You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
| Title | Description| Severity | Category | MITRE ATT&CK <br> tactics and techniques |
247
247
|--|--|--|--|--|
248
-
|**Connection Attempt to Known Malicious IP**| Suspicious network activity was detected. This activity may be associated with an attack exploiting a method used by known malware. <br><br>Triggered by both OT and Enterprise IoT network sensors. |Major| Suspicion of Malicious Activity |**Tactics:** <br> - Initial Access <br> - Command And Control <br><br> **Techniques:** <br> - T0883: Internet Accessible Device <br> - T0884: Connection Proxy |
248
+
|**Connection Attempt to Known Malicious IP**| Suspicious network activity was detected. This activity may be associated with an attack exploiting a method used by known malware. <br><br>Triggered by both OT and Enterprise IoT network sensors. |Critical| Suspicion of Malicious Activity |**Tactics:** <br> - Initial Access <br> - Command And Control <br><br> **Techniques:** <br> - T0883: Internet Accessible Device <br> - T0884: Connection Proxy |
249
249
|**Invalid SMB Message (DoublePulsar Backdoor Implant)**| Suspicious network activity was detected. This activity may be associated with an attack exploiting a method used by known malware. | Critical | Suspicion of Malware |**Tactics:** <br> - Initial Access <br> - LateralMovement <br><br> **Techniques:** <br> - T0866: Exploitation of Remote Services |
250
-
|**Malicious Domain Name Request**| Suspicious network activity was detected. This activity may be associated with an attack exploiting a method used by known malware. <br><br>Triggered by both OT and Enterprise IoT network sensors. |Major| Suspicion of Malicious Activity |**Tactics:** <br> - Initial Access <br> - Command And Control <br><br> **Techniques:** <br> - T0883: Internet Accessible Device <br> - T0884: Connection Proxy |
251
-
|**Malware Test File Detected - EICAR AV Success**| An EICAR AV test file was detected in traffic between two devices (over any transport - TCP or UDP). The file isn't malware. It's used to confirm that the antivirus software is installed correctly. Demonstrate what happens when a virus is found, and check internal procedures and reactions when a virus is found. Antivirus software should detect EICAR as if it were a real virus. |Major| Suspicion of Malicious Activity |**Tactics:** <br> - Discovery <br><br> **Techniques:** <br> - T0842: Network Sniffing |
250
+
|**Malicious Domain Name Request**| Suspicious network activity was detected. This activity may be associated with an attack exploiting a method used by known malware. <br><br>Triggered by both OT and Enterprise IoT network sensors. |Critical| Suspicion of Malicious Activity |**Tactics:** <br> - Initial Access <br> - Command And Control <br><br> **Techniques:** <br> - T0883: Internet Accessible Device <br> - T0884: Connection Proxy |
251
+
|**Malware Test File Detected - EICAR AV Success**| An EICAR AV test file was detected in traffic between two devices (over any transport - TCP or UDP). The file isn't malware. It's used to confirm that the antivirus software is installed correctly. Demonstrate what happens when a virus is found, and check internal procedures and reactions when a virus is found. Antivirus software should detect EICAR as if it were a real virus. |Critical| Suspicion of Malicious Activity |**Tactics:** <br> - Discovery <br><br> **Techniques:** <br> - T0842: Network Sniffing |
252
252
|**Suspicion of Conficker Malware**| Suspicious network activity was detected. This activity may be associated with an attack exploiting a method used by known malware. | Major | Suspicion of Malware |**Tactics:** <br> - Initial Access <br> - Impact <br><br> **Techniques:** <br> - T0826: Loss of Availability <br> - T0828: Loss of Productivity and Revenue <br> - T0847: Replication Through Removable Media |
253
253
|**Suspicion of Denial Of Service Attack**| A source device attempted to initiate an excessive number of new connections to a destination device. This may indicate a Denial Of Service (DOS) attack against the destination device, and might interrupt device functionality, affect performance and service availability, or cause unrecoverable errors. <br><br> Threshold: 3000 attempts in 1 minute | Critical | Suspicion of Malicious Activity |**Tactics:** <br> - Inhibit Response Function <br><br> **Techniques:** <br> - T0814: Denial of Service |
254
-
