CYFIRMA - High severity Malicious Phishing Network Indicators - Monitor Recommended Rule

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Content Index


"This analytics rule identifies network-based indicators such as URLs, IP addresses, and domains related to phishing campaigns, as reported by CYFIRMA threat intelligence. These indicators are flagged with a recommended action to block and are categorized under the 'Phishing' role. Such infrastructure is often used to deliver phishing emails, host fake login portals, or redirect victims to credential-harvesting pages. monitoring these indicators proactively helps prevent user compromise and da

Attribute Value
Type Analytic Rule
Solution Cyfirma Cyber Intelligence
ID 359e2afb-b6d4-45db-90aa-c89ce7234d72
Severity High
Kind Scheduled
Tactics InitialAccess, Execution, CredentialAccess, Exfiltration
Techniques T1566, T1204, T1556, T1110, T1041, T1566.001, T1566.002, T1204.001, T1556.002, T1110.003
Required Connectors CyfirmaCyberIntelligenceDC
Source View on GitHub

Tables Used

This content item queries data from the following tables:

Table Transformations Ingestion API Lake-Only
CyfirmaIndicators_CL ? ?

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Analytic Rules · Back to Cyfirma Cyber Intelligence