections are considered – this
means that if detections on a host are triaged as marked-as-custom, marked-as-fixed, or
become inactive, that host’s behavioral profile may change.
Business Impact
• Investigations of entities matching this profile should be prioritized in alignment with
procedures associated with unauthorized vulnerability discovery or limited scope penetration
testing
• Failure to take timely steps to investigate may allow additional dwell time for an adversary
with unobserved, persistent command and control or allow the presence of unauthorized,
rogue vulnerability discovery infrastructure
When determining a behavioral profile for a host, only active detections are considered – this
means that if detections on a host are triaged as marked-as-custom, marked-as-fixed, or
become inactive, that host’s behavioral profile may change.
Business Impact
• Investigations of entities matching this profile may generally be prioritized in alignment with
addressing the presence of destructive malware, ransomware, and worms.
When determining a behavioral profile for a host, only active detections are considered – this
means that if detections on a host are triaged as marked-as-custom, marked-as-fixed, or
become inactive, that host’s behavioral profile may change.
All observed privilege scores, regardless of the object (account, host, or service) to which they
refer, are expressed on the same scale. Each privilege score consists of two components: a
numerical score from 1 to 10 (ranging from low to high privilege) and a label (low, medium, or
high). Scores of 1 and 2 are labeled “low”, scores of 3 to 7 are labeled “medium”, and scores
of 8-10 are labeled “high”. Cognito detection algorithms that are part of the Privileged Access
Analytics (PAA) feature make extensive use of these privilege scores.
Account Scores
Observed privilege scores for accounts derive from the number of services an account
connects to, either exclusively or in partnership with a small number of other accounts. An
account that connects to 200 services, each of which is used by only a small number of other
accounts, will score high. An account which connects to 5 services, each of which is used by a
large number of other accounts, will score low.
Using this approach, service accounts tend to score high as they usually connect to many
services that only the service account can access. Privileged users (aka admins) are typically
given a normal account (to be used for normal non-privileged activity such as getting onto WiFi,
requesting vacations, etc.) and a privileged account (to be used only for activities which require
privileges). The first of these accounts will typically have a low score, the second a high score.
Service Scores
Let’s begin by defining what a “service” is. Given that PAA is constructed on Kerberos traffic
and Active Directory data, a service is any distinct place (server) to which a system (client) can
connect to request a service. Using this definition, RDP is not a service, but RDP to a particular
system (e.g. RDP to serverA) is a service. Given such a methodology, it’s easy to see how a
network can contain many services.
Observed privilege scores for services derive from the scores of the accounts that are used
to connect to the service. Thus, if a service is only accessed via accounts that predominantly
have high privilege scores, the service will also have a high privilege score. This can, for
instance, happen when a small number of privileged accounts belonging to admins are used
from each admin’s laptop to exclusively connect to a particular service. Another example is
when a service account for a backup server connects to an agent running on 1,000 laptops. In
both instances, the accounts used are high privilege—in the latter example, there is only single
account in use. Conversely, a vacation request portal used by everyone in an organization
(each logging in with their user accounts) will rate low on the privilege scale. And a service used
exclusively by a low privilege account will also have a low privilege score.
Privilege scores for hosts often indicate how interesting the hosts would be to an attacker. If
an attacker compromises a high privilege host, they can harvest the credentials of one or more
high-privilege accounts on that host. In a scenario where an attacker wants to move laterally
through the use of stolen credentials, this is exactly their goal. After all, stealing credentials
which have little or no privilege won’t get the attacker closer to their goal.
100
50
!
0
O365
80 70
Threat Certainty
Triggers
• An account has congured an internal resource for remote interaction through the use of a
T1041 Exfiltration Over C2
Channel Power Automate HTTP Connector.
Business Impact
• Adversaries using this technique may gain malicious access to a wide range of internal
resources including forms, pages, files, and emails.
• Use of this technique allows an adversary to bypass login and MFA requirements once the
Power Automate flow is installed.
Steps to Verify
• Given the risk and relative rarity associated with Power Automate HTTP connectors, the
legitimacy of associated flows should be investigated.
100
50
!
0
O365
70 60
Threat Certainty
Triggers
• Power Automate Flow creation has been observed by a user not typically associated with
T1041 Exfiltration Over C2
Channel this activity.
Business Impact
• Adversaries using this technique may gain malicious access to a wide range of internal
resources including forms, pages, files, and emails.
• Use of this technique may enable persistence or lateral movement, or may be used to
establish a means for subsequent data exfiltration.
Steps to Verify
• Power Automate activities from unauthorized users should be immediately investigated
• Users authorized for Power Automate activities should be explicitly triaged in this system to
avoid future detections.
100
50 !
0
O365
50 50
Threat Certainty
Triggers
• The Exchange compliance search functionality was observed being used by an account that
T1119 Automated Collection
does not normally use this functionality.
T1213 Data from Information • The threat score is statically assigned.
Repositories • The certainty score is statically assigned.
T1083 File and Directory
Discovery Possible Root Causes
• Attackers may use compliance searches to search across Exchange mailboxes for sensitive
data to collect and exfiltrate.
• Some internal users may use compliance searches to support legitimate business
operations like legal and HR for litigation, audit, and compliance purposes.
Business Impact
• Compliance search capabilities provide an enticing target for adversaries to abuse and may
result in the loss of sensitive information up to and including passwords, encryption keys,
and even financial data or intellectual property.
Steps to Verify
• Review the account in question to ensure they should be issuing compliance searches
within the environment.
• Review the search being done to determine if the data being sought may be particularly
interesting to attackers.
• Contact the user to ensure the searches are being done in compliance with company policy.
100
50 !
0
O365
50 50
Threat Certainty
Triggers
• A user is creating or updating an eDiscovery search.
T1119 Automated Collection
Business Impact
• eDiscovery capabilities provide an enticing target for adversaries to abuse and may result in
the loss of sensitive information up to and including passwords, encryption keys, and even
financial data or intellectual property.
• eDiscovery capabilities may include data traditionally inaccessible through other means but
preserved as part of a litigation hold.
Steps to Verify
• eDiscovery search from unauthorized users should be immediately investigated.
• Users authorized for eDiscovery should be explicitly triaged in this system to avoid future
detections.
100
50
!
0
O365
65 50
Threat Certainty
Triggers
• Behaviors commonly associated with covering up a potentially malicious eDiscovery search
T1119 Automated Collection
have been observed.
