Incident Category Descriptions and Sample Playbooks
LogRhythm NDR has the following incident categories:
- Initial Compromise
- Infection
- Command and Control
- Service Attack
- Recon and Discovery
- Collection and Exfiltration
- Suspicious Access
- Privilege Escalation
- Ransomware
- Lateral Movement
These categories were originally based on the NIST incident categories, but were taken further because of the modern threat landscape and the LogRhythm NDR detection capabilities.
Initial Compromise
This incident usually indicates one of the following conditions:
- Detected some vector used to get initial foothold into the network
- Execution of adversary controlled-code detected
- Adversary trying to have persistent presence (over system restarts and other failures)
- Attempt to evade detection or avoid other defenses
The following information would be provided:
- Internal host/user
- User information
- Host information
- External domain information
- Affected internal resources
Infection
This incident usually indicates one of the following conditions:
- Initial infection detected.
- Suspicious file was downloaded.
- Malware installed and callbacks to CNC servers are seen.
- Malware is attempting to spread laterally through the environment (for example, ransomware).
The following information would be provided:
- Victim is an internal host/user.
- Attacker is an external domain or an internal user that is infected.
- User information.
- Host information.
- External domain information.
- File information.
- Affected internal resources.
SOC actions:
- Review the download activity for the incident and prior to it (file logs).
- Review web browsing activity (HTTP, SSL) for suspicious domains.
- Review the software activity in the software log.
- Review the internal activity (for example, encryption of files in case of a ransomware attack).
- Cross-check for any alerts from endpoint tools like antivirus.
- Confirm if the activity was initiated by the user by contacting them.
Command and Control
This incident usually indicates the following condition:
- Detection of C&C
The following information would be provided:
- Internal host/user
- User information
- Host information
- External domain information
- Affected internal resources
Service Attack
This incident usually indicates one of the following conditions:
- Exploit against the specific service detected.
- (Distributed) Denial of Service attack is detected.
The following information would be provided:
- Victim is an internal host.
- Attacker is an external host or a list of hosts.
- User information.
- Host information.
- External IP information (WHOIS, country).
- Affected service information.
SOC actions:
- Review the provided service/activity logs (check service name logs).
- Confirm if the activity is in line with the service typical activity.
- Verify if reported vulnerability is applicable to the target host/service.
- Confirm if the potential attacker(s) IPs do not belong to the partner organization.
- Contact the service owner.
Recon and Discovery
This incident usually indicates one of the following conditions:
- Network host/port/sweep scan is detected.
- Vulnerability scan is detected.
- Application scan is detected.
The following information would be provided:
- Victim is an internal host or a list of hosts.
- Attacker is an internal/external host.
- User information.
- Host information.
- External IP information (WHOIS, country).
- Affected service/application information.
SOC actions:
- Review the provided activity logs. Normally, the event would indicate the range and count of hosts/ports scanned or the list of application activity performed.
- Confirm if the activity is in line with the source activity. For example, it could be an internal vulnerability scan. Such an activity is expected and should be whitelisted.
- Contact the attacker’s user for internal or block at the perimeter for the external actor.
Collection and Exfiltration
This incident usually indicates one of the following conditions:
- Sensitive files and other information being collected, prior to exfiltration.
- Host/user performs internal downloads AND external uploads AND.
- Score and the amount of data transferred raises suspicion AND.
- Such activity hasn’t been attributed to that host/user before.
The following information would be provided:
- Victim is an internal host/user.
- Attacker is an external domain destination of the exfiltration.
- User information.
- Host information.
- External domain information.
- File information for internal download (if available).
- Connection data indicating the download/upload flows.
SOC actions:
- Review upload/download flows and verify if this activity is expected.
- Confirm with the user/their manager for clarification.
Suspicious Access
This incident usually indicates one of the following conditions:
- Bruteforce attack detected
- User compromise detected
- Access to the unusual resources that hasn’t been seen before
The following information would be provided:
- Victim is an internal host/user.
- Attacker is an external/internal host/user.
- User information.
- Host information.
- External domain information.
- Account break-in attempts.
- Connection data indicating the new suspicious connection flows.
SOC actions:
- Review password attack evidence.
- Review new activity.
- If in doubt, contact the user for clarification.
- Reset the user credentials and quarantine their host.
Privilege Escalation
This incident usually indicates one of the following conditions:
- Access to privileged data detected by an unauthorized user.
- Access to critical services is detected by an unauthorized user.
The following information would be provided:
- Victim is an internal host/user.
- Attacker is an external/internal host/user.
- User information.
- Host information.
- External domain information.
- Access attempts indicating success/failure.
- Connection data indicating the new suspicious connection flows.
SOC actions:
- Review the flow of events. Since LogRhythm NDR is limited to the network activity in terms of visibility, the picture might be incomplete. However, the sequence of events should indicate an anomaly in the user’s behavior. For example, after many denied attempts to access the service, the access is granted. This could be due to the exploitation of the service or user credentials that LogRhythm NDR was unable to see (for example, due to the encryption being used).
- If in doubt, contact the user for clarification.
Ransomware
This incident usually indicates the following condition:
- Ransomware – A malicious actor is encrypting files. No command and control channel is necessary for this attack pattern, although such a pattern is often used.
The following information would be provided:
- Internal host/user
- User information
- Host information
- External domain information
- Affected files and internal resources
Lateral Movement
This incident usually indicates the following condition:
- Lateral movement detected in search of key data and assets
The following information would be provided:
- Internal host/user
- User information
- Host information
- Target information
- Affected internal resources