When to connect with ISG Threat Intelligence Team? |
How will Assocaite know of the issue |
Immediate actions to be taken |
What Information is to be provided to the TI Team |
Actions Taken by Threat Intelligence Team |
Malware Alert on TechM System |
Pop-up from Antivirus
Email from TIM or ISG |
- Disconnect system from internet and LAN
- Change password for TechM & Customer Applications
- Sign-out from everywhere and revalidate using 2FA
- Initiate Full AV Scan on the System
|
- Hostname, IP address
- Alert date and time.
- Tool on which Alert Triggered (Antivirus, EDR, Proxy, Email gateway etc.)
- Full path of file with virus details.
|
- System Isolation & Scanning
- Investigation (Validation of FireEye, AV, Sign-in & Zscaler Logs, System Review) & RCA
|
Suspicious Sign-in Alerts or Notifications or SMS due to Credential Leakage |
SMS or Microsoft Authenticator Alert on Mobile |
- Change password for TechM & Customer Applications
- Sign-out from everywhere and revalidate using 2FA
|
- Username and Email address.
- Host Name, IP address and location details
- MFA status
- Sign Ins type (Failed, interrupted, successful)
|
- Investigation (Validation of FireEye, AV, Sign-in & Zscaler Logs, System Review) & RCA
|
Suspicious activities on TechM Hosted Web Application |
Unexplained Data Deletion, Unknown Sign-ins observed in Application Logs |
- Isolate application from the internet
- Initaite Full AV Scan on the Server
|
- Application name (FQDN)
- IP address (internal and External)
- Application published on the internet or Intranet.
- Confirmation if 2FA or MFA, TechM AD is used for Login
- Confirmation if WAF is enabled
- Timestamp of suspicious activities
- Application & Application Server Logs
- VAPT and WAPT status..
|
- Investigation (Validation of FireEye, AV, Sign-in & Zscaler Logs, System Review)
- Investigation of Applciation, Application Server Logs
- RCA
|
Phishing Mail received on TechM Email |
Unknown Sender, Mail has suspicious links, Unexpected attachment or links from known sender but a different Mail ID, etc |
- Report the suspicious email using "Report Phishing" button on Outlook or send as an attachment to ReportPhishing@TechMahindra.com.
- Do not click the links or open attachments
|
- Email attachment
|
- Investigation (Domain/IP reputation, URL clicks, threats in attachment, Number of associates targeted)
- Reporting to MS if email found phishing/spam and initiating blocking of sender.
|
Want to receive Periodic Vulnerability Updates for Components Used within your TechM Application |
Older version or 3rd Party Component used within Application |
- Check the OEM Website for Vulnerability Alerts for the Version used
- Isolate the application and take it off the internet
|
- Application Name, URL, Server IP
|
- Add to list of users for sharing updates / alerts related to Vulnerabilities
|
Check for Vulnerabilities visible to the Exteranl World for your External TechM Applciation |
Older version or 3rd Party Component used within Application |
- Check the OEM Website for Vulnerability Alerts for the Version used
|
- Application Name, URL, Server IP
|
- Add Application to Tools for Periodic Scanning of Vulnerabilities from External Attack Surface Monitoring Scanners
|