Large Upload (SMTP)

Cortex XDR Analytics Alert Reference by data source

Product
Cortex XDR
Last date published
2024-12-03
Category
Analytics Alert Reference
Order
data source

Synopsis

Activation Period

14 Days

Training Period

30 Days

Test Period

1 Day

Deduplication Period

1 Day

Required Data

  • Requires one of the following data sources:
    • Palo Alto Networks Platform Logs
      OR
    • XDR Agent
      OR
    • Third-Party Firewalls

Detection Modules

Detector Tags

ATT&CK Tactic

Exfiltration (TA0010)

ATT&CK Technique

Exfiltration Over Alternative Protocol (T1048)

Severity

Low

Description

The endpoint, which is not an internal SMTP server, emailed an excessive amount of data from your network.

Attacker's Goals

Transfer data they have stolen from your network to a location that is convenient and useful to him.

Investigative actions

  • Identify the process/user performing the data transfer to determine if the transfer is sanctioned.
  • Verify that the source is not a mail server.
  • Check if the target address represents a mail service that rarely used in the organization. If so, this might indicate on file exfiltration attempt.

Variations

Large Upload (SMTP)

Synopsis

ATT&CK Tactic

Exfiltration (TA0010)

ATT&CK Technique

Exfiltration Over Alternative Protocol (T1048)

Severity

Informational

Description

The endpoint, which is not an internal SMTP server, emailed an excessive amount of data from your network.

Attacker's Goals

Transfer data they have stolen from your network to a location that is convenient and useful to him.

Investigative actions

  • Identify the process/user performing the data transfer to determine if the transfer is sanctioned.
  • Verify that the source is not a mail server.
  • Check if the target address represents a mail service that rarely used in the organization. If so, this might indicate on file exfiltration attempt.