Detection of Drive-by Compromise

Technique Detected:  Drive-by Compromise | T0817

ID: DET0782
Domains: ICS
Analytics: AN1914
Version: 1.0
Created: 21 October 2025
Last Modified: 21 October 2025

Analytics

AN1914

Monitor for unusual network traffic that may indicate additional tools transferred to the system. Use network intrusion detection systems, sometimes with SSL/TLS inspection, to look for known malicious scripts (recon, heap spray, and browser identification scripts have been frequently reused), common script obfuscation, and exploit code.
Firewalls and proxies can inspect URLs for potentially known-bad domains or parameters. They can also do reputation-based analytics on websites and their requested resources such as how old a domain is, who it's registered to, if it's on a known bad list, or how many other users have connected to it before.
Monitor for behaviors on the endpoint system that might indicate successful compromise, such as abnormal behaviors of browser processes. This could include suspicious files written to disk.
Monitor for newly constructed files written to disk through a user visiting a website over the normal course of browsing.
Monitor for newly constructed network connections to untrusted hosts that are used to send or receive data.

Log Sources
Data Component Name Channel
Network Traffic Content (DC0085) Network Traffic None
Application Log Content (DC0038) Application Log None
Process Creation (DC0032) Process None
File Creation (DC0039) File None
Network Connection Creation (DC0082) Network Traffic None