|**Suspicion of Malicious Activity**| Suspicious network activity was detected. This activity may be associated with an attack that triggered known 'Indicators of Compromise' (IOCs). Alert metadata should be reviewed by the security team. |Major| Suspicion of Malicious Activity |**Tactics:** <br> - Lateral Movement <br><br> **Techniques:** <br> - T0867: Lateral Tool Transfer |
254
+
|**Suspicion of Malicious Activity**| Suspicious network activity was detected. This activity may be associated with an attack that triggered known 'Indicators of Compromise' (IOCs). Alert metadata should be reviewed by the security team. |Critical| Suspicion of Malicious Activity |**Tactics:** <br> - Lateral Movement <br><br> **Techniques:** <br> - T0867: Lateral Tool Transfer |
255
255
|**Suspicion of Malicious Activity (BlackEnergy)**| Suspicious network activity was detected. This activity may be associated with an attack exploiting a method used by known malware. | Critical | Suspicion of Malware |**Tactics:** <br> - Command And Control <br><br> **Techniques:** <br> - T0869: Standard Application Layer Protocol |
256
256
|**Suspicion of Malicious Activity (DarkComet)**| Suspicious network activity was detected. This activity may be associated with an attack exploiting a method used by known malware. | Critical | Suspicion of Malware |**Tactics:** <br> - Impact <br><br> **Techniques:** <br> - T0882: Theft of Operational Information |
257
257
|**Suspicion of Malicious Activity (Duqu)**| Suspicious network activity was detected. This activity may be associated with an attack exploiting a method used by known malware. | Critical | Suspicion of Malware |**Tactics:** <br> - Impact <br><br> **Techniques:** <br> - T0882: Theft of Operational Information |
258
258
|**Suspicion of Malicious Activity (Flame)**| Suspicious network activity was detected. This activity may be associated with an attack exploiting a method used by known malware. | Critical | Suspicion of Malware |**Tactics:** <br> - Collection <br> - Impact <br><br> **Techniques:** <br> - T0882: Theft of Operational Information <br> - T0811: Data from Information Repositories |
259
259
|**Suspicion of Malicious Activity (Havex)**| Suspicious network activity was detected. This activity may be associated with an attack exploiting a method used by known malware. | Critical | Suspicion of Malware |**Tactics:** <br> - Collection <br> - Discovery <br> - Inhibit Response Function <br><br> **Techniques:** <br> - T0861: Point & Tag Identification <br> - T0846: Remote System Discovery <br> - T0814: Denial of Service |
260
260
|**Suspicion of Malicious Activity (Karagany)**| Suspicious network activity was detected. This activity may be associated with an attack exploiting a method used by known malware. | Critical | Suspicion of Malware |**Tactics:** <br> - Impact <br><br> **Techniques:** <br> - T0882: Theft of Operational Information |
261
261
|**Suspicion of Malicious Activity (LightsOut)**| Suspicious network activity was detected. This activity may be associated with an attack exploiting a method used by known malware. | Critical | Suspicion of Malware |**Tactics:** <br> - Evasion <br><br> **Techniques:** <br> - T0849: Masquerading |
262
-
|**Suspicion of Malicious Activity (Name Queries)**| Suspicious network activity was detected. This activity may be associated with an attack exploiting a method used by known malware. <br><br> Threshold: 25 name queries in 1 minute |Major| Suspicion of Malicious Activity |**Tactics:** <br> - Command And Control <br><br> **Techniques:** <br> - T0884: Connection Proxy |
262
+
|**Suspicion of Malicious Activity (Name Queries)**| Suspicious network activity was detected. This activity may be associated with an attack exploiting a method used by known malware. <br><br> Threshold: 25 name queries in 1 minute |Critical| Suspicion of Malicious Activity |**Tactics:** <br> - Command And Control <br><br> **Techniques:** <br> - T0884: Connection Proxy |
263
263
|**Suspicion of Malicious Activity (Poison Ivy)**| Suspicious network activity was detected. This activity may be associated with an attack exploiting a method used by known malware. | Critical | Suspicion of Malware |**Tactics:** <br> - Initial Access <br> - Lateral Movement <br><br> **Techniques:** <br> - T0866: Exploitation of Remote Services |
264
264
|**Suspicion of Malicious Activity (Regin)**| Suspicious network activity was detected. This activity may be associated with an attack exploiting a method used by known malware. | Critical | Suspicion of Malware |**Tactics:** <br> - Initial Access <br> - Lateral Movement <br> - Impact <br><br> **Techniques:** <br> - T0866: Exploitation of Remote Services <br> - T0882: Theft of Operational Information |
265
265
