Incident Details: Detector Event ID Severity Username Source IP Destination IP Protocol Event Subtype Event Count Event Time Offense ID
Incident Details: Detector Event ID Severity Username Source IP Destination IP Protocol Event Subtype Event Count Event Time Offense ID
We have observed “UBA : Suspicious Privileged Activity (Rarely Used Privilege)” from
Source Ips “Multiple“.
Incident Details:
HULK
Detector
ANGEL
Success Audit: A computer account was changed
Success Audit: A Kerberos service ticket was granted
Event ID
Success Audit: An account was successfully logged on
Success Audit: A Kerberos authentication ticket (TGT) was requested
Severity P3 - Low
Username opeyemi.oriolowo
10.0.20.228
Source IP
10.11.39.23
10.0.20.228
Destination IP
172.21.1.27
Protocol 255
Computer Account Changed
Event Subtype Kerberos Session Opened
User Login Success
Event Count Multiple
Offense ID 339823
Incident Analysis:
1. We have observed “UBA : Suspicious Privileged Activity (Rarely Used Privilege”
from Source IP “Multiple” with Username “opeyemi.oriolowo”
2. All the details for the event have been attached.
3. We are raising this incident for informational purpose.
Recommendations:
1. Kindly check the performed activity is legitimate or not.
2. Also, kindly check if the attempts made were legitimate or not.
Sample logs:
++++++Refer Attachment++++++++++++
Hello Team,
Hope You're Doing Well!
Case Details:
Severity P3-Low
Event Subtype Suspicious Address
Action Reputation block outbound request: malicious URL
Source IP 10.216.72.216
Post NAT Source IP 202.189.246.62
Destination IP 192.252.154.117
URL gamil.com:443
Username [email protected]
Event Count 06
Offense ID 596527
URL Blacklist Check:
Incident Observation:
Risk/Impact
Recommendation:
Raw Logs:
Hello Team,
Case details:
Detector BLUE-WEB-PROXY2.gtbank.com
Source IP 10.1.1.217
60983
Source Port 52401
61158
172.64.142.28
Destination IP 172.67.211.92
66.96.149.32
Threat Intel:
Incident Summary:
This offense was triggered when mentioned source IP " 10.1.1.217" tried to
communicate with destination IP “172.64.142.28, 172.67.211.92, 66.96.149.32”.
This offense has triggered under Successful phishing detected from proxy.
This also indicates the possible Phishing attack.
Recommended Action:
Kindly check whether it is a legitimate activity or not.
If not legitimate, then request you to kindly block the URL as well as domains to avoid any
successful malicious activity.
Investigate the incident with user and Source IP.
Create employee awareness programs for identifying phishing activities.
This domain has been listed as Phishing by Symantec ( Bluecoat Proxy OEM ) . GT-Bank
should be raising request on Symantec website for reviewing the domain so that this would
get recategorized correctly after review by Symantec.
You can visit URL https://sitereview.bluecoat.com/#/lookup-result/totalsportal.com ,
https://sitereview.bluecoat.com/#/lookup-result/pistisghana.com,
https://sitereview.bluecoat.com/#/lookup-result/streamsss.net please find screenshot for
reference .
Raw Logs:
+++Refer Attachment+++
Hello Team,
We have observed an offence triggered as “UC 109 - Linux-User created on Linux machine”.
Case Details :
Case Details:
Recommendation:
Payload:
Hi Team,
Incident Details:
Severity P2 – Medium
Source IP 10.3.1.12
50370
Source Port
50357
Destination IP 165.225.124.38
Destination Port 80
DDI_shost kxdk-dc01.kgc.kirloskar.com
Event Count 2
Destination Network
KIARIO.KIARIO
Location
Offense ID 596420
URL:
Incident analysis:
Recommendations:
Raw logs:
Attached
Dear Team,
We have observed "ARCOS Multiple Login Failure” from source IP "10.61.15.49" toward
destination IP “10.20.64.104” .
