Network sniffing detected in Cloud environment

Cortex XDR Analytics Alert Reference by Alert name

Product
Cortex XDR
Last date published
2024-06-18
Category
Analytics Alert Reference
Order
Alert name

Synopsis

Activation Period

14 Days

Training Period

30 Days

Test Period

N/A (single event)

Deduplication Period

5 Days

Required Data

  • Requires one of the following data sources:
    • AWS Audit Log
      OR
    • Azure Audit Log
      OR
    • Gcp Audit Log

Detection Modules

Cloud

ATT&CK Tactic

ATT&CK Technique

Network Sniffing (T1040)

Severity

Informational

Description

Network sniffing tool was used in cloud environment.

Attacker's Goals

Adversaries may sniff network traffic to capture information about an environment, including authentication material passed over the network.

Investigative actions

  • Check the targeted resources and the sniffing policy.
  • Check the cloud identity activity prior/after the network sniffing.

Variations

Unusual Network sniffing detected in Cloud environment

Synopsis

ATT&CK Tactic

ATT&CK Technique

Network Sniffing (T1040)

Severity

Low

Description

Network sniffing tool was used in cloud environment.

Attacker's Goals

Adversaries may sniff network traffic to capture information about an environment, including authentication material passed over the network.

Investigative actions

  • Check the targeted resources and the sniffing policy.
  • Check the cloud identity activity prior/after the network sniffing.


Successful Network sniffing detected in Cloud environment

Synopsis

ATT&CK Tactic

ATT&CK Technique

Network Sniffing (T1040)

Severity

Informational

Description

Network sniffing tool was used in cloud environment.

Attacker's Goals

Adversaries may sniff network traffic to capture information about an environment, including authentication material passed over the network.

Investigative actions

  • Check the targeted resources and the sniffing policy.
  • Check the cloud identity activity prior/after the network sniffing.