DETECTION OVERVIEW
Risk Factors
Attackers frequently set up websites and servers to distribute malware, communicate with command-and-control servers, or collect exploitable information from victims. The URIs associated with known malicious servers can be identified from threat intelligence, which is a collection of information curated by the security community. Devices that communicate with suspicious domains should be investigated. These devices might be vulnerable to various exploits, which could expose information or result in a persistent attack on the network.
The system might change the risk score for this detection.
Kill Chain
Risk Score
60
N/A
Block inbound and outbound suspicious traffic at the network perimeter
Quarantine the device while checking for indicators of compromise, such as the presence of malware
Implement network segmentation and the principle of least privilege on accounts to minimize the damage caused by a compromised device