<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Resources: Investigation Guide — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/resources-investigation-guide/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 28 Apr 2026 17:17:03 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/resources-investigation-guide/feed.xml" rel="self" type="application/rss+xml"/><item><title>LLM-Based Compromised User Triage</title><link>https://feed.craftedsignal.io/briefs/2024-05-llm-compromised-user/</link><pubDate>Tue, 28 Apr 2026 17:17:03 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-05-llm-compromised-user/</guid><description>This rule correlates multiple security alerts involving the same user, analyzes them with an LLM, and flags potentially compromised accounts based on MITRE tactics, geographic anomalies, and multi-host activity, helping analysts prioritize users exhibiting indicators of credential theft or unauthorized access.</description><content:encoded><![CDATA[<p>This Elastic Security rule, designed for Elastic Cloud deployments 9.3.0 and later, leverages an Elastic Managed LLM to analyze correlated security alerts and identify potentially compromised user accounts. The rule aggregates alerts associated with a single user, examining patterns, MITRE ATT&amp;CK tactic progression, unusual geographic locations, and multi-host activity. The LLM then provides a verdict (compromised, benign, or suspicious) and a confidence score. It aims to reduce analyst workload by surfacing users exhibiting indicators of credential theft or unauthorized access and is intended to be used in conjunction with other detection mechanisms to provide a higher-order analysis.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Multiple security alerts are triggered across various data sources, such as endpoint activity, network traffic, and authentication logs.</li>
<li>Alerts are aggregated and correlated by user.name and user.id, filtering out system accounts and noisy rule types.</li>
<li>The rule extracts key alert details, including rule names, threat tactics, techniques, affected hosts, source IPs, and event datasets.</li>
<li>An alert summary is constructed, including the user&rsquo;s name, email, number of alerts, distinct rules triggered, affected hosts, time window, and maximum risk score.</li>
<li>The LLM analyzes the alert summary, considering multi-host activity, credential access alerts, unusual source IPs, and tactic progression.</li>
<li>The LLM provides a verdict (TP, FP, or SUSPICIOUS), a confidence score, and a brief summary explaining the assessment.</li>
<li>The rule filters results to surface only compromised or suspicious accounts with a confidence score above 0.7.</li>
<li>ECS fields are mapped for timeline visibility and alert exclusion and the analyst is presented with a high-confidence alert.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack using compromised credentials can lead to unauthorized access to sensitive data, lateral movement within the network, and potentially data exfiltration or ransomware deployment. This detection rule helps to quickly identify compromised user accounts, allowing security teams to respond promptly and prevent further damage. The rule reduces the amount of time analysts spend manually triaging alerts and helps them prioritize high-risk users based on an LLM&rsquo;s assessment.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Ensure that your Elastic Cloud deployment is running version 9.3.0 or later to leverage the ES|QL COMPLETION command with Elastic&rsquo;s managed LLM.</li>
<li>Review the <code>Esql.summary</code> field in the generated alerts to understand the LLM&rsquo;s assessment of why the user was flagged.</li>
<li>Investigate alerts where the <code>Esql.confidence</code> score is above 0.9, as these indicate strong indicators of compromise.</li>
<li>Examine the <code>Esql.kibana_alert_rule_name_values</code> and <code>Esql.kibana_alert_rule_threat_tactic_name_values</code> to understand which detection rules triggered and what MITRE ATT&amp;CK tactics were observed.</li>
<li>Use the provided investigation steps in the rule&rsquo;s note to conduct a thorough investigation, checking for unusual login times, locations, password resets, and MFA changes.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>Domain: Identity</category><category>Domain: LLM</category><category>Use Case: Threat Detection</category><category>Use Case: Identity and Access Audit</category><category>Resources: Investigation Guide</category><category>Rule Type: Higher-Order Rule</category></item></channel></rss>