The Internal Darknet Scan detection identifies attempts by an internal host to scan IP addresses within the organization's network that are not actively used or publicly advertised (often referred to as "darknet" space). This type of activity is typically associated with reconnaissance efforts to discover hidden or unused network segments that could be leveraged for malicious purposes.
Scenario 1: An internal host generates a high volume of scan probes targeting a range of IP addresses within the darknet space. Investigation reveals that the host is compromised, and the attacker is mapping the network to identify potential targets for lateral movement.
Scenario 2: A sudden spike in network traffic is detected, originating from a security team's vulnerability scanner. Verification with the IT department confirms that the activity is part of a scheduled security assessment, and the detected behavior is legitimate.
If this detection indicates a genuine threat, the organization faces significant risks:
Discovery and exploitation of hidden or unused network segments can lead to unauthorized access to sensitive data or systems.
Attackers can use information gathered from darknet scans to move laterally within the network, escalating privileges and accessing critical resources.
High volumes of scan traffic can cause network congestion and impact the performance of legitimate network operations.
Analyze logs to identify the source of the scan probes and the targeted IP addresses. Look for patterns and repeated attempts.
Determine the internal host generating the darknet scan traffic. Verify if the host and user are authorized to perform such actions.
Look for other signs of compromise or suspicious behavior linked to the scanning host, such as malware alerts, unusual login attempts, or data exfiltration activities.
Confirm if any legitimate network mapping, security assessments, or maintenance activities could explain the detected darknet scan behavior.