Incident Details:
Severity P2-Med
Username 28257
Source IP 10.61.15.49
Destination IP 10.20.64.104
Event Count 7
Event Subtype User Login Failure
Offense ID 22062
Incident Analysis:
Sample Packet:
++ Refer Attachment ++
Dear Team,
We have observed "Multiple Login Failures for the Same User” from Multiple Source IP’s
“Multiple” towards Multiple Destination IP “Multiple”
Incident Details:
DC_AD_Server @ 10.20.34.11
Detector/ Log DC_AD_Server @ 10.20.34.12
Source WSUYONXAPU01
WSUYONXWBU01
Failure Audit: The domain controller failed to validate the credentials for
an account
10.20.34.11
10.20.25.36
10.20.232.16
10.250.100.61
Source Port 0
10.20.34.12
10.20.34.11
Destination IP 10.20.25.36
10.20.232.16
Destination Port 0
Protocol 255
Event Count 27
Offense ID 22055
Incident Analysis:
Disclaimer: We're raising this offense as an informative measure as we've observed a stream
of failure audit events.
Recommendations:
1. Kindly check the password complexity and limit login attempts to avoid brute force
attacks
2. Also, kindly check if the attempts made were legitimate or not.
3. Kindly check any Saved credentials present in the system.
Audit Logs:
Refer Attachment
Dear Team,
Case Details :
Case Analysis:
Recommendation:
Raw Data:
----Attached---
With Regards,
Akash Karad
Hello Team,
Incident Details :
Severity P2-Med
Source IP Multiple
Destination
192.168.3.15
IP
Username SYSTEM
Action jticlient.contain
Event
Notice
Subtype
Event
13
Count
Offense ID 596556
Incident Analysis:
Recommendations:
Check whether this activity is legitimate or not
Run an Antivirus Scan on the system
Please Upgrade AV and AM to Latest Signature Products
Please Check in System if the user has downloaded any malicious file
Raw logs:
Multiple(Refer to attachment)
Dear Team,
We have observed an Offense triggered as “UCT_007 : Proxy - Attempt to connect to Phishing site”
Case Details :
Protocol 255
Category Phishing Activity
Event Time 11-Oct-2022, 4:24:04 pm
Case Analysis:
Recommendation:
Raw Data:
----Attached---
Hello Team,
Case Details:
Severity P2-Medium
FortiGate @ 10.101.101.9
Detector
FortiGate @ 172.16.17.130
Nmap.Script.Scanner - This indicates detection of an attempted scan
from Nmap scripting engine scanner
Event Name Java.Debug.Wire.Protocol.Insecure.Configuration - This indicates an
attempt to use Java Debug Wire Protocol to access remote
debugging
Blacklist Check:
Incident Observation:
Risk/Impact
Recommendation:
Raw Logs:
Refer Attachment
Dear Team,
We have observed an offence triggered as “UC 517 - Arcos - Excessive Sessions from Same User”
Case Details :
Detector Arcos_PIM_TU
Alert Name UC 517 - Arcos - Excessive Sessions from Same User
Offense ID 596441
Symphony
1427614
Ticket ID
Severity 3
Source IP 10.22.18.168
Source Port 0
Destination
10.22.18.168
IP
Destination
0
Port
Protocol 255
Username SSUTHAR1_T
User Mac 10.22.24.43[IN-36LRXM3][20C19B57FC24][][36LRXM3][ACM4.8.5.0]
Server IP
10.22.17.142
Address
Event ID 9200
Event
Access Permitted
Category
Event Time 11-Oct-2022, 3:19:53 pm
Case Details
Recommendation
Payload
--Attached--
We have observed an offence triggered as “GTBNIG 009 - Firewall - Remote to Local horizontal
Scan”.
Case Details :
5579
Destination IP Multiple
5060
Destination Port 3389
Username N/A
Protocol TCP IP
Category Firewall Deny
Event Time Oct 8, 2022, 9:15:10 PM
Case Analysis:
1. We have observed an offence triggered as " GTBNIG 009 - Firewall - Remote to Local
horizontal Scan “ reconnaissance activity.
2. Attacker using Multiple source ports and trying to communicate with destination Port for
scanning.
3. We observed firewall deny but source IP Is fully Malicious.
4. We also observed these source IPs are proxy server IPs.
Recommendations:
1. A firewall can prevent unauthorized access to a private network. It controls ports and their
visibility, as well as detects when a port scan is in progress before shutting it down.
2. Use tools like IP scanning, network mapper (Nmap), and Netcat to ensure their network and
systems are secure.
Raw Data:
----Attached---