<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Machine Learning — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/machine-learning/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 02 Apr 2026 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/machine-learning/feed.xml" rel="self" type="application/rss+xml"/><item><title>Unusual Spike in Bytes Written to External Device Detected by Machine Learning</title><link>https://feed.craftedsignal.io/briefs/2026-04-high-bytes-written-to-external-device/</link><pubDate>Thu, 02 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-high-bytes-written-to-external-device/</guid><description>A machine learning job has detected a spike in bytes written to an external device, which is anomalous and can signal illicit data copying or transfer activities, potentially leading to data exfiltration.</description><content:encoded><![CDATA[<p>The Data Exfiltration Detection integration, part of the Elastic Security suite, includes a machine learning job designed to detect anomalies in data transfer patterns to external devices. This job, named &ldquo;ded_high_bytes_written_to_external_device,&rdquo; identifies unusual increases in the amount of data written to external devices, which could indicate data exfiltration attempts. The system establishes a baseline of normal activity and flags deviations from that baseline, operating on a 15-minute interval and examining data from the preceding two hours. While this rule is intended to detect malicious data exfiltration, legitimate activities like backups, software updates, archiving, and media creation can trigger false positives. The rule is enabled via the Data Exfiltration Detection integration.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to a system via compromised credentials or other means.</li>
<li>The attacker enumerates sensitive data on the compromised system.</li>
<li>The attacker stages the data for exfiltration, possibly compressing or archiving it.</li>
<li>The attacker connects an external device (e.g., USB drive) to the system.</li>
<li>The attacker initiates a large data transfer to the external device.</li>
<li>The Data Exfiltration Detection machine learning job detects a significant increase in bytes written to the external device, triggering an alert.</li>
<li>The attacker removes the external device containing the exfiltrated data.</li>
<li>The attacker uses the external device to access the stolen data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful data exfiltration event can result in the loss of sensitive information, potentially leading to financial losses, reputational damage, legal repercussions, and competitive disadvantage. Although the specific number of victims and targeted sectors are not specified, the potential impact is broad, affecting any organization that stores sensitive data on systems accessible to malicious actors. The severity depends on the nature and volume of the exfiltrated data.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Review and tune the Data Exfiltration Detection integration&rsquo;s configuration, specifically the &ldquo;ded_high_bytes_written_to_external_device&rdquo; machine learning job, to reduce false positives related to legitimate data transfer activities.</li>
<li>Implement and enforce data transfer policies to restrict the unauthorized use of external devices and ensure compliance with organizational security standards.</li>
<li>Deploy endpoint detection and response (EDR) solutions to enhance visibility and control over data movements to external devices, as recommended in the rule&rsquo;s response and remediation guidance.</li>
<li>Investigate any alerts generated by the &ldquo;Spike in Bytes Sent to an External Device&rdquo; rule (rule_id: &ldquo;35a3b253-eea8-46f0-abd3-68bdd47e6e3d&rdquo;) to determine the legitimacy of the data transfer and take appropriate action.</li>
<li>Consult the investigation guide provided in the rule&rsquo;s notes section to aid in the triage and analysis of potential data exfiltration incidents.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>data exfiltration</category><category>machine learning</category><category>external device</category></item><item><title>Potential Data Exfiltration to Unusual Geographic Region via Machine Learning</title><link>https://feed.craftedsignal.io/briefs/2024-05-data-exfiltration-unusual-region/</link><pubDate>Thu, 02 May 2024 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-05-data-exfiltration-unusual-region/</guid><description>A machine learning job has detected potential data exfiltration activity to an unusual geographical region, specifically by region name, indicating exfiltration over command and control channels.</description><content:encoded><![CDATA[<p>This alert is triggered by a machine learning job, <code>ded_high_sent_bytes_destination_region_name_ea</code>, that detects data exfiltration to unusual geographical regions based on network traffic patterns. The Data Exfiltration Detection integration, including Elastic Defend and Network Packet Capture, is required for this detection to function. This integration analyzes network and file events to identify abnormalities in data transfer volumes to different geographical locations, specifically by region name. Anomalous traffic patterns, particularly those involving high volumes of data being sent to regions outside the organization&rsquo;s typical network activity, could indicate malicious actors attempting to exfiltrate sensitive data via command and control channels. This detection provides defenders with an early warning of potential data breaches. Version requirements: Elastic Stack version 9.4.0 or later is required to leverage the Entity Analytics (EA) fields.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial Access: An attacker gains initial access to a system within the network through various means, such as exploiting a vulnerability or using compromised credentials.</li>
<li>Command and Control: The attacker establishes a command and control (C2) channel to communicate with the compromised system.</li>
<li>Data Collection: The attacker identifies and collects sensitive data from various sources within the network.</li>
<li>Staging: The collected data is staged in a temporary location, compressed, and potentially encrypted for exfiltration.</li>
<li>Exfiltration: The attacker uses the C2 channel to transfer the staged data to an external location in an unusual geographic region.</li>
<li>Evasion: The attacker may attempt to obfuscate the data transfer by using techniques such as tunneling or encryption to avoid detection.</li>
<li>Cleanup: The attacker may attempt to remove traces of their activity, such as deleting logs or files, to hinder investigation.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful data exfiltration attack can result in the loss of sensitive information, including intellectual property, customer data, and financial records. The risk score for this rule is 21, which indicates a moderate level of risk. Detection of this activity allows security teams to quickly respond and mitigate the potential damage. Early detection helps prevent large-scale data breaches and minimizes the impact on the organization.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Ensure that the Data Exfiltration Detection integration assets are installed and properly configured, including Elastic Defend and Network Packet Capture (see Setup instructions in content).</li>
<li>Review the geo-location details flagged by the alert to determine if the region is indeed unusual for the organization&rsquo;s typical network traffic patterns (see Triage and Analysis in content).</li>
<li>Analyze the network traffic logs associated with the alert to identify the volume and type of data being transferred to the unusual region (see Triage and Analysis in content).</li>
<li>Implement geo-blocking measures to restrict data transfers to the identified unusual region, ensuring that only approved regions can communicate with the network (see Response and Remediation in content).</li>
<li>Deploy the Sigma rule below to detect processes initiating network connections to unusual regions based on the <code>DestinationGeoRegion</code> field.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>data-exfiltration</category><category>machine-learning</category><category>network-traffic</category></item><item><title>Unusual Remote File Size Indicating Lateral Movement</title><link>https://feed.craftedsignal.io/briefs/2024-04-30-unusual-remote-file-size/</link><pubDate>Tue, 30 Apr 2024 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-04-30-unusual-remote-file-size/</guid><description>A machine learning job has detected an unusually high file size shared by a remote host, indicating potential lateral movement as attackers bundle data into a single large file transfer to evade detection when exfiltrating valuable information.</description><content:encoded><![CDATA[<p>This detection leverages machine learning to identify unusual remote file sizes, a tactic often used during lateral movement. After gaining initial access, adversaries frequently aim to locate and exfiltrate valuable data. To avoid raising alarms with numerous small transfers, they may consolidate data into a single large file. This rule, built upon the Elastic Lateral Movement Detection integration, specifically uses the <code>lmd_high_file_size_remote_file_transfer_ea</code> machine learning job. The integration requires the <code>host.ip</code> field to be populated and Elastic Defend to be properly configured. This detection is critical for organizations seeking to identify and prevent data exfiltration attempts early in the attack lifecycle. The integration assets must be installed and file and Windows RDP process events collected by Elastic Defend.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial Access: An attacker gains access to a host within the network, potentially through compromised credentials or exploitation of a vulnerability.</li>