|**Suspicion of Malicious Activity (Stuxnet)**| Suspicious network activity was detected. This activity may be associated with an attack exploiting a method used by known malware. | Critical | Suspicion of Malware |**Tactics:** <br> - Initial Access <br> - Lateral Movement <br> - Impact <br><br> **Techniques:** <br> - T0818: Engineering Workstation Compromise <br> - T0866: Exploitation of Remote Services <br> - T0831: Manipulation of Control |
266
266
|**Suspicion of Malicious Activity (WannaCry) [*](#ot-alerts-turned-off-by-default)**| Suspicious network activity was detected. This activity may be associated with an attack exploiting a method used by known malware. | Major | Suspicion of Malware |**Tactics:** <br> - Initial Access <br> - Lateral Movement <br><br> **Techniques:** <br> - T0866: Exploitation of Remote Services <br> - T0867: Lateral Tool Transfer |
267
267
|**Suspicion of NotPetya Malware - Illegal SMB Parameters Detected**| Suspicious network activity was detected. This activity may be associated with an attack exploiting a method used by known malware. | Critical | Suspicion of Malware |**Tactics:** <br> - Initial Access <br> - Lateral Movement <br><br> **Techniques:** <br> - T0866: Exploitation of Remote Services |
268
268
|**Suspicion of NotPetya Malware - Illegal SMB Transaction Detected**| Suspicious network activity was detected. This activity may be associated with an attack exploiting a method used by known malware. | Critical | Suspicion of Malware |**Tactics:** <br> - Lateral Movement <br><br> **Techniques:** <br> - T0867: Lateral Tool Transfer |
269
-
|**Suspicion of Remote Code Execution with PsExec**| Suspicious network activity was detected. This activity may be associated with an attack exploiting a method used by known malware. |Major| Suspicion of Malicious Activity |**Tactics:** <br> - Lateral Movement <br> - Initial Access <br><br> **Techniques:** <br> - T0866: Exploitation of Remote Services |
270
-
|**Suspicion of Remote Windows Service Management [*](#ot-alerts-turned-off-by-default)**| Suspicious network activity was detected. This activity may be associated with an attack exploiting a method used by known malware. |Major| Suspicion of Malicious Activity |**Tactics:** <br> - Initial Access <br><br> **Techniques:** <br> - T0822: NetworkExternal Remote Services |
271
-
|**Suspicious Executable File Detected on Endpoint**| Suspicious network activity was detected. This activity may be associated with an attack exploiting a method used by known malware. |Major| Suspicion of Malicious Activity |**Tactics:** <br> - Evasion <br> - Inhibit Response Function <br><br> **Techniques:** <br> - T0851: Rootkit |
269
+
|**Suspicion of Remote Code Execution with PsExec**| Suspicious network activity was detected. This activity may be associated with an attack exploiting a method used by known malware. |Critical| Suspicion of Malicious Activity |**Tactics:** <br> - Lateral Movement <br> - Initial Access <br><br> **Techniques:** <br> - T0866: Exploitation of Remote Services |
270
+
|**Suspicion of Remote Windows Service Management [*](#ot-alerts-turned-off-by-default)**| Suspicious network activity was detected. This activity may be associated with an attack exploiting a method used by known malware. |Critical| Suspicion of Malicious Activity |**Tactics:** <br> - Initial Access <br><br> **Techniques:** <br> - T0822: NetworkExternal Remote Services |
271
+
|**Suspicious Executable File Detected on Endpoint**| Suspicious network activity was detected. This activity may be associated with an attack exploiting a method used by known malware. |Critical| Suspicion of Malicious Activity |**Tactics:** <br> - Evasion <br> - Inhibit Response Function <br><br> **Techniques:** <br> - T0851: Rootkit |
272
272
|**Suspicious Traffic Detected [*](#ot-alerts-turned-off-by-default)**| Suspicious network activity was detected. This activity may be associated with an attack that triggered known 'Indicators of Compromise' (IOCs). Alert metadata should be reviewed by the security team | Critical | Suspicion of Malicious Activity |**Tactics:** <br> - Discovery <br><br> **Techniques:** <br> - T0842: Network Sniffing |
273
273
|**Backup Activity with Antivirus Signatures**| Traffic detected between the source device and the destination backup server triggered this alert. The traffic includes backup of antivirus software that might contain malware signatures. This is most likely legitimate backup activity. | Warning | Backup |**Tactics:** <br> - Impact <br><br> **Techniques:** <br> - T0882: Theft of Operational Information |
0 commit comments