Eradication and recovery – removing the intrusion signs and getting back to normal
Eradication and recovery steps follow analysis and containment and focus on eliminating the root cause of the attack and restoring affected systems. They are mentioned together because a successful eradication minimizes the risk of the incident recurring, allowing for a full recovery with confidence
Eradication
The eradication phase is reminiscent of the containment steps, but it covers removing the malicious files and traces from the environment as shown in the following table:
IOC type |
Action |
Limitation |
Public IP related to C2 |
Ensure the IP is blacklisted on the gateway |
- |
DNS related to C2 |
Ensure the IP is blacklisted on the external DNS gateway ... |