Tag
Compromised Bitwarden CLI npm Package Enables Credential Theft and Information Exfiltration
2 rules 2 TTPsA remote attacker can exploit a compromised Bitwarden CLI npm package to steal credentials and exfiltrate sensitive information.
Malicious Chrome Extensions Stealing Data and Opening Backdoors
2 rules 6 TTPsA coordinated campaign uses 108 malicious Chrome extensions to steal user data, inject ads, and establish backdoors on over 20,000 systems via a shared command-and-control infrastructure.
GitHub Exfiltration via High Number of Repository Clones
2 rules 3 TTPsA single user rapidly cloning a high number of GitHub repositories indicates potential exfiltration of sensitive data such as proprietary code, embedded secrets, and build artifacts.
Kimsuky Malware Using Dropbox API for Command and Control
2 rules 2 TTPsKimsuky is using malware that leverages the Dropbox API for command and control, enabling file exfiltration and remote code execution.
Potential Abuse of Certreq for File Transfer via HTTP POST
2 rules 4 TTPsAdversaries may abuse the Windows Certreq utility to download files or upload data to a remote URL by making an HTTP POST request, potentially for command and control or exfiltration, which can be detected by monitoring process execution events.
Detecting Rare SMB Connections for Potential NTLM Credential Theft
2 rules 2 TTPsThis brief details a detection strategy for rare SMB connections originating from internal networks to the internet, potentially indicating NTLM credential theft via rogue UNC path injection.
Suspicious SMTP Activity on Port 26/TCP
2 rules 3 TTPsThis rule detects SMTP traffic on TCP port 26, an alternative to the standard port 25 that the BadPatch malware family has used for command and control of Windows systems.
Detection of Encrypted Archive Creation with WinRAR or 7-Zip
2 rules 2 TTPsAdversaries use WinRAR or 7-Zip with encryption options to compress and protect stolen data before exfiltration, making detection more challenging.
SMB (Windows File Sharing) Activity to the Internet
2 rules 2 TTPsThis rule detects network events indicating the use of Windows file sharing (SMB or CIFS) traffic to the Internet, which is commonly exploited for initial access, backdoor deployment, or data exfiltration.
First Time Seen Removable Device Registry Modification
2 rules 2 TTPsDetection of newly seen removable devices via Windows registry modification events can indicate data exfiltration attempts or initial access via malicious USB drives.
SMB Registry Hive Exfiltration
2 rules 3 TTPsDetection of medium-sized registry hive files being created or modified on Server Message Block (SMB) shares, potentially indicating exfiltration of Security Account Manager (SAM) data for credential extraction.