Synopsis
Activation Period |
14 Days |
Training Period |
30 Days |
Test Period |
1 Hour |
Deduplication Period |
1 Hour |
Required Data |
|
Detection Modules |
Identity Threat Module |
Detector Tags |
|
ATT&CK Tactic |
|
ATT&CK Technique |
|
Severity |
Low |
Description
A user connected a new USB storage device to multiple endpoints.
Attacker's Goals
The attacker may use a USB storage device connection for data exfiltration or data collection.
Investigative actions
Investigate the USB storage device related process and file events to determine if it was used for legitimate purposes or malicious activity.