Active Attack on Database - Audit Tampering
-
- Last UpdatedNov 06, 2024
- 1 minute read
What it means
A malicious user attacked the database and attempted to modify the database audit log records, or attempted to partially or completely delete them, in order to disguise their actions.
Implications
There is an attacker within the organization network with access to the database. The attacker is trying to cover their tracks, and this attack might be part of a broader attack. The attacker probably still has access to the database and may continue to execute various attacks.
What to look for
Examine the incident details and Imperva audit logs as required to determine:
- The number of attempts that took place
- Whether the attempts succeeded
- If the attempt(s) succeeded, check to see what data was modified/deleted.
- Trace the activity, and verify it was actually performed by the indicated user.
Exceptions
While changes in audit configuration could be legitimate, any modification should be examined.
Note: Viewing this incident requires deploying Imperva Sonar and configuring it to send security events to Data Risk Analytics. This incident is only available for some database types. |