{"id":38710,"date":"2024-02-15T10:38:23","date_gmt":"2024-02-15T10:38:23","guid":{"rendered":"https:\/\/www.mfec.co.th\/uncategorized\/incident-response-detecting-and-analyzing-threats-through-malicious-behavior\/"},"modified":"2024-12-06T03:30:18","modified_gmt":"2024-12-06T03:30:18","slug":"incident-response-detecting-and-analyzing-threats-through-malicious-behavior","status":"publish","type":"post","link":"https:\/\/www.mfec.co.th\/en\/tech-talk\/incident-response-detecting-and-analyzing-threats-through-malicious-behavior\/","title":{"rendered":"Incident Response \u2013 Detecting and Analyzing Threats Through Malicious Behavior"},"content":{"rendered":"\n<p>One of the challenges in responding to cyber threats is monitoring and responding to attacks that continuously evolve in their methods and techniques. Relying solely on signature-based detection, which identifies specific characteristics of attack patterns, may not be sufficient. It&#8217;s necessary to also incorporate anomaly detection or abnormal behavior analysis for more comprehensive coverage. Although there are tools available today to assist in detecting such incidents, the ability of analysts to understand how these tools work or to identify abnormalities that the tools might miss can greatly enhance the accuracy of threat response. <\/p>\n\n<p><span class=\"TextRun SCXW43188030 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW43188030 BCX0\">The incident response process, as recommended by NIST SP 800-61r2, is divided into four steps. This article focuses on step 2, Detection and Analysis. The aim is to help those involved in threat analysis understand how to detect and analyze malicious behavior. Key points from two documents\u2014Technical Approaches to Uncovering and Remediating Malicious Activity and Federal Government Cybersecurity Incident and Vulnerability Response Playbooks\u2014will be referenced, with the content divided into three sections: Log to collect, Methods for Analyzing Abnormal Behavior, and Recommended Response Actions.<\/span><\/span><span class=\"EOP SCXW43188030 BCX0\" data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n\n<p><\/p>\n\n<p><strong><span class=\"TextRun MacChromeBold SCXW210093794 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW210093794 BCX0\">Part 1:<\/span><span class=\"NormalTextRun SCXW210093794 BCX0\"> Log to collect<\/span><\/span><span class=\"EOP SCXW210093794 BCX0\" data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:0,&quot;335559739&quot;:405}\">\u00a0<\/span><\/strong><\/p>\n\n<p>When considering which logs to collect, you can start by looking at what is required by law (e.g., the Computer Crime Act of 2021). Then, expand to cover the requirements of audits or regulatory bodies, and define the use cases along with the urgency level of each event. <\/p>\n\n<p>Another approach is to choose use cases first (e.g., referencing techniques in MITRE ATT&amp;CK that are commonly used by attackers). Afterward, link the log sources to the relevant techniques and specify indicators to create detection rules. The selection of use cases can be based on several factors, such as activities that are inconsistent with the organization\u2019s IT security policy, alerts from security analytics devices, threat intelligence data, or information from other sources useful for monitoring abnormal events. <\/p>\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-full is-resized\"><img src=\"https:\/\/www.mfec.co.th\/wp-content\/uploads\/2024\/02\/image-1.png\" alt=\"\" class=\"wp-image-34190\" width=\"736\" height=\"624\" srcset=\"https:\/\/www.mfec.co.th\/wp-content\/uploads\/2024\/02\/image-1.png 936w, https:\/\/www.mfec.co.th\/wp-content\/uploads\/2024\/02\/image-1-300x254.png 300w\" sizes=\"(max-width: 736px) 100vw, 736px\" \/><\/figure><\/div>\n\n<p>The selection of indicators to create detection rules can be based on attack vectors and potential impacts on the systems to be monitored. For example, consider how attackers can access the system, which accounts have elevated privileges, and if successful, how malware might be installed or a backdoor created for future access. Additionally, assess whether lateral movement to other systems within the organization is possible, or if sensitive data could be directly transferred from the compromised system. This information can help identify related events for crafting detection rule logic. <\/p>\n\n<p><\/p>\n\n<p><strong><span class=\"TextRun MacChromeBold SCXW149262479 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW149262479 BCX0\">Part 2: <\/span><\/span><span class=\"TextRun SCXW149262479 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW149262479 BCX0\">Methods for Analyzing Abnormal Behavior<\/span><\/span><span class=\"EOP SCXW149262479 BCX0\" data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:0,&quot;335559739&quot;:405}\">\u00a0<\/span><\/strong><\/p>\n\n<p>After selecting log sources and evaluating indicators based on potential threats, the next step is to define conditions for detecting or