<li>Discovery: The attacker performs reconnaissance to identify valuable data stores, network shares, and potential exfiltration targets.</li>
<li>Collection: The attacker gathers sensitive data from various sources within the compromised network. This data could include documents, databases, or other confidential information.</li>
<li>Data Consolidation: To avoid detection, the attacker bundles the collected data into a single, large file. This could involve archiving, compression, or other methods of aggregation.</li>
<li>Lateral Tool Transfer: The attacker uses remote services or tools to transfer the large file to a remote host within the network (T1570).</li>
<li>Exfiltration Preparation: The attacker stages the large file on the remote host, preparing it for exfiltration outside the network.</li>
<li>Exfiltration: The attacker initiates the transfer of the large file from the compromised network to an external destination, potentially using protocols like RDP.</li>
<li>Cleanup: The attacker attempts to remove traces of the activity, such as deleting temporary files or logs, to avoid detection.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack can lead to the exfiltration of sensitive data, potentially resulting in financial loss, reputational damage, and legal liabilities. The detection of unusual remote file sizes can help organizations identify and prevent data exfiltration attempts before they cause significant harm. Depending on the sensitivity of the exfiltrated data, the impact could range from minor inconvenience to a major security breach affecting thousands of individuals or customers.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Ensure the <code>host.ip</code> field is populated as required by the rule. For Elastic Defend versions 8.18 and above, verify that host IP collection is enabled following the provided <a href="https://www.elastic.co/docs/solutions/security/configure-elastic-defend/configure-data-volume-for-elastic-endpoint#host-fields">helper guide</a>.</li>
<li>Install the Lateral Movement Detection integration assets, including the <code>lmd_high_file_size_remote_file_transfer_ea</code> machine learning job. Follow the setup instructions detailed in the <a href="https://www.elastic.co/guide/en/security/current/prebuilt-ml-jobs.html">documentation</a>.</li>
<li>Review and tune the anomaly threshold (<code>anomaly_threshold = 70</code>) of the machine learning job based on your environment&rsquo;s baseline to reduce false positives.</li>
<li>Implement network segmentation to limit lateral movement, as suggested in the &ldquo;Response and remediation&rdquo; section of the rule documentation.</li>
<li>Enhance monitoring and logging for unusual file transfer activities and remote access attempts as stated in the rule documentation.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>lateral-movement</category><category>data-exfiltration</category><category>machine-learning</category></item><item><title>Unusually High Mean of RDP Session Duration Detected by Machine Learning</title><link>https://feed.craftedsignal.io/briefs/2024-01-high-mean-rdp-session/</link><pubDate>Wed, 24 Jan 2024 18:10:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-high-mean-rdp-session/</guid><description>A machine learning job detected an unusually high mean of RDP session duration, indicative of potential lateral movement or persistent access attempts by adversaries abusing RDP.</description><content:encoded><![CDATA[<p>This threat brief addresses the detection of unusually long Remote Desktop Protocol (RDP) sessions, identified by a pre-built Elastic machine learning job named <code>lmd_high_mean_rdp_session_duration_ea</code>. Attackers can abuse RDP for lateral movement and maintaining persistence within a network. Extended RDP sessions can also be used to evade detection mechanisms. This detection leverages machine learning to identify deviations from normal RDP session durations, potentially indicating malicious activity. The detection rule has been available since October 2023, and the corresponding ML job is part of the Lateral Movement Detection integration, requiring Elastic Stack version 9.4.0 or later. The rule depends on the <code>host.ip</code> field to be populated, which may require enabling host IP collection in Elastic Defend versions 8.18 and above.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a system within the network, possibly through phishing or exploiting a public-facing application.</li>
<li>The attacker leverages valid credentials or exploits a vulnerability to establish an RDP connection to a target system.</li>
<li>The RDP session is maintained for an extended period, significantly longer than typical RDP sessions within the environment.</li>
<li>During the prolonged RDP session, the attacker performs reconnaissance, gathering information about the network and target systems.</li>
<li>The attacker moves laterally to other systems within the network, using the established RDP session as a persistent access point.</li>
<li>The attacker executes malicious commands or transfers files, potentially installing malware or exfiltrating sensitive data.</li>
<li>The unusually long RDP session duration helps the attacker to remain undetected and evade security measures.</li>
<li>The attacker achieves their final objective, such as data theft, system compromise, or ransomware deployment.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation and undetected lateral movement via prolonged RDP sessions can lead to significant data breaches, system compromise, and financial loss. The impact includes potential theft of sensitive information, disruption of business operations, and reputational damage. If an adversary establishes a persistent foothold via RDP, they can maintain long-term access to the compromised environment.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Ensure <code>host.ip</code> field is populated by enabling host IP collection if using Elastic Defend versions 8.18 and above, as described in the <a href="https://www.elastic.co/docs/solutions/security/configure-elastic-defend/configure-data-volume-for-elastic-endpoint#host-fields">helper guide</a>.</li>
<li>Install and configure the Lateral Movement Detection integration in Kibana as described in the <a href="https://www.elastic.co/guide/en/security/current/prebuilt-ml-jobs.html">setup guide</a>.</li>
<li>Tune the machine learning job <code>lmd_high_mean_rdp_session_duration_ea</code> by adjusting the <code>anomaly_threshold</code> based on your environment and RDP usage patterns.</li>
<li>Investigate triggered alerts from the &ldquo;High Mean of RDP Session Duration&rdquo; rule following the <a href="https://www.elastic.co/guide/en/security/current/prebuilt-ml-jobs.html">triage and analysis guide</a>.</li>
<li>Monitor Windows RDP process events collected by the <a href="https://docs.elastic.co/en/integrations/endpoint">Elastic Defend</a> integration for suspicious activity.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>lateral-movement</category><category>rdp</category><category>machine-learning</category></item><item><title>Unusual Process Spawned by a Parent Process via Machine Learning</title><link>https://feed.craftedsignal.io/briefs/2024-01-unusual-process-spawn/</link><pubDate>Tue, 23 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-unusual-process-spawn/</guid><description>A machine learning job detected a suspicious Windows process, predicted malicious by the ProblemChild model and flagged as an unusual child process name for its parent, potentially indicating LOLbins usage and evading traditional detection.</description><content:encoded><![CDATA[<p>This alert originates from an Elastic machine learning job named <code>problem_child_rare_process_by_parent_ea</code> designed to detect Living off the Land (LotL) attacks on Windows systems. The model identifies processes spawned by parent processes that are statistically rare and have a high probability of being malicious based on the &ldquo;ProblemChild&rdquo; supervised learning model. This approach aims to uncover malicious activities that utilize legitimate system binaries (LOLbins) for nefarious purposes, effectively bypassing traditional signature-based detections. The alert relies on Windows process events collected by Elastic Defend or Winlogbeat with the LotL Attack Detection integration. This detection method becomes particularly important as attackers increasingly rely on existing tools to blend in with normal system activity and avoid raising suspicion.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains initial access via unspecified means (e.g., phishing, compromised credentials).</li>
<li>Attacker leverages a legitimate system binary (LOLbin) such as <code>powershell.exe</code> or <code>cmd.exe</code>.</li>
<li>The LOLbin is used to execute a malicious payload or script.</li>
<li>The malicious process is spawned as a child process of the LOLbin.</li>
<li>Elastic&rsquo;s machine learning model identifies the child process as rare and potentially malicious based on its parent-child relationship and other features.</li>
<li>The rare process executes malicious commands, possibly downloading further payloads.</li>