T1213 Data from Information • The threat score is statically assigned.
Repositories • The certainty score is statically assigned.
T1083 File and Directory
Discovery Possible Root Causes
T1562 Impair Defenses • An attacker has compromised the eDiscovery system, is using it to actively collect and
exfiltrate data, and is hiding their tracks.
• A legitimate user has abused the eDiscovery system to gain information and has deleted the
search quickly to go unnoticed.
• An improperly created eDiscovery Search has been flagged for removal based on deviation
from enterprise policies on accepted eDiscovery usage.
• An authorized test of the eDiscovery system has been observed and clean up actions from
that test have been flagged as suspicious.
Business Impact
• eDiscovery search capabilities provide an enticing target for adversaries to abuse and may
result in the loss of sensitive information up to and including passwords, encryption keys,
and even financial data or intellectual property.
• Abuse of eDiscovery search could result in sensitive data exfiltration as well as advancing an
attack deeper into the organization.
Steps to Verify
• Review the account in question to ensure they should be issuing compliance searches
within the environment.
• Review any remaining and undeleted artifacts associated the search being done to
determine if the data being sought may be particularly interesting to attackers.
• Contact the user to ensure the searches are being done in compliance with company policy.
100
50 !
0
O365
80 70
Threat Certainty
Triggers
• Access has been granted to more resources than a user has had historically and has
T1098 Account Manipulation
occurred outside of learned administrator behaviors.
Business Impact
• Sensitive data and content may be contained within Exchange which may be useful or
desirable to an adversary.
• Data may leak from a user’s mailbox by being transmitted to unauthorized entities.
Steps to Verify
• Validate that the permissions granted are appropriate to the entity in question.
100
50 !
0
O365
40 60
Threat Certainty
Triggers
• An account was observed creating suspicious mailbox rules in Exchange that allow an
T1564 Hide Artifacts
attacker to manipulate, hide, or delete incoming emails.
Business Impact
• Instances of malicious mailbox rules may indicate an adversary has control of an internal
mailbox and can access the users email data and send emails internally and externally on
behalf of the user.
• A successful attack can result in immediate data theft or reputation loss from the
compromised account.
• A successful attack can result in additional business impact through targeted phishing from
the internal account, as they are often trusted and subsequent to less strict security controls
relative to external accounts.
Steps to Verify
• Investigate the account that performed the action for other indications of malicious activity
• If review indicates possible malicious actions, revert configuration and disable credentials
associated with this alert, then perform a comprehensive investigation.
100
!
50
!
0
O365
80 70
Threat Certainty
Triggers
T1114 Email Collection • The Ruler attack tool has been observed.
Business Impact
• Use of this tool may allow an adversary to install malware or execute commands on the
endpoint running the exchange client associated with this compromised account. Malware
or arbitrary command execution may be used for a variety of malicious activities, such
as additional credential compromise, data collection and exfiltration, or to further attack
progression.
Steps to Verify
• Investigate the compromised account for additional malicious actions and respond
according to findings.
100
50
!
0
O365
50 50
Threat Certainty
Triggers
• Activities which weaken or disable Office 365 protective security features and tools.
T1562 Impair Defenses
Business Impact
• Attackers who have successfully degraded, disabled, or bypassed security controls can
more easily progress towards their objectives.
• Degraded or disabled security controls increase the potential impact of both present and
future attacks against the organization.
Steps to Verify
• Review if this configuration is expected and appropriate in light of any available
compensating controls.
• If this is a temporary configuration for troubleshooting purposes, confirm it has been
reenabled once that troubleshooting is complete.
100
!
50 !
0
O365
70 60
Threat Certainty
Triggers
• An account that may not download DLLs typically has been observed downloading a DLL
T1574 Hijack Execution Flow
file under conditions that highlight the risk of DLL hijacking, such as both a non-DLL and
DLL file being downloaded from the same directory in a short time frame.
• Threat scores are statically assigned.
• Certainty scores are statically assigned.
Business Impact
• DLL Hijacking may result in the complete compromise of a targeted system, and associated
accounts and data.
• Endpoints compromised through DLL Hijacking give an attacker an additional foothold in
the environment and an opportunity for additional lateral movement, increasing the risk of
impact to enterprise systems, users, and data.
Steps to Verify
• Investigate the user associated with this action, and verify if this user would be downloading
DLL files as part of their expected workflows.
• Investigate presence of additional files accessed as part of this detection, and assess if this
is indicative of an authorize remote application, used for legitimate business purposes.
100
50
!
0
O365
0–100 0–100
Threat Certainty
Triggers
• A new team member has been added to a team in O365 Teams consisting of an external
T1213 Data from Information
Repositories account from a domain rarely associated with O365 Teams access.
• The threat score is driven by the value of the team being modified.
• The certainty score is driven by how certain we feel about the maliciousness of the action.
Business Impact
• This type of access enables an attacker to perform additional discovery or collection
activities by exposing sensitive business information which may include shared files,
meeting content, or chat transcripts.
• The impact of such access may include information necessary to enable further attack
progression or facilitate the loss of proprietary information or intellectual property, and
regulated data.
• In some cases, access to the team’s communication fabric and conversation history can
enable successful blackmail or extortion against enterprise personnel.
Steps to Verify
• Validate that the account added is an authorized member of the O365 Team.
100
!
50
!
0
O365
70 60
Threat Certainty
Triggers
• A user was observed sending multiple emails to internal recipients which were flagged by
T1534 Internal Spearphishing
O365 reputation scanning as likely phishing emails.
• The threat score is statically assigned.
• The certainty score is statically assigned.
Business Impact
• Spearphishing is one of the predominant ways attackers gain and expand access to
credentials within an environment and is particularly effective when utilizing the implicit trust
of an internal sender.
• Successful internal spearphishing campaigns result in broad access to a large range of
resources within the environment, resulting in a significant increase in overall impact of a
compromised account incident within an organization.
Steps to Verify
• Review the details and contents of the email to validate it is malicious.
• Review additional detections and events by the source user which may indicate their
account has been compromised.
• Validate the source user is aware of and sent the email that was flagged.
100
!
50 !
LOG
0 O365
80 90
Threat Certainty
Triggers
• An attempt has been made to disable important Office 365 logs that enhance security.
T1562 Impair Defenses
Business Impact
• An attacker who has disabled logging may progress parts of an attack without being
detected, and without producing an auditable record to aid in forensics.
