CYFIRMA - Medium severity Malicious Phishing Network Indicators - Block Recommended Rule

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Content Index


"This analytics rule identifies network indicators such as URLs, IP addresses, and domains related to phishing campaigns, as reported by CYFIRMA threat intelligence. These indicators are flagged with a recommended action to block and are categorized under the 'Phishing' role. Such infrastructure is often used to deliver phishing emails, host fake login portals, or redirect victims to credential-harvesting pages. Blocking these indicators proactively helps prevent user compromise and data theft

Attribute Value
Type Analytic Rule
Solution Cyfirma Cyber Intelligence
ID 5468e012-6681-44fb-be2d-b1cd58b62ac7
Severity Medium
Kind Scheduled
Tactics InitialAccess, Execution, CredentialAccess, Exfiltration
Techniques T1566, T1204, T1556, T1110, T1041, T1566.001, T1566.002, T1204.001, T1556.002, T1110.003
Required Connectors CyfirmaCyberIntelligenceDC
Source View on GitHub

Tables Used

This content item queries data from the following tables:

Table Transformations Ingestion API Lake-Only
CyfirmaIndicators_CL ? ?

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Analytic Rules · Back to Cyfirma Cyber Intelligence