Tor client IP address identified in Slack

slack

Classification:

attack

Set up the slack integration.

Cette page n'est pas encore disponible en français, sa traduction est en cours.
Si vous avez des questions ou des retours sur notre projet de traduction actuel, n'hésitez pas à nous contacter.

Goal

Detect when Tor client activity is seen in Slack audit logs.

Strategy

This rule monitors Slack audit logs to determine when an activity had originated from a Tor client. Datadog enriches all ingested logs with expert-curated threat intelligence in real time. An attacker may use a Tor client to anonymize their true origin.

Triage and response

  1. Determine if the actions taken by the identity {{@usr.email}} are legitimate by looking at past activity and the type of logs occurring.
  2. If the results of the triage indicate that an attacker has taken the action, begin your organization’s incident response process and investigate.
PREVIEWING: rtrieu/product-analytics-ui-changes