• Disabling logging degrades a critical component of an organization’s security architecture.
• Many audit and compliance requirements can only be met through the collection of activity
logs.
Steps to Verify
• Review whether this logging configuration is expected and appropriate.
• If this is a temporary configuration for troubleshooting purposes, confirm it has been
reenabled once that troubleshooting is complete.
100
50 !
0
O365
75 80
Threat Certainty
Triggers
• Files which were subsequently flagged as malware were uploaded into the environment by
T1203 Exploitation for Client
Execution this account.
Business Impact
• An attacker who has disabled logging may progress parts of an attack without being
detected, and without producing an auditable record to aid in forensics.
• Disabling logging degrades a critical component of an organization’s security architecture.
• Many audit and compliance requirements can only be met through the collection of activity
logs.
Steps to Verify
• Review whether this logging configuration is expected and appropriate.
• If this is a temporary configuration for troubleshooting purposes, confirm it has been
reenabled once that troubleshooting is complete.
100
50
!
0
O365
90 70
Threat Certainty
Triggers
• A series of file modifications typically associated with ransomware.
T1486 Data Encrypted for
Impact
Possible Root Causes
• An account is being used to access an organization’s cloud storage and encrypt and rewrite
files.
• In some cases, automated jobs or services that perform widespread file renaming may
trigger this detection.
Business Impact
• Ransomware attacks directly impact access to the organization’s data and are popular
among attackers due to the possibility of a quick transition from attack to monetization.
• After files have been encrypted, the attacker will ask the organization to pay a ransom
in return for a promise to provide the encryption key which would allow the files to be
decrypted.
• Even if an organization is willing to pay the ransom, there is no guarantee that the encryption
key will be provided by the attacker or that the decryption process will work.
• Absent the encryption key, an organization must rely on restoration of files from backups.
Steps to Verify
• Review the integrity of the affected files and determine whether they appear encrypted.
100
50
!
0
O365
40 60
Threat Certainty
Triggers
• High risk Exchange operations which range from allowing the exfiltration of data, the
T1484 Group Policy
Modification creation of backdoor rules, execution of VBS scripts, or forwarding and collecting sensitive
information.
T1098 Account Manipulation
Business Impact
• Sensitive data and content may be contained within Exchange which may be useful or
desirable to an adversary.
• Compromising Exchange may allow an attacker to continue their attack progression.
Steps to Verify
• Verify whether these changes to the configurations are intentional and have been made with
appropriate compensating safeguards.
100
50
!
0
O365
0–100 0–100
Threat Certainty
Triggers
• A rarely used, third-party Microsoft Teams integrated application has been granted
T1550 Use Alternate
Authentication Material excessive or risky permissions that may enable malicious activities to be taken on behalf of
the authorizing user
T1528 Steal Application • The threat score is statically assigned.
Access Token
• The certainty score is statically assigned.
Business Impact
• Malicious third-party apps can be used to undermine existing security controls, such as
multi-factor authentication (MFA), and enable malicious action on behalf of the authorizing
user, increasing risk to enterprise system and data and increasing the likelihood of further
attack progression.
• A suspicious teams application could result in outcomes ranging from the compromise of an
individual account or host, to broader compromise of a full teams channel.
• Malicious apps may enable a foothold into the environment as a means of maintaining
persistent access.
• Malicious apps could may allow the collection of sensitive information or act as a
mechanism to support data exfiltration.
Steps to Verify
• Verify that the application in question is authorized for the associated user.
• Validate that the required permission set is appropriate for the authorized business process
associated with this application.
• Investigate for additional malicious indicators associated with this application or user.
100
50
!
0
O365
50 50
Threat Certainty
Triggers
• A user is previewing or downloading the results of an eDiscovery activity.
T1048 Exfiltration Over
Alternative Protocol
Possible Root Causes
• An adversary has gained access to eDiscovery capabilities and is using that access to
collect or exfiltrate data.
• One of a small set of users authorized to perform eDiscovery has been observed doing so.
Business Impact
• eDiscovery capabilities provide an enticing target for adversaries to abuse and may result in
the loss of sensitive information up to and including passwords, encryption keys, and even
financial data or intellectual property.
• eDiscovery capabilities may include data traditionally inaccessible through other means but
preserved as part of a litigation hold.
Steps to Verify
• eDiscovery activities from unauthorized users should be immediately investigated.
• Users authorized for eDiscovery should be explicitly triaged in this system to avoid future
detections.
100
50 !
!
0
O365
70 60
Threat Certainty
Triggers
• The risk of insider threat has been observed by an account downloading or exfiltrating files
T1213 Data from Information
Repositories prior to that account being deleted or disabled.
• Threat scores are assigned a static value.
• Certainty scores are assigned a static value.
Business Impact
• Insider threat places an organization at risk of loss of sensitive information such as
intellectual property, financial data, or other data associated with legal and compliance
protections.
• The successful exfiltration of data by an insider may lead to regulatory fines or penalties,
loss of competitive advantages, or other outcomes detrimental to business and
organizational success.
Steps to Verify
• Investigate the reason this account was disabled or deleted, and if maintaining access to
these files continues to be authorized.
• Investigate if the files associated with this detection include sensitive information.
100
50 !
0
O365
0-100 0-100
Threat Certainty
Triggers
• An account was seen downloading an unusual number of objects compared to the user’s
T1567 Exfiltration Over Web
Service past behavior or the behavior of other O365 users.
• The Threat score is driven by a combination of factors which include the quantity of objects
downloaded, the relative rarity associated with downloading those objects, and rarity of
downloading from the source sites for those objects.
• The Certainty score is driven by a combination of factors which include a historic baseline
of that user’s download volumes, a comparison of that user relative to other users, and
dimensions related to the locations where these objects have been downloaded from.
Business Impact
• Ability to exfiltrate a significant number of sensitive files from the enterprise is often the last
stage of the security compromise.
• Exfiltration of sensitive business data may lead to loss of control of company secrets and
intellectual property.
Steps to Verify
• Review the details and contents of the files to assess risk, and validate these are authorized
downloads.
• Review additional detections and events by the source user which may indicate their
account has been compromised.
100
50 !
!
0
O365
50 60
Threat Certainty
Triggers
• A new Exchange transport rule has been created with a potentially risky action that may
T1114 Email Collection
provide email collection, exfiltration, or deletion capabilities (BlindCopyTo, CopyTo, Delete).
• The threat score is statically assigned.
• The certainty score is statically assigned.
