Tag
Remote Desktop File Opened from Suspicious Path
2 rules 2 TTPsAdversaries may abuse RDP files delivered via phishing from suspicious locations to gain unauthorized access to systems.
Potential Remote File Execution via MSIEXEC
2 rules 3 TTPsThe rule detects the execution of the built-in Windows Installer, msiexec.exe, to install a remote package potentially abused by adversaries for initial access and defense evasion.
Google Workspace Login Attempt with Government Attack Warning
2 rules 1 TTPA Google Workspace login attempt flagged as a potential attack by a government-backed threat actor, indicating potential privilege escalation, defense evasion, persistence, initial access, or impact.
Large-Scale OAuth Device Code Phishing Campaign Observed in April 2026
2 rules 1 TTPIn early April 2026, Arctic Wolf tracked a large-scale device code phishing campaign across multiple regions and sectors where threat actors abused OAuth device code flow to trick victims into providing authentication codes.
AWS Credentials Used from GitHub Actions and Non-CI/CD Infrastructure
2 rules 2 TTPsAttackers are stealing AWS credentials configured as GitHub Actions secrets and using them from non-CI/CD infrastructure, indicating potential credential theft and unauthorized access to AWS resources.
Suspicious RDP File Execution
2 rules 2 TTPsThis rule identifies attempts to open a remote desktop file from suspicious paths, indicative of adversaries abusing RDP files for initial access via phishing.
Elastic Defend Alert from Package Manager Install Ancestry
3 rules 1 TTPThis rule detects Elastic Defend alerts where the alerted process has a package-manager install context in its ancestry (npm, PyPI, Rust), indicating potential supply chain compromise via malicious postinstall scripts.
Azure Service Principal Sign-In Followed by Arc Cluster Credential Access
2 rules 3 TTPsDetects a service principal authenticating to Azure AD followed by listing credentials for an Azure Arc-connected Kubernetes cluster, indicating potential adversary activity with stolen service principal secrets to establish a proxy tunnel into Kubernetes clusters.
AWS IAM Long-Term Access Key Correlated with Elevated Detection Alerts
2 rules 2 TTPsThis rule correlates AWS Long-Term Access Key First Seen from Source IP alerts with other open alerts of medium or higher severity that share the same IAM access key ID to prioritize investigation of potentially compromised accounts, helping identify post-compromise activity.
Unsecured Zoom Meeting Creation
2 rules 2 TTPsThe creation of Zoom meetings without passcodes allows unauthorized access and disruption, known as Zoombombing, potentially leading to the exposure of sensitive information or reputational damage.
Potential Abuse of msDS-ManagedAccountPrecededByLink for Privilege Escalation
2 rules 4 TTPsDetection of PowerShell scripts modifying the msDS-ManagedAccountPrecededByLink attribute, potentially indicating exploitation of the BadSuccessor privilege escalation vulnerability in Windows Server 2025.
Device Code Phishing Campaign Targeting Cloud Platforms
2 rules 2 TTPsA phishing campaign abuses Microsoft's Device Code OAuth flow to gain access to cloud-based file storage and document workflow platforms, bypassing traditional credential harvesting.
Azure Service Principal Sign-In Followed by Arc Cluster Credential Access
2 rules 2 TTPsDetects a service principal authenticating to Microsoft Entra ID and then listing credentials for an Azure Arc-connected Kubernetes cluster within a short time window, indicating potential unauthorized access to Kubernetes clusters via stolen service principal secrets.
Fortigate VPN CVE-2023-27997 Exploitation Attempt
2 rules 1 TTP 1 IOCIDS alerts indicate a potential exploitation attempt against a Fortigate VPN server using CVE-2023-27997, characterized by repeated GET requests to the /remote/logincheck endpoint originating from a specific IPv6 address.
Suspicious AWS EC2 Key Pair Import Activity
2 rules 1 TTPThe import of SSH key pairs into AWS EC2, as detected by CloudTrail logs, may indicate unauthorized access attempts, persistence establishment, or privilege escalation by an attacker.
GitHub SSH Certificate Configuration Changed
2 rules 4 TTPsAttackers can modify SSH certificate configurations in GitHub organizations to gain unauthorized access, persist in the environment, escalate privileges, and operate stealthily.
Suspicious Child Processes Spawned by JetBrains TeamCity
2 rules 17 TTPs 1 CVEDetection of suspicious processes spawned by JetBrains TeamCity indicates potential exploitation of remote code execution vulnerabilities, with attackers using command interpreters and system binaries for malicious purposes.
