Large Upload (SMTP)

Cortex XDR Analytics Alert Reference by data source

Last date published
2024-04-15
Order
data source

Synopsis

Activation Period

14 Days

Training Period

30 Days

Test Period

1 Day

Deduplication Period

1 Day

Required Data

  • Requires one of the following data sources:
    • Palo Alto Networks Platform Logs
      OR
    • XDR Agent

Detection Modules

ATT&CK Tactic

Exfiltration (TA0010)

ATT&CK Technique

Exfiltration Over Alternative Protocol (T1048)

Severity

Low

Description

The endpoint, which is not an internal SMTP server, emailed an excessive amount of data from your network.

Attacker's Goals

Transfer data they have stolen from your network to a location that is convenient and useful to him.

Investigative actions

  • Identify the process/user performing the data transfer to determine if the transfer is sanctioned.
  • Verify that the source is not a mail server.
  • Check if the target address represents a mail service that rarely used in the organization. If so, this might indicate on file exfiltration attempt.