What is compromised in cyber security?

During a cybersecurity incident, indicators of compromise (IoC) are clues and evidence of a data breach. These digital breadcrumbs can reveal not just that an attack has occurred, but often, what tools were used in the attack and who’s behind them.

IoCs can also be used to determine the extent to which a compromise affected an organisation or to gather lessons learned to help secure the environment from future attacks. Indicators are typically collected from software, including antimalware and antivirus systems, but other artificial IoC cybersecurity tools can be used to aggregate and organise indicators during incident response.

As much as malware authors try to create software that always avoids detection, every application leaves evidence of its existence on the network. These clues can be used to determine whether the network is under attack or a data breach has occurred. Forensic investigators use these clues to aggregate evidence after a cybersecurity incident to prepare countermeasures and pursue criminal charges against an attacker. IoCs also reveal what data was stolen and the severity of the cybersecurity incident.

Think of indicators of compromise as the breadcrumbs left by an attacker after a cybersecurity incident. Anti-malware applications could partially stop the incident, but indicators of compromise determine the data and files that were accessible to an attacker. They are crucial in finding vulnerabilities and exploits used by attackers to steal data because they offer the organisation information on the ways to better protect the network in the future.

What is an IoC compared to an IoA? Cybersecurity incidents have several phases. But in terms of investigations, there are two main concerns—is the attack ongoing, or has the issue been contained? Investigators use the indicators of compromise left by an attacker to answer both questions.

IoC security used during incident response is used to determine the extent of an attack and data breached. Indicators of attack (IoA) are used to determine whether an attack is ongoing and must be contained before it can cause more damage.

Both IoC cyber tools and IoA tools work with evidence and metadata that give investigators clues into the state of an attack. Indicators of compromise are used after an attack was contained, when the organisation needs to know where, what, and how. Indicators of attack focus on a current attack that may be active and must be contained.

For extremely stealthy malware, a compromise could last for months before administrators are aware of it. IoAs will help determine whether suspicions are accurate or a false positive.

Large networks could have thousands of IoCs. For this reason, most evidence is aggregated and loaded into IoC security event and event management (SIEM) systems to help forensic investigators organise data. Evidence can come from numerous locations, but here are a few discovery items that can be used as IoC:

After an incident, IoC cybersecurity measures can be used to establish what went wrong so that the organisation can avoid any future exploits from the same vulnerability.

In some cases, organisations fail to properly log and monitor the right resources. That oversight leaves them open to an attacker who can then avoid detection after an investigation. It’s important first to apply monitoring on the network to detect an attack, but for investigations, logs and audit trails are just as important.

IoC data points can be collected in real time to reduce response time during an investigation. SIEMs are used to separate noise from valuable evidence needed to identify an attack and its exploit vectors. Documenting current incident response procedures can also reduce the time it takes for an investigation. These procedures should be reviewed after a compromise to improve on them.

During incident response, the “lessons learned” phase is the last step. IoCs are be useful during this phase to identify what cybersecurity defences were incorrectly configured or insufficient to stop an attacker. The more thorough logs and audit trails organisation have, the more effective their investigation during incident response.

Learn how to protect your company against business email compromise (BEC) using Proofpoint's Business Email Compromise Protection – learn what it is and how it works.

You’ve probably heard of the term Business Email Compromise (BEC) before. But maybe not the term Email Account Compromise (EAC), which is a close cousin of BEC.

As fraudsters become more sophisticated, we’re seeing more BEC variants such as gift card scams, payroll diversion and supplier invoicing fraud.

A compromised account happens when it is accessed by threat actors to steal data and/or for financial gain. Read on to learn the meaning and how to prevent it.

What is compromised in cyber security?

Sometimes personal data can be disclosed to unauthorised parties, through incidents such as a data breach. Learn what to do when your data is lost or disclosed.

An Indicator of Compromise (IOC) is a piece of digital forensics that suggests that an endpoint or network may have been breached. Just as with physical evidence, these digital clues help information security professionals identify malicious activity or security threats, such as data breaches, insider threats or malware attacks.

Investigators can gather indicators of compromise manually after noticing suspicious activity or automatically as part of the organization’s cybersecurity monitoring capabilities. This information can be used to help mitigate an in-progress attack or remediate an existing security incident, as well as create “smarter” tools that can detect and quarantine suspicious files in the future.

Unfortunately, IOC monitoring is reactive in nature, which means that if an organization finds an indicator, it is almost certain that they have already been compromised. That said, if the event is in-progress, the quick detection of an IOC could help contain attacks earlier in the attack lifecycle, thus limiting their impact to the business.

As cyber criminals become more sophisticated, indicators of compromise have become more difficult to detect. The most common IOCs—such as an md5 hash, C2 domain or hardcoded IP address, registry key and filename—are constantly changing, which makes detection more difficult.

How to Identify Indicators of Compromise

When an organization is an attack target or victim, the cybercriminal will leave traces of their activity in the system and log files. The threat hunting team will gather this digital forensic data from these files and systems to determine if a security threat or data breach has occurred or is in-process.

Identifying IOCs is a job handled almost exclusively by trained infosec professionals. Often these individuals leverage advanced technology to scan and analyze tremendous amounts of network traffic, as well as isolate suspicious activity.

The most effective cybersecurity strategies blend human resources with advanced technological solutions, such as AI, ML and other forms of intelligent automation to better detect anomalous activity and increase response and remediation time.

Why Your Organization Should Monitor for Indicators of Compromise

The ability to detect indicators of compromise is a crucial element of every comprehensive cybersecurity strategy. IOCs can help improve detection accuracy and speed, as well as remediation times. Generally speaking, the earlier an organization can detect an attack, the less impact it will have on the business and the easier it will be to resolve.

IOCs, especially those that are recurring, provide the organization with a window into the techniques and methodologies of their attackers. As such, organizations can incorporate these insights into their security tooling, incident response capabilities and cybersecurity policies to prevent future events.

Examples of Indicators of Compromise

What are the warning signs that the security team is looking for when investigating cyber threats and attacks? Some indicators of compromise include:

  • Unusual inbound and outbound network traffic
  • Geographic irregularities, such as traffic from countries or locations where the organization does not have a presence
  • Unknown applications within the system
  • Unusual activity from administrator or privileged accounts, including requests for additional permissions
  • An uptick in incorrect log-ins or access requests that may indicate brute force attacks
  • Anomalous activity, such as an increase in database read volume
  • Large numbers of requests for the same file
  • Suspicious registry or system file changes
  • Unusual Domain Name Servers (DNS) requests and registry configurations
  • Unauthorized settings changes, including mobile device profiles
  • Large amounts of compressed files or data bundles in incorrect or unexplained locations

The Difference Between Indicator of Compromises (IoCs) and Indicators of Attack (IoAs)

An Indicator of Attack (IOA) is related to an IOC in that it is a digital artifact that helps the infosec team evaluate a breach or security event. However, unlike IOCs, IOAs are active in nature and focus on identifying a cyber attack that is in process. They also explore the identity and motivation of the threat actor, whereas an IOC only helps the organization understand the events that took place.