Business Impact
• Because email services are critical to so many enterprise activities, attackers prioritize
access both as a means of progressing an attack as well as a mechanism for data
exfiltration.
• Forwarded emails may expose sensitive data.
• Deleted emails may mask security alerts or important emails alerting an organization to a
breach.
• The combination of forwarded and deleted emails may allow an external party to
impersonate internal users to further their goals.
Steps to Verify
• Validate the new transport rule serves a business purpose, does not create a risk of data
exposure, and has been implemented according to proper change control processes.
100
50 !
!
0
O365
60 50
Threat Certainty
Triggers
• Mail forwarding which may be used as a collection or exfilltration channel for an adversary
T1114 Email Collection
has been observed.
Business Impact
• Attackers who have gained persistence through the email systems may passively collect and
exlfiltrate data.
• Sensitive business information often resides in email systems and may be leaked through
e-mail theft.
Steps to Verify
• Verify if sensitive data has been unintentionally forwarded using this feature.
100
50 !
!
0
O365
70 60
Threat Certainty
Triggers
• Abnormal Power Automate activity was observed from a user in the environment.
T1041 Exfiltration Over C2
Channel • A user leveraged a Power Automate flow connector that was unusual for either the user or
the environment.
T1008 Fallback Channels • A user modified another user existing flow in a suspect manner.
T1059 Command and Script-
ing Interpreter Possible Root Causes
T1020 Automated Exfiltration • An attacker may be creating automated tasks within the environment to secretly exfil,
manipulate data for impact, or create network control channels.
• A normal user is attempting to subvert normal IT policies by leveraging native Microsoft
infrastructure without authorization.
• One of a small set of users who are authorized to leverage Power Automate flow was
observed doing so.
Business Impact
• Power Automate, Microsoft’s native and on-by-default O365 automation tool, can be
leveraged by attackers to interact directly with internal data and infrastructure to facilitate
data exfil or attack automation.
Steps to Verify
• Power Automate activities involving unauthorized connectors should be investigated
immediately.
• Users modifying other user’s Power Automate flows should have explicit permission to do
so.
• Users authorized for Power Automate activities should be explicitly triaged to avoid future
detections.
100
!
50 !
0 O365
30-50 30-60
Threat Certainty
Triggers
• An account was seen sharing files and/or folders at a volume that is higher than is normal for
T1213 Data from Information
Repositories both the environment and for the account.
• Threat is driven by the number of objects shared.
• When mosts users do not share normally the, certainty is drive by how uncommon sharing
is for all users. When sharing is normally observed, certainty is driven by a combination of
the amount of deviation from the user’s normal shared object volume and the proportion of
objects shared from directories other than the user’s personal directory.
Business Impact
• While some level of sharing may be normal for an environment or user, those users who
emerge as sharing unusual amounts of data should be reviewed to validate the sharing is
legitimate and does not pose a risk.
• Sharing of a large volume or breadth of files or folders exposes the organization to an
increased risk of data theft or loss.
Steps to Verify
• Review the data being shared to determine if the information should be exposed to external
parties.
• Review the sharing permissions to ensure the least possible data is exposed.
• Validate with the user that the sharing was intended and follows organizational policies on
data sharing with external parties.
100
50 !
0
O365
80 70
Threat Certainty
Triggers
• An account has been created with administrative privileges (TenantAdmins,
T1528 Steal Application
Access Token PrivilegedRoleAdmins, ApplicationAdministrators) that provide broad access to the
environment.
T1550 Use Alternate • The threat score is statically assigned.
Authentication Material
• The certainty score is statically assigned.
Business Impact
• Unauthorized administrative users have complete control within the environment, creating
significant on-going risk to a broad range of resources.
• Attackers with access to the identified administrative rights will be able to operate unfettered
within the environment.
• Attackers using multiple administrative accounts improve their resilience to an incident
response and are able to silo operations to prevent the detection of a single compromised
admin account from affecting access and actions undertaken from other compromised
admin accounts.
Steps to Verify
• Validate the administrative account was created according to organizational change control
policies and that the access granted is appropriate and necessary.
100
50 !
0
O365
40-60 40-60
Threat Certainty
Triggers
• A login attempt occurred to an account where both conditional access policies were not met
T1078 Valid Accounts
and where sign-on attributes (such as location, device, etc.) that are unusual for the account.
Business Impact
• Adversaries will continue to attempt to bypass security controls until successful unless
directly stopped.
• The compromise of a valid account may lead to the loss of confidentiality and integrity
of any data and services that the account may access, and it may be used in service of
additional lateral movement or attacks against other internal users.
Steps to Verify
• Investigate irregularities associated with this user’s login events for indications of a
successful compromise.
• Validate whether these attempts were performed by the account’s proper owner.
100
50 !
0
O365
50 50
Threat Certainty
Triggers
• A service principal, application, or user has been provisioned membership into to the
T1098 Account Manipulation
‘Privileged Role Administrator’ AzureAD role.
Business Impact
• Adversaries will create redundant access mechanisms so that they are able to continue to
maintain persistence despite their primary access method being discovered and remediated.
• Redundant access allows malicious activities to continue well beyond initial discovery and
response phases, increasing risks to enterprise services or data.
Steps to Verify
• Validate that this activity is not associated with authorized administrative testing activities.
100
50
!
0
O365
80 70
Threat Certainty
Triggers
• A third-party cloud application has requested excessive or risky access, which may allow
T1550 Use Alternate
Authentication Material malicious activities to be performed on behalf of the granter of the permission.
Business Impact
• Malicious applications are able to perform actions with delegated permissions without a
user’s knowledge and may be difficult to detect.
• Depending on the delegated privileges involved, the impact may range from single account
takeover to full subscription compromise.
Steps to Verify
• Validate that this is an authorized application which has been vetted for risk by the security
team.
100
50 !
0
O365
80 70
Threat Certainty
Triggers
• A successful login has occurred to an account with sign-on attributes (such as location,
T1078 Valid Accounts
device, etc.) that are unusual for the account.
• The threat score is statically assigned.
• The certainty score is statically assigned.
Business Impact
• Adversaries frequently bypass security controls through the malicious, unauthorized use of
valid credentials.
• The compromise of a valid account may lead to the loss of confidentiality and integrity of
any data and services that account may access, and it may be used in service of additional
lateral movement or attacks against other internal users.
Steps to Verify
• Investigate irregularities associated with these login events for indications of compromise.