<li>The attacker achieves their objective, such as data exfiltration or lateral movement.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack utilizing LOLbins can lead to significant compromise, including data theft, system disruption, and further propagation within the network. The reliance on trusted system binaries makes these attacks difficult to detect with traditional methods, potentially allowing attackers to operate undetected for extended periods. The impact is directly correlated to the privileges of the initial compromised account and the effectiveness of lateral movement techniques employed by the attacker.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Ensure that the Living off the Land (LotL) Attack Detection integration is installed and configured correctly, along with either Elastic Defend or Winlogbeat, as described in the rule&rsquo;s <code>setup</code> section.</li>
<li>Review the parent and child process names identified in the alert to determine if they are legitimate applications or associated with LOLbins, as detailed in the investigation guide within the rule&rsquo;s <code>note</code> section.</li>
<li>Investigate the command-line arguments used by the suspicious process for potentially malicious commands or scripts as described in the rule <code>note</code> section.</li>
<li>Tune the <code>anomaly_threshold</code> setting in the machine learning job configuration based on your environment&rsquo;s baseline activity to reduce false positives, as described in the rule documentation.</li>
<li>Implement exceptions for legitimate administrative tools and software updates to reduce false positives, as mentioned in the rule&rsquo;s <code>note</code> section.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>defense-evasion</category><category>lolbins</category><category>windows</category><category>machine-learning</category></item><item><title>Unusual Remote File Directory Lateral Movement Detection</title><link>https://feed.craftedsignal.io/briefs/2024-01-22-unusual-remote-file-directory/</link><pubDate>Mon, 22 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-22-unusual-remote-file-directory/</guid><description>An Elastic machine learning job detects anomalous remote file transfers to unusual directories, indicating potential lateral movement by attackers attempting to bypass standard security monitoring.</description><content:encoded><![CDATA[<p>This detection identifies potential lateral movement within a network by flagging unusual remote file transfers to directories that are not commonly monitored. Attackers often leverage less scrutinized file paths to evade standard security measures and deploy malicious payloads. This detection relies on the &ldquo;lmd_rare_file_path_remote_transfer_ea&rdquo; machine learning job within Elastic Security, which analyzes file and Windows RDP process events to identify anomalous file transfers based on the destination directory. The detection is part of the Lateral Movement Detection integration and requires Elastic Defend and Fleet for full functionality. This is important for defenders because attackers will try to blend in with normal file transfer activity by using uncommon directories.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to a system within the network (e.g., via phishing or exploitation of a vulnerability).</li>
<li>The attacker identifies a target host for lateral movement.</li>
<li>The attacker uses a remote service (e.g., RDP, SMB) to connect to the target host.</li>
<li>The attacker attempts to transfer malicious files to the target host.</li>
<li>Instead of using common directories like &ldquo;C:\Windows\Temp&rdquo; or &ldquo;C:\ProgramData&rdquo;, the attacker chooses a less monitored directory to evade detection.</li>
<li>The remote service is leveraged to perform the file transfer to the atypical directory.</li>
<li>The transferred file is then executed, potentially leading to command execution or privilege escalation.</li>
<li>The attacker achieves their objective (e.g., data exfiltration, ransomware deployment) on the target host.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack can lead to unauthorized access to sensitive data, compromise of critical systems, and potential disruption of business operations. Although this detection is rated as low severity, successful lateral movement can lead to significant damage. The number of affected hosts and the severity of the impact depends on the attacker&rsquo;s objectives and the organization&rsquo;s security posture. Lateral movement allows attackers to gain a deeper foothold within the network and increase the scope of their malicious activities.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Ensure the <code>host.ip</code> field is populated in Elastic Defend events by following the configuration steps in the <a href="https://www.elastic.co/docs/solutions/security/configure-elastic-defend/configure-data-volume-for-elastic-endpoint#host-fields">Elastic documentation</a>.</li>
<li>Install the Lateral Movement Detection integration assets as described in the <a href="https://www.elastic.co/guide/en/security/current/prebuilt-ml-jobs.html">setup instructions</a>.</li>
<li>Tune the anomaly_threshold in the machine learning job configuration based on your environment&rsquo;s baseline activity to minimize false positives, as mentioned in the rule&rsquo;s configuration.</li>
<li>Investigate any alerts generated by this rule, paying close attention to the source and destination IP addresses, the user account involved, and the specific directory used for the file transfer as outlined in the <a href="#triage-and-analysis">triage and analysis section</a>.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>lateral-movement</category><category>machine-learning</category><category>elastic</category></item><item><title>ProblemChild ML Detection of Suspicious Windows Processes</title><link>https://feed.craftedsignal.io/briefs/2024-01-problemchild-suspicious-windows-processes/</link><pubDate>Mon, 22 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-problemchild-suspicious-windows-processes/</guid><description>The ProblemChild machine learning model has detected a user with suspicious Windows processes exhibiting unusually high malicious probability scores, potentially indicating defense evasion via masquerading or LOLbins.</description><content:encoded><![CDATA[<p>The Elastic ProblemChild integration leverages machine learning to identify suspicious Windows process clusters associated with specific users. This detection focuses on processes flagged as malicious by a supervised ML model, further refined by an unsupervised ML model that identifies unusually high aggregate scores within process clusters. This combination aims to detect activity that may evade traditional signature-based detections, such as the use of Living-off-the-Land Binaries (LOLbins) for masquerading. The models are trained to identify processes exhibiting characteristics indicative of malicious intent, making it possible to expose attackers using legitimate system tools for malicious purposes. The integration requires Windows process events collected by Elastic Defend or Winlogbeat and the Living off the Land (LotL) Attack Detection integration assets to be installed.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Windows system.</li>
<li>The attacker attempts to execute malicious commands using LOLbins (e.g., PowerShell, cmd.exe, mshta.exe).</li>
<li>These processes are spawned with potentially obfuscated or unusual command-line arguments to evade basic detection.</li>
<li>The ProblemChild supervised ML model analyzes process characteristics and assigns a malicious probability score.</li>
<li>An unsupervised ML model aggregates the scores of related processes associated with the same user, identifying unusually high clusters.</li>
<li>The rule triggers based on the combined supervised and unsupervised ML scores, indicating a high likelihood of malicious activity.</li>
<li>The attacker may attempt to use masquerading techniques to further disguise their actions by renaming files or using legitimate process names.</li>
<li>The ultimate goal could be data exfiltration, lateral movement, or establishing persistence on the compromised system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack leveraging LOLbins and masquerading techniques can lead to significant damage, including data breaches, system compromise, and disruption of services. The use of legitimate tools makes detection challenging, potentially allowing attackers to operate undetected for extended periods. While the number of victims and specific sectors are unknown, any organization running Windows systems is potentially vulnerable. The impact of a successful attack depends on the attacker&rsquo;s objectives but can range from minor data theft to complete system takeover.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Ensure the Living off the Land (LotL) Attack Detection integration assets are installed and properly configured as described in the setup instructions of the rule.</li>
<li>Deploy the &ldquo;User Detected with Suspicious Windows Process(es)&rdquo; ML job (machine_learning_job_id: <code>problem_child_high_sum_by_user_ea</code>) and tune the anomaly threshold for your environment.</li>
<li>Enable Windows process event collection via Elastic Defend or Winlogbeat (Rule Setup) to provide the necessary data for the ML models.</li>
<li>Review and whitelist legitimate administrative tools and software updates that may trigger false positives, as described in the False Positive Analysis section of the rule note.</li>
