awacke1 commited on
Commit
807302d
Β·
verified Β·
1 Parent(s): c9823be

Update app.py

Browse files
Files changed (1) hide show
  1. app.py +4 -4
app.py CHANGED
@@ -51,10 +51,10 @@ st.markdown("""
51
  ## Overview of the pattern and recommended actions:
52
 
53
  ## Indicators of Compromise (IOCs):
54
- 1. File Hash Signatures: BlackCat attacks leave specific file hash signatures. These can be used to identify compromised files. πŸ“
55
- 2. Command and Control (C2) IP Addresses: Monitor network traffic for connections to known BlackCat C2 servers. Blocking these IPs can prevent further communication. 🚫🌐
56
- 3. Domains: Keep an eye on domains associated with BlackCat. These may appear in phishing emails or malicious URLs. πŸ•΅οΈβ€β™‚οΈπŸ”—
57
- 4. Malware Analysis Reports: Stay informed about BlackCat through reliable sources like the FBI and other security organizations. πŸ“ŠπŸ”
58
 
59
  ## Network Exposure Assessment:
60
  1. Review Logs: Analyze network logs for suspicious activity. Look for signs of unauthorized access, unusual authentication attempts, or unexpected network connections. πŸ“πŸ”
 
51
  ## Overview of the pattern and recommended actions:
52
 
53
  ## Indicators of Compromise (IOCs):
54
+ 1. File Hash Signatures: Attacks leave specific file hash signatures. These can be used to identify compromised files. πŸ“
55
+ 2. Command and Control (C2) IP Addresses: Monitor network traffic for connections to known C2 servers. Blocking these IPs can prevent further communication. 🚫🌐
56
+ 3. Domains: Keep an eye on domains associated. These may appear in phishing emails or malicious URLs. πŸ•΅οΈβ€β™‚οΈπŸ”—
57
+ 4. Malware Analysis Reports: Stay informed through reliable sources like the FBI and other security organizations. πŸ“ŠπŸ”
58
 
59
  ## Network Exposure Assessment:
60
  1. Review Logs: Analyze network logs for suspicious activity. Look for signs of unauthorized access, unusual authentication attempts, or unexpected network connections. πŸ“πŸ”