Discovery

Data Gathering

Data Gathering

Detection overview

The "Data Gathering" detection focuses on identifying activities that involve the collection and aggregation of information from within an organization's network. This activity can be a precursor to more severe attacks, as attackers often gather data to understand the environment, identify targets, and plan their next steps. Detecting data gathering is crucial to prevent potential data breaches, privilege escalation, and other malicious activities.

Triggers

  • Pre-exfiltration behaviors have been observed on a host that has received abnormally high amounts of data from one or more hosts within a short period of time.

Possible Root Causes

  • An attacker has pivoted to a host to use for dumping/staging data prior to exfiltrating, likely taking advantage of the trusted nature of this host to bypass security controls and evade detection.
  • A malicious insider is collecting data they intend to steal from a position of trust.
  • A user has joined a new team, changed organizational roles, or otherwise been given reason to significantly depart from their typical data access and retrieval activities.
  • An application has been observed on an unusual or infrequent backup or update cycle.

Business Impact

  • Failure to identify and respond to pre-exfiltration activities in an organization increases the likelihood of data loss.
  • When successful, data exfiltration places an organization at the risk of the loss of intellectual property, financial data, or other regulated or sensitive data sources.

Steps to Verify

  1. Verify if the data gathered supports valid and authorized business activities.
  2. Investigate the host and associated accounts for other signs of compromise.
Data Gathering

Possible root causes

Malicious Detection

  • An external attacker has gained initial access and is performing reconnaissance to gather information.
  • Insider threat where an employee is collecting sensitive data for malicious purposes.
  • Use of malware or automated tools designed to gather data from the network.

Benign Detection

  • Legitimate administrative tasks involving data collection or backup.
  • Security assessments or penetration tests involving data gathering activities.
  • Business processes requiring the aggregation of information for analysis or reporting.
Data Gathering

Example scenarios

Scenario 1: An attacker who has gained access to the network starts querying Active Directory to gather information about users, groups, and computers. The detection is triggered by the high volume of directory service queries.

Scenario 2: An insider threat scenario where an employee uses automated scripts to collect sensitive customer data from various databases. The detection is triggered by the unusual volume and pattern of data access activities.

Data Gathering

Business impact

If this detection indicates a genuine threat, the organization faces significant risks:

Data Breach

Unauthorized access to and potential exfiltration of sensitive information.

Privilege Escalation

Attackers can use gathered data to escalate privileges within the network.

Operational Disruption

Extensive data gathering can disrupt normal operations and impact system performance.

Data Gathering

Steps to investigate

FAQs

What is data gathering in the context of cybersecurity?

How can I detect data gathering activities in my environment?

What are the common signs of data gathering activities?

Why is data gathering a significant threat?

Can legitimate activities trigger the detection of data gathering?

What steps should I take if I detect data gathering?

How does Vectra AI detect data gathering activities?

What tools can help verify the presence of data gathering?

What is the business impact of data gathering?

How can I prevent unauthorized data gathering?