Title: INCIDENT RESPONSE - BEST PRACTICES FOR COMMON ATTACK SCENARIOS
1INCIDENT RESPONSE
www.infosectrain.com
BEST PRACTICES FOR COMMON
SACTETNAARCIOKS
2BRUTE FORCING
www.infosectrain.com
INVESTIGATION
Analyze Active Directory, application, and
operating system logs for multiple login
failures. Contact the user to confirm the
legitimacy of login attempts.
01 02
ACTIONS
01
If unauthorized activity is confirmed, disable
the account.
- Investigate and block the attackers IP address.
- Implement account lockout policies to prevent
brute force attacks
3BOTNETS
www.infosectrain.com
INVESTIGATION
01
Monitor network traffic for connections to
suspicious IPs.
02 Check OS logs for new or suspicious
processes. Contact the server owner and support
team for information.
03
ACTIONS
01
Identify and remove malicious processes.
- Fix the vulnerabilities by applying necessary
patches. - Isolate the affected server to prevent further
malicious activities.
4RANSOMWARE
www.infosectrain.com
INVESTIGATION
01
Check for anti-virus alerts and malware
indicators.
02 Monitor network traffic for connections to
suspicious IPs.
ACTIONS
01
Request anti-virus checks and initiate a malware
scan.
02 Isolate the infected machine to prevent
further spread.
5DATA EXFILTRATION
www.infosectrain.com
INVESTIGATION
01
Monitor network traffic for abnormally high
traffic patterns using DLP.
02 Check proxy logs and OS logs for unusual
activities.
ACTIONS
01
If a rogue employee is suspected, contact their
manager for an internal investigation.
02 If it's an external threat, isolate and
disconnect the compromised machine from the
network.
6COMPROMISED ACCOUNT
www.infosectrain.com
INVESTIGATION
01
Analyze Active Directory logs, OS logs, and
network traffic for indicators of a compromised
account.
02 Contact the user for additional information.
ACTIONS
01
If a compromised account is confirmed, disable
the account, change the password
02 Conduct forensic investigations to determine
the extent of the breach.
7DENIAL OF SERVICE
www.infosectrain.com
INVESTIGATION
01
Monitor network traffic for abnormally high
traffic.
02 Review firewall logs and OS logs for signs of
the attack.
ACTIONS
01
If the DoS is due to vulnerabilities, contact the
patching team to remediate the vulnerabilities.
- Enable redundancy and failover for uninterrupted
service during an attack. - For a network traffic-induced attack, contact
network support - or ISP and refrain from disclosing sensitive
information - too quickly.
8FOUND THIS USEFUL?
Get More Insights Through Our FREE Courses
Workshops eBooks Checklists Mock Tests
LIKE
SHARE
FOLLOW