Operational Handoff
- Shift window: 2026-03-30 through 2026-04-03
- Open escalations: 15 cases pending VERA investigation
- Priority breakdown: P1: 12 | P2: 3
- Insufficient context: 2 cases pending enrichment — blocking fields: asset.criticality, asset.environment (both cases: source IP 10.10.6.200, no hostname, no CMDB record)
- Forced escalations: 12 — rules triggered: ssh_bruteforce_confirmed_access (4), asset_criticality_critical_or_high (5), multi_asset_scope (2), severity_critical_or_high (1)
- Watch list: 10.10.6.200 is an unidentified internal VM that generated four alerts this week across two C2 domains (cdn-update-srv.net, update-check-ms.net, telemetry-cloud-api.com) — it produced one INSUFFICIENT_CONTEXT, one INSUFFICIENT_CONTEXT, one P2 ESCALATED (NOERROR), and one P2 ESCALATED (NOERROR); CMDB enrichment on this IP is the single most consequential open gap entering next shift.
Weekly Overview
- Total alerts processed: 25
- Dispositions: CLOSED: 8 | ESCALATED: 15 | INSUFFICIENT_CONTEXT: 2
- Alert subtypes:
dns_malicious_lookup: 18 |ssh_bruteforce_c2_dns: 7 - Date range: 2026-03-30 through 2026-04-03
- Daily distribution: Mon: 4 | Tue: 6 | Wed: 5 | Thu: 7 | Fri: 3
- Escalation priorities: P1: 12 | P2: 3
- Forced escalation rules fired:
ssh_bruteforce_confirmed_access: 4 |asset_criticality_critical_or_high: 5 |multi_asset_scope: 2 |severity_critical_or_high: 1
Thursday was the heaviest single day at 7 alerts, which also contained the two highest-confidence SSH-to-C2 pivot cases of the week. Friday’s lighter load of 3 alerts included one of the week’s most structurally complex cases in TORA-20260403-0025, where a failed SSH campaign and an unexplained C2 resolution from a crown-jewel-adjacent production domain controller arrived in the same alert window.
What the Week Looked Like
Two threat categories defined this shift: dns_malicious_lookup alerts dominated the volume at 18 of 25 cases, and ssh_bruteforce_c2_dns alerts drove the highest-severity outcomes at 7 cases with 4 confirmed brute-force successes. The closed cases were almost entirely routine — a cluster of stale phishing domains (secure-docusign-verify.com, login-microsofft-com.net) resolving NXDOMAIN against low-criticality development workstands on the corp-lan dev segment, handled cleanly through valid suppression rules. The engineering workstations ws-eng-087.corp.local and ws-eng-201.corp.local accounted for the majority of CLOSED volume, with recurring rule fires that are approaching suppression-rule review territory.
The escalated cases told a different story entirely. Three threat families accounted for nearly all the serious signal: BlackCat (ALPHV) ransomware appearing on secure-vault-exfil.com across multiple host types including the production domain controller srv-ad-01.corp.local; QakBot on dist-pkg-repo.net appearing in both a confirmed post-SSH-access pivot on day one and a separate, unexplained infection on ws-fin-015.corp.local the following day; and Cobalt Strike on cdn-update-srv.net and telemetry-cloud-api.com touching both named production infrastructure and the unidentified ghost host 10.10.6.200. The asset mix across escalations leaned heavily on srv-ad-01.corp.local, srv-db-staging.corp.local, and ws-fin-015.corp.local — a domain controller, a staging database server, and a high-criticality finance workstation — all of which appeared in multiple alerts across the week.
The ssh_bruteforce_c2_dns cases were meaningfully more complex to reason through than the pure dns_malicious_lookup escalations. A straight C2 lookup alert requires weighing the IOC quality, the response code, the asset tier, and the identity context — the reasoning is multi-factor but the path is relatively linear. The SSH-correlated cases required resolving a prior causal question first: did the brute-force succeed? If yes, the C2 DNS query is post-compromise callback and the case becomes a confirmed active intrusion. If no, the C2 resolution is unexplained by the correlated event and the infection vector is open — which is often the more unsettling finding. Four of the seven ssh_bruteforce_c2_dns alerts had auth_successes ≥ 1, and those cases locked immediately. The remaining three — where the brute-force failed but the C2 domain still resolved — required more careful structuring of the escalation hypothesis and introduced genuine uncertainty about whether the correlated events were causally related at all.
The user account m.reyes (elevated privilege) appeared across multiple alerts on different assets — srv-ad-01.corp.local, srv-db-staging.corp.local — and the user a.patel (admin privilege, risk score 78, recent anomaly) appeared repeatedly on ws-fin-015.corp.local. These recurrences are worth tracking: either these are legitimately active accounts on compromised hosts, or there is a credential reuse or lateral movement pattern that spans the week’s events.
Cases Worth Noting
TORA-20260330-0002 was the clearest case of the week and the one I most want VERA to move on without delay. External IP 185.56.83.83 (RU, AS57523) brute-forced srv-ad-01.corp.local with 2,336 attempts, achieved one successful authentication, and 75 minutes later the host resolved dist-pkg-repo.net — QakBot C2, 29/60 sources, NOERROR — via its DNS resolver. That 75-minute gap is consistent with manual attacker dwell time before deploying tooling, not automated callback. The ssh_bruteforce_confirmed_access rule fired unconditionally and correctly. The one structural ambiguity I flagged and could not resolve at triage: network.src_ip in the alert was 179.43.175.10, but ssh_brute_force.attacker_ip was 185.56.83.83 — those are two distinct external IPs, and the question of whether that represents dual attacker infrastructure or a SIEM correlation artifact should be VERA’s first move before any other thread is pulled.
TORA-20260402-0020 and TORA-20260402-0021 arrived within 34 minutes of each other on Thursday and should be treated as a connected investigation rather than independent cases. TORA-20260402-0020 was ws-fin-015.corp.local — the finance workstation running a.patel’s admin session with risk score 78 — achieving 2 SSH auth successes from 104.244.77.14 before resolving secure-vault-exfil.com (BlackCat, 55/60 sources, TXT query, NOERROR) 294 minutes later. TORA-20260402-0021 was srv-db-staging.corp.local hit by 91.92.251.103 (NL), 1 auth success, same C2 domain, 264-minute dwell. Two different attacker IPs, two different target hosts, same BlackCat C2 domain, same dwell-then-beacon pattern. The dwell windows in both cases are long enough that VERA is not racing a live operator — but they’re also long enough that substantial post-access activity may have already occurred.
TORA-20260401-0012 was the case where the decision was genuinely not obvious. 10.10.6.200 resolved cdn-update-srv.net — Cobalt Strike, 45/60 sources, NOERROR — with zero asset context: no hostname, no criticality, no environment, no identity. The alert could have gone to INSUFFICIENT_CONTEXT. I chose ESCALATED at P2 with 62% confidence, and I want to document the reasoning explicitly: I rejected INSUFFICIENT_CONTEXT because the hypothesis was fully articulable and withholding a Cobalt Strike C2 resolution with NOERROR from VERA’s queue on the basis of missing CMDB fields is the wrong type of error to make. The confidence is low because the blast radius is entirely uncharacterized. If 10.10.6.200 comes back as a dev VM with a suppression history, this escalation was excess noise. If it comes back as a production server, 62% confidence is underselling the urgency. I’d make the same call again — but I’m documenting the tension because it recurred with the same IP throughout the week.
TORA-20260403-0025 was the most structurally complex case of the week. srv-ad-01.corp.local — critical, crown-jewel-adjacent, outdated Windows 10 21H2 — resolved secure-vault-exfil.com (BlackCat, 55/60, NOERROR) in the same alert window as a failed 898-attempt SSH campaign from 179.43.175.10 (BR). The failed SSH brute-force doesn’t explain the C2 resolution. That means the infection vector is unknown, and a host can’t resolve a ransomware C2 domain without something initiating the query — something that got onto the box through a pathway that isn’t reflected in the alert data. That’s the more alarming finding, and it’s the one VERA needs to drive toward first. An intrusion that bypassed the noisy observed attack vector entirely is more dangerous than one the noisy attacker conducted themselves.
Where I Got Stuck
Both INSUFFICIENT_CONTEXT cases this week blocked on the same fields from the same source IP: asset.criticality and asset.environment for 10.10.6.200. TORA-20260330-0004 had telemetry-cloud-api.com (Cobalt Strike, 38/60, NXDOMAIN) and TORA-20260401-0014 had update-check-ms.net (Sliver, 12/60, NXDOMAIN). In both cases the NXDOMAIN response reduced immediate impact probability, but without knowing what 10.10.6.200 is, I could not evaluate asset_criticality_critical_or_high or production_environment escalation rules. The same IP later produced NOERROR resolutions on day four and five that I escalated at P2 despite the missing context, precisely because NOERROR changes the calculus — a successful resolution to a Cobalt Strike domain compels escalation regardless of unknown asset class, while a failed one does not. The lesson is that 10.10.6.200’s absence from the CMDB is itself a finding that should have generated a ticket the first time this IP appeared. Five alerts from an unidentified internal host across a single shift week is not a triage problem — it’s an asset inventory problem that was handed to me as a triage problem.
