Coconote
AI notes
AI voice & video notes
Try for free
Understanding Indicators of Compromise (IOC)
May 26, 2025
Indicators of Compromise (IOC)
Definition
Indicator of Compromise (IOC):
Evidence that a system has been breached or accessed by unauthorized individuals.
Situations indicating high confidence of system compromise.
Examples of IOCs
Unusual Traffic:
Large amounts of data transfer over a network.
Traffic from unexpected international locations.
Modified DNS information.
Authentication Patterns:
Unusual login patterns or account lockouts.
Accounts locked due to excessive login attempts.
Account disabled without administrative action.
Multiple Logins from Different Locations:
Simultaneous logins from geographically distant locations.
"Impossible" logins indicating potential misuse.
Resource Consumption:
Spikes in network traffic due to unauthorized file transfers.
Firewall logs showing unexpected data transfer.
Resource Inaccessibility:
Servers or network resources becoming unavailable due to attacks.
Encrypted data indicating ransomware infections.
Unscheduled Logging:
Logs showing unplanned installation of patches or applications.
Out-of-cycle logging indicating unusual activities.
Implications and Responses
Compromised Accounts:
Reset procedures should be robust to prevent impersonation.
Log Analysis:
Monitor for missing log data as attackers may delete logs to hide activities.
Use logs to detect file transfers or unauthorized accesses.
Data Breaches:
Private data appearing on the internet is a clear sign of compromise.
Often linked with ransomware attacks where data is exfiltrated before encryption.
Best Practices
Implement strong password reset processes.
Regularly review authentication logs for anomalies.
Set up alerts for unusual network activity or file transfers.
Ensure comprehensive logging and monitor for deleted or missing logs.
Prepare for potential data breaches by safeguarding sensitive information.
📄
Full transcript