Site icon LIFARS, a SecurityScorecard company

How to Detect Malicious Activity Early? Set up IOCs

LIFARS Cyber Security Recommendations

LIFARS Cyber Security Recommendations

Indicators of Compromise (IOCs) are forensic data IT professionals use to detect malicious activity. It is defined as “pieces of forensic data, such as data found in system log entries or files, that identify potentially malicious activity on a system or network.” Through setting up IOCs to monitor, a firm may act quickly to prevent or mitigate cyber-attacks in early stages.
Because IOCs are red flags for early detection that has potential of leading to malicious activity, they are not easy to detect. IOCs can be simple as detecting metadata or as complex as detecting complex malicious code. Firm cyber risk analysts must be able to piece together various IOCs to catch the potential threat or even in-progress activity.
So what IOCs you can set up and detect for your firm?

Darkreading.com provides the Top 15 IOCs:

After noting to looking out for these IOCs, here are some best practices:

Note that Indicators of compromise are different from Indicators of Attack (IOAs). Indicators of compromise answer, “what happened?” while indicators of attack answer “what is happening and why?”

A proactive approach to detection uses both IOAs and IOCs to discover security incidents or threats in as close to real time as possible. In addition to the 15 IOCs above, setting up other indicators that would be unusual for your firm is the key idea for malicious activity detection sooner than later. Always understand what is normal for your firm and keep an eye out for the unusual.

 

 

 

 

 


Credit:
https://digitalguardian.com/blog/what-are-indicators-compromise
https://www.darkreading.com/attacks-breaches/top-15-indicators-of-compromise/d/d-id/1140647?

Exit mobile version