Watering Hole Infection

Watering Hole Infection

Description

This threat is generated when there is suspicious activity surrounding a public cloud file share followed by malware activity.

Content Mapping

This content is not mapped to any local saved search. Add mapping


Use Case

Advanced Threat Detection

Category

Adversary Tactics, Endpoint Compromise, Malware

Alert Volume

Low

Data Availability

Bad

Journey

Stage 4

Data Sources

Box
Network Communication
IDS or IPS
Host-based IDS
Endpoint Detection and Response
Authentication
Windows Security
Web Proxy
Anti-Virus or Anti-Malware
DLP
Email