Identification Of New Leads & Impacted Systems
1. Analyzing IOC Hits
Purpose: To identify new leads and impacted systems by analyzing hits from IOC searches.
Why: IOC hits can reveal additional compromised systems or related malicious activity, helping to expand the scope of the investigation.
Technical Example:
Search for IOCs Across Systems:
Use SIEM tools to search for IOCs across logs and endpoints:
Query EDR tools for suspicious activity:
Cross-Reference with Asset Inventory:
Identify systems associated with IOC hits:
2. Eliminating False Positives
Purpose: To filter out irrelevant or overly generic IOC matches that do not relate to the incident.
Why: False positives can waste time and resources, diverting focus from genuine threats.
Technical Example:
Validate IOC Hits:
Investigate whether the hit is relevant to the incident:
Compare with known legitimate activity (e.g., software updates):
Refine Generic IOCs:
Narrow down overly broad IOCs to reduce false positives:
3. Prioritizing Leads
Purpose: To focus on high-value leads that are most likely to provide actionable insights.
Why: When dealing with a large number of IOC hits, prioritization ensures efficient use of resources and faster progress in the investigation.
Technical Example:
Prioritize Based on Severity:
Focus on systems with critical alerts or high-severity events:
Focus on Business-Critical Systems:
Identify and prioritize systems that are critical to operations:
Prioritize Leads with Forensic Value:
Select systems where forensic analysis is likely to yield new insights:
4. Identifying New Leads
Purpose: To uncover additional systems, activities, or artifacts that expand the understanding of the incident.
Why: New leads often reveal lateral movement, persistence mechanisms, or other attack vectors that were previously unknown.
Technical Example:
Trace Lateral Movement:
Analyze logs for unusual login attempts or connections between systems:
Use tools like BloodHound to map relationships between users and systems:
Identify Persistence Mechanisms:
Search for registry keys or scheduled tasks created by attackers:
5. Handling Large Numbers of Hits
Purpose: To manage and process a high volume of IOC hits effectively.
Why: Large numbers of hits can overwhelm investigators, so systematic filtering and prioritization are essential.
Technical Example:
Automate IOC Filtering:
Use scripts to filter and categorize IOC hits:
Visualize Hit Data:
Use visualization tools to identify patterns and trends:
Conclusion
The identification of new leads and impacted systems is a critical step in expanding the scope of an investigation. By analyzing IOC hits, eliminating false positives, and prioritizing high-value leads, organizations can efficiently uncover additional compromised systems and malicious activities.
Last updated