Indicators of Compromise Flashcards
(40 cards)
Indicators or signs that unauthorized activity has compromised an information system
Indicators of Compromise
IOCs act as breadcrumbs for
incident response investigators
IOCs symptoms can sometimes be exhibited due to
technical issues
Unusual outbound
network traffic
Anomalies in
privileged user account activity
Geographical irregularities in
network traffic
account login
Red flags
Database read volume
Increas
Large number of requests
for same files
Mismatched port-application traffic
encrypted traffic over plain ports
Suspicious registry or
system file changes
Unusual DNS
Requests
Unexpected system
patching
Mobile device
profile changes
Bundles of data in
wrong places
Web traffic with non-human
behavior
Signs of DDoS attempts
even if temporary
Framework created by Mandiant and is opensource
OpenIOC
Structured Threat Information Expression
STIX
Trusted Automated Exchange of Indicatior Information
TAXII
Cyber Observable Expression
CybOX
Designed by MITRE specifically to facilitate automated information sharing between organizations
STIX/TAXII/CybOx
Piece of software designed to do something nefarious
Malware
Malware that changes its code after each use, making each replication different for detection purposes.
Polymorphic Malware