OpenCanary SSH Login Attempt Detection
2 rules 1 TTPDetects instances where an SSH service on an OpenCanary node has had a login attempt, indicating potential reconnaissance, privilege escalation, or lateral movement.
Okta Admin Console Unusual Behavior Detection
2 rules 4 TTPsThis brief details detection of anomalous activity within the Okta Admin Console, potentially indicating privilege escalation, persistence, defense evasion, or initial access attempts by malicious actors.
Bitbucket User Login Failure Detection
2 rules 3 TTPsDetection of Bitbucket user login failures, potentially indicating credential access attempts, initial access attempts, or other malicious activity.
Detection of New GitHub Actions Secrets Creation
3 rules 3 TTPsThis analytic detects the creation of new GitHub Actions secrets at the organization, environment, codespaces, or repository level, potentially indicating malicious persistence or privilege escalation.
AWS Identity API Access from Rare ASN Organizations
2 rules 1 TTPThis rule detects AWS identities with API traffic dominated by cloud-provider source AS organization labels, but also exhibit traffic from other AS organizations, potentially indicating credential reuse or pivoting.
Google Workspace Suspicious Login Activity
3 rules 1 TTPDetect Google Workspace login activity that Google has classified as suspicious, potentially indicating initial access, privilege escalation, defense evasion, or persistence attempts.
Detecting External RPC Traffic for Initial Access
2 rules 2 TTPsThis brief focuses on detecting Remote Procedure Call (RPC) traffic originating from the internet, a common initial access vector, by monitoring network connections to TCP port 135 and filtering known internal IP ranges.
Successful AWS Console Login Without MFA
2 rules 1 TTPSuccessful AWS console logins without multi-factor authentication can indicate compromised credentials, misconfigured security settings, or unauthorized access attempts.
Apache Struts CVE-2023-50164 Exploitation Leading to Web Shell Deployment
2 rules 3 TTPs 1 CVEExploitation of CVE-2023-50164, a critical path traversal vulnerability in Apache Struts 2, is detected by identifying malicious multipart/form-data POST requests with WebKitFormBoundary targeting Struts .action upload endpoints, followed by JSP web shell creation in Tomcat's webapps directories, indicating remote code execution.
Suspicious PDF Reader Child Process Activity
2 rules 13 TTPsAdversaries may exploit PDF reader applications to execute arbitrary commands and establish a foothold within a system, often launching built-in utilities for reconnaissance and privilege escalation.
Suspicious AWS SAML Activity Detection
2 rules 3 TTPsThis rule identifies suspicious SAML activity in AWS, such as AssumeRoleWithSAML and UpdateSAMLProvider events, which could indicate an attacker gaining backdoor access, escalating privileges, or establishing persistence.
Azure AD Temporary Access Pass Added to Account
2 rules 4 TTPsDetection of a temporary access pass (TAP) being added to an Azure AD account, which could indicate potential privilege escalation, initial access, persistence, or stealth activity.
Okta Alerts Following Unusual Proxy Authentication
2 rules 1 TTPAttackers use proxy infrastructure to mask their origin when using stolen Okta credentials, and this rule correlates the first occurrence of an Okta user session started via a proxy with subsequent Okta security alerts for the same user.
Azure AD User Password Reset Detection
2 rules 1 TTPDetects when a user successfully resets their own password in Azure Active Directory, which may indicate malicious activity or account compromise.
Suspicious PowerShell Execution via Windows Script Host
2 rules 4 TTPsDetection of PowerShell processes launched by cscript.exe or wscript.exe, indicative of potential malicious initial access or execution attempts.
RDP (Remote Desktop Protocol) from the Internet
2 rules 3 TTPs 1 CVEThis rule detects network events indicative of RDP traffic originating from the internet, which poses a significant security risk due to its frequent exploitation as an initial access or backdoor vector.
Detecting RPC Traffic to the Internet
2 rules 2 TTPsThis brief focuses on detecting Remote Procedure Call (RPC) traffic originating from internal networks and reaching the public internet, which is indicative of potential initial access or backdoor activity.
Suspicious Execution via Microsoft Office Add-Ins
3 rules 3 TTPsThis rule detects suspicious execution of Microsoft Office applications launching Office Add-Ins from unusual paths or with atypical parent processes, potentially indicating an attempt to gain initial access via a malicious phishing campaign.
