DETECTION OVERVIEW
Risk Factors
Protocols such as Internet Inter-ORB Protocol (IIOP) with Common Object Request Broker Architecture (CORBA) facilitate communication between distributed Java systems. Unexpected IIOP connections can be indicators of compromise. Attack tools and techniques that leverage IIOP for RCE are available to attackers with any skill level. A victim can download a malicious payload through an IIOP connection to an attacker-controlled server.
The system might change the risk score for this detection.
Kill Chain
Risk Score
60
N/A
Quarantine the device while checking for indicators of compromise
Block suspicious inbound and outbound traffic at the network perimeter