Daily Blog #747: What I look for when reviewing external ips
文章指出,在审查外部IP地址日志时,传统的寻找外国可疑连接的方法已不再有效。当前威胁行为者多利用美国托管的虚拟专用服务器(VPS)进行攻击。通过ipinfo.io等工具分析IP来源(如托管服务、代理或VPN),可有效识别潜在威胁。合法员工极少从VPS连接,因此发现此类活动通常表明系统可能已被 compromise(入侵)。 2025-2-13 04:40:0 Author: www.hecfblog.com(查看原文) 阅读量:10 收藏

By February 12, 2025

Hello Reader,

One question I often receive from clients and new associates is: What do you look for when reviewing external IP addresses in logs, especially VPN or SAS logs?

In the past, analysts would typically begin their investigations by searching for suspicious connections originating from foreign countries. However, this approach is less effective today. Many companies operate globally, and even those that don’t often experience noise from automated scanners and brute-force attempts from foreign countries. While scanning for foreign countries sometimes yields results, most threat actors we track don’t actually originate from their native countries as indicated by their IP addresses.

What we’ve observed instead is that many threat actors—ranging from organized crime groups to nation-state actors—have shifted their operations to US-hosted virtual private servers (VPS). My current approach is to collect all unique IPs within a given time frame and enrich them with additional data, such as the datasets available from ipinfo.io. Their API can identify whether an IP is linked to hosting services, proxies, Tor nodes, anonymous IPs, or VPNs.

Documentation: IP Privacy Detection Database - IPinfo.io

I’ve found it’s very rare for a legitimate company employee to connect from a VPS. Therefore, when we narrow our list down to this subset, it often reliably indicates signs of compromise.

What techniques do you use? Let me know in the comments!


文章来源: https://www.hecfblog.com/2025/02/daily-blog-747-what-i-look-for-when.html
如有侵权请联系:admin#unsafe.sh