CYFIRMA - Data Breach and Web Monitoring - Ransomware Exposure Detected Rule

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Content Index


This analytics rule detects high-severity ransomware threats targeting the organization, as reported by CYFIRMA's Dark Web and Data Breach Intelligence feeds. The alert is generated when threat actors post, claim, or associate ransomware activity with corporate domains, brands, or subsidiaries, indicating a potential data breach, extortion attempt, or unauthorized access.

Attribute Value
Type Analytic Rule
Solution Cyfirma Digital Risk
ID ed1aabc1-e1c1-42f4-abac-fd5637730f13
Severity High
Status Available
Kind Scheduled
Tactics InitialAccess, Exfiltration
Techniques T1566.001, T1566.002, T1566.003
Required Connectors CyfirmaDigitalRiskAlertsConnector
Source View on GitHub

Tables Used

This content item queries data from the following tables:

Table Transformations Ingestion API Lake-Only
CyfirmaDBWMRansomwareAlerts_CL ? ?

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Analytic Rules · Back to Cyfirma Digital Risk