<li>Implement enhanced monitoring and detection rules to identify similar patterns of behavior in the future, focusing on the specific tactics and techniques used in this incident (Rule Note).</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>windows</category><category>machine-learning</category></item><item><title>Potential DGA Activity Detected by Machine Learning</title><link>https://feed.craftedsignal.io/briefs/2024-01-dga-activity/</link><pubDate>Tue, 09 Jan 2024 15:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-dga-activity/</guid><description>A machine learning job detected potential DGA (domain generation algorithm) activity indicative of malware command and control (C2) channels, identifying source IP addresses making DNS requests with a high probability of being DGA-generated, a technique used by adversaries to evade detection.</description><content:encoded><![CDATA[<p>This brief describes a detection of potential DGA (Domain Generation Algorithm) activity identified by an Elastic machine learning job. DGAs are often used by malware for command and control (C2) communication, generating domain names dynamically to evade detection. The machine learning job, <code>dga_high_sum_probability_ea</code>, analyzes DNS requests to identify source IP addresses that exhibit a high probability of DGA activity. This detection relies on the DGA Detection integration, which includes an ML-based framework to detect DGA activity in DNS events. The integration requires Fleet and DNS events collected by integrations such as Elastic Defend, Network Packet Capture, or Packetbeat. This activity matters for defenders because successful DGA-based C2 channels can allow malware to maintain communication and control even when individual malicious domains are blocked.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker compromises a host within the network, potentially through unpatched vulnerabilities or social engineering.</li>
<li>Malware is deployed on the compromised host. This malware contains a DGA.</li>
<li>The malware uses the DGA to generate a list of potential domain names.</li>
<li>The compromised host initiates DNS requests to resolve the generated domain names.</li>
<li>The DNS requests are sent to internal or external DNS servers.</li>
<li>The machine learning job <code>dga_high_sum_probability_ea</code> analyzes the DNS requests, specifically looking for source IPs with a high aggregate probability of generating DGA domains.</li>
<li>If the anomaly score exceeds the threshold (70), an alert is triggered.</li>
<li>The malware successfully establishes a C2 channel with a dynamically generated domain, enabling further malicious activities such as data exfiltration or lateral movement.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The successful exploitation of DGA-based command and control can lead to persistent malware infections, data exfiltration, and further compromise of systems within the network. While the severity is rated low, the potential impact can escalate quickly if the C2 channel is used for more damaging activities. This detection focuses on identifying potential DGA activity, enabling security teams to investigate and prevent further damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Ensure the DGA Detection integration is installed and properly configured, including the machine learning job <code>dga_high_sum_probability_ea</code> (references: <a href="https://docs.elastic.co/en/integrations/dga">Elastic DGA Detection documentation</a>, <a href="https://www.elastic.co/guide/en/security/current/prebuilt-ml-jobs.html">prebuilt ML jobs</a>).</li>
<li>Verify that DNS events are being collected by Elastic Defend, Network Packet Capture, or Packetbeat and that the data view used by the machine learning job includes these events (references: <a href="https://docs.elastic.co/en/integrations/endpoint">Elastic Defend</a>, <a href="https://docs.elastic.co/integrations/network_traffic">Network Packet Capture</a>, <a href="https://www.elastic.co/guide/en/beats/packetbeat/current/packetbeat-overview.html">Packetbeat</a>).</li>
<li>Tune the anomaly threshold (currently 70) in the machine learning job based on your environment to reduce false positives and ensure timely detection of DGA activity.</li>
<li>Review and implement the triage and analysis steps outlined in the rule&rsquo;s note section, focusing on identifying the source IP, analyzing DNS request patterns, and cross-referencing domains with threat intelligence feeds.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>dga</category><category>command-and-control</category><category>machine-learning</category></item><item><title>Unusual Source IP for Okta Privileged Operations Detected</title><link>https://feed.craftedsignal.io/briefs/2024-01-okta-unusual-ip/</link><pubDate>Tue, 09 Jan 2024 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-okta-unusual-ip/</guid><description>A machine learning job has identified a user performing privileged operations in Okta from an uncommon source IP, indicating potential privileged access activity indicative of account compromise or privilege escalation.</description><content:encoded><![CDATA[<p>This alert leverages machine learning to identify deviations in IP usage patterns associated with privileged Okta operations, flagging unusual access attempts that could signify privilege escalation or account compromise. It identifies a user performing privileged operations in Okta from an uncommon source IP, potentially indicating account compromise, misuse of administrative privileges, or an attacker leveraging a new network location. The detection rule analyzes Okta logs, specifically focusing on events related to privileged operations and source IP addresses, to establish baseline behavior and detect anomalies. This detection is important because Okta controls access to many downstream applications, and any compromise of Okta privileges can lead to widespread data breaches. The rule requires the Privileged Access Detection integration assets to be installed, as well as Okta logs collected by integrations such as Okta. The minimum stack version is 9.4.0</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Adversary gains initial access to a valid user account through phishing, credential stuffing, or other means (T1078, T1078.004).</li>
<li>The adversary leverages the compromised account to authenticate to Okta, potentially bypassing or circumventing MFA.</li>
<li>The adversary attempts to perform privileged operations within Okta, such as modifying user permissions, accessing sensitive applications, or changing security settings.</li>
<li>Okta logs record the privileged operation attempt, including the source IP address of the request.</li>
<li>The machine learning job analyzes the source IP address and compares it to the user&rsquo;s historical access patterns.</li>
<li>If the source IP address is determined to be unusual or rare for the user, the machine learning job generates an anomaly.</li>
<li>The &ldquo;Unusual Source IP for Okta Privileged Operations Detected&rdquo; rule triggers based on the anomaly score exceeding a predefined threshold (anomaly_threshold = 75).</li>
<li>The alert triggers, potentially leading to account takeover, data exfiltration, or further privilege escalation.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack can lead to unauthorized access to sensitive applications and data managed by Okta. This can result in data breaches, financial loss, reputational damage, and legal liabilities. Since Okta is a widely used identity management service, a compromise can impact numerous downstream applications and services that rely on Okta for authentication and authorization. The number of affected users and systems can vary depending on the scope of the privileged access and the attacker&rsquo;s objectives.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Install the Privileged Access Detection integration assets, as well as Okta logs collected by integrations such as Okta, as described in the &ldquo;Setup&rdquo; section of the rule to enable the machine learning job.</li>
<li>Review the source IP address flagged by the alert to determine its geolocation and assess if it aligns with the user&rsquo;s typical access patterns or known locations, as described in the rule&rsquo;s &ldquo;Triage and analysis&rdquo; section.</li>
<li>Tune the <code>anomaly_threshold</code> parameter in the machine learning job based on your environment to reduce false positives.</li>
<li>Correlate the flagged IP address with any known threat intelligence feeds to check for any history of malicious activity associated with it, as described in the rule&rsquo;s &ldquo;Triage and analysis&rdquo; section.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>privileged-access</category><category>okta</category><category>machine-learning</category></item><item><title>High Command Line Entropy Detected for Privileged Commands on Linux</title><link>https://feed.craftedsignal.io/briefs/2024-01-high-command-line-entropy/</link><pubDate>Wed, 03 Jan 2024 15:30:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-high-command-line-entropy/</guid><description>A machine learning job has identified an unusually high median command line entropy for privileged commands executed by a user on Linux systems, suggesting possible privileged access activity through command lines, indicating potential obfuscation or unauthorized use of privileged access.</description><content:encoded><![CDATA[<p>This alert originates from a machine learning job designed to detect anomalous command-line activity on Linux systems. Specifically, it focuses on identifying instances where privileged commands are executed with unusually high entropy. High entropy in command lines often signifies obfuscation, which threat actors use to mask their activities and evade detection. This rule leverages the Privileged Access Detection (PAD) integration from Elastic to identify these anomalies. The PAD integration requires Linux logs collected by Elastic Defend or Sysmon Linux. The detection logic analyzes command lines associated with privileged commands, flagging those with a high degree of randomness or complexity. This can indicate unauthorized use of valid accounts (T1078) or attempts at privilege escalation, especially if combined with defense evasion techniques (T1027) such as obfuscating commands. The rule and associated ML job have been in production since Feb 2025 and require Elastic Stack version 9.4.0 or higher.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Linux system, potentially through a compromised account or vulnerability exploitation.</li>