I’m not fully confident in my handling of the dwell-time gap in TORA-20260402-0020. The minutes_before_dns value was 294 — nearly five hours between confirmed SSH access and the C2 DNS query. I interpreted that as consistent with manual attacker dwell and potentially extensive post-access activity. That interpretation is reasonable, but five hours is also long enough that the correlation between the brute-force success and the C2 resolution could be coincidental — the host may have been compromised independently through a different vector, and the SSH session may have been from a different actor. I escalated at P1 and labeled it active compromise because the forced escalation rule requires it and the hypothesis is sound, but I flagged the dwell window explicitly for VERA because if the SSH session was a credential test and the actual compromise predates it, the blast radius timeline changes substantially.
Signal vs. Noise
The closed-case volume was well-calibrated. The phishing domain suppression rules covering secure-docusign-verify.com and login-microsofft-com.net are doing their job correctly on the development segment, but they are firing at rates that signal the rules should be reviewed for formal renewal or expiration: login-microsofft-com.net suppression rules show 37–52 prior firings across the week’s closed cases, all consistent CLOSED outcomes, with IOCs that are 70–115 days old. These domains appear to be defunct infrastructure — last observed activity windows of 5 days, months prior. The rules are accurate but the underlying IOCs are stale enough that retiring them and relying on age-based filtering may be cleaner than carrying forward suppression rules that will hit their 90-day expiration threshold soon anyway.
The dns_malicious_lookup alerts on the escalated side were well-calibrated to severity. The NOERROR/NXDOMAIN signal was the most reliable first-order discriminator in the pipeline — every case where NXDOMAIN was the response code and no forced escalation threshold fired, the closure verdict held cleanly. Cases with NOERROR plus multi-source threat intelligence corroboration above 29/60 sources were consistently correct escalations. The borderline cases were all below 45/60 sources with missing asset context.
The ssh_bruteforce_c2_dns alert subtype is generating high-quality escalations but would benefit from one structural improvement: the network.src_ip field in several cases was populated with the attacker’s external IP rather than the querying internal host, which created genuine ambiguity in TORA-20260330-0002 and TORA-20260403-0024. If the internal asset IP is consistently available in ssh_brute_force.target_ip, the schema should route network.src_ip to the DNS query originator (the internal host) rather than the brute-force source. The current ambiguity is a data quality issue that VERA has to resolve at investigation time rather than triage time.
The multi_asset_scope forced escalation rule fired twice and both fires were correct — secure-vault-exfil.com at same_domain_count=4 and cdn-update-srv.net at same_domain_count=4. The rule threshold appears appropriately set. I would consider whether same_domain_count=3 should also trigger the rule, given that TORA-20260403-0024 (fonts-static-cdn.net, same_domain_count=3) still received a P1 escalation through other rule stacking — the multi-asset threshold being at 4 rather than 3 is a coverage gap that may be leaving early-stage multi-host campaigns just below the forced escalation line.
For NOVA
The most important cross-week pattern to track is 10.10.6.200. This IP generated five alerts in five days — two INSUFFICIENT_CONTEXT (NXDOMAIN, unknown asset), two ESCALATED (NOERROR, P2), and one ESCALATED (NXDOMAIN, P2). That is an asset probing three different C2 frameworks in a single week: Cobalt Strike (telemetry-cloud-api.com, cdn-update-srv.net) and Sliver (update-check-ms.net). If this is a single compromised host cycling through C2 domains, the pattern is consistent with an implant testing available infrastructure. If these are correlated at all. NOVA should track whether 10.10.6.200 appears in any future week and whether enrichment has resolved its identity — the insufficient_blocking_fields frequency for asset.criticality and asset.environment from this single IP represents a structural gap, not a random data quality miss.
The m.reyes (elevated privilege) identity token appeared on srv-ad-01.corp.local in TORA-20260330-0002, TORA-20260401-0013, TORA-20260402-0019, and TORA-20260403-0025, and on srv-db-staging.corp.local in TORA-20260331-0006, TORA-20260331-0009, TORA-20260401-0015, TORA-20260402-0021. Eight alerts involving a single elevated-privilege account across two critical-tier servers in five days is a significant pattern that only a longitudinal view will clarify. NOVA should pull the full m.reyes alert history across all prior weeks and flag whether this account’s appearance rate on high-criticality assets has been increasing.
