Understanding Incident Triggers
We define incident triggers as the first indication of a compromise that prompted the client to seek IR services. Ransomware stands out as the predominant factor, accounting for approximately 30% of all Incident-Triggers. Ransomware attacks are often highly visible and severely disruptive, requiring immediate action.
Twenty percent of CIPRT cases in 2023 were triggered by an alert from a security product in the customer’s environment. These are often alerts of the highest severity, while lower severity alerts do not usually require the same response. Interestingly, behavioral anomalies, which include any unusual activity that the regular user observes and that deviate from established patterns, prompted 13% of incident response (IR) engagements. This high percentage reflects their significance as a red flag for potentially severe security issues. However, it is important to keep in mind that reports of behavioral anomalies are often less reliable and may result in False Positives.
In the graph above, the suspicious email category refers to any suspect inbound or outbound email activity. Suspicious outbound emails are extremely concerning, as they often indicate an email compromise in the organization. If not detected in time, these incidents may lead to an unauthorized money transfer, which is another common IR trigger that comprised 3% of our cases in 2023.
Incident triggers that are less frequent but still critical include CERT alerts, in which the initial indication of compromise is provided by the local CERT, and dark web monitoring, in which the initial alert comes from finding mentions on underground forums of a breach or offers to buy initial access. Despite their lower prevalence, these triggers often indicate sophisticated and severe threats that can have significant ramifications if not addressed promptly.
As we delved deeper into the incident, the plot thickened. We detected signs of data exfiltration, coupled with the discovery of a RAT (Remote Access Tool) and encryption binaries on the Active Directory server. These elements were prepared for a wide-scale deployment across the network – the unmistakable precursors of a ransomware attack, mere minutes from execution.