What are top 15 indicators?
Here are 15 common behavior-based indicators of a compromise:
1. Outbound network connections to known malicious IP addresses or domains.
2. The presence of unknown or unauthorized user accounts.
3. Unexplained changes to system settings or configurations.
4. Failed login attempts or unusual login activity.
5. The presence of unfamiliar or unapproved software applications on the system.
6. Unusual file or system modifications.
7. Suspicious behaviors from privileged accounts or systems.
8. Evidence of lateral movement within the network.
9. Significant changes in user behavior or system activity.
10. Changes to the security software or firewalls.
11. System crashes or unexpected shutdowns.
12. The presence of backdoors or remote access tools.
13. Increased network or system traffic.
14. Suspicious emails or phishing attempts.
15. The presence of any unusual or unexpected system activity, such as unusual DNS queries, file downloads or uploads, or other network activity.
It's important to note that these indicators alone are not always conclusive evidence of a compromise, but they should always prompt further investigation.