Uploaded on Jul 5, 2023
Malware is nothing but malicious software that damages your system without your knowledge. There are many types of malware like Trojan horse, spyware, ransomware, worms, virus, or any other spiteful code that damages our system. And, when the SOC team detects this malware or is notified about this infectious application, then that situation is called Malware Incident. The SOC team begins an investigation of the malware immediately after identifying it to know the gravity of the problem.
Five Steps to Investigate and Respond to Malware Incidents as a SOC Analyst
Five Steps to Investigate and
Respond to Malware Incidents as a
SOC Analyst
www.infosectrain.com | [email protected]
Malware is nothing but malicious software that damages your system without your
knowledge. There are many types of malware like Trojan horse, spyware, ransomware,
worms, virus, or any other spiteful code that damages our system. And, when the SOC
team detects this malware or is notified about this infectious application, then that
situation is called Malware Incident. The SOC team begins an investigation of the
malware immediately after identifying it to know the gravity of the problem.
www.infosectrain.com | [email protected]
There are four essential skills required for SOC analyst and they are:
1. Critical thinking
2. Performing under pressure
3. Strong fundamental skills
4. Curious mind
In this blog, we will discuss about who notifies the SOC team about malware and the
steps taken by the SOC team to investigate the malware. Let us discuss the life of a SOC
analyst:
Who notifies the SOC team about malware?
There are various stakeholders involved in notifying the SOC team about malware they
are:
Customers, Employees, or Clients: Whenever a malware attack happens, you
will observe the abnormal behaviour of the system like pop-up messages, many
irrelevant advertisements, system crashes, or Blue Screen Of Death. When this
behaviour is followed by Customers, Employees, or clients, they will notify Security
Operations teams to investigate the problem.
Defense and SOC security tools notify the malware: Due to the advanced
technology nowadays, it is becoming challenging to absorb the defects in the system;
hence SOC teams use different defense tools that will notify the malware in the system.
These detections are differentiated into two categories as given below, and without
these tools and the improved technologies behind them, the life of a SOC analyst would
be tough:
• Behavior-based detection.
• Signature-based detection.
www.infosectrain.com | [email protected]
Now let us discuss the Investigation and incident response steps taken by the SOC team:
Preparation: Preparation is the first important step in the process of responding to
malware attacks. In this step, the SOC team installs a security system in a place that
identifies an incident.
Identification: As SOC teams have set up a Security system, this will alert the
Intrusion Detection Systems, and web filtering gateways detect the unusual external
connection. And then, the SIEM solutions will connect the dots of an attacker passing
through the endpoint solution or the internal network.
Containment: Containment takes place to stop the further spread of the damage or
the malware to the network. Containment is needed to concentrate on the next stage of
the response.
Eradication: Eradication is one of the most complicated stages in the incident
response process because it includes forensic analysis to discover the degree of
presence of the threat actor. Security staff must make sure they eliminate the entire
existence. By re-imaging the machine, backdoors searching and determining the root
cause analysis of the incident.
Recovery: Recovery is the final stage in the incident response. In this stage, we get
the infected systems up and run them to reduce the potential monetary loss caused by
the infected system.
So, these are the five steps taken by the SOC team to investigate and give the incident
response.
www.infosectrain.com | [email protected]
Why Infosec Train:
InfosecTrain provides 80 hours of training with 4 hours per day with the
industry-certified trainers who use this time to train you excellently and with
real-life examples. You will get the recorded sessions by which you can learn at
your own pace. To enroll in our course and get a deep understanding of the
topic, please visit our website InfosecTrain
www.infosectrain.com | [email protected]
About InfosecTrain
• Established in 2016, we are one of the finest
Security and Technology Training and
Consulting company
• Wide range of professional training programs,
certifications & consulting services in the IT
and Cyber Security domain
• High-quality technical services, certifications
or customized training programs curated with
professionals of over 15 years of combined
experience in the domain
www.infosectrain.com | [email protected]
Our Endorsements
www.infosectrain.com | [email protected]
Why InfosecTrain Global Learning Partners
Certified and Flexible modes Access to the
Experienced Instructors of Training recorded
sessions
Post training Tailor Made
completion Training
www.infosectrain.com | [email protected]
Our Trusted Clients
www.infosectrain.com | [email protected]
Contact us
Get your workforce reskilled
by our certified and
experienced instructors!
IND: 1800-843-7890 (Toll Free) / US: +1 657-722-
11127 / UK : +44 7451 208413
[email protected]
www.infosectrain.com
Comments