WebPros cPanel & WHM and WP2 Authentication Bypass Vulnerability (CVE-2026-41940)
2 rules 1 TTP 1 CVECVE-2026-41940 is an authentication bypass vulnerability in WebPros cPanel & WHM and WP2 (WordPress Squared) that allows unauthenticated remote attackers to gain unauthorized access to the control panel.
Unused Privileged Identity Management (PIM) Roles in Azure
2 rules 1 TTPDetection of assigned but unused privileged roles in Azure's Privileged Identity Management (PIM) service, indicating potential misconfiguration, license overuse, or dormant privileged access that could be exploited.
Unauthorized Guest User Invitation Attempt in Azure
2 rules 1 TTPDetection of a failed attempt to invite an external guest user by an Azure user lacking the necessary permissions, potentially indicating privilege escalation or malicious insider activity.
Suspicious MS Office Child Process
2 rules 18 TTPsDetects suspicious child processes of Microsoft Office applications, indicating potential exploitation or malicious macros for initial access, defense evasion, and execution.
Suspicious HTML File Creation Leading to Potential Payload Delivery
3 rules 3 TTPsThis detection identifies the creation of HTML files with high entropy and large size, followed by execution via a browser process, indicating potential HTML smuggling and malicious payload delivery on Windows systems.
Suspicious Execution from VS Code Extension
2 rules 9 TTPsMalicious VS Code extensions can execute arbitrary commands, leading to initial access and subsequent payload deployment on Windows systems.
Execution from Removable Media with Network Connection
2 rules 1 TTPDetects process execution from removable media by an unusual process with untrusted code signature followed by network connection attempts, potentially indicating malware introduced via removable media for initial access.
Detection of Privileged Account Creation in Azure
2 rules 3 TTPsDetects the creation of new privileged accounts in Azure environments, potentially indicating initial access, persistence, privilege escalation, or stealth activities by malicious actors.
Azure Subscription Permission Elevation via Activity Logs
2 rules 1 TTPAn attacker elevates their Azure subscription permissions to manage all subscriptions, potentially leading to unauthorized access and control over the environment.
AWS AssumeRoleWithWebIdentity from Kubernetes SA and External ASN
2 rules 1 TTPDetects successful AWS `AssumeRoleWithWebIdentity` calls where the caller identity is a Kubernetes service account and the source autonomous system organization is not `Amazon.com, Inc.`, which may indicate a stolen or misused projected service-account token being exchanged for IAM credentials off-cluster.
Azure AD Account Created and Deleted Within a Close Time Frame
2 rules 3 TTPsDetection of Azure Active Directory accounts that are created and deleted within a short timeframe, potentially indicating malicious activity such as privilege escalation or persistence attempts.
AWS Root Account Usage Detected
3 rules 3 TTPsThe AWS root account, which grants unrestricted access to all resources within an AWS account, was used, potentially indicating unauthorized activity, privilege escalation, or a breach of security best practices.
SMB (Windows File Sharing) Activity to the Internet
2 rules 2 TTPsThis rule detects network events indicating the use of Windows file sharing (SMB or CIFS) traffic to the Internet, which is commonly exploited for initial access, backdoor deployment, or data exfiltration.
First Time Seen Removable Device Registry Modification
2 rules 2 TTPsDetection of newly seen removable devices via Windows registry modification events can indicate data exfiltration attempts or initial access via malicious USB drives.
Unauthorized Guest User Invitations in Azure AD
2 rules 3 TTPsDetection of unauthorized guest user invitations within an Azure Active Directory tenant, indicating potential privilege escalation, persistence, or initial access attempts.
Suspicious Explorer Child Process via DCOM
2 rules 9 TTPsAdversaries abuse the trusted status of explorer.exe to launch malicious scripts or executables, often using DCOM to start processes like PowerShell or cmd.exe, achieving initial access, defense evasion, and execution.
Masquerading Business Application Installers
2 rules 4 TTPsAttackers masquerade malicious executables as legitimate business application installers to trick users into downloading and executing malware, leveraging defense evasion and initial access techniques.
Detection of Office Macro File Creation
2 rules 1 TTPThis brief outlines a threat involving the creation of new Office macro files, potentially indicating malicious activity such as phishing or malware distribution, targeting Windows systems.
Azure Domain Federation Settings Modified
2 rules 2 TTPsAn attacker may modify Azure domain federation settings to establish persistence, escalate privileges, or gain unauthorized access to resources.
Suspicious MS Outlook Child Process
2 rules 3 TTPsDetection of suspicious child processes spawned by Microsoft Outlook, indicative of spear phishing and malicious file execution leading to potential initial access and further exploitation.