<li>The attacker identifies privileged commands they need to execute to achieve their objectives, such as gaining root access or modifying sensitive files.</li>
<li>To evade detection, the attacker obfuscates their commands using techniques like encoding, compression, or complex string manipulation.</li>
<li>The attacker executes the obfuscated privileged commands via the command line.</li>
<li>Elastic Defend or Sysmon Linux captures the command-line activity and logs it to Elasticsearch.</li>
<li>The Privileged Access Detection ML job analyzes the command lines and calculates their entropy.</li>
<li>If the entropy exceeds a predefined threshold, the ML job flags the activity as anomalous and generates an alert.</li>
<li>Security analysts investigate the alert to determine the nature of the suspicious activity and take appropriate action.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful privilege escalation can grant an attacker complete control over a Linux system, allowing them to steal sensitive data, install malware, or disrupt critical services. While this rule itself triggers on unusual command line activity, the underlying behavior could lead to a full system compromise. The number of potential victims is directly related to the scope of the Linux environment being monitored. Sectors commonly targeted by privilege escalation attacks include technology, finance, and government.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Privileged Access Detection integration and ensure that Linux logs from Elastic Defend or Sysmon Linux are being ingested (Setup section).</li>
<li>Review and tune the machine learning job <code>pad_linux_high_median_process_command_line_entropy_by_user_ea</code> to minimize false positives based on your environment (False positive analysis section in rule).</li>
<li>Create a case management workflow triggered by the &ldquo;High Command Line Entropy Detected for Privileged Commands&rdquo; rule to ensure alerts are promptly investigated.</li>
<li>Implement the remediation steps outlined in the investigation guide to contain and eradicate any confirmed malicious activity (Response and remediation section).</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>privileged-access-detection</category><category>machine-learning</category><category>linux</category></item><item><title>Unusual Remote File Extension Detected via Machine Learning</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-unusual-remote-file-extension/</link><pubDate>Wed, 03 Jan 2024 15:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-unusual-remote-file-extension/</guid><description>An Elastic machine learning rule detects unusual remote file transfers with rare extensions, potentially indicating lateral movement activity on a host and suggesting adversaries bypassing security measures.</description><content:encoded><![CDATA[<p>This brief focuses on a detection rule from Elastic&rsquo;s Lateral Movement Detection (LMD) integration that utilizes machine learning to identify unusual remote file transfers. The rule, &ldquo;Unusual Remote File Extension,&rdquo; is designed to detect anomalies in file transfers, specifically those involving rare file extensions, which could be indicative of lateral movement within a network. This rule leverages the <code>lmd_rare_file_extension_remote_transfer_ea</code> machine learning job ID. The rule requires the Lateral Movement Detection integration assets to be installed, as well as file and Windows RDP process events collected by the Elastic Defend integration. The rule operates by analyzing <code>host.ip</code> and detecting anomalies in file transfers, where host IP collection needs to be enabled on Elastic Defend versions 8.18 and above.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a system within the network.</li>
<li>The attacker attempts to move laterally to other systems using remote services like RDP or SMB.</li>
<li>As part of the lateral movement, the attacker transfers tools or files to the remote system.</li>
<li>The attacker uses a rare or uncommon file extension for the transferred files, potentially to evade detection based on known file types.</li>
<li>The file transfer occurs over the network, triggering file event logs on the source and destination systems.</li>
<li>Elastic Defend, with host IP collection enabled, monitors these file events and forwards the data to the Elastic Security platform.</li>
<li>The &ldquo;Unusual Remote File Extension&rdquo; machine learning job identifies the transfer of a file with a rare extension, comparing it against historical data.</li>
<li>If the file extension is deemed anomalous based on its rarity, the rule triggers, indicating potential lateral movement.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful lateral movement attack can allow an adversary to gain access to sensitive data, critical systems, or privileged accounts. By using uncommon file extensions, attackers attempt to bypass security measures that rely on identifying known file types. This can lead to undetected malware deployment, data exfiltration, or further compromise of the network. Though this rule is of low severity, it can provide an early warning signal to stop an attack before greater damage occurs.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable the <code>host.ip</code> field within Elastic Defend configurations (versions 8.18 and above) to ensure proper data collection for the machine learning job.</li>
<li>Install the Lateral Movement Detection integration assets within Kibana as per the provided setup instructions to activate the &ldquo;Unusual Remote File Extension&rdquo; rule.</li>
<li>Tune the anomaly threshold of the machine learning job to reduce false positives, considering your organization&rsquo;s typical file transfer patterns.</li>
<li>Deploy the &ldquo;Detect Remote File Extension Transfer&rdquo; Sigma rule to identify file transfers with rare extensions using process creation logs.</li>
<li>Review the triage and analysis steps in the rule&rsquo;s documentation to effectively investigate and respond to triggered alerts.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>lateral-movement</category><category>machine-learning</category><category>elastic</category></item><item><title>Machine Learning Detects High Bytes Written to External Device</title><link>https://feed.craftedsignal.io/briefs/2024-01-exfiltration-ml-high-bytes/</link><pubDate>Wed, 03 Jan 2024 15:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-exfiltration-ml-high-bytes/</guid><description>A machine learning job has detected high bytes of data written to an external device, potentially indicating illicit data copying or transfer activities leading to data exfiltration over a physical medium such as USB.</description><content:encoded><![CDATA[<p>This brief addresses a machine learning detection identifying anomalous data transfer volumes to external devices. The Elastic Data Exfiltration Detection integration includes a prebuilt machine learning job, <code>ded_high_bytes_written_to_external_device_ea</code>, designed to detect spikes in data written to external devices. This behavior is considered anomalous because typical operational settings usually exhibit predictable patterns or ranges of data transfer to external storage. The detection is triggered when the amount of data written significantly deviates from the established baseline, potentially signaling unauthorized data copying or exfiltration attempts. This detection focuses on identifying abnormalities, providing an alert for investigation of possible illicit data transfer activities. The integration requires the Elastic Defend integration to collect file events.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a system via compromised credentials or exploiting a vulnerability.</li>
<li>The attacker uses their access to locate and stage sensitive data for exfiltration.</li>
<li>The attacker connects an external storage device, such as a USB drive, to the compromised system.</li>
<li>The attacker initiates a large data transfer operation, copying the staged data to the external device.</li>
<li>Elastic Defend monitors file events and detects a significant increase in bytes written to the external device.</li>
<li>The <code>ded_high_bytes_written_to_external_device_ea</code> machine learning job identifies the unusual data transfer volume.</li>
<li>An alert is triggered based on the anomaly threshold defined in the Data Exfiltration Detection rule.</li>
<li>The attacker removes the external device, completing the exfiltration of the sensitive data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exfiltration of data to external devices can lead to significant data breaches. The impact varies depending on the sensitivity and volume of the data stolen. This activity can result in financial losses, reputational damage, legal repercussions, and compromise of intellectual property. While the specific number of affected organizations is unknown, any organization that allows the use of external storage devices is potentially vulnerable. This issue poses a risk across various sectors, particularly those handling sensitive data, such as finance, healthcare, and technology.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Install the Data Exfiltration Detection integration and configure the preconfigured anomaly detection jobs as described in the rule&rsquo;s setup instructions.</li>