The dist-pkg-repo.net domain (QakBot) appeared in TORA-20260330-0002, TORA-20260331-0005, and TORA-20260401-0015 — three separate alerts on three separate hosts over three consecutive days, with TORA-20260401-0015 noting a prior escalation on this same domain from 2026-03-20. NOVA should verify whether that prior escalation was closed with a confirmed clean state or left open, and track dist-pkg-repo.net resolution attempts across the full alert population going forward. A QakBot C2 domain persisting across consecutive weeks is an indication that either remediation was incomplete or that the domain is being distributed through a campaign with a wide delivery surface that the organization has not contained.
The secure-vault-exfil.com domain (BlackCat) appeared in TORA-20260330-0003, TORA-20260331-0009, TORA-20260402-0019, TORA-20260402-0020, and TORA-20260402-0021 — five alerts, four distinct hosts, spanning the full shift window. TORA-20260402-0019 referenced a prior escalation on this domain from 2026-03-05. NOVA should determine whether that March 5 escalation was closed with remediation confirmed, and flag the full query timeline for secure-vault-exfil.com across the case population. If this domain was live as of March 5 and is still generating NOERROR resolutions on April 2, either the C2 infrastructure is persistent or there are multiple independent infections with shared IOC overlap.
The confidence score distribution this week separated cleanly by verdict class: CLOSED cases clustered at 82–84% confidence, driven by suppression rule matches and NXDOMAIN responses. ESCALATED cases with known asset context and NOERROR responses ran 87–97%. The lower-confidence ESCALATED cases (62–67%) were uniformly the 10.10.6.200 alerts with missing context. INSUFFICIENT_CONTEXT cases sat at 42–48%. That distribution looks well-calibrated — the confidence score is tracking meaningful signal, not noise. NOVA should watch whether that structure holds across future weeks or whether the 62–67% bracket expands as a signature of a broader asset-inventory problem.
For ARIA
This week gives a clear picture of what you’ll need to act quickly and correctly on the escalations that matter most.
For ssh_bruteforce_confirmed_access cases: the operative fact is auth_successes ≥ 1. When that flag is set, the attacker is on the host before the C2 DNS query fires. Your first action should be network isolation of the affected host — not investigation, isolation. The investigation determines blast radius; isolation stops the clock on dwell time. In TORA-20260330-0002, the host was a domain controller (srv-ad-01.corp.local), which means isolation carries domain-wide service impact. You’ll need a policy decision about whether domain controller isolation is within your autonomous authority or requires human approval. This week suggests that decision needs to be made before you’re operational, not during. For non-DC targets like srv-db-staging.corp.local (TORA-20260401-0015, TORA-20260402-0021), isolation should be within your authority and should happen immediately upon VERA’s confirmation of the SSH authentication log.
For multi-host C2 domain cases: when same_domain_count ≥ 4, the escalation hypothesis involves at least four internal hosts querying the same malicious domain. You cannot contain this by isolating the trigger host. You’ll need the full asset list from DNS logs before taking containment action, or you risk isolating one node of an active multi-host infection while leaving the others communicating freely. TORA-20260330-0003 (secure-vault-exfil.com, four hosts, BlackCat) and TORA-20260331-0006 (cdn-update-srv.net, four hosts, Cobalt Strike) are the clearest examples this week. VERA will need to hand you a host list before you act.
The context you consistently didn’t have this week that would have sharpened escalation scope: (1) the full list of assets behind a multi-domain query flag — same_domain_count tells me how many, not which ones; (2) confirmed post-DNS outbound connection data — a NOERROR response is a strong signal but VERA’s first confirmation step is always whether TCP followed the DNS, and you’ll need that confirmation to calibrate containment urgency; (3) process attribution for the DNS query — whether the query originated from a browser, a system process, or an injected beacon changes both the malware family confidence and the containment approach. If you can pull process telemetry at the moment of the DNS query as part of your investigation sequence, that single data point will resolve more ambiguity than any other enrichment step in these alert types.
One note on the 10.10.6.200 situation entering next shift: two of my escalations on that IP went to VERA as P2 with explicit instructions to start by identifying the asset. If VERA confirms the host is a production server or has elevated criticality, those cases should re-enter your queue immediately at P1. Build a handler for VERA-to-ARIA re-prioritization on enriched-context cases — this week showed that the gap between initial triage confidence and post-enrichment priority can be significant, and the escalation priority on a 62%-confidence P2 should not be treated as fixed.
TORA T1 — Eyes on the Glass, April 3, 2026