Navigation :
Watering Hole Infection
Description
This threat is generated when there is suspicious activity surrounding a public cloud file share followed by malware activity.
Content Mapping
This content is not mapped to any local saved search. Add mapping
Use Case
Advanced Threat Detection
Category
Adversary Tactics, Endpoint Compromise, Malware
Alert Volume
Low
(?)SPL Difficulty
None
Journey
Stage 4
Data Sources
Windows Security
Audit Trail
Host-based IDS
Network Communication
Anti-Virus or Anti-Malware
IDS or IPS
Authentication
DLP
Email
Endpoint Detection and Response
Web Proxy