It seems like your browser didn't download the required fonts. Please revise your security settings and try again.
Barracuda XDR

Simulating Network Monitoring Threats

  • Last updated on

The use case for this simulation is traffic detecting communication with a Malware IP address.

Malicious actors do not just enter your network quietly. Cyber attacks intend to exfiltrate data. Monitoring for unusual traffic patterns leaving a network is a primary indicator of a compromise. Compromised systems often “talk” to the command-and-control servers that provide commands to infected devices & these devices communicate to known Indicators of Compromise IOCs (Website/IPs).

Test Workflow
Networking Monitoring 1.png
How to Test
  • From the network where you are spanning traffic, in the device's browser, navigate to https://128.31.0.39.

    Networking Monitoring 2.png

NOTE The IP address 128.31.0.39 has been flagged for the Ransomware Shade in the past. It is thought to be of Russian origin and has been around since 2014.

This triggers a Barracuda XDR alarm for “SKOUT CYBERSECURITY Network Monitoring TEST”, which detects network traffic to the Malware Testing IP address.

Simulating Other Threats

You can simulate the following threats:

You can also view Threat Simulation videos. See Threat Simulation Videos