CYFIRMA - High severity Malicious Network Indicators with Block Action Rule

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Content Index


This rule detects network-based indicators such as IP addresses, domains, and URLs reported by CYFIRMA threat intelligence with a recommended action of 'Block' and no specified role. These indicators may be associated with infrastructure used in phishing campaigns, malware, or initial access via watering hole or drive-by compromise techniques.

Attribute Value
Type Analytic Rule
Solution Cyfirma Cyber Intelligence
ID 58ae2c87-fc07-434b-aacf-f66d25b25e7e
Severity High
Kind Scheduled
Tactics InitialAccess, Execution, Reconnaissance, Impact
Techniques T1566, T1189, T1204, T1595, T1498, T1566.002, T1204.001, T1595.002
Required Connectors CyfirmaCyberIntelligenceDC
Source View on GitHub

Tables Used

This content item queries data from the following tables:

Table Transformations Ingestion API Lake-Only
CyfirmaIndicators_CL ? ?

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Analytic Rules · Back to Cyfirma Cyber Intelligence