Blog

該当する項目はありません。

Eメールセキュリティの統合により、各サイロの総和を超える体制を構築

Default blog imageDefault blog imageDefault blog imageDefault blog imageDefault blog imageDefault blog image
17
Apr 2023
17
Apr 2023
サイバー攻撃の94%は受信トレイから侵入してきますが、その行き先はほとんどEメールではありません。攻撃の行き先は、クラウドアプリやインフラ、エンドポイント、ネットワークなど、他の領域に及ぶことが多いのです。そのため、セキュリティチームは、Eメールセキュリティの強固な基盤を確立する必要がありますが、それらのソリューションがより広範なセキュリティ体制にどのように適合するかも考慮する必要があります。

Darktrace/Email™は、それ自体で、攻撃が従業員の受信トレイに到達する前に阻止し、セキュリティチームと従業員自身の双方を考慮します。しかし、その価値はメールセキュリティにとどまらず、Darktrace 製品や外部ツールなど、より広範なセキュリティエコシステムと統合する能力によって向上しています。 

Darktraceは、御社と御社の組織全体に対する理解を、御社がデータを持っている領域であればどこでも適用することができます。サイバーセキュリティに対するこの統一的なアプローチは、Cyber AI Loop™の基礎を築くもので、Darktrace の全製品がAI出力を相互にフィードし、自律的かつ継続的にセキュリティ体制全体を強化します。また、AIはデータを取り込み、共有することで、組織が導入している他のセキュリティソリューションも充実させます。このような統合の度合いにより、セキュリティスタックは、その部分の総和を超えるものになるのです。 

Darktrace Cyber AI Loop graphic
図1:Darktrace のすべての製品とカバーエリアが互いにフィードバックするCyber AI Loop

Eメールの枠を超えた統合で検知・対処能力を強化する 

Eメールのセキュリティをデジタル資産の他の領域と統合することで、必要なリソースを削減しながら、防御を強化することができます。より多くのデータにより、セキュリティチームはセキュリティスタックと攻撃がどのようにシステムを通過していくかをより深く理解することができます。

従来のセキュリティソリューションでは、さまざまなツールからの入力を手動で集約するか、ネイティブな統合機能を持たないSIEMを使用してデータを照合することでこれを実現していました。これに対し、Darktrace'の統合は、製品間でリアルタイムにインテリジェントな通信を行い、セキュリティチームに情報を提供します。 

例えば、ネットワークアクティビティのコンテキストは、より全体的なEメールセキュリティを提供することができます。ユーザーが訪問するウェブサイトとEメールを送る相手には強い相関関係があります。つまり、ウェブトラフィックのような情報はEメールの脅威に関する洞察を提供し、その逆もまた然りです。 

ある組織が、見知らぬ新しい送信者からEメールを受け取り、それが偶然にも誰も訪れたことのないドメインから送信されていた場合、その追加されたコンテキストは、実行するアクションの攻撃レベルに影響を与える可能性があります。エンドポイントセキュリティとの統合により、このような情報に基づく意思決定がリモート環境でも可能になります。これらの例は、Darktrace/Network™とDarktrace/Endpoint™をEメールカバレッジと組み合わせることで、特許も取得済みの独自の能力を発揮します。 

Diagram depicting the flow of email activity generated by Darktrace Email Security tool.
図2: Darktrace/Emailは、Darktrace/NetworkおよびDarktrace/Endpointと連携して、WebトラフィックからEメールのインサイトを生成し、その逆も可能 

Eメールのアクティビティは、さらに直接的な方法でクラウド/SaaSアプリケーションのアカウントアクティビティと結びついています。アカウント乗っ取りの場合、Microsoft 365への不審なログインに続いて、新しい受信トレイのルールが作成されるなど、非常に珍しいEメールアクティビティが発生すると、さらに不審に思われます。多くのEメールセキュリティソリューションは受信トレイだけに焦点を当てていますが、これらの領域を単一のスコープで見ることは、インシデントの完全なタイムラインを理解したいセキュリティチームにとって重要です。 

このため、Darktrace は、各ユーザーとその行動に関する 360 度のビューを作成します。この包括的なビューは、ネイティブのセキュリティ監視ツールを超えるもので、セキュリティチームは、データ流出、人的ミス、Eメールの誤送信、不適切なリンク共有、異常なログ活動などの事例を即座に特定することができます。 

ある実例では、Darktrace/EmailとDarktrace/Apps™のおかげで、セキュリティチームはEメールとSaaSの両方の視点から攻撃を見て、全体像を素早く理解することができました。 