searching for abnormal events. This can be divided into four approaches: <\/p>\n\n<ol type=\"1\"><li><em><span class=\"TextRun SCXW135194319 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW135194319 BCX0\">Indicator of Compromise (IOC) Search<\/span><\/span><\/em><span class=\"TextRun SCXW135194319 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW135194319 BCX0\"> \u2013 <\/span><\/span><span class=\"TextRun SCXW135194319 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW135194319 BCX0\">This<\/span> <span class=\"NormalTextRun SCXW135194319 BCX0\">involves<\/span> <span class=\"NormalTextRun SCXW135194319 BCX0\">directly<\/span> <span class=\"NormalTextRun SCXW135194319 BCX0\">searching<\/span> <span class=\"NormalTextRun SCXW135194319 BCX0\">for<\/span> <span class=\"NormalTextRun SCXW135194319 BCX0\">identified<\/span> <span class=\"NormalTextRun SCXW135194319 BCX0\">malicious<\/span> <span class=\"NormalTextRun SCXW135194319 BCX0\">data<\/span><span class=\"NormalTextRun SCXW135194319 BCX0\"> (<\/span><span class=\"NormalTextRun SCXW135194319 BCX0\">e.g<\/span><span class=\"NormalTextRun SCXW135194319 BCX0\">., <\/span><span class=\"NormalTextRun SCXW135194319 BCX0\">domains<\/span><span class=\"NormalTextRun SCXW135194319 BCX0\">, IP <\/span><span class=\"NormalTextRun SCXW135194319 BCX0\">addresses<\/span><span class=\"NormalTextRun SCXW135194319 BCX0\">, <\/span><span class=\"NormalTextRun SCXW135194319 BCX0\">file<\/span> <span class=\"NormalTextRun SCXW135194319 BCX0\">hashes<\/span><span class=\"NormalTextRun SCXW135194319 BCX0\">) <\/span><span class=\"NormalTextRun SCXW135194319 BCX0\">in<\/span> <span class=\"NormalTextRun SCXW135194319 BCX0\">logs<\/span><span class=\"NormalTextRun SCXW135194319 BCX0\">. <\/span><span class=\"NormalTextRun SCXW135194319 BCX0\">The<\/span> <span class=\"NormalTextRun SCXW135194319 BCX0\">advantage<\/span> <span class=\"NormalTextRun SCXW135194319 BCX0\">is<\/span> <span class=\"NormalTextRun SCXW135194319 BCX0\">that<\/span> <span class=\"NormalTextRun SCXW135194319 BCX0\">it<\/span> <span class=\"NormalTextRun SCXW135194319 BCX0\">is<\/span> <span class=\"NormalTextRun SCXW135194319 BCX0\">straightforward<\/span> <span class=\"NormalTextRun SCXW135194319 BCX0\">with<\/span><span class=\"NormalTextRun SCXW135194319 BCX0\"> a <\/span><span class=\"NormalTextRun SCXW135194319 BCX0\">lower<\/span> <span class=\"NormalTextRun SCXW135194319 BCX0\">chance<\/span> <span class=\"NormalTextRun SCXW135194319 BCX0\">of<\/span> <span class=\"NormalTextRun SCXW135194319 BCX0\">false<\/span> <span class=\"NormalTextRun SCXW135194319 BCX0\">positives<\/span><span class=\"NormalTextRun SCXW135194319 BCX0\">. <\/span><span class=\"NormalTextRun SCXW135194319 BCX0\">However<\/span><span class=\"NormalTextRun SCXW135194319 BCX0\">, <\/span><span class=\"NormalTextRun SCXW135194319 BCX0\">the<\/span> <span class=\"NormalTextRun SCXW135194319 BCX0\">downside<\/span> <span class=\"NormalTextRun SCXW135194319 BCX0\">is<\/span> <span class=\"NormalTextRun SCXW135194319 BCX0\">that<\/span><span class=\"NormalTextRun SCXW135194319 BCX0\"> IOC-<\/span><span class=\"NormalTextRun SCXW135194319 BCX0\">based<\/span> <span class=\"NormalTextRun SCXW135194319 BCX0\">detection<\/span> <span class=\"NormalTextRun SCXW135194319 BCX0\">can<\/span> <span class=\"NormalTextRun SCXW135194319 BCX0\">be<\/span> <span class=\"NormalTextRun SCXW135194319 BCX0\">easily<\/span> <span class=\"NormalTextRun SCXW135194319 BCX0\">bypassed<\/span><span class=\"NormalTextRun SCXW135194319 BCX0\">, <\/span><span class=\"NormalTextRun SCXW135194319 BCX0\">and<\/span> <span class=\"NormalTextRun SCXW135194319 BCX0\">network-related<\/span> <span class=\"NormalTextRun SCXW135194319 BCX0\">IOCs<\/span> <span class=\"NormalTextRun SCXW135194319 BCX0\">may<\/span> <span class=\"NormalTextRun SCXW135194319 BCX0\">be<\/span> <span class=\"NormalTextRun SCXW135194319 BCX0\">dynamic<\/span><span class=\"NormalTextRun SCXW135194319 BCX0\">, <\/span><span class=\"NormalTextRun SCXW135194319 BCX0\">leading<\/span> <span class=\"NormalTextRun SCXW135194319 BCX0\">to<\/span> <span class=\"NormalTextRun SCXW135194319 BCX0\">false<\/span> <span class=\"NormalTextRun SCXW135194319 BCX0\">positives<\/span> <span class=\"NormalTextRun SCXW135194319 BCX0\">over<\/span> <span class=\"NormalTextRun SCXW135194319 BCX0\">time<\/span><span class=\"NormalTextRun SCXW135194319 BCX0\">.