Possible use of IPFS was detected

Cortex XDR Analytics Alert Reference by Alert name

Product
Cortex XDR
Last date published
2024-10-08
Category
Analytics Alert Reference
Order
Alert name

Synopsis

Activation Period

14 Days

Training Period

30 Days

Test Period

N/A (single event)

Deduplication Period

1 Day

Required Data

  • Requires one of the following data sources:
    • Palo Alto Networks Platform Logs
      OR
    • XDR Agent

Detection Modules

Detector Tags

ATT&CK Tactic

ATT&CK Technique

Severity

Informational

Description

The host produced traffic consistent with IPFS.

Attacker's Goals

IPFS access may expose your organization to new malware or allow attackers/ malicious insiders to exfiltrate data.

Investigative actions

  • Check the host for IPFS client software.
  • Look at the user's website history for IPFS url's and check the content ID (CID) for malicious indicators.
  • Examine the client's network traffic for uploaded or downloaded file hashes.

Variations

Possible use of IPFS was detected

Synopsis

ATT&CK Tactic

ATT&CK Technique

Severity

Informational

Description

The host produced traffic consistent with IPFS.

Attacker's Goals

IPFS access may expose your organization to new malware or allow attackers/ malicious insiders to exfiltrate data.

Investigative actions

  • Check the host for IPFS client software.
  • Look at the user's website history for IPFS url's and check the content ID (CID) for malicious indicators.
  • Examine the client's network traffic for uploaded or downloaded file hashes.