Darktrace は、この統合されたセキュリティスタックから大きな価値を得ています。「この製品群のおかげで、エコシステム全体を100%可視化できるようになり、素晴らしいことです。そのためには、多くの製品を使用する必要がありますが、Darktrace の製品では、そのすべてが1つにまとまっています」と、ある大手信用組合の企業セキュリティおよび不正管理担当バイスプレジデントはコメントしています。 

サイバー業界では、サイロ化したソリューションが大きな痛手となっています。ほとんどの企業では、セキュリティスタックに複数のツールを多重的に導入しています。これらのツール間のコミュニケーションがほとんどない場合、セキュリティチームは増大する作業負荷に対処しなければならず、価値を見失うことになります。毎日すべてのソリューションを監視するだけでなく、複数の異なるダッシュボードを操作し、言語や用語を翻訳し、データを手動で相関させる方法を学ばなければなりません。このようなプロセスは、特に複雑化し、攻撃のペースが速くなる脅威ランドスケープにおいて、チームにとってセキュリティの維持をより困難なものにしています。 

Darktrace/Email は、セキュリティチームが既に使用している他のツールとの間で情報を送受信することで、それらがDarktraceの製品スタックの一部であるかどうかにかかわらず、ワークフローを最適化し、セキュリティチームがより大規模で戦略的なプロジェクトにリソースを再配分できるようにします。  

Eメールセキュリティとサイバーリスクマネジメントツールを横断するコラボレーション

Eメール保護とサイバーリスクマネジメントツールを同期させることで、さらにリスクを低減し、セキュリティを強固にすることができます。

クライアントのブランドに関連するドメイン名からEメールを受信した場合、攻撃対象範囲に含めるべきか、悪意のあるドメインの応答をトリガーすべきか、アタックサーフェス管理ツールが自動的に分析することができます。 

一方、アタックサーフェス管理ツールが、疑わしいドメイン、なりすましサイト、タイポスクワッターなどの悪意のある資産を特定した場合、Eメールセキュリティの意思決定に役立てることができます。ツール間の統合により、これらの悪意のある資産は自動的にインバウンドメールの感度を高めた監視ドメインとなります。 

このような統合的なリスク低減は、社内でも起こり得ます。セキュリティチームが社内の視点からサイバーリスクを見ると、社内のデジタル資産の中から攻撃経路や価値の高い標的を特定することができます。この理解を活用することで、Darktrace はどの従業員が潜在的な攻撃経路の重要な構成要素であるかを判断することができます。そして、実際のコミュニケーションパターンやカレンダーのデータなどを使ってフィッシングシミュレーションを行い、その結果をAIが検証することができます。これらのテストによって得られた知見は、Darktrace/Emailにフィードバックされ、感度を高めるなどして環境を強化することができます。 

これは、Darktrace/EmailDarktrace PREVENT™ を組み合わせることの利点を示しています。 Cyber AI Loopの一部として、Eメールセキュリティとサイバーリスクマネジメントの間のこれらの接続は、セキュリティチームが理解し、行動することが容易になっています。あるお客様は、この統合によってセキュリティチームのワークフローが改善されたと述べています。  

ある建設会社の最高情報責任者(CIO)は、「Darktrace を使えば使うほど、より良い相関関係を構築することができます。だからこそ、私たちは現在Darktrace を使っているのです。私たちはDarktrace の全体的なフットプリントを持ち、より多くのモジュールが私たちのために稼働し、別々に、あるいは孤立して相関を行う必要がないため、私たちに大きな利益をもたらしています」と述べています。 

外部セキュリティソリューションとの親和性をサポート

Darktrace/Emailはまた外部ツールとも連携しています。Microsoft 365やGoogle WorkspaceなどのEメールプロバイダとの成熟した統合に加え、Darktrace/Emailはオープンアーキテクチャを採用しているため、非常に柔軟性があります。API駆動でsyslogとの互換性があるため、あらゆるセキュリティツールと統合し、SIEMやSOARにフィードすることが可能です。 

この無限の統合能力により、Darktrace はより多くのデータにアクセスすることで、より正確に脅威を検知対処することができます。また、すべての関連情報を1枚の画面に収めることで、セキュリティチームの意味付けまでの時間を短縮することができます。 

Darktrace/Emailは、Darktrace モバイルアプリの一部でもあり、セキュリティチームは、外出先でもいつでも通知、レポート、改善アクションを確認することができます。このようにDarktrace は、より大きなセキュリティ態勢に適合するだけでなく、従業員の日々のワークフローにも適合しています。 