• Validate the login activities have been performed in accordance with organizational MFA
policies, enforcing re-login with MFA if required.
100
50
!
0
O365
90 90
Threat Certainty
Triggers
• A successful login has occurred to an account with many characteristics that are both
T1078 Valid Accounts
unusual for the account and highly correlated with account compromise.
• The threat score is statically assigned.
• The certainty score is statically assigned.
Business Impact
• Adversaries frequently bypass security controls through the malicious, unauthorized use of
valid credentials.
• The compromise of a valid account may lead to the loss of confidentiality and integrity
of any data and services that the account may access, and it may be used in service of
additional lateral movement or attacks against other internal users.
Steps to Verify
• Investigate irregularities associated with these login events for indications of compromise.
• Validate the login activities have been performed in accordance with organizational MFA
policies, enforcing re-login with MFA if required.
100
50
!
0
O365
70 60
Threat Certainty
Triggers
• A user was observed accessing the environment from a known anonymized (TOR) exit node,
T1090 Proxy
post authentication.
• The threat score is statically assigned.
• The certainty score is statically assigned.
Business Impact
• Attackers identified under this detection are actively operating within the environment while
maintaining some level of operational security by obfuscating their source details.
• Attackers operating using TOR will reduce the ability of teams to connect identified attacker
behavior with other behaviors not yet identified since it enables the attacker to regularly
change the source detail of their connections while undertaking operations within the
environment.
Steps to Verify
• Review the actions being undertaken by the user during and just before the identified activity
to determine resources accessed and potential risk posed by that access.
• Review security policy to determine if use of TOR is allowed.
• Discuss with user to determine if use of TOR is known and legitimate.
• If review determines there is a high risk to data or the environment, disable the account and
perform a comprehensive investigation.
100
50
!
0
O365
50 50
Threat Certainty
Triggers
• A successful login with suspicious IP Address or User-Agent after frequent failed login
T1110 Brute Force
attempts.
Business Impact
• Accounts compromised through brute-force attacks provide attackers a foothold in the
enterprise.
• Attackers who have taken over administrative, executive, or high-value accounts put the
enterprise at considerable risk.
Steps to Verify
• Brute-force attacks that end with a successful login should immediately be investigated for
abnormal or threatening behavior.
100
50
!
0 O365
70 80
Threat Certainty
Triggers
T1562 Impair Defenses • A change to a trusted IP configuration in Azure was observed in either the AzureAD
Known Networks configuration or the configuration for trusted networks for multi-factor
authentication.
Business Impact
• Modifications to the trusted network configuration may introduce risks by allowing particular
IP addresses/ranges to bypass critical security controls.
• Trade-offs in favor of usability over security can be achieved through the configuration of
trusted IPs, but when abused or misconfigured can increase risk to an organization by
disabling expected security controls.
Steps to Verify
• Investigate the IP addresses to determine if they should be trusted by the organization.
• Contact the owner of the account that made the change to verify it was done legitimately.
100
50 !
0
O365
60 70
Threat Certainty
Triggers
• An account was observed disabling Multi-Factor Authentication (MFA) for another account.
T1562 Impair Defenses
• The threat score is statically assigned.
• The certainty score is statically assigned.
Business Impact
• MFA is a critical security control that if bypassed may be indicative of an active threat in the
environment or increase risk of the account becoming compromised in the future.
• Compromised accounts provide attackers with access to critical systems and data which
may be stolen, modified, or deleted.
Steps to Verify
• Review the account and internal policy to determine if MFA should be enabled for this
account.
• Verify the action of disabling MFA on this account was intentional and followed internal
security policies and change control processes.
100
!
50
!
LOG
0
O365
80 70
Threat Certainty
Triggers
• An account has been created with administrative privileges (TenantAdmins,
T1136 Create Account
PrivilegedRoleAdmins, ApplicationAdministrators) that provide broad access to the
environment.
• The threat score is statically assigned.
• The certainty score is statically assigned.
Business Impact
• Unauthorized administrative users have complete control within the environment, creating
significant on-going risk to a broad range of resources.
• Attackers with access to the identified administrative rights will be able to operate unfettered
within the environment.
• Attackers using multiple administrative accounts improve their resilience to an incident
response and are able to silo operations to prevent the detection of a single compromised
admin account from affecting access and actions undertaken from other compromised
admin accounts.
Steps to Verify
• Validate the administrative account was created according to organizational change control
policies and that the access granted is appropriate and necessary.
100
50
!
0
O365
0–100 0–100
Threat Certainty
Triggers
• Abnormal Azure AD operations that may be associated with privilege escalation or account
T1078 Valid Accounts
takeover.
Business Impact
• Users substantially deviating from their learned baseline in ways that correspond to threats
associated with privilege escalation or account takeover often indicate an adversary
foothold.
• Account takeover and privilege escalation can lead to sensitive information leakage,
ransomware attacks, and other abuses.
Steps to Verify
• Investigate both the target and result of these operations to understand the potential impact.
100
50 !
!
0
O365
70 60
Threat Certainty
Triggers
• An account has executed O365 operations with either tools, scripting engines or command
T1059 Command and
Scripting Interpreter line interfaces which could be\u00a0maliciously used by attackers.
• The threat score is driven by the quantity of operations executed by the account.
• The certainty score is driven by the uniqueness of the User Agent reported for the account.
Business Impact
• Automated tools increase attack speed and volume while reducing human error, and
attackers that successfully leverage them have an opportunity to move faster and in some
cases with a lower chance of detection.
• Use of automation tools is a \”force multiplier\” that increases chances of successful
breaches and data exfiltration, significantly increasing risks to the enterprise.
Steps to Verify
• Investigate O365 operation in context of the user, verify if this user would reasonably
conduct these types of operations.
• Investigate tooling or scripting engine to validate if this is an appropriate and approved tool
for a user of this type.
This is a complex problem because users in AWS are encouraged to assume other roles to
perform actions, and actively discouraged to perform actions as the account they logged in
with. In some cases, users will even assume roles after assuming a role in order to be able to
perform certain actions. Our dedicated team of Data Scientists use advanced machine learning
techniques to attribute any activity up to the original actor based on logged activity across
your AWS account. When you see any AWS detections in our product, you will be able to see a
chain of roles assumed by the actor before performing their action, which will explain how this
user assumed this role.
100
50
!
Root
0
AWS
90 90
Threat Certainty
Triggers
• An action was taken by the root account.