<li>Review and tune the <code>anomaly_threshold</code> (currently set to 75) based on your environment&rsquo;s baseline data transfer patterns to reduce false positives.</li>
<li>Deploy endpoint detection and response (EDR) solutions to enhance visibility and control over data movements to external devices as mentioned in the &ldquo;Response and remediation&rdquo; section of the rule&rsquo;s <code>note</code>.</li>
<li>Create exceptions for known backup operations, software updates, and data archiving processes that may trigger false positives, referencing the &ldquo;False positive analysis&rdquo; section of the rule&rsquo;s <code>note</code>.</li>
<li>Implement additional monitoring on similar devices and network segments to detect any further anomalous data transfer activities, based on the rule&rsquo;s description and &ldquo;Response and remediation&rdquo; section of the <code>note</code>.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>data-exfiltration</category><category>machine-learning</category><category>endpoint</category></item><item><title>Okta Group Privilege Change Spike via ML Detection</title><link>https://feed.craftedsignal.io/briefs/2024-01-okta-group-privilege-spike/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-okta-group-privilege-spike/</guid><description>A machine learning job has identified an unusual spike in Okta group privilege change events, indicating potential privileged access activity where attackers might be elevating privileges by adding themselves or compromised accounts to high-privilege groups, enabling further access or persistence.</description><content:encoded><![CDATA[<p>This alert focuses on detecting potential privilege escalation attempts within Okta environments. The Elastic Security prebuilt machine learning job <code>pad_okta_spike_in_group_privilege_changes_ea</code> identifies unusual spikes in Okta group privilege change events. Attackers may add themselves or compromised accounts to high-privilege groups to gain unauthorized access and persist within the environment. This activity can lead to significant data breaches, system compromise, and long-term persistence. The rule leverages Elastic&rsquo;s Anomaly Detection feature. This detection is particularly relevant for organizations heavily reliant on Okta for identity and access management, especially those with sensitive data or critical infrastructure.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker compromises a low-privilege user account through phishing or credential stuffing.</li>
<li>The attacker logs into Okta using the compromised credentials, bypassing MFA if possible.</li>
<li>The attacker attempts to add the compromised account to a high-privilege Okta group, such as &ldquo;Administrators&rdquo; or &ldquo;Security Admins.&rdquo;</li>
<li>Okta logs an event indicating a group privilege change for the compromised account.</li>
<li>The machine learning job <code>pad_okta_spike_in_group_privilege_changes_ea</code> detects a statistically significant spike in these group privilege change events.</li>
<li>The attacker gains elevated privileges within Okta and connected applications.</li>
<li>The attacker leverages the newly acquired privileges to access sensitive data or modify critical system configurations.</li>
<li>The attacker establishes persistence by creating new administrative accounts or modifying existing account permissions, ensuring continued access even if the initial compromised account is discovered.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful privilege escalation attack in Okta can have severe consequences. Attackers can gain complete control over the Okta environment, leading to unauthorized access to all connected applications and systems. This can result in data breaches, financial losses, and reputational damage. The number of affected users and systems depends on the scope of the attacker&rsquo;s access and the sensitivity of the data stored within the connected applications.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the &ldquo;Spike in Group Privilege Change Events&rdquo; machine learning job in your Elastic Security environment and tune the <code>anomaly_threshold</code> for your specific Okta usage patterns (references: <a href="https://www.elastic.co/guide/en/security/current/prebuilt-ml-jobs.html">Elastic ML Jobs</a>, <a href="https://docs.elastic.co/en/integrations/pad">Privileged Access Detection Setup</a>).</li>
<li>Investigate any alerts generated by the machine learning job, focusing on identifying the accounts involved in the privilege changes, the source IP addresses, and the affected groups (reference: Investigation Guide section in the content).</li>
<li>Implement multi-factor authentication (MFA) for all Okta users, especially those with administrative privileges, to prevent account compromise (reference: remediation steps in the content).</li>
<li>Review and update access control policies to ensure that only authorized personnel can modify group memberships, reducing the risk of future privilege escalation (reference: remediation steps in the content).</li>
<li>Enable Okta integration and collect Okta logs in Elastic Agent policy (reference: <a href="https://docs.elastic.co/en/integrations/okta">Okta integration</a>).</li>
<li>Implement the Sigma rule &ldquo;Okta Suspicious Group Membership Changes&rdquo; to detect specific patterns of malicious group modifications, and tune for your environment.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>okta</category><category>privilege-escalation</category><category>machine-learning</category></item><item><title>Unusual Process Spawned by a User Detected by Machine Learning</title><link>https://feed.craftedsignal.io/briefs/2024-01-rare-process-user/</link><pubDate>Wed, 03 Jan 2024 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-rare-process-user/</guid><description>A machine learning job detected a suspicious Windows process, predicted to be malicious by the ProblemChild supervised ML model and found to be unusual within the user's context, potentially indicating defense evasion techniques like masquerading or the use of LOLbins.</description><content:encoded><![CDATA[<p>A machine learning (ML) rule has identified unusual process execution on a Windows endpoint. This detection leverages two ML models from the Elastic ProblemChild integration: a supervised model that predicts malicious processes and an unsupervised model that identifies processes anomalous to the user&rsquo;s typical behavior. The rule focuses on detecting defense evasion tactics, specifically the potential use of Living-off-the-Land Binaries (LOLbins) or masquerading techniques, which can be difficult to detect with traditional signature-based methods. This detection uses data from the Elastic Endpoint or Winlogbeat and requires the Living off the Land (LotL) Attack Detection integration assets to be installed. This rule was last updated April 1, 2026 and requires Elastic Stack version 9.4.0 or higher.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial Access: The attacker gains initial access through an existing user account.</li>
<li>Execution: The attacker executes a standard Windows process (e.g., cmd.exe, powershell.exe).</li>
<li>Defense Evasion: The attacker leverages LOLbins to perform malicious actions, blending in with legitimate system activity.</li>
<li>Masquerading: The attacker renames or moves malicious tools to mimic legitimate system files.</li>
<li>Privilege Escalation (Optional): The attacker attempts to escalate privileges using the compromised process.</li>
<li>Lateral Movement (Optional): The attacker uses the compromised process to move laterally to other systems.</li>
<li>Command and Control (Optional): The process establishes a connection to a command and control server for further instructions.</li>
<li>Impact: The attacker achieves their objective, such as data exfiltration, system compromise, or persistence.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack using these techniques can lead to a full system compromise, data theft, or the installation of persistent backdoors. The use of LOLbins makes detection difficult, potentially allowing attackers to operate undetected for extended periods. The impact is amplified by the potential for lateral movement to other systems within the network. While the severity is rated &ldquo;low&rdquo;, successful exploitation allows attackers to move laterally and establish persistence in the network.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Ensure the Living off the Land (LotL) Attack Detection integration is installed and properly configured, as detailed in the rule setup (Elastic Defend or Winlogbeat).</li>
<li>Investigate alerts generated by the &ldquo;Unusual Process Spawned by a User&rdquo; rule (rule_id: 40155ee4-1e6a-4e4d-a63b-e8ba16980cfb) to determine the legitimacy of the flagged process.</li>
<li>Tune the anomaly threshold (anomaly_threshold: 75) based on your environment to reduce false positives, as mentioned in the rule parameters.</li>
<li>Review the &ldquo;False positive analysis&rdquo; section in the rule&rsquo;s note for guidance on identifying and excluding legitimate processes.</li>