最後に、Darktrace/Emailは、データエクスポートをサポートしています。これにより、Eメール環境内で収集したデータを翻訳して共有することができ、セキュリティチームは、Darktrace/Emailで生成された重要な手掛かりを組織内の誰にでも伝えることができるようになります。Microsoft Excelやその他のデータ分析ツールに直接エクスポートすることができます。これは、IT、コンプライアンス、財務などの他部門と連携するセキュリティチームにとって、特に有用です。 

統合はDarktrace パートナーシップの価値を高める

Darktrace/Emailはそれ自体で強力なツールですが、その価値の大きな源泉は、Darktrace の他のツール、人、およびプロセスとの互換性にあります。 

複数のDarktrace 製品を導入することで、強固なセキュリティエコシステムが構築され、サイロを破壊してワークフローを改善しながら検知を強化するため、セキュリティチームはより高度で戦略的な業務に取り組むことができるようになります。外部ツールとの統合により、Darktrace は自身の価値を高めるだけでなく、チームがすでに持っている他のセキュリティソリューションの投資対効果を最大化することができます。  

INSIDE THE SOC
Darktrace cyber analysts are world-class experts in threat intelligence, threat hunting and incident response, and provide 24/7 SOC support to thousands of Darktrace customers around the globe. Inside the SOC is exclusively authored by these experts, providing analysis of cyber incidents and threat trends, based on real-world experience in the field.
AUTHOR
ABOUT ThE AUTHOR
Dan Fein
VP, Product

Based in New York, Dan joined Darktrace’s technical team in 2015, helping customers quickly achieve a complete and granular understanding of Darktrace’s product suite. Dan has a particular focus on Darktrace/Email, ensuring that it is effectively deployed in complex digital environments, and works closely with the development, marketing, sales, and technical teams. Dan holds a Bachelor’s degree in Computer Science from New York University.

Carlos Gray
Product Manager

Carlos Gonzalez Gray is a Product Marketing Manager at Darktrace. Based in the Madrid Office, Carlos engages with the global product team to ensure each product supports the company’s overall strategy and goals throughout their entire lifecycle. Previous to his position in the product team, Carlos worked as a Cyber Technology Specialist where he specialized in the OT sector protecting critical infrastructure.  His background as a consultant in Spain to IBEX 35 companies led him to become well versed in matters of compliance, auditing and data privacy as well. Carlos holds an Honors BA in Political Science and a Masters in Cybersecurity from IE University.

Book a 1-1 meeting with one of our experts
この記事を共有
USE CASES
該当する項目はありません。
COre coverage

Blog

Eメール

How Empowering End Users can Improve Your Email Security and Decrease the Burden on the SOC

Default blog imageDefault blog image
08
May 2024

Why do we pay attention to the end user?

Every email security solution filters inbound mail, then typically hands over false positives and false negatives to the security team for manual triage. A crucial problem with this lifecycle is that it ignores the inevitability of end users being at the front line of any organization. Employees may receive point in time security awareness training, but it is rarely engaging or contextualized to their reality. While an employee may report a suspicious-looking email to the security team, they will rarely get to understand the outcome or impact of that decision. This means that the quality of reporting never improves, so the burden on the security team of triaging these emails – of which 90% are falsely reported – persists and grows with the business over time.

At Darktrace, we recognize that employees will always be on the front line of email security. That’s why we aim to improve end-user reporting from the ground up, reducing the overall number of emails needing triage and saving security team resource.

How does Darktrace improve the quality of end-user reporting?

Darktrace prioritizes improving users’ security awareness to increase the quality of end-user reporting from day one. We train users and optimize their experience, which in turn provides better detection. 

That starts with training and security awareness. Traditionally, organizations oblige employees to attend point-in-time training sessions which interrupt their daily work schedules. With Darktrace/Email, if a message contains some potentially suspicious markers but is most likely safe, Darktrace takes a specific action to neutralize the risky components and presents it to the user with a simple narrative explaining why certain elements have been held back. The user can then decide whether to report this email to the security team. 

AI shares its analysis in context and in real time at the moment a user is questioning an email
Figure 1: AI shares its analysis in context and in real time at the moment a user is questioning an email

The AI narrative gives the user context for why their specific email may carry risk, putting their security awareness training into practice. This creates an element of trust with the security solution, rather than viewing it as outside of daily workflows. Users may also receive a daily or weekly digest of their held emails and make a decision on whether to release or report them.  