<\/span><\/span><span class=\"EOP SCXW135194319 BCX0\" data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:0,&quot;335559739&quot;:0}\">\u00a0<\/span><\/li><li><em><span class=\"TextRun SCXW86631939 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW86631939 BCX0\">Frequency Analysis<\/span><\/span><\/em><span class=\"TextRun SCXW86631939 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW86631939 BCX0\"> \u2013 <\/span><\/span><span class=\"TextRun SCXW86631939 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW86631939 BCX0\">This<\/span> <span class=\"NormalTextRun SCXW86631939 BCX0\">method<\/span> <span class=\"NormalTextRun SCXW86631939 BCX0\">identifies<\/span> <span class=\"NormalTextRun SCXW86631939 BCX0\">abnormalities<\/span> <span class=\"NormalTextRun SCXW86631939 BCX0\">based<\/span> <span class=\"NormalTextRun SCXW86631939 BCX0\">on<\/span> <span class=\"NormalTextRun SCXW86631939 BCX0\">human<\/span> <span class=\"NormalTextRun SCXW86631939 BCX0\">behavior<\/span> <span class=\"NormalTextRun SCXW86631939 BCX0\">by<\/span> <span class=\"NormalTextRun SCXW86631939 BCX0\">analyzing<\/span> <span class=\"NormalTextRun SCXW86631939 BCX0\">datasets<\/span> <span class=\"NormalTextRun SCXW86631939 BCX0\">to<\/span> <span class=\"NormalTextRun SCXW86631939 BCX0\">establish<\/span> <span class=\"NormalTextRun SCXW86631939 BCX0\">patterns<\/span> <span class=\"NormalTextRun SCXW86631939 BCX0\">of<\/span> <span class=\"NormalTextRun SCXW86631939 BCX0\">normal<\/span> <span class=\"NormalTextRun SCXW86631939 BCX0\">activities<\/span><span class=\"NormalTextRun SCXW86631939 BCX0\">, <\/span><span class=\"NormalTextRun SCXW86631939 BCX0\">then<\/span> <span class=\"NormalTextRun SCXW86631939 BCX0\">monitoring<\/span> <span class=\"NormalTextRun SCXW86631939 BCX0\">for<\/span> <span class=\"NormalTextRun SCXW86631939 BCX0\">events<\/span> <span class=\"NormalTextRun SCXW86631939 BCX0\">that<\/span> <span class=\"NormalTextRun SCXW86631939 BCX0\">fall<\/span> <span class=\"NormalTextRun SCXW86631939 BCX0\">outside<\/span> <span class=\"NormalTextRun SCXW86631939 BCX0\">these<\/span> <span class=\"NormalTextRun SCXW86631939 BCX0\">established<\/span> <span class=\"NormalTextRun SCXW86631939 BCX0\">patterns<\/span><span class=\"NormalTextRun SCXW86631939 BCX0\">. <\/span><span class=\"NormalTextRun SCXW86631939 BCX0\">For<\/span> <span class=\"NormalTextRun SCXW86631939 BCX0\">example<\/span><span class=\"NormalTextRun SCXW86631939 BCX0\">, <\/span><span class=\"NormalTextRun SCXW86631939 BCX0\">logins<\/span> <span class=\"NormalTextRun SCXW86631939 BCX0\">outside<\/span> <span class=\"NormalTextRun SCXW86631939 BCX0\">working<\/span> <span class=\"NormalTextRun SCXW86631939 BCX0\">hours<\/span><span class=\"NormalTextRun SCXW86631939 BCX0\">, <\/span><span class=\"NormalTextRun SCXW86631939 BCX0\">logins<\/span> <span class=\"NormalTextRun SCXW86631939 BCX0\">from<\/span> <span class=\"NormalTextRun SCXW86631939 BCX0\">unfamiliar<\/span> <span class=\"NormalTextRun SCXW86631939 BCX0\">devices<\/span><span class=\"NormalTextRun SCXW86631939 BCX0\">, <\/span><span class=\"NormalTextRun SCXW86631939 BCX0\">or<\/span> <span class=\"NormalTextRun SCXW86631939 BCX0\">the<\/span> <span class=\"NormalTextRun SCXW86631939 BCX0\">use<\/span> <span class=\"NormalTextRun SCXW86631939 BCX0\">of<\/span> <span class=\"NormalTextRun SCXW86631939 BCX0\">previously<\/span> <span class=\"NormalTextRun SCXW86631939 BCX0\">unused<\/span> <span class=\"NormalTextRun SCXW86631939 BCX0\">ports<\/span><span class=\"NormalTextRun SCXW86631939 BCX0\">.<\/span><\/span><span class=\"EOP SCXW86631939 BCX0\" data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:0,&quot;335559739&quot;:0}\">\u00a0<\/span><\/li><li><span class=\"TextRun SCXW108113708 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW108113708 BCX0\"><em>Pattern Analysis<\/em> <\/span><\/span><span class=\"TextRun SCXW108113708 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW108113708 BCX0\">\u2013 <\/span><\/span><span class=\"TextRun SCXW108113708 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW108113708 BCX0\">This<\/span> <span class=\"NormalTextRun SCXW108113708 BCX0\">method<\/span> <span class=\"NormalTextRun SCXW108113708 BCX0\">looks<\/span> <span class=\"NormalTextRun SCXW108113708 BCX0\">for<\/span> <span class=\"NormalTextRun SCXW108113708 BCX0\">abnormalities<\/span> <span class=\"NormalTextRun SCXW108113708 BCX0\">caused<\/span> <span class=\"NormalTextRun SCXW108113708 BCX0\">by<\/span> <span class=\"NormalTextRun SCXW108113708 BCX0\">malware<\/span> <span class=\"NormalTextRun SCXW108113708 BCX0\">or<\/span> <span class=\"NormalTextRun SCXW108113708 BCX0\">automated<\/span> <span class=\"NormalTextRun SCXW108113708 BCX0\">scripts<\/span><span class=\"NormalTextRun SCXW108113708 BCX0\">, <\/span><span class=\"NormalTextRun SCXW108113708 BCX0\">which<\/span> <span class=\"NormalTextRun SCXW108113708 BCX0\">differ<\/span> <span class=\"NormalTextRun SCXW108113708 BCX0\">from<\/span> <span class=\"NormalTextRun SCXW108113708 BCX0\">normal<\/span> <span class=\"NormalTextRun SCXW108113708 BCX0\">human<\/span> <span class=\"NormalTextRun SCXW108113708 BCX0\">behavior<\/span><span class=\"NormalTextRun SCXW108113708 BCX0\">. <\/span><span class=\"NormalTextRun SCXW108113708 BCX0\">For<\/span> <span class=\"NormalTextRun SCXW108113708 BCX0\">instance<\/span><span class=\"NormalTextRun SCXW108113708 BCX0\">, <\/span><span class=\"NormalTextRun SCXW108113708 BCX0\">recurring<\/span> <span class=\"NormalTextRun SCXW108113708 BCX0\">events<\/span> <span class=\"NormalTextRun SCXW108113708 BCX0\">occurring<\/span> <span class=\"NormalTextRun SCXW108113708 BCX0\">at<\/span> <span class=\"NormalTextRun SCXW108113708 BCX0\">the<\/span> <span class=\"NormalTextRun SCXW108113708 BCX0\">same<\/span> <span class=\"NormalTextRun SCXW108113708 BCX0\">time<\/span> <span class=\"NormalTextRun SCXW108113708 BCX0\">every<\/span> <span class=\"NormalTextRun SCXW108113708 BCX0\">day<\/span><span class=\"NormalTextRun SCXW108113708 BCX0\">.