Possible internal data exfiltration over a USB storage device

Cortex XDR Analytics Alert Reference by Alert name

Product
Cortex XDR
Last date published
2024-09-24
Category
Analytics Alert Reference
Order
Alert name

Synopsis

Activation Period

14 Days

Training Period

30 Days

Test Period

1 Hour

Deduplication Period

1 Day

Required Data

  • Requires:
    • XDR Agent with eXtended Threat Hunting (XTH)

Detection Modules

Identity Threat Module

Detector Tags

ATT&CK Tactic

ATT&CK Technique

Severity

Informational

Description

A user generated abnormal massive file activity to a connected USB storage device.

Attacker's Goals

Collect data and stage it on an endpoint in the organization.

Investigative actions

  • Check whether the process that created the massive file activity creates network connections as well.
  • Check whether the USB storage device is new to the organization.
  • Check whether other users in the organization used the same process for massive file activity.

Variations

Possible internal data exfiltration of over 500 MB via USB storage device

Synopsis

ATT&CK Tactic

ATT&CK Technique

Severity

Low

Description

A user generated abnormal massive file activity to a connected USB storage device.

Attacker's Goals

Collect data and stage it on an endpoint in the organization.

Investigative actions

  • Check whether the process that created the massive file activity creates network connections as well.
  • Check whether the USB storage device is new to the organization.
  • Check whether other users in the organization used the same process for massive file activity.