Whatever the user’s existing workflow is for reporting emails, Darktrace/Email can integrate with it and improve its quality. Our add-in for Outlook gives users a fully optimized experience, allowing them to engage with the narratives for each email, as well as non-productive mail management. However, if teams want to integrate Darktrace into an existing workflow, it can analyze emails reported to an internal SOC mailbox, the native email provider’s 'Report Phish’ button, or the ‘Knowbe4’ button.

By empowering the user with contextual feedback on each unique email, we foster employee engagement and elevate both reporting quality and security awareness. In fact, 60% fewer benign emails are reported because of the extra context supplied by Darktrace to end users. The eventual report is then fed back to the detection algorithm, improving future decision-making.  

Reducing the amount of emails that reach the SOC

Out of the higher-quality emails that do end up being reported by users, the next step is to reduce the amount of emails that reach the SOC.   

Once a user reports an email, Darktrace will independently determine if the mail should be automatically remediated based on second level triage. Darktrace/Email’s Mailbox Security Assistant automates secondary triage by combining additional behavioral signals and the most advanced link analysis engine we have ever built. It detects 70% more sophisticated malicious phishing links by looking at an additional twenty times more context than at the primary analysis stage, revealing the hidden intent within interactive and dynamic webpages. This directly alleviates the burden of manual triage for security analysts.

Following this secondary triage the emails that are deemed worthy of security team attention are then passed over, resulting in a lower quantity and higher quality of emails for SOC manual triage.

Centralizing and speeding analysis for investigations

For those emails that are received by the SOC, Darktrace also helps to improve triage time for manual remediation.  

AI-generated narratives and automated remediation actions empower teams to fast-track manual triage and remediation, while still providing security analysts with the necessary depth. With live inbox view, security teams gain access to a centralized platform that combines intuitive search capabilities, Cyber AI Analyst reports, and mobile application access. With all security workflows consolidated within a unified interface, users can analyze and take remediation actions without the need to navigate multiple tools, such as e-discovery platforms – eliminating console hopping and accelerating incident response.

Our customers tell us that our AI allows them to go in-depth quickly for investigations, versus other solutions that only provide a high-level view.

Cyber AI Analyst provides a simple language narrative for each reported email, allowing teams to quickly understand why it may be suspicious
Figure 2: Cyber AI Analyst provides a simple language narrative for each reported email, allowing teams to quickly understand why it may be suspicious

結論

Unlike our competitors, we believe that improving the quality of users’ experience is not only a nice-to-have, but a fundamental means for improving security. Any modern solution should consider end users as a key source of information as well as an opportunity for defense. Darktrace does both – optimizing the user experience as well as our AI learning from the user to augment detection.  

The benefits of empowering users are ultimately felt by the security team, who benefit from improved detection, a reduction in manual triage of benign emails, and faster investigation workflows.

Augmented end user reporting is just one of a range of features new to Darktrace/Email. Check out the latest Innovations to Darktrace/Email in our recent blog.

続きを読む
著者について
Carlos Gray
Product Manager

Blog

Inside the SOC

Detecting Attacks Across Email, SaaS, and Network Environments with Darktrace’s AI Platform Approach

Default blog imageDefault blog image
30
Apr 2024

The State of AI in Cybersecurity

In a recent survey outlined in Darktrace’s State of AI Cyber Security whitepaper, 95% of cyber security professionals agree that AI-powered security solutions will improve their organization’s detection of cyber-threats [1]. Crucially, a combination of multiple AI methods is the most effective to improve cybersecurity; improving threat detection, accelerating threat investigation and response, and providing visibility across an organization’s digital environment.

In March 2024, Darktrace’s AI-led security platform was able to detect suspicious activity affecting a customer’s email, Software-as-a-Service (SaaS), and network environments, whilst its applied supervised learning capability, Cyber AI Analyst, autonomously correlated and connected all of these events together in one single incident, explained concisely using natural language processing.

攻撃の概要

Following an initial email attack vector, an attacker logged into a compromised SaaS user account from the Netherlands, changed inbox rules, and leveraged the account to send thousands of phishing emails to internal and external users. Internal users fell victim to the emails by clicking on contained suspicious links that redirected them to newly registered suspicious domains hosted on same IP address as the hijacked SaaS account login. This activity triggered multiple alerts in Darktrace DETECT™ on both the network and SaaS side, all of which were correlated into one Cyber AI Analyst incident.

