Tag
Potential Pass-the-Hash (PtH) Attempt Detection
2 rules 1 TTPThis rule detects potential Pass-the-Hash (PtH) attempts in Windows environments by monitoring successful authentications with specific user IDs (S-1-5-21-* or S-1-12-1-*) and the `seclogo` logon process, where attackers use stolen password hashes to authenticate and move laterally across systems without needing plaintext passwords.
Potential Computer Account NTLM Relay Activity
2 rules 2 TTPsDetection of potential NTLM relay attacks targeting computer accounts by identifying authentication events originating from hosts other than the account's owner, indicating possible credential theft and misuse.
Expanding Detection Beyond Endpoints to Counter Evolving Threats
3 rules 6 TTPsThreat actors are rapidly exfiltrating data by exploiting blind spots created by an over-reliance on endpoint data, necessitating a comprehensive security approach that incorporates cloud, identity, and network telemetry for effective threat detection and response.
Multiple Rare Elastic Defend Behavior Rules Triggered on Single Host
2 rules 8 TTPsThis rule identifies hosts triggering multiple distinct, globally rare Elastic Defend behavior rules, increasing the likelihood of detecting compromised hosts while reducing false positives.
Multiple External EDR Alerts by Host
3 rules 3 TTPsThis rule detects multiple external EDR alerts on the same host, indicating a potential compromise, by analyzing alert data from various EDR solutions like CrowdStrike, SentinelOne, and M365 Defender to identify hosts triggering multiple alerts, enabling prioritization of investigation and response.
Self-Hosted Email Threat Detection Tool
2 rulesA user created a self-hosted email threat detection tool, named VerdictMail, employing IMAP IDLE for real-time monitoring and multi-stage enrichment via SPF, DKIM, DMARC, DNSBL, WHOIS, URLhaus, and VirusTotal, coupled with an LLM for threat assessment.
Multiple Alerts in Different ATT&CK Tactics by Host
3 rules 3 TTPsThis rule uses alert data to identify hosts with multiple alerts across different ATT&CK tactics, indicating a higher likelihood of compromise and enabling analysts to prioritize triage and response based on accumulated risk score.
Multiple Alerts Involving a User Detection
2 rules 3 TTPsThis rule identifies when multiple different alerts involving the same user are triggered, which could indicate a compromised user account and requires further investigation.
Spike in Number of Processes in an RDP Session
2 rules 2 TTPsA machine learning job has detected an unusually high number of processes started within a single Remote Desktop Protocol (RDP) session, potentially indicating lateral movement activity.
Okta Security Threat Detected
2 rules 1 TTPThis alert detects when Okta's ThreatInsight identifies a security threat within an Okta environment, potentially indicating command and control activity.
Detection of Command and Control Activity via Commonly Abused Web Services
2 rules 2 TTPsThis rule detects command and control activity using common web services by identifying Windows hosts making DNS requests to a list of commonly abused web services from processes outside of known program locations, potentially indicating adversaries attempting to blend malicious traffic with legitimate network activity.
Unusual Time or Day for an RDP Session Detected by Machine Learning
2 rules 2 TTPsA machine learning job detected an RDP session initiated at an unusual time or day, potentially indicating lateral movement activity within a network.
Execution of Persistent Suspicious Programs via Run Keys
2 rules 8 TTPsThis analytic identifies suspicious programs such as script interpreters, rundll32, or MSBuild being executed shortly after user logon, indicating potential persistence mechanisms abusing the registry run keys.
Suspicious Whoami Process Activity
2 rules 2 TTPsThis rule detects suspicious use of whoami.exe to display user, group, and privileges information for the user who is currently logged on to the local system, potentially indicating post-compromise discovery activity.
Newly Observed High Severity Detection Alert in Elastic SIEM
3 rulesThis rule detects newly observed, low-frequency, high-severity Elastic SIEM detection alerts affecting a single agent, helping prioritize triage and response by highlