DETECTION OVERVIEW
Risk Factors
Attackers frequently establish websites that are designed to distribute malware or collect information from victims. The hostnames of known malicious websites can be included in threat intelligence, which is a collection of information curated by the security community. Network clients that communicate with a suspicious host should be investigated. These clients might be vulnerable to man-in-the-middle, phishing, or pharming attacks, which could result in the exposure of information.
Kill Chain
Risk Score
60