Skip to content
Threat Feed

Tag

Attack.persistence

16 briefs RSS
high advisory

Malicious Usage of AWS IMDS Credentials Outside of Expected Services

Compromised EC2 instances may be leveraged to exfiltrate and misuse AWS Instance Metadata Service (IMDS) credentials to perform actions outside of the expected AWS Simple Systems Manager (SSM) service, indicating potential lateral movement or data exfiltration.

EC2 attack.privilege-escalation attack.initial-access attack.persistence attack.stealth attack.t1078 attack.t1078.002
2r 3t
medium advisory

Unauthorized Modification of Azure Conditional Access Policy

An unauthorized actor modifies an Azure Conditional Access policy, potentially leading to privilege escalation, credential access, persistence, or defense impairment.

Azure Active Directory azure conditional-access policy-modification attack.privilege-escalation attack.credential-access attack.persistence attack.defense-impairment attack.t1548 +1
2r 2t
medium advisory

Azure AD Root Certificate Authority Added for Passwordless Authentication

An attacker may add a new root certificate authority to an Azure AD tenant to support certificate-based authentication for persistence, privilege escalation, or defense evasion.

Azure Active Directory attack.credential-access attack.persistence attack.privilege-escalation attack.defense-impairment attack.t1556
2r 4t
high advisory

Azure AD Sign-in from New Country/Region

Detection of Azure AD sign-ins originating from countries or regions not previously associated with a user, indicating potential account compromise or anomalous activity.

Entra ID attack.stealth attack.t1078 attack.persistence attack.privilege-escalation attack.initial-access
2r 1t
medium advisory

Windows Registry Classes Autorun Keys Modification for Persistence

Adversaries modify Windows Registry Classes keys to establish persistence by executing malicious code when specific file types are opened or actions are performed, potentially leading to privilege escalation and persistent access.

Windows attack.privilege-escalation attack.persistence attack.t1547.001
3r 1t
medium advisory

Cisco 802.1X (dot1x) Disabled on Network Interface

Detection of manual disablement of IEEE 802.1X (dot1x) on a Cisco network device interface, potentially allowing unauthorized network access and lateral movement.

IOS attack.defense-evasion attack.persistence attack.credential-access attack.t1562.001 attack.t1556.004
2r 2t
medium advisory

User Added to Group with Conditional Access Policy Modification Access

An attacker adds a user to a privileged Azure Active Directory group with permissions to modify Conditional Access policies, potentially leading to privilege escalation, credential access, persistence, and defense impairment.

Azure Active Directory attack.privilege-escalation attack.credential-access attack.persistence attack.defense-impairment attack.t1548 attack.t1556
3r 4t
medium advisory

Azure AD Authentication to Important Apps Using Single-Factor Authentication

Detection of successful Azure AD authentications to critical applications that only required single-factor authentication, potentially indicating a security lapse or policy violation leading to unauthorized access.

Azure Active Directory attack.privilege-escalation attack.persistence attack.initial-access attack.stealth attack.t1078
2r 3t
high advisory

Detection of Azure Subscription Permission Elevation

Detection of a user being assigned the 'User Access Administrator' role, which grants the ability to manage all Azure Subscriptions, potentially leading to privilege escalation and unauthorized access.

Azure attack.privilege-escalation attack.persistence attack.initial-access attack.stealth attack.t1078
2r 1t
medium advisory

Suspicious Scripts in the Startup Directory

This rule identifies script engines creating files or the creation of script files in the Windows Startup folder, a persistence technique used by adversaries to automatically execute scripts upon user login.

Elastic Defend +1 persistence startup windows attack.persistence
2r 2t
medium advisory

Azure AD Successful Authentication Increase

This detection identifies a statistically significant (10% or greater) increase in successful sign-ins to Azure Active Directory, potentially indicating credential compromise or account takeover attempts.

Azure Active Directory attack.privilege-escalation attack.persistence attack.initial-access attack.stealth attack.t1078
2r 1t
medium advisory

Office Application Autorun Registry Key Modification

Adversaries modify Office application autostart extensibility point (ASEP) registry keys to achieve persistence and execute malicious code when Office applications are launched.

Microsoft Office attack.privilege-escalation attack.persistence attack.t1547.001
2r 1t
high advisory

Detection of Important Scheduled Task Deletion or Disablement

Adversaries delete or disable critical scheduled tasks, such as those related to system restore, Windows Defender, BitLocker, Windows Backup, or Windows Update, to disrupt operations and potentially conduct data destructive activities.

Windows attack.execution attack.privilege-escalation attack.persistence attack.t1053.005
2r 1t
medium advisory

Azure AD User Added to Administrator Role

An adversary adds a user to an Azure Active Directory administrative role to gain initial access, persist in the environment, escalate privileges, and potentially operate stealthily.

Azure Active Directory attack.initial-access attack.persistence attack.privilege-escalation attack.stealth attack.t1098.003 attack.t1078
2r 4t
low advisory

Suspicious Local Scheduled Task Creation

This rule detects the creation of scheduled tasks on Windows systems by non-system accounts, a common technique used by adversaries for persistence, lateral movement, and privilege escalation.

Elastic Defend persistence windows scheduled_task attack.persistence
2r 1t
high advisory

Azure PIM - Role Assignment Outside of Privileged Identity Management

Detection of privilege role assignments outside of Azure Privileged Identity Management (PIM) can indicate potential attacker activity related to initial access, stealth, persistence, or privilege escalation within the Azure environment.

Azure Active Directory azure pim role-assignment attack.initial-access attack.stealth attack.t1078 attack.persistence attack.privilege-escalation
2r 4t