<\/span><\/span><span class=\"EOP SCXW108113708 BCX0\" data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:0,&quot;335559739&quot;:0}\">\u00a0<\/span><\/li><li><em><span class=\"TextRun SCXW192937009 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW192937009 BCX0\">Anomaly Analysis<\/span><\/span><\/em><span class=\"TextRun SCXW192937009 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW192937009 BCX0\"> \u2013 <\/span><\/span><span class=\"TextRun SCXW192937009 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW192937009 BCX0\">Analysts<\/span> <span class=\"NormalTextRun SCXW192937009 BCX0\">collaborate<\/span> <span class=\"NormalTextRun SCXW192937009 BCX0\">with<\/span> <span class=\"NormalTextRun SCXW192937009 BCX0\">system<\/span> <span class=\"NormalTextRun SCXW192937009 BCX0\">administrators<\/span> <span class=\"NormalTextRun SCXW192937009 BCX0\">to<\/span> <span class=\"NormalTextRun SCXW192937009 BCX0\">look<\/span> <span class=\"NormalTextRun SCXW192937009 BCX0\">for<\/span> <span class=\"NormalTextRun SCXW192937009 BCX0\">behavior<\/span> <span class=\"NormalTextRun SCXW192937009 BCX0\">or<\/span> <span class=\"NormalTextRun SCXW192937009 BCX0\">errors<\/span> <span class=\"NormalTextRun SCXW192937009 BCX0\">in<\/span> <span class=\"NormalTextRun SCXW192937009 BCX0\">the<\/span> <span class=\"NormalTextRun SCXW192937009 BCX0\">system<\/span> <span class=\"NormalTextRun SCXW192937009 BCX0\">that<\/span> <span class=\"NormalTextRun SCXW192937009 BCX0\">are<\/span> <span class=\"NormalTextRun SCXW192937009 BCX0\">abnormal<\/span> <span class=\"NormalTextRun SCXW192937009 BCX0\">but<\/span> <span class=\"NormalTextRun SCXW192937009 BCX0\">may<\/span> <span class=\"NormalTextRun SCXW192937009 BCX0\">not<\/span> <span class=\"NormalTextRun SCXW192937009 BCX0\">yet<\/span> <span class=\"NormalTextRun SCXW192937009 BCX0\">be<\/span> <span class=\"NormalTextRun SCXW192937009 BCX0\">definitively<\/span> <span class=\"NormalTextRun SCXW192937009 BCX0\">identified<\/span> <span class=\"NormalTextRun SCXW192937009 BCX0\">as<\/span> <span class=\"NormalTextRun SCXW192937009 BCX0\">an<\/span> <span class=\"NormalTextRun SCXW192937009 BCX0\">attack<\/span><span class=\"NormalTextRun SCXW192937009 BCX0\">.<\/span><\/span><span class=\"EOP SCXW192937009 BCX0\" data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:0,&quot;335559739&quot;:0}\">\u00a0<\/span><\/li><\/ol>\n\n<p>Methods for detecting abnormalities on hosts generally focus on analyzing data from processes, applications, files, user accounts, and event logs present on the machines. Some abnormalities are clear indicators of an attack, while others may require confirmation from relevant personnel. Examples of detecting abnormalities on a host include: <\/p>\n\n<ul><li>Processes attempting to connect to the internet and send data to suspicious endpoints, which could be botnet behavior sending beacon signals to communicate with command and control systems.  <\/li><li>Detection of PowerShell command lines encoded in Base64, which may indicate an attempt to bypass detection of malicious command execution. <\/li><li>Suspicious login attempts, such as successful logins from IPs that have never been used before. <\/li><li>Accounts that cannot be identified or are being used for unclear purposes. <\/li><li>Programs or scripts being executed from the temp directory, which should not typically be used for installing or running programs. <\/li><\/ul>\n\n<p>For network-based detection, the focus is on detecting anomalies in DNS traffic, the use of remote access protocols (e.g., RDP, VPN, SSH), file transfer protocols (e.g., FTP, torrent), or other communication channels outside of authorized use. Examples of detecting abnormalities on the network include: <\/p>\n\n<ul><li>Internal machines opening ports that allow external network connections, which were not requested or cannot be identified as specific services. <\/li><li>Abnormal spikes in traffic, which could indicate data uploads to an external network, or patterns of data transmission (e.g., a connection attempt every hour), which may indicate malware activity. <\/li><li>Connections to IPs or domains known to be associated with malware or attacks, especially when multiple connection attempts are made even after being blocked. This may suggest malware infection.  <\/li><\/ul>\n\n<p><\/p>\n\n<p><strong><span class=\"TextRun MacChromeBold SCXW128976489 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW128976489 BCX0\">Part 3: <\/span><\/span><span class=\"TextRun SCXW128976489 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW128976489 BCX0\">Recommended Response Actions<\/span><\/span><span class=\"EOP SCXW128976489 BCX0\" data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:0,&quot;335559739&quot;:405}\">\u00a0<\/span><\/strong><\/p>\n\n<p>The incident response process, following detection and analysis, moves to containment, eradication, and recovery once confirmation has been made that the endpoint has been successfully compromised. The next step is to limit the damage to prevent the affected system from being used to spread to others. Afterward, malware is removed or any changes made by the attacker are reversed, and the system is restored to normal operations. However, one process that may introduce risks (or further damage) is when taking action too early before transitioning from analysis to containment. <\/p>\n\n<p>The purpose of conducting analysis is to assess the damage, impact, and potentially investigate the attack vector and links to the attack group involved. There are two main points to be cautious about: first, ensuring the preservation of evidence or minimizing interference with volatile data on the compromised system (e.g., avoiding restarting or shutting down the system before evidence collection); and second, preventing the attacker from becoming aware of detection (e.g., avoiding pinging, connecting to IPs, or visiting the attacker\u2019s websites), as the attacker may change tactics or attempt to destroy evidence or further compromise data on the system they control. <\/p>\n\n<p>The purpose of containment is to limit the scope of damage after a system has been compromised by an attacker. There are several approaches for implementation, such as disconnecting the affected system from the organization&#8217;s main network, blocking connections to IPs or domains associated with the attack, or suspending access rights to accounts that the attacker has gained unauthorized access to. However, some actions may require careful consideration to ensure thorough verification, as the attacker may change tactics or utilize other undiscovered channels to re-enter the system. For instance, blocking only the attacker\u2019s IP or domain might prompt them to switch to a new IP or domain and launch another attack. Similarly, suspending access to the compromised account may lead the attacker to use another account that hasn&#8217;t been detected yet. Therefore, before containment is executed, it&#8217;s important to verify that all necessary actions have been taken, and continued monitoring may be required to detect any abnormal activity even after containment is in place. <\/p>\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large is-resized\"><img src=\"https:\/\/www.mfec.co.th\/wp-content\/uploads\/2024\/02\/Incident-Response-01-2-1024x536.jpg\" alt=\"\" class=\"wp-image-34193\" width=\"598\" height=\"312\" srcset=\"https:\/\/www.mfec.co.th\/wp-content\/uploads\/2024\/02\/Incident-Response-01-2-1024x536.jpg 1024w, https:\/\/www.mfec.co.th\/wp-content\/uploads\/2024\/02\/Incident-Response-01-2-300x157.jpg 300w, https:\/\/www.mfec.co.th\/wp-content\/uploads\/2024\/02\/Incident-Response-01-2.jpg 1920w\" sizes=\"(max-width: 598px) 100vw, 598px\" \/><\/figure><\/div>\n\n<p><strong><span class=\"TextRun MacChromeBold SCXW185764078 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW185764078 BCX0\">Conclusion<\/span><\/span><span class=\"EOP SCXW185764078 BCX0\" data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:0,&quot;335559739&quot;:405}\">\u00a0<\/span><\/strong><\/p>\n\n<p>Detecting and analyzing threats based on malicious behavior, as well as choosing appropriate approaches to limit the scope of damage, are key factors that can help organizations respond to attacks accurately and comprehensively. Whether it&#8217;s collecting log, anomaly detection, or selecting a response strategy to address the issue, these tasks require collaboration and information exchange between system administrators and threat analysis teams. This ensures that sufficient information is available to make timely and informed decisions in response to the situation. <\/p>\n\n<p><span class=\"TextRun SCXW248361416 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW248361416 BCX0\">MFEC is a comprehensive IT consulting and solution development company that plays a vital role in <\/span><span class=\"NormalTextRun SCXW248361416 BCX0\">establishing<\/span><span class=\"NormalTextRun SCXW248361416 BCX0\"> IT foundations for leading clients across various industries. With over 20 years of experience, the company <\/span><span class=\"NormalTextRun SCXW248361416 BCX0\">leverages<\/span><span class=\"NormalTextRun SCXW248361416 BCX0\"> its strength in providing Cyber Security services and IT solutions to organizational clients. <\/span><span class=\"NormalTextRun SCXW248361416 BCX0\">MFEC offers a <\/span><\/span><a class=\"Hyperlink SCXW248361416 BCX0\" href=\"https:\/\/www.techtalkthai.com\/guest-post-mfec-cyber-security-operation-center\/\" target=\"_blank\" rel=\"noreferrer noopener\"><span class=\"TextRun SCXW248361416 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW248361416 BCX0\" data-ccp-charstyle=\"Hyperlink\">Cyber Security Operation Center (CSOC)<\/span><\/span><\/a><span class=\"TextRun SCXW248361416 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW248361416 BCX0\"> service, which provides 24\/7 monitoring, as well as precise analysis and timely response to security incidents.