In this instance, Darktrace RESPOND™ was not active on any of the customer’s environments, meaning the compromise was able to escalate until their security team acted on the alerts raised by DETECT. Had RESPOND been enabled at the time of the attack, it would have been able to apply swift actions to contain the attack by blocking connections to suspicious endpoints on the network side and disabling users deviating from their normal behavior on the customer’s SaaS environment.

Nevertheless, thanks to DETECT and Cyber AI Analyst, Darktrace was able to provide comprehensive visibility across the customer’s three digital estate environments, decreasing both investigation and response time which enabled them to quickly enact remediation during the attack. This highlights the crucial role that Darktrace’s combined AI approach can play in anomaly detection cyber defense

Attack Details & Darktrace Coverage

攻撃のタイムライン

1. Email: the initial attack vector  

The initial attack vector was likely email, as on March 18, 2024, Darktrace observed a user device making several connections to the email provider “zixmail[.]net”, shortly before it connected to the first suspicious domain. Darktrace/Email identified multiple unusual inbound emails from an unknown sender that contained a suspicious link. Darktrace recognized these emails as potentially malicious and locked the link, ensuring that recipients could not directly click it.

Suspected initial compromise email from an unknown sender, containing a suspicious link, which was locked by Darktrace/Email.
Figure 1: Suspected initial compromise email from an unknown sender, containing a suspicious link, which was locked by Darktrace/Email.

2. Escalation to Network

Later that day, despite Darktrace/Email having locked the link in the suspicious email, the user proceeded to click on it and was directed to a suspicious external location, namely “rz8js7sjbef[.]latovafineart[.]life”, which triggered the Darktrace/Network DETECT model “Suspicious Domain”. Darktrace/Email was able to identify that this domain had only been registered 4 days before this activity and was hosted on an IP address based in the Netherlands, 193.222.96[.]9.

3. SaaS Account Hijack

Just one minute later, Darktrace/Apps observed the user’s Microsoft 365 account logging into the network from the same IP address. Darktrace understood that this represented unusual SaaS activity for this user, who had only previously logged into the customer’s SaaS environment from the US, triggering the “Unusual External Source for SaaS Credential Use” model.

4. SaaS Account Updates

A day later, Darktrace identified an unusual administrative change on the user’s Microsoft 365 account. After logging into the account, the threat actor was observed setting up a new multi-factor authentication (MFA) method on Microsoft Authenticator, namely requiring a 6-digit code to authenticate. Darktrace understood that this authentication method was different to the methods previously used on this account; this, coupled with the unusual login location, triggered the “Unusual Login and Account Update” DETECT model.

5. Obfuscation Email Rule

On March 20, Darktrace detected the threat actor creating a new email rule, named “…”, on the affected account. Attackers are typically known to use ambiguous or obscure names when creating new email rules in order to evade the detection of security teams and endpoints users.

The parameters for the email rule were:

“AlwaysDeleteOutlookRulesBlob: False, Force: False, MoveToFolder: RSS Feeds, Name: ..., MarkAsRead: True, StopProcessingRules: True.”

This rule was seemingly created with the intention of obfuscating the sending of malicious emails, as the rule would move sent emails to the "RSS Feeds” folder, a commonly used tactic by attackers as the folder is often left unchecked by endpoint users. Interestingly, Darktrace identified that, despite the initial unusual login coming from the Netherlands, the email rule was created from a different destination IP, indicating that the attacker was using a Virtual Private Network (VPN) after gaining a foothold in the network.

Hijacked SaaS account making an anomalous login from the unusual Netherlands-based IP, before creating a new email rule.
Figure 2: Hijacked SaaS account making an anomalous login from the unusual Netherlands-based IP, before creating a new email rule.

6. Outbound Phishing Emails Sent

Later that day, the attacker was observed using the compromised customer account to send out numerous phishing emails to both internal and external recipients. Darktrace/Email detected a significant spike in inbound emails on the compromised account, with the account receiving bounce back emails or replies in response to the phishing emails. Darktrace further identified that the phishing emails contained a malicious DocSend link hidden behind the text “Click Here”, falsely claiming to be a link to the presentation platform Prezi.

Figure 3: Darktrace/Email detected that the DocSend link displayed via text “Click Here”, was embedded in a Prezi link.
Figure 3: Darktrace/Email detected that the DocSend link displayed via text “Click Here”, was embedded in a Prezi link.

