Publication Date – January 14, 2020
When classifying observations as Unsolicited Communications events, we look for unwanted connection attempts to the system. These are captured by the hardware of software-based systems, such as firewalls.
- Communication attempts include secure shell (SSH) brute-force attempts, port probes, and network ports scanning.
- A device will send unsolicited communication if it is infected with a worm that is attempting to locate new devices to infect.