<li>Implement the provided Sigma rule to detect unusual command line arguments associated with LOLBins.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>endpoint</category><category>windows</category><category>defense evasion</category><category>machine learning</category><category>lolbins</category></item><item><title>ProblemChild ML Model Detects Unusual Process on Windows Host</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-problemchild-rare-process/</link><pubDate>Wed, 03 Jan 2024 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-problemchild-rare-process/</guid><description>The ProblemChild machine learning model detected a rare Windows process indicative of defense evasion, potentially involving LOLbins, on a host not commonly associated with malicious activity.</description><content:encoded><![CDATA[<p>This detection leverages the ProblemChild supervised machine learning model to identify unusual Windows processes that may be indicative of defense evasion tactics. The model flags processes that are both statistically unusual for a given host and predicted to be suspicious based on their characteristics. This approach aims to detect Living off the Land (LotL) attacks, where adversaries use legitimate system binaries (LOLbins) to evade traditional signature-based detection methods. The rule specifically targets processes observed on hosts that do not commonly exhibit malicious behavior. The alert requires the Elastic&rsquo;s Living off the Land (LotL) Attack Detection integration assets to be installed, processing Windows process events collected by Elastic Defend or Winlogbeat. This detection rule was last updated on 2026-04-01 and requires Elastic Stack version 9.4.0 or higher.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Adversary gains initial access to a Windows system.</li>
<li>The attacker leverages a LOLbin (e.g., <code>powershell.exe</code>, <code>cmd.exe</code>, <code>mshta.exe</code>) to execute malicious commands.</li>
<li>The LOLbin spawns a child process to perform a specific task, such as downloading a file or modifying system settings.</li>
<li>The spawned process exhibits characteristics flagged as suspicious by the ProblemChild ML model.</li>
<li>The suspicious process attempts to evade detection by masquerading as a legitimate system process or by obfuscating its activity.</li>
<li>The attacker uses the process to establish persistence, escalate privileges, or move laterally within the network.</li>
<li>The ultimate objective is to exfiltrate sensitive data, deploy ransomware, or disrupt business operations.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful defense evasion attack can allow adversaries to operate undetected within a network, leading to data breaches, financial losses, and reputational damage. The use of LOLbins makes it difficult to distinguish malicious activity from legitimate system operations. This detection rule aims to reduce the dwell time of attackers by identifying suspicious processes early in the attack chain, even if they are using legitimate tools. False positives may occur due to routine administrative tasks, software updates, or custom scripts.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Ensure that the Living off the Land (LotL) Attack Detection integration is installed and properly configured, as described in the &ldquo;Setup&rdquo; section of this brief.</li>
<li>Verify that Windows process events are being collected by Elastic Defend or Winlogbeat, as required by the detection rule.</li>
<li>Deploy the following Sigma rule to detect unusual process spawns and tune the <code>Image|endswith</code> and <code>CommandLine|contains</code> conditions for your specific environment.</li>
<li>Review the investigation guide provided in the rule description to triage and analyze potential false positives.</li>
<li>Adjust the <code>anomaly_threshold</code> (currently 75) in the Elastic detection rule based on your environment&rsquo;s baseline to reduce noise.</li>
<li>Monitor for MITRE ATT&amp;CK Technique T1218 (System Binary Proxy Execution) to identify potential LOLbin abuse.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>defense-evasion</category><category>lolbin</category><category>windows</category><category>machine-learning</category></item><item><title>Unusual Source IP for Windows Privileged Operations Detected via ML</title><link>https://feed.craftedsignal.io/briefs/2024-01-unusual-source-ip-privileged-ops/</link><pubDate>Tue, 02 Jan 2024 15:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-unusual-source-ip-privileged-ops/</guid><description>A machine learning job detected a user performing privileged operations in Windows from an uncommon source IP, potentially indicating account compromise or privilege escalation.</description><content:encoded><![CDATA[<p>This alert leverages Elastic&rsquo;s machine learning capabilities to identify anomalous network activity related to privileged operations in Windows. Specifically, it flags instances where a user performs privileged actions from a source IP address that is not typically associated with their account. The detection rule, <code>Unusual Source IP for Windows Privileged Operations Detected</code>, is triggered by the <code>pad_windows_rare_source_ip_by_user_ea</code> machine learning job. The underlying machine learning model analyzes network patterns and user behavior to detect deviations from established baselines. Such deviations can indicate account compromise, insider threat activity, or attackers leveraging new network locations for privilege escalation within a Windows environment. This detection is enabled through the Privileged Access Detection integration assets within Elastic Security, supporting deployments of Elastic Defend and the Windows integration.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Access (TA0001):</strong> An attacker gains initial access to a user account through credential compromise or other means.</li>
<li><strong>Privilege Escalation (TA0004):</strong> The attacker attempts to escalate privileges using the compromised account.</li>
<li><strong>Unusual Network Location:</strong> The attacker leverages a VPN, proxy, or compromised host in a different network segment to conduct privileged operations.</li>
<li><strong>Windows Privileged Operation:</strong> The attacker performs a privileged action on a Windows system, such as modifying system files, creating new accounts, or accessing sensitive data.</li>
<li><strong>ML Anomaly Detection:</strong> Elastic&rsquo;s machine learning job <code>pad_windows_rare_source_ip_by_user_ea</code> detects the unusual source IP for the privileged operation.</li>
<li><strong>Alert Triggered:</strong> The &ldquo;Unusual Source IP for Windows Privileged Operations Detected&rdquo; rule triggers an alert in Elastic Security.</li>
<li><strong>Potential Lateral Movement:</strong> If successful, the attacker can use the elevated privileges to move laterally within the network and compromise other systems.</li>
<li><strong>Data Exfiltration/Impact:</strong> The attacker achieves their final objective, such as data exfiltration, system disruption, or ransomware deployment, leveraging the escalated privileges.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation and privilege escalation can allow an attacker to move laterally through the network, access sensitive data, and disrupt critical systems. While the alert itself is low severity, the underlying activity can lead to significant damage if not addressed promptly. The risk score associated with the rule is 21, indicating a moderate level of risk. Affected organizations may experience data breaches, financial loss, and reputational damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Review and tune the machine learning job <code>pad_windows_rare_source_ip_by_user_ea</code> to reduce false positives and ensure accurate detection of anomalous activity.</li>
<li>Investigate any alerts triggered by the &ldquo;Unusual Source IP for Windows Privileged Operations Detected&rdquo; rule, focusing on identifying the root cause of the unusual source IP and the nature of the privileged operations performed.</li>
<li>Implement the setup steps outlined in the rule documentation to ensure proper collection and ingestion of Windows events required for the machine learning job to function correctly.</li>
<li>Correlate the alerts with other security events or logs, such as firewall logs, VPN logs, or endpoint security alerts, to gather additional context about the source IP and user activity.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>privileged-access-detection</category><category>machine-learning</category><category>windows</category></item><item><title>Unusual Process Writing Data to an External Device via Machine Learning</title><link>https://feed.craftedsignal.io/briefs/2024-01-rare-process-exfiltration/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-rare-process-exfiltration/</guid><description>A machine learning job detects a rare process writing data to an external device, potentially indicating data exfiltration masked by benign-looking processes.</description><content:encoded><![CDATA[<p>This detection identifies unusual processes writing data to external devices, a tactic often used by malicious actors to exfiltrate data while masking their activities with seemingly benign processes. The detection leverages machine learning to identify deviations from typical behavior patterns, specifically focusing on processes that have no legitimate reason to write data to external devices. The rule relies on the &ldquo;ded_rare_process_writing_to_external_device_ea&rdquo; machine learning job from the Elastic Data Exfiltration Detection integration, version 9.4.0 or later. The rule analyzes file events collected by integrations such as Elastic Defend and Network Packet Capture. This detection is important because it can uncover exfiltration attempts that might otherwise go unnoticed due to the use of legitimate-looking processes.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a system through various means (e.g., compromised credentials, software vulnerability).</li>
<li>The attacker establishes persistence on the system, potentially using scheduled tasks or autorun keys.</li>
<li>The attacker identifies sensitive data on the system or network.</li>
<li>The attacker copies the sensitive data to a staging directory.</li>