<\/span><\/span><span class=\"EOP SCXW248361416 BCX0\" data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n\n<p><span class=\"TextRun SCXW34865294 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW34865294 BCX0\">For<\/span> <span class=\"NormalTextRun SCXW34865294 BCX0\">organizational<\/span> <span class=\"NormalTextRun SCXW34865294 BCX0\">clients<\/span> <span class=\"NormalTextRun SCXW34865294 BCX0\">and<\/span> <span class=\"NormalTextRun SCXW34865294 BCX0\">businesses<\/span> <span class=\"NormalTextRun SCXW34865294 BCX0\">interested<\/span> <span class=\"NormalTextRun SCXW34865294 BCX0\">in<\/span> <span class=\"NormalTextRun SCXW34865294 BCX0\">using<\/span> <span class=\"NormalTextRun SCXW34865294 BCX0\">the<\/span><span class=\"NormalTextRun SCXW34865294 BCX0\"> CSOC <\/span><span class=\"NormalTextRun SCXW34865294 BCX0\">as<\/span><span class=\"NormalTextRun SCXW34865294 BCX0\"> a <\/span><span class=\"NormalTextRun SCXW34865294 BCX0\">service<\/span> <span class=\"NormalTextRun SCXW34865294 BCX0\">or<\/span> <span class=\"NormalTextRun SCXW34865294 BCX0\">other<\/span> <span class=\"NormalTextRun SCXW34865294 BCX0\">Cyber<\/span> <span class=\"NormalTextRun SCXW34865294 BCX0\">Security-related<\/span> <span class=\"NormalTextRun SCXW34865294 BCX0\">services<\/span><span class=\"NormalTextRun SCXW34865294 BCX0\">, <\/span><span class=\"NormalTextRun SCXW34865294 BCX0\">please<\/span> <span class=\"NormalTextRun ContextualSpellingAndGrammarErrorV2Themed SCXW34865294 BCX0\">contact:<\/span> <\/span><span class=\"TextRun SCXW34865294 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun ContextualSpellingAndGrammarErrorV2Themed SCXW34865294 BCX0\">email<\/span><span class=\"NormalTextRun ContextualSpellingAndGrammarErrorV2Themed SCXW34865294 BCX0\"> :<\/span> <\/span><a class=\"Hyperlink SCXW34865294 BCX0\" href=\"mailto:infosec@mfec.co.th\" target=\"_blank\" rel=\"noreferrer noopener\"><span class=\"TextRun SCXW34865294 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW34865294 BCX0\" data-ccp-charstyle=\"Hyperlink\">infosec@mfec.co.th<\/span><\/span><\/a><span class=\"EOP SCXW34865294 BCX0\" data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:0,&quot;335559739&quot;:405}\">\u00a0<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>One of the challenges in responding to cyber threats is monitoring and responding to attacks that continuously evolve in their methods and techniques. Relying solely on signature-based detection, which identifies specific characteristics of attack patterns, may not be sufficient. It&#8217;s necessary to also incorporate anomaly detection or abnormal behavior analysis for more comprehensive coverage. Although [&hellip;]<\/p>\n","protected":false},"author":10,"featured_media":34194,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0},"categories":[17,92,110],"tags":[],"acf":[],"aioseo_notices":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v19.3 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Incident Response<\/title>\n<meta name=\"description\" content=\"Detecting and Analyzing Threats Through Malicious Behavior\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.mfec.co.th\/en\/tech-talk\/incident-response-detecting-and-analyzing-threats-through-malicious-behavior\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Incident Response\" \/>\n<meta property=\"og:description\" content=\"Detecting and Analyzing Threats Through Malicious Behavior\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mfec.co.th\/en\/tech-talk\/incident-response-detecting-and-analyzing-threats-through-malicious-behavior\/\" \/>\n<meta property=\"og:site_name\" content=\"MFEC | The Leading Tech Company in Thailand\" \/>\n<meta property=\"article:published_time\" content=\"2024-02-15T10:38:23+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-12-06T03:30:18+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mfec.co.th\/wp-content\/uploads\/2024\/02\/Incident-Response-01-2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1005\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"MFEC\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"MFEC\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mfec.co.th\/en\/#organization\",\"name\":\"MFEC | The Leading Tech Company in Thailand\",\"url\":\"https:\/\/www.mfec.co.th\/en\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mfec.co.th\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mfec.co.th\/wp-content\/uploads\/2023\/06\/Black-MFEC-More.png\",\"contentUrl\":\"https:\/\/www.mfec.co.th\/wp-content\/uploads\/2023\/06\/Black-MFEC-More.png\",\"width\":240,\"height\":77,\"caption\":\"MFEC | The Leading Tech Company