The "Data Gathering" detection focuses on identifying activities that involve the collection and aggregation of information from within an organization's network. This activity can be a precursor to more severe attacks, as attackers often gather data to understand the environment, identify targets, and plan their next steps. Detecting data gathering is crucial to prevent potential data breaches, privilege escalation, and other malicious activities.
Scenario 1: An attacker who has gained access to the network starts querying Active Directory to gather information about users, groups, and computers. The detection is triggered by the high volume of directory service queries.
Scenario 2: An insider threat scenario where an employee uses automated scripts to collect sensitive customer data from various databases. The detection is triggered by the unusual volume and pattern of data access activities.
If this detection indicates a genuine threat, the organization faces significant risks:
Unauthorized access to and potential exfiltration of sensitive information.
Attackers can use gathered data to escalate privileges within the network.
Extensive data gathering can disrupt normal operations and impact system performance.