T1078 Valid Accounts
Business Impact
• Malicious use of the root account indicates significant opportunity for negative impact to
organizational assets, services, and data to include disruptive impact and sensitive data
loss.
• Misuse of the root account by admins for routine activities greatly elevates the risk of
accidental damage or disruption.
Steps to Verify
• Review the activity completed by the root account for indications of malicious activity.
• Validate with the team responsible for administering AWS that they used the root account for
an authorized activity.
100
50 !
0
AWS
80 70
Threat Certainty
Triggers
• EC2 generated temporary credential used outside of EC2.
T1078 Valid Accounts
Business Impact
• Attackers may use temporary credentials as a means of maintaining persistent command
and control in an environment, which increases the risk of data loss or impacted assets and
services.
Steps to Verify
• Review the actions being undertaken by the credential after the identified activity and
potential risk posed by that access.
• Discuss with the EC2 instance owners to determine if the use of instance generated
temporary keys outside of EC2 is known and legitimate.
• If the review determines there is a high risk to data or the environment, disable the
credentials and perform a comprehensive investigation.
100
! !
5
7
1
50
AWS
2
4
0
O365
O365
3
80 70
Threat Certainty The Onion Router (TOR)
Triggers
• A credential was observed accessing the environment from a known anonymized (TOR) exit
T1090 Proxy
node.
Business Impact
• Attackers identified under this detection are actively operating within the environment while
maintaining some level of operational security by obfuscating their source details.
• Attackers operating using TOR will reduce the ability of teams to connect identified attacker
behavior with other behaviors not yet identified since it enables the attacker to regularly
change the source detail of their connections while undertaking operations within the
environment.
• Authorized users that have adopted TOR may be in violation of IT Policies and be placing
organizational assets at risk.
Steps to Verify
• Review the actions being undertaken by the user after the identified activity and potential
risk posed by that access
• Review security policy to determine if the use of TOR is allowed.
• Discuss with the user to determine if the use of TOR is known and legitimate.
• If the review determines there is a high risk to data or the environment, disable the
credentials and perform a comprehensive investigation.
100
50 !
0
AWS
30 30
Threat Certainty
Triggers
• An AWS control-plane API was observed programmatically enumerating the configuration
T1049 System Network Con-
nections Discovery details associated with Cloud-Native network integrations such as VPC Peering
Connections, VPN Connections and/or DirectConnect Gateways.
Business Impact
• Reconnaissance may indicate the presence of an adversary gaining details necessary to
support additional malicious activities within the environment. A successful attack may yield
information that can be used by an adversary to mount a campaign against any external,
connected network
Steps to Verify
• Investigate the Principal that performed the action for other signs of malicious activity.
• Investigate if any modifications were made to the enumerated DirectConnect Gateways,
VPN or VPC Peering Connections configurations.
• Validate that any changes were authorized, given the purpose and policies governing this
resource.
• If review indicates possible malicious actions or high-risk configuration change:
▪ Revert configuration change.
▪ Disable credentials associated with this alert.
▪ Perform a comprehensive investigation to determine initial compromise and the scope of
impacted resources.
100
50 !
30 30 AWS
Threat Certainty
Triggers
• An AWS control-plane API was observed programmatically enumerating the configuration
T1526 Cloud Service
Discovery details associated with the Virtual Private Network (VPC) such as Network Interfaces,
Gateways, Network ACLs and Route Tables.
Business Impact
• Recon may indicate the presence of an adversary gaining details necessary to support
additional malicious activities within the environment. A successful attack may yield
information that can be used by an adversary to mount a campaign within the AWS
Environment.
Steps to Verify
• Investigate the Principal that performed the action for other signs of malicious activity.
• Investigate if any modifications were made to the enumerated VPCs such as changes to
Network Interfaces, Gateways, Network ACLs or Routing Tables.
• Validate that any changes were authorized, given the purpose and policies governing this
resource.
• If review indicates possible malicious actions or high-risk configuration change:
▪ Revert configuration change.
▪ Disable credentials associated with this alert.
▪ Perform a comprehensive investigation to determine initial compromise and the scope of
impacted resources.
100
50 !
20 20 AWS
Threat Certainty
Triggers
• A user lists AWS account aliases via ListAliases or retrieves details for the AWS organization
T1580 Cloud Infrastructure
Discovery via DescribeOrganization
Business Impact
• Recon may indicate the presence of an adversary gaining details necessary to support
additional malicious activities within the environment.
Steps to Verify
• Investigate the account context that performed the action for other signs of malicious
activity.
• If review indicates possible malicious actions or high-risk configuration, revert configuration
and disable credentials associated with this alert then perform a comprehensive
investigation.
100
50 !
0
AWS S3
40 40
Threat Certainty
Triggers
• Credential was observed performing a set of anomalous API requests that can be
T1526 Cloud Service
Discovery associated with the discovery or subsequent phases of an attack.
Business Impact
• Privilege escalation may indicate the presence of an adversary that is modifying permissions
to progress towards an objective.
Steps to Verify
• Investigate the account context that performed the action for other signs of malicious
activity.
• Validate that any modifications are authorized, given the purpose and policies governing this
resource.
• If review indicates possible malicious actions or high-risk configuration, revert configuration
and disable credentials associated with this alert then perform a comprehensive
investigation.
100
50 !
0
AWS EC2
70 50
Threat Certainty
Triggers
• A set of AWS control plane APIs commonly used to search EC2 user data on EC2 resources
T1552 Unsecured Credentials
for credentials was invoked in an unusual way that may be associated with a potential
attack.
Business Impact
• Lateral movement may indicate that an adversary has established a foothold in the
environment and is progressing towards their objective, increasing the risk of material
impact.
Steps to Verify
• Investigate the account context that performed the action for other signs of malicious
activity.
• Validate that any modifications are authorized, given the purpose and policies governing this
resource.
• If review indicates possible malicious actions or high-risk configuration, revert configuration
and disable credentials associated with this alert then perform a comprehensive
investigation.
100
50 !
70 50 AWS ECS
Threat Certainty
Triggers
• Credential was observed performing a set of API requests to retrieve a broad range of
T1552 Unsecured Credentials
container configuration details which may further their attack through the leak of credentials
or other data about the environment.
Business Impact
• Stolen credentials allow an adversary to leverage authorized services and APIs to extend
their attack which can be difficult for traditional security solutions to detect.
• Abused credentials are typically associated with impactful attacks, and if unmitigated may
increase the likelihood that an adversary may inflict a loss of data or service availability.
Steps to Verify
• Investigate the account context that performed the action for other signs of malicious
activity.
• Validate that any modifications are authorized, given the purpose and policies governing this
resource.
• If review indicates possible malicious actions or high-risk configuration, revert configuration
and disable credentials associated with this alert then perform a comprehensive
investigation.
100
50 !
0
AWS SSM
70 50
Threat Certainty
Triggers
• Credential was observed performing a set of API requests to list and then retrieve
T1552 Unsecured Credentials
parameters within the AWS parameter store.
Business Impact
• Stolen credentials allow an adversary to leverage authorized services and APIs to extend
their attack which can be difficult for traditional security solutions to detect.
• Abused credentials are typically associated with impactful attacks, and if unmitigated may
increase the likelihood that an adversary may inflict a loss of data or service availability.
Steps to Verify
• Investigate the account context that performed the action for other signs of malicious
activity.
• Validate that parameters requested do not contain sensitive details, such as credentials. If
they do, investigate those credentials for potential malicious use.
• If review indicates possible malicious actions or high-risk configuration, revert configuration
and disable credentials associated with this alert then perform a comprehensive
investigation.
100
50 !
0
AWS
40 40
Threat Certainty
Triggers
• Credential was observed performing a set of unusual API requests that can be associated
T1069 Permission Groups
Discovery with the discovery or subsequent phase of an attack.
Business Impact
• Privilege escalation may indicate the presence of an adversary that is modifying permissions
to progress towards an objective.
Steps to Verify
• Investigate the account context that performed the action for other signs of malicious
activity.
• Validate that any modifications are authorized, given the purpose and policies governing this
resource.
• If review indicates possible malicious actions or high-risk configuration, revert configuration
and disable credentials associated with this alert then perform a comprehensive
investigation.
100
50 !
0
AWS EC2
40 40
Threat Certainty
Triggers
• Credential was observed performing a set of anomalous API requests that can be
T1526 Cloud Service
Discovery associated with the discovery or subsequent phases of an attack.
Business Impact
• Privilege escalation may indicate the presence of an adversary that is modifying permissions
to progress towards an objective.
Steps to Verify
• Investigate the account context that performed the action for other signs of malicious
activity.
• Validate that any modifications are authorized, given the purpose and policies governing this
resource.
• If review indicates possible malicious actions or high-risk configuration, revert configuration
and disable credentials associated with this alert then perform a comprehensive
investigation.
100
50 !
0
AWS
40 40
Threat Certainty
Triggers
• Credential was observed performing a set of unusual API requests that can be associated
T1069 Permission Groups
Discovery with the discovery or subsequent phase of an attack.
Business Impact
• Privilege escalation may indicate the presence of an adversary that is modifying permissions
to progress towards an objective.
Steps to Verify
• Investigate the account context that performed the action for other signs of malicious
activity.
• Validate that any modifications are authorized, given the purpose and policies governing this
resource.
• If review indicates possible malicious actions or high-risk configuration, revert configuration
and disable credentials associated with this alert then perform a comprehensive
investigation.
100
50 !
0
AWS ECR
80 70
Threat Certainty
Triggers
• After enumerating ECR repositories and enumerating the images within those repositories,
T1525 Implant Internal Image
the attacker requests an authorization token for an image.
Business Impact
• Lateral movement may indicate that an adversary has established a foothold in the
environment and is progressing towards their objective, increasing the risk of material
impact.
• An inserted backdoor may provide hidden access persistence within the environment,
allowing attackers to return to the environment after eviction.
Steps to Verify
• Investigate the account context that performed the action for other signs of malicious
activity.
• Validate that any modifications are authorized, given the purpose and policies governing this
resource.
• If review indicates possible malicious actions or high-risk configuration, revert configuration
and disable credentials associated with this alert then perform a comprehensive
investigation.
100
!
50
0 AWS LAMBDA
80 70
Threat Certainty
Triggers
• After enumerating Lambda functions and IAM roles, create a Lambda function, and add a
T1525 Implant Internal Image
new rule to that Lambda function.
Business Impact
• Lateral movement may indicate that an adversary has established a foothold in the
environment and is progressing towards their objective, increasing the risk of material
impact.
• An inserted backdoor may provide hidden access persistence within the environment,
allowing attackers to return to the environment after eviction.
Steps to Verify
• Investigate the account context that performed the action for other signs of malicious
activity.
• Validate that any modifications are authorized, given the purpose and policies governing this
resource.
• If review indicates possible malicious actions or high-risk configuration, revert configuration
and disable credentials associated with this alert then perform a comprehensive
investigation.
100
50 !
0
AWS
90 90
Threat Certainty
Triggers
• Disable or delete CloudTrail logging within a region where the logging is already enabled.
T1562 Impair Defenses
Business Impact
• Inability to detect future attacks, investigate future or historical attacks, or audit activity
within the environment.
• Increased risk of activity that may negatively impact the business going unnoticed.
Steps to Verify
• Review the actions being undertaken by the user after the identified activity and potential
risk posed by that access in regions where logging remains (if any).
• Review security policy to determine if the removal of logging capabilities is allowed.
• Discuss with the user to determine if the activity is known and legitimate.
• If the review determines there is a high risk to data or the environment, disable the
credentials and perform a comprehensive investigation.
100
50 !
0
AWS S3
90 80
Threat Certainty
Triggers
• A large number of S3 objects were copied in a way that may indicate the encryption phase
T1486 Data Encrypted for
Impact of ransomware activity in the environment.
Business Impact
• Ransomware attacks directly impact access to the organization’s data and are popular
among attackers due to the possibility of a quick transition from attack to monetization.
• After files have been encrypted, the attacker will ask the organization to pay a ransom
in return for a promise to provide the encryption key which would allow the files to be
decrypted.
• Even if an organization is willing to pay the ransom, there is no guarantee that the encryption
key will be provided by the attacker or that the decryption process will work.
Steps to Verify
• Investigate the account context that performed the action for other signs of malicious
activity.
• Validate that any modifications are authorized, given the purpose and policies governing this
• resource.
• If review indicates possible malicious actions or high-risk configuration, disable credential
associated with this alert then perform a comprehensive investigation.
100
50 !
0
AWS
90 90
Threat Certainty
Triggers
• Credential was observed performing a set of API requests capable of disabling native AWS
T1562 Impair Defenses
security measures.
Business Impact
• Attackers who have successfully degraded, disabled, or bypassed security controls can
more easily progress towards their objectives.
• Unintentional disabling of security controls increases the potential impact of both present
and future attacks against the organization.
Steps to Verify
• Review if this configuration is expected and appropriate in light of any available
compensating controls.
• If this is a temporary configuration for troubleshooting purposes, confirm it has been
reenabled once that troubleshooting is complete.
100
!
50
0 AWS
60 50
Threat Certainty
Triggers
• Apply a highly permissive inline policy (i.e. “:” or “*:*”) to a user, role, or group.
T1078 Valid Accounts
Business Impact
• Lateral movement may indicate that an adversary has established a foothold in the
environment and is progressing towards their objective, increasing the risk of material
impact.
Steps to Verify
• Investigate the account context that performed the action for other signs of malicious
activity.
• Review whether this account should have access to the console for their normal duties.
• If review indicates possible malicious actions or high-risk configuration, revert configuration
and disable credentials associated with this alert then perform a comprehensive
investigation.
100
50 !
0
AWS
80 70
Threat Certainty
Triggers
• An account enumerates users or obtains details on their own account, after which they
T1538 Cloud Service Dash-
board request a token for console login and use that token to login to the console.
Business Impact
• Lateral movement may indicate that an adversary has established a foothold in the
environment and is progressing towards their objective, increasing the risk of material
impact.
Steps to Verify
• Investigate the account context that performed the action for other signs of malicious
activity.
• Review whether this account should have access to the console for their normal duties.
• If review indicates possible malicious actions or high-risk configuration, revert configuration
and disable credentials associated with this alert then perform a comprehensive
investigation.
100
50 !
0
AWS
80 70
Threat Certainty
Triggers
• A source AWS account modifies the login profile of a target account, following which the
T1098 Account Manipulation
target account accesses the AWS console.
Business Impact
• Lateral movement may indicate that an adversary has established a foothold in the
environment and is progressing towards their objective, increasing the risk of material
impact.
Steps to Verify
• Investigate the account context that performed the action for other signs of malicious
activity.
• Validate that any modifications are authorized, given the purpose and policies governing this
• resource.
• If review indicates possible malicious actions or high-risk configuration, revert configuration
and disable credentials associated with this alert then perform a comprehensive
investigation.
100
50
!
0
AWS
80 70
Threat Certainty
Triggers
• Credential was observed performing a set of unusual API requests that enumerate privileges,
T1098 Account Manipulation
following which a modification of privileges was observed which may be indicative of a
privilege escalation occurring within the environment.
Business Impact
• Privilege escalation may indicate the presence of an adversary that is modifying permissions
to progress towards an objective.
• IT misconfigurations may act to increase the risk of impact to assets, data, or services.
Steps to Verify
• Investigate the account context that made the change for other signs of malicious activity.
• Validate that the modifications are authorized, given the purpose and policies governing this
resource.
• If review indicates possible malicious actions or high-risk configuration, revert configuration
and disable credentials associated with this alert then perform a comprehensive
investigation.
100
50 !
0
AWS
80 70
Threat Certainty
Triggers
• After enumerating users in the environment, add an access key to another user in the
T1098 Account Manipulation
environment.
Business Impact
• Lateral movement may indicate that an adversary has established a foothold in the
environment and is progressing towards their objective, increasing the risk of material
impact.
Steps to Verify
• Investigate the account context that performed the action for other signs of malicious
activity.
• Validate that any modifications are authorized, given the purpose and policies governing this
resource.
• If review indicates possible malicious actions or high-risk configuration, revert configuration
and disable credentials associated with this alert then perform a comprehensive
investigation.
100
50
!
0
AWS
80 70
Threat Certainty
Triggers
• A credential was observed enabling external access to AWS resources through an IAM role.
T1078 Valid Accounts
Business Impact
• Once an adversary achieves persistent access, they’ve established the opportunity to stage
subsequent phases of an attack.
Steps to Verify
• Validate that the access is authorized, given the purpose and policies governing these
resources.
• If review indicates possible malicious actions or high-risk configuration, delete the created
IAM role and disable credentials associated with this alert then perform a comprehensive
investigation.
100
50 !
0
AWS EBS
60 40
Threat Certainty
Triggers
• A credential was observed performing a set of AWS control plane API actions related to
T1213 Data from Information-
Repositories exfiltration EC2 snapshots.
Steps to Verify
• Investigate the account context that performed this action for other signs of malicious
activity.
• Investigate for data loss.
• If review indicates possible malicious actions or high-risk configuration, revert applicable
configurations and disable credentials associated with this alert then perform a
comprehensive investigation.
100
50 !
70 60 AWS EC2
Threat Certainty
Triggers
• After enumerating the existing security group policies, the ingress policy for an EC2 instance
T1213 Data from Information-
Repositories is modified.
Steps to Verify
• Validate that any modifications are authorized, given the purpose and policies governing this
resource.
• If review indicates possible malicious actions or high-risk configuration, revert configuration
and disable credentials associated with this alert then perform a comprehensive
investigation.
100
50 !
0
AWS S3
70 60
Threat Certainty
Triggers
• A credential was observed suspiciously invoking a set of S3 APIs that permits public access
T1213 Data from Information-
Repositories to a given bucket.
Business Impact
• Malicious or unintentional weakening of security posture controls around S3 buckets are
commonly associated with data loss.
Steps to Verify
• Investigate the account context that made the change for other signs of malicious activity.
• Investigate for data loss.
• Verify if the S3 bucket in question is authorized for public access.
• If review indicates possible malicious actions or high-risk configuration, revert configuration
and disable credentials associated with this alert then perform a comprehensive
investigation.
100
50 !
0
AWS EC2
70 60
Threat Certainty
Triggers
• Using a compromised EC2 instance token, multiple high-powered EC2 instances are
T1496 Resource Hijacking
started.
Business Impact
• High powered EC2 instances utilized for cryptomining result in significant costs billed to the
organization that owns the AWS account.
Steps to Verify
• Investigate the source of the EC2 instances being started to determine if this resource
should be creating new, high-powered, EC2 instances.
• Investigate the newly created EC2 instances to determine their purpose and ensure they are
not malicious.
• If review indicates possible malicious actions, perform a comprehensive investigation
to determine initial source of EC2 compromise, remove EC2 access and remediate
compromised resources and accounts.