in Thailand\"},\"image\":{\"@id\":\"https:\/\/www.mfec.co.th\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mfec.co.th\/en\/#website\",\"url\":\"https:\/\/www.mfec.co.th\/en\/\",\"name\":\"MFEC | The Leading Tech Company in Thailand\",\"description\":\"MFEC | The Leading Tech Company in Thailand\",\"publisher\":{\"@id\":\"https:\/\/www.mfec.co.th\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mfec.co.th\/en\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mfec.co.th\/en\/tech-talk\/incident-response-detecting-and-analyzing-threats-through-malicious-behavior\/#primaryimage\",\"url\":\"https:\/\/www.mfec.co.th\/wp-content\/uploads\/2024\/02\/Incident-Response-01-2.jpg\",\"contentUrl\":\"https:\/\/www.mfec.co.th\/wp-content\/uploads\/2024\/02\/Incident-Response-01-2.jpg\",\"width\":1920,\"height\":1005},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mfec.co.th\/en\/tech-talk\/incident-response-detecting-and-analyzing-threats-through-malicious-behavior\/\",\"url\":\"https:\/\/www.mfec.co.th\/en\/tech-talk\/incident-response-detecting-and-analyzing-threats-through-malicious-behavior\/\",\"name\":\"Incident Response\",\"isPartOf\":{\"@id\":\"https:\/\/www.mfec.co.th\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mfec.co.th\/en\/tech-talk\/incident-response-detecting-and-analyzing-threats-through-malicious-behavior\/#primaryimage\"},\"datePublished\":\"2024-02-15T10:38:23+00:00\",\"dateModified\":\"2024-12-06T03:30:18+00:00\",\"description\":\"Detecting and Analyzing Threats Through Malicious Behavior\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mfec.co.th\/en\/tech-talk\/incident-response-detecting-and-analyzing-threats-through-malicious-behavior\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mfec.co.th\/en\/tech-talk\/incident-response-detecting-and-analyzing-threats-through-malicious-behavior\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mfec.co.th\/en\/tech-talk\/incident-response-detecting-and-analyzing-threats-through-malicious-behavior\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Incident Response \u2013 Detecting and Analyzing Threats Through Malicious Behavior\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mfec.co.th\/en\/tech-talk\/incident-response-detecting-and-analyzing-threats-through-malicious-behavior\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mfec.co.th\/en\/tech-talk\/incident-response-detecting-and-analyzing-threats-through-malicious-behavior\/\"},\"author\":{\"name\":\"MFEC\",\"@id\":\"https:\/\/www.mfec.co.th\/en\/#\/schema\/person\/b46959076bf6725a32607656a0cbb16c\"},\"headline\":\"Incident Response \u2013 Detecting and Analyzing Threats Through Malicious Behavior\",\"datePublished\":\"2024-02-15T10:38:23+00:00\",\"dateModified\":\"2024-12-06T03:30:18+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mfec.co.th\/en\/tech-talk\/incident-response-detecting-and-analyzing-threats-through-malicious-behavior\/\"},\"wordCount\":1417,\"publisher\":{\"@id\":\"https:\/\/www.mfec.co.th\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mfec.co.th\/en\/tech-talk\/incident-response-detecting-and-analyzing-threats-through-malicious-behavior\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mfec.co.th\/wp-content\/uploads\/2024\/02\/Incident-Response-01-2.jpg\",\"articleSection\":[\"COE\",\"Life at MFEC\",\"Tech Talk\"],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mfec.co.th\/en\/#\/schema\/person\/b46959076bf6725a32607656a0cbb16c\",\"name\":\"MFEC\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mfec.co.th\/en\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/acb46d5b36bd75b632b47ccf425430ef?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/acb46d5b36bd75b632b47ccf425430ef?s=96&d=mm&r=g\",\"caption\":\"MFEC\"},\"url\":\"https:\/\/www.mfec.co.th\/en\/author\/admincc\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Incident Response","description":"Detecting and Analyzing Threats Through Malicious Behavior","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.mfec.co.th\/en\/tech-talk\/incident-response-detecting-and-analyzing-threats-through-malicious-behavior\/","og_locale":"en_US","og_type":"article","og_title":"Incident Response","og_description":"Detecting and Analyzing Threats Through Malicious Behavior","og_url":"https:\/\/www.mfec.co.th\/en\/tech-talk\/incident-response-detecting-and-analyzing-threats-through-malicious-behavior\/","og_site_name":"MFEC | The Leading Tech Company in Thailand","article_published_time":"2024-02-15T10:38:23+00:00","article_modified_time":"2024-12-06T03:30:18+00:00","og_image":[{"width":1920,"height":1005,"url":"https:\/\/www.mfec.co.th\/wp-content\/uploads\/2024\/02\/Incident-Response-01-2.jpg","type":"image\/jpeg"}],"author":"MFEC","twitter_card":"summary_large_image","twitter_misc":{"Written by":"MFEC","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.mfec.co.th\/en\/#organization","name":"MFEC | The Leading Tech Company in Thailand","url":"https:\/\/www.mfec.co.th\/en\/","sameAs":[],"logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mfec.co.th\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.mfec.co.th\/wp-content\/uploads\/2023\/06\/Black-MFEC-More.png","contentUrl":"https:\/\/www.mfec.co.th\/wp-content\/uploads\/2023\/06\/Black-MFEC-More.png","width":240,"height":77,"caption":"MFEC | The Leading Tech Company in Thailand"},"image":{"@id":"https:\/\/www.mfec.co.th\/en\/#\/schema\/logo\/image\/"}},{"@type":"WebSite","@id":"https:\/\/www.mfec.co.th\/en\/#website","url":"https:\/\/www.mfec.co.th\/en\/","name":"MFEC | The Leading Tech Company in Thailand","description":"MFEC | The Leading Tech Company in Thailand","publisher":{"@id":"https:\/\/www.mfec.co.th\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mfec.co.th\/en\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mfec.co.th\/en\/tech-talk\/incident-response-detecting-and-analyzing-threats-through-malicious-behavior\/#primaryimage","url":"https:\/\/www.mfec.co.th\/wp-content\/uploads\/2024\/02\/Incident-Response-01-2.jpg","contentUrl":"https:\/\/www.mfec.co.th\/wp-content\/uploads\/2024\/02\/Incident-Response-01-2.jpg","width":1920,"height":1005},{"@type":"WebPage","@id":"https:\/\/www.mfec.co.th\/en\/tech-talk\/incident-response-detecting-and-analyzing-threats-through-malicious-behavior\/","url":"https:\/\/www.mfec.co.th\/en\/tech-talk\/incident-response-detecting-and-analyzing-threats-through-malicious-behavior\/","name":"Incident Response","isPartOf":{"@id":"https:\/\/www.mfec.co.th\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mfec.co.th\/en\/tech-talk\/incident-response-detecting-and-analyzing-threats-through-malicious-behavior\/#primaryimage"},"datePublished":"2024-02-15T10:38:23+00:00","dateModified":"2024-12-06T03:30:18+00:00","description":"Detecting and Analyzing Threats Through Malicious Behavior","breadcrumb":{"@id":"https:\/\/www.mfec.co.th\/en\/tech-talk\/incident-response-detecting-and-analyzing-threats-through-malicious-behavior\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mfec.co.th\/en\/tech-talk\/incident-response-detecting-and-analyzing-threats-through-malicious-behavior\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.mfec.co.th\/en\/tech-talk\/incident-response-detecting-and-analyzing-threats-through-malicious-behavior\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Incident Response \u2013 Detecting and Analyzing Threats Through Malicious Behavior"}]},{"@type":"Article","@id":"https:\/\/www.mfec.co.th\/en\/tech-talk\/incident-response-detecting-and-analyzing-threats-through-malicious-behavior\/#article","isPartOf":{"@id":"https:\/\/www.mfec.co.th\/en\/tech-talk\/incident-response-detecting-and-analyzing-threats-through-malicious-behavior\/"},"author":{"name":"MFEC","@id":"https:\/\/www.mfec.co.th\/en\/#\/schema\/person\/b46959076bf6725a32607656a0cbb16c"},"headline":"Incident Response \u2013 Detecting and Analyzing Threats Through Malicious Behavior","datePublished":"2024-02-15T10:38:23+00:00","dateModified":"2024-12-06T03:30:18+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mfec.co.th\/en\/tech-talk\/incident-response-detecting-and-analyzing-threats-through-malicious-behavior\/"},"wordCount":1417,"publisher":{"@id":"https:\/\/www.mfec.co.th\/en\/#organization"},"image":{"@id":"https:\/\/www.mfec.co.th\/en\/tech-talk\/incident-response-detecting-and-analyzing-threats-through-malicious-behavior\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mfec.co.th\/wp-content\/uploads\/2024\/02\/Incident-Response-01-2.jpg","articleSection":["COE","Life at MFEC","Tech Talk"],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.mfec.co.th\/en\/#\/schema\/person\/b46959076bf6725a32607656a0cbb16c","name":"MFEC","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mfec.co.th\/en\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/acb46d5b36bd75b632b47ccf425430ef?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/acb46d5b36bd75b632b47ccf425430ef?s=96&d=mm&r=g","caption":"MFEC"},"url":"https:\/\/www.mfec.co.th\/en\/author\/admincc\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mfec.co.th\/en\/wp-json\/wp\/v2\/posts\/38710"}],"collection":[{"href":"https:\/\/www.mfec.co.th\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mfec.co.th\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mfec.co.th\/en\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mfec.co.th\/en\/wp-json\/wp\/v2\/comments?post=38710"}],"version-history":[{"count":1,"href":"https:\/\/www.mfec.co.th\/en\/wp-json\/wp\/v2\/posts\/38710\/revisions"}],"predecessor-version":[{"id":38711,"href":"https:\/\/www.mfec.co.th\/en\/wp-json\/wp\/v2\/posts\/38710\/revisions\/38711"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mfec.co.th\/en\/wp-json\/wp\/v2\/media\/34194"}],"wp:attachment":[{"href":"https:\/\/www.mfec.co.th\/en\/wp-json\/wp\/v2\/media?parent=38710"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mfec.co.th\/en\/wp-json\/wp\/v2\/categories?post=38710"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mfec.co.th\/en\/wp-json\/wp\/v2\/tags?post=38710"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}