November 2024 (21)
Microsoft 365 Identity Login from Impossible Travel Location
2 rules 1 TTPDetects successful Microsoft 365 portal logins from impossible travel locations, defined as logins originating from two different countries within a short time frame, potentially indicating account compromise or unauthorized access.
Command and Scripting Interpreter via Windows Scripts
2 rules 1 TTPThis rule detects the execution of PowerShell, PowerShell ISE, or Cmd spawned from Windows Script Host or MSHTA, indicating potential abuse of scripting interpreters to execute malicious commands or scripts on Windows systems.
LiteLLM Proxy API Key Verification SQL Injection
2 rules 1 TTPA SQL injection vulnerability exists in LiteLLM versions 1.81.16 to prior to 1.83.7 allowing an unauthenticated attacker to inject SQL queries via a crafted 'Authorization' header, potentially leading to unauthorized data access or modification.
OpenC3 COSMOS Script Runner Permissions Bypass
2 rules 1 TTPThe OpenC3 COSMOS Script Runner widget allows authenticated users to bypass API permissions checks and execute administrative actions by running specially crafted Python and Ruby scripts, leading to data manipulation and privilege escalation.
Suspicious Pod Creation in Kubernetes System Namespace
2 rules 1 TTPAn attacker may deploy a pod within the kube-system namespace in Kubernetes to mimic legitimate system pods and evade detection.
LiteLLM Server-Side Template Injection Vulnerability
2 rules 1 TTPA server-side template injection vulnerability in LiteLLM versions 1.80.5 to before 1.83.7 allows authenticated users to execute arbitrary code within the LiteLLM Proxy process via a crafted prompt template, potentially exposing sensitive information and enabling command execution on the host.
Powercat PowerShell Implementation Detection
2 rules 2 TTPsAdversaries may leverage Powercat, a PowerShell implementation of Netcat, to establish command and control channels or perform lateral movement within a compromised network.
Potential Foxmail Exploitation Leading to Initial Access
2 rules 1 TTPThis rule detects potential exploitation of Foxmail client to gain initial access and execute malicious code by monitoring for Foxmail client spawning child processes with arguments pointing to user-profile AppData paths or remote shares, indicating exploitation of a Foxmail vulnerability through a malicious email.
Active Directory Group Modification by SYSTEM Account
2 rules 2 TTPsDetection of a user being added to an Active Directory group by the SYSTEM account (S-1-5-18) can indicate an attacker with SYSTEM privileges attempting to pivot to a domain account.
NornicDB Improper Network Binding Exposes Bolt Server
2 rules 2 TTPsNornicDB versions prior to 1.0.42-hotfix have an improper network binding vulnerability in its Bolt server, allowing unauthorized remote access because the `--address` CLI flag is not correctly plumbed through to the Bolt server config, causing the Bolt listener to always bind to the wildcard address and expose the database with default credentials.
GitHub SSH Certificate Configuration Changed
2 rules 4 TTPsAttackers can modify SSH certificate configurations in GitHub organizations to gain unauthorized access, persist in the environment, escalate privileges, and operate stealthily.
MemProcFS Usage for Memory Dump Mounting and Credential Access
2 rules 3 TTPsAdversaries use MemProcFS, a memory forensics tool, to mount memory dumps as virtual file systems and extract sensitive information like credentials from LSASS or registry hives.
Micronaut TimeConverterRegistrar Memory Exhaustion via Accept-Language Header
3 rules 2 TTPsMicronaut's `TimeConverterRegistrar` has an unbounded `formattersCache` that allows memory exhaustion via a crafted `Accept-Language` header, where an unauthenticated attacker can crash the JVM by sending requests with novel locale tags to `@Format`-annotated endpoints, growing the cache until heap memory is exhausted, affecting Micronaut applications with `micronaut-context` versions 4.3.0 and above, up to but not including 4.10.22.
Potential Privilege Escalation via SUID/SGID on Linux
2 rules 2 TTPsAttackers may leverage misconfigured SUID/SGID permissions on Linux systems to escalate privileges to root or establish persistence by executing processes with root privileges initiated by non-root users.
Untrusted DLL Loaded by Azure AD Connect Authentication Agent
2 rules 1 TTPThe loading of an untrusted DLL by the Azure AD Connect Authentication Agent, potentially indicating credential access attempts via the Pass-through Authentication service, is detected by this rule.
Unusual Spike in Okta User Lifecycle Management Change Events
2 rules 4 TTPsA machine learning job has identified an unusual spike in Okta user lifecycle management change events, indicating potential privileged access activity where threat actors may manipulate user accounts to gain higher access rights or persist within the environment.
WDAC Policy File Creation by Unusual Process
2 rules 1 TTPAdversaries may use a specially crafted Windows Defender Application Control (WDAC) policy to restrict the execution of security products, detected by unusual process creation of WDAC policy files.
Bitbucket Global SSH Settings Changed
2 rules 2 TTPsAn attacker modifies Bitbucket global SSH settings to potentially enable unauthorized access and lateral movement.
Detect AWS Route Table Modification via CloudTrail
2 rulesAn attacker may add a new route to an AWS route table, potentially redirecting network traffic for malicious purposes such as defense impairment or data exfiltration.
go-zserio Unbounded Memory Allocation Vulnerability
2 rules 1 TTPgo-zserio versions prior to 0.9.1 are vulnerable to unbounded memory allocation when deserializing data, potentially leading to denial of service.
Kubernetes Admission Controller Modification
2 rules 2 TTPsAn adversary modifies Kubernetes admission controller configurations to achieve persistence, escalate privileges, or gain unauthorized access to credentials within the cluster.
October 2024 (9)
GitHub Security Feature Disablement
3 rules 3 TTPsAn administrator or privileged user disables critical security features within a GitHub organization or repository, potentially leading to increased risk of unauthorized access, data breaches, and persistent compromise.
macOS User Added to Admin Group Detection
2 rules 2 TTPsThe rule identifies when a user is added to the admin group on macOS systems, potentially indicating privilege escalation activity, and requires Jamf Protect for data ingestion into Elastic.
OpenCanary HTTPPROXY Login Attempt Detection
2 rules 1 TTPDetection of attempted HTTP proxy use on an OpenCanary node, indicating potential reconnaissance or lateral movement by an attacker attempting to proxy another page.
OpenCanary Telnet Login Attempt
1 rule 2 TTPsThe OpenCanary Telnet Login Attempt detection identifies unauthorized login attempts to a Telnet service monitored by an OpenCanary node, indicating potential reconnaissance or intrusion attempts targeting the network.
New AWS Network ACL Entry Creation Detected
2 rules 1 TTPDetection of new Network ACL entries in AWS CloudTrail logs can indicate potential defense impairment or the opening of new attack vectors within an AWS account by an adversary.
Suspicious Windows Command Shell Arguments Detection
3 rules 2 TTPsThis rule identifies the execution of the Windows Command Shell process (cmd.exe) with suspicious argument values, often observed during malware installation.
M365 Identity Login from Atypical Region
2 rules 1 TTPDetects successful Microsoft 365 portal logins from a country and region the user has not previously authenticated from in a specific time window, potentially indicating unauthorized access attempts by analyzing login events and user location patterns.
Linux Shell Invocation via Env Command
2 rules 1 TTPThe 'env' command is used to invoke a shell on Linux systems, potentially bypassing restricted environments or escalating privileges to execute arbitrary commands.
MsiExec Child Process Spawning Network Connections for Defense Evasion
2 rules 1 TTPDetection of MsiExec spawning child processes that initiate network connections, potentially indicating abuse of Windows Installers for malware delivery and defense evasion.