heroui logo

Threat Intel URL Indicator Match

Elastic Detection Rules

View Source
Summary
The 'Threat Intel URL Indicator Match' rule detects when a URL indicator from the Threat Intelligence Filebeat module matches an event that includes URL data, such as DNS events and network logs. This detection is contingent on ingested threat intelligence data within the last 30 days. The rule is critical due to its potential to identify malicious activities linked to URLs, which could lead to phishing attempts or malware infections. Investigators are advised to validate matched URLs, gather additional context around the associated activities, and follow a comprehensive approach that includes examining the responsible process executions, indicators of compromise (IoCs), and leveraging various security resources to analyze domain reputations. The setup requires collection of relevant threat intelligence indicators, which can be integrated through Elastic Agents or custom setups.
Categories
  • Network
  • Endpoint
  • Cloud
Data Sources
  • Network Traffic
  • Process
  • User Account
  • File
  • Application Log
Created: 2023-05-22