Multiple Alerts in Different ATT&CK Tactics by Host
This rule uses alert data to identify hosts with multiple alerts across different ATT&CK tactics, indicating a higher likelihood of compromise and enabling analysts to prioritize triage and response based on accumulated risk score.
This detection rule, created by Elastic, is designed to identify potentially compromised hosts by aggregating alert data. It focuses on scenarios where a single host triggers multiple alerts associated with different phases of an attack, as defined by the ATT&CK framework. The rule calculates a risk score based on the number and severity of alerts, prioritizing hosts exceeding a defined threshold. By focusing on hosts exhibiting diverse attack tactics, analysts can more effectively triage and respond to complex, multi-stage intrusions. This rule helps filter out noisy alerts such as “Agent Spoofing”, “Compression DLL Loaded by Unusual Process”, and “Potential PrintNightmare File Modification”, and focuses on alerts where kibana.alert.risk_score is greater than 0.
Attack Chain
- An adversary gains initial access to a host through various methods.
- The adversary executes malicious code or commands on the host.
- The attacker establishes persistence to maintain access.
- The adversary attempts to escalate privileges to gain higher-level control.
- The attacker performs lateral movement to compromise other systems.
- The adversary gathers information about the compromised environment.
- The attacker exfiltrates sensitive data from the network.
- The attacker achieves their final objective, such as data theft or disruption of services.
Impact
A successful attack, as identified by this rule, can lead to significant data breaches, system compromise, and operational disruption. Multiple alerts across various tactics suggest a sophisticated and persistent attacker. Prioritizing hosts identified by this rule enables security teams to quickly contain and remediate advanced threats, minimizing potential damage and reducing the overall impact on the organization. Without this detection, analysts might miss critical correlations between seemingly isolated alerts.
Recommendation
- Deploy the provided Sigma rule to your SIEM to identify potentially compromised hosts based on multiple alerts across different ATT&CK tactics.
- Investigate any hosts flagged by this rule, correlating the alert data with other logs and telemetry to understand the full scope of the attack.
- Tune the threshold values in the Sigma rule (distinct rule count, tactic count, risk score) to align with your environment and risk tolerance.
- Enable logging for process creation, network connections, and file modifications on all hosts to provide sufficient data for the detection rule.
- Review the “False positive analysis” section of the rule’s documentation to identify and exclude known benign activities that may trigger the rule.
- Use the
Esql.kibana_alert_rule_name_valuesfield in the rule output to quickly identify the specific alert types triggering the rule.
Detection coverage 3
High Alert Count with Multiple ATT&CK Tactics
highDetects hosts with a high number of alerts spanning multiple ATT&CK tactics, indicating a potentially compromised system.
Risky Host Detection via Distinct Alerts
highIdentifies hosts triggering multiple distinct alerts, indicating a potentially compromised system requiring immediate investigation.
High Risk Score Alert Combination
highFlags hosts with a high cumulative risk score from correlated alerts, suggesting a potentially significant compromise.
Detection queries are kept inside the platform. Get full rules →