Built-in checks
Built-in checks are based on specific signatures or hard-coded logics with reference to: known ICS threats (by signatures provided by Threat Intelligence), known malicious operations, system weaknesses, or protocol-compliant operations that can impact the network/ICS functionality. They might also leverage the Learning process to be more accurate.
Type ID | Name | Details |
---|---|---|
INCIDENT:BRUTE-FORCE-ATTACK | Brute-force Attack |
Several failed login attempts to a node, using a specific protocol, are detected. Investigate on the host attempting the login attempts. |
INCIDENT:ENG-OPERATIONS | Engineering Operations |
Various operations to modify the configuration, the program, or the status of a device have been detected. Validate the engineering operations. |
INCIDENT:FORCE-COMMAND | Force Command |
A command to manually force a variable value has been detected. Investigate on the entity that has initiated the forcing. |
INCIDENT:FUNCTION-CODE-SCAN | Function Code Scan |
A node has performed several actions that are not supported by the target devices. Investigate the source and destination devices configuration. |
INCIDENT:ILLEGAL-PARAMETER-SCAN | Illegal Parameter Scan |
A node has performed a scan of the parameters available on a device. Investigate the source authenticity. |
INCIDENT:MALICIOUS-FILE | Malicious File |
A compressed archive with some malware inside has been transferred. Investigate on the malware source and infected device, and consider to remove the file. |
INCIDENT:SUSPICIOUS-ACTIVITY | Suspicious Activity |
Suspicious activity that can be potentially related to known malware has been detected over two nodes. Investigate on the malware source and infected device. |
INCIDENT:WEAK-PASSWORDS | Weak Passwords |
Several weak passwords have been detected on this communication. Consider to update to secure communication or evaluate the risks of having this data exposed on the network. |