7. Suspicious Domains and Redirects

After the phishing emails were sent, multiple other internal users accessed the DocSend link, which directed them to another suspicious domain, “thecalebgroup[.]top”, which had been registered on the same day and was hosted on the aforementioned Netherlands-based IP, 193.222.96[.]91. At the time of the attack, this domain had not been reported by any open-source intelligence (OSINT), but it has since been flagged as malicious by multiple vendors [2].

External Sites Summary showing the suspicious domain that had never previously been seen on the network. A total of 11 “Suspicious Domain” models were triggered in response to this activity.
Figure 4: External Sites Summary showing the suspicious domain that had never previously been seen on the network. A total of 11 “Suspicious Domain” models were triggered in response to this activity.  

8. Cyber AI Analyst’s Investigation

As this attack was unfolding, Darktrace’s Cyber AI Analyst was able to autonomously investigate the events, correlating them into one wider incident and continually adding a total of 14 new events to the incident as more users fell victim to the phishing links.

Cyber AI Analyst successfully weaved together the initial suspicious domain accessed in the initial email attack vector (Figure 5), the hijack of the SaaS account from the Netherlands IP (Figure 6), and the connection to the suspicious redirect link (Figure 7). Cyber AI Analyst was also able to uncover other related activity that took place at the time, including a potential attempt to exfiltrate data out of the customer’s network.

By autonomously analyzing the thousands of connections taking place on a network at any given time, Darktrace’s Cyber AI Analyst is able to detect seemingly separate anomalous events and link them together in one incident. This not only provides organizations with full visibility over potential compromises on their networks, but also saves their security teams precious time ensuring they can quickly scope out the ongoing incident and begin remediation.

Figure 5: Cyber AI Analyst correlated the attack’s sequence, starting with the initial suspicious domain accessed in the initial email attack vector.
Figure 5: Cyber AI Analyst correlated the attack’s sequence, starting with the initial suspicious domain accessed in the initial email attack vector.
Figure 6: As the attack progressed, Cyber AI Analyst correlated and appended additional events to the same incident, including the SaaS account hijack from the Netherlands-based IP.
Figure 6: As the attack progressed, Cyber AI Analyst correlated and appended additional events to the same incident, including the SaaS account hijack from the Netherlands-based IP.
Cyber AI Analyst correlated and appended additional events to the same incident, including additional users connecting to the suspicious redirect link following the outbound phishing emails being sent.
Figure 7: Cyber AI Analyst correlated and appended additional events to the same incident, including additional users connecting to the suspicious redirect link following the outbound phishing emails being sent.

結論

In this scenario, Darktrace demonstrated its ability to detect and correlate suspicious activities across three critical areas of a customer’s digital environment: email, SaaS, and network.

It is essential that cyber defenders not only adopt AI but use a combination of AI technology capable of learning and understanding the context of an organization’s entire digital infrastructure. Darktrace’s anomaly-based approach to threat detection allows it to identify subtle deviations from the expected behavior in network devices and SaaS users, indicating potential compromise. Meanwhile, Cyber AI Analyst dynamically correlates related events during an ongoing attack, providing organizations and their security teams with the information needed to respond and remediate effectively.

Credit to Zoe Tilsiter, Analyst Consulting Lead (EMEA), Brianna Leddy, Director of Analysis

付録

参考文献

[1] https://darktrace.com/state-of-ai-cyber-security

[2] https://www.virustotal.com/gui/domain/thecalebgroup.top

Darktrace DETECT Model Coverage

SaaS Models

- SaaS / Access / Unusual External Source for SaaS Credential Use

- SaaS / Compromise / Unusual Login and Account Update

- SaaS / Compliance / Anomalous New Email Rule

- SaaS / Compromise / Unusual Login and New Email Rule

Network Models

- Device / Suspicious Domain

- Multiple Device Correlations / Multiple Devices Breaching Same Model

Cyber AI Analyst Incidents

- Possible Hijack of Office365 Account

- Possible SSL Command and Control

Indicators of Compromise (IoCs)

IoC – Type – Description

193.222.96[.]91 – IP – Unusual Login Source

thecalebgroup[.]top – Domain – Possible C2 Endpoint

rz8js7sjbef[.]latovafineart[.]life – Domain – Possible C2 Endpoint

https://docsend[.]com/view/vcdmsmjcskw69jh9 - Domain - Phishing Link

続きを読む
著者について
Zoe Tilsiter
Cyber Analyst
Our ai. Your data.

Elevate your cyber defenses with Darktrace AI

無償トライアルを開始
Darktrace AI protecting a business from cyber threats.