<li>The attacker uses a renamed or masqueraded legitimate process (e.g., <code>svchost.exe</code>, <code>powershell.exe</code>) to write the staged data to an external device connected to the system.</li>
<li>The system&rsquo;s file events are monitored by Elastic Defend, capturing the process writing data to the external device.</li>
<li>The Elastic Data Exfiltration Detection integration analyzes the file events and identifies the process as rare or unusual for writing to external devices.</li>
<li>The &ldquo;Unusual Process Writing Data to an External Device&rdquo; rule is triggered, alerting security analysts to the potential exfiltration attempt.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack could result in the exfiltration of sensitive data, leading to financial loss, reputational damage, and legal repercussions. While the severity is &ldquo;low,&rdquo; a successful exfiltration can have significant consequences. The number of victims and the specific sectors targeted depend on the attacker&rsquo;s objectives and the compromised system&rsquo;s access to sensitive information.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Install and configure the Data Exfiltration Detection integration in Elastic, ensuring the machine learning job <code>ded_rare_process_writing_to_external_device_ea</code> is enabled, as described in the <a href="https://www.elastic.co/guide/en/security/current/prebuilt-ml-jobs.html">setup documentation</a>.</li>
<li>Enable file event collection using Elastic Defend to provide the necessary data for the machine learning job, as detailed in the <a href="https://www.elastic.co/guide/en/security/current/install-endpoint.html">Elastic Defend documentation</a>.</li>
<li>Deploy the provided Sigma rule to your SIEM and tune the <code>anomaly_threshold</code> based on your environment&rsquo;s baseline behavior to reduce false positives.</li>
<li>Investigate any alerts generated by this rule, following the <a href="https://www.elastic.co/blog/detect-data-exfiltration-activity-with-kibanas-new-integration">triage and analysis guidance</a> to determine the legitimacy of the activity.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>data-exfiltration</category><category>machine-learning</category><category>elastic-defend</category></item><item><title>Spike in Remote File Transfers via Lateral Movement</title><link>https://feed.craftedsignal.io/briefs/2024-01-spike-remote-file-transfers/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-spike-remote-file-transfers/</guid><description>A machine learning job detects an abnormal volume of remote file transfers, potentially indicating lateral movement by attackers attempting to blend in with normal network egress activity.</description><content:encoded><![CDATA[<p>The &ldquo;Spike in Remote File Transfers&rdquo; detection identifies potential lateral movement activity within a network by monitoring for unusual volumes of remote file transfers. Attackers often aim to locate and exfiltrate valuable information after gaining initial access. To evade detection, they may attempt to mimic normal egress activity through numerous small transfers. This detection leverages machine learning to establish a baseline of normal transfer activity and identify deviations that may indicate malicious behavior. The rule requires the Lateral Movement Detection integration assets to be installed. For Elastic Defend events on versions 8.18 and above, <code>host.ip</code> collection must be enabled.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial Access: An attacker gains initial access to a host within the network through an exploit or compromised credentials.</li>
<li>Internal Reconnaissance: The attacker performs internal reconnaissance to identify valuable data and potential target systems.</li>
<li>Lateral Movement: The attacker uses stolen credentials or exploits remote services (T1210) to gain access to other systems on the network.</li>
<li>Tool Transfer: The attacker transfers malicious tools or scripts (T1570) to the compromised systems to facilitate further actions.</li>
<li>Data Collection: The attacker gathers sensitive data from the compromised systems.</li>
<li>Egress Activity: The attacker initiates numerous small remote file transfers, attempting to blend in with normal network traffic.</li>
<li>Data Exfiltration: The attacker exfiltrates the stolen data to an external location.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful lateral movement attack involving anomalous file transfers can lead to data exfiltration, intellectual property theft, and reputational damage. Even though the severity is low, undetected lateral movement can escalate quickly into high severity incidents like ransomware or data breaches. This detection focuses on the early stages of lateral movement, allowing security teams to respond before significant damage occurs.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Ensure host IP collection is enabled in Elastic Defend configurations, following the steps in the <a href="https://www.elastic.co/docs/solutions/security/configure-elastic-defend/configure-data-volume-for-elastic-endpoint#host-fields">helper guide</a>.</li>
<li>Install the Lateral Movement Detection integration assets as described in the setup instructions in the rule documentation.</li>
<li>Investigate alerts generated by the &ldquo;Spike in Remote File Transfers&rdquo; rule, paying close attention to the source and destination of the file transfers.</li>
<li>Review authentication logs for signs of compromised accounts, such as unusual login times or locations, as described in the rule&rsquo;s triage notes.</li>
<li>Tune the machine learning job&rsquo;s anomaly threshold based on your environment&rsquo;s baseline activity and false positive analysis.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>lateral-movement</category><category>machine-learning</category></item><item><title>Okta Privileged Operations from Unusual Host Name Detected</title><link>https://feed.craftedsignal.io/briefs/2024-01-okta-unusual-hostname/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-okta-unusual-hostname/</guid><description>A machine learning job detected a user performing privileged operations in Okta from an uncommon device, potentially indicating a compromised account or insider threat attempting privilege escalation.</description><content:encoded><![CDATA[<p>This alert identifies potentially malicious Okta activity based on unusual host names associated with privileged operations. The Elastic prebuilt machine learning job <code>pad_okta_rare_host_name_by_user_ea</code> analyzes Okta logs to detect anomalies in device usage, specifically focusing on unusual host names. This activity could indicate a compromised user account, an attacker using stolen credentials, or an insider threat leveraging an unauthorized device to escalate privileges within the Okta environment. This detection is part of the Privileged Access Detection (PAD) integration, designed to identify abnormalities across Windows, Linux, and Okta events, starting with Elastic Stack version 9.4.0. Defenders should investigate users exhibiting this behavior to determine the legitimacy of the access and the device being used.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to an Okta user&rsquo;s credentials, possibly through phishing (not specified in source, but likely).</li>
<li>The attacker authenticates to Okta using the compromised credentials.</li>
<li>The attacker attempts to perform privileged operations within Okta (e.g., modifying user permissions, accessing sensitive applications).</li>
<li>The attacker uses a device with a host name that is uncommon for the compromised user, triggering the machine learning alert.</li>
<li>Okta logs the privileged operation and the associated host name.</li>
<li>Elastic&rsquo;s machine learning job, <code>pad_okta_rare_host_name_by_user_ea</code>, detects the unusual host name based on historical data.</li>
<li>A security alert is generated, indicating potential privileged access from an unusual host.</li>
<li>The attacker escalates privileges within the Okta environment, potentially gaining access to sensitive resources or data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack could lead to unauthorized access to sensitive applications and data managed by Okta. The potential impact includes data breaches, financial loss, and reputational damage. While the rule severity is low, successful privilege escalation can significantly increase the attacker&rsquo;s access and control, impacting all applications and services integrated with Okta. The exact number of potential victims varies depending on the organization&rsquo;s size and the scope of Okta&rsquo;s usage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Ensure the Privileged Access Detection integration assets are installed and configured properly as per the <a href="https://www.elastic.co/guide/en/security/current/prebuilt-ml-jobs.html">official Elastic documentation</a>.</li>
<li>Investigate alerts from the <code>pad_okta_rare_host_name_by_user_ea</code> machine learning job by reviewing user login history, device usage patterns, and associated IP addresses as outlined in the rule&rsquo;s &ldquo;Triage and analysis&rdquo; section.</li>
<li>Implement multi-factor authentication (MFA) for all privileged accounts to add an additional layer of security as mentioned in the &ldquo;Response and remediation&rdquo; section.</li>
<li>Enable Okta integration and configure the Fleet agent policy according to the <a href="https://docs.elastic.co/en/integrations/okta">Elastic documentation</a> to ensure proper data collection.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>privileged-access-detection</category><category>okta</category><category>machine-learning</category><category>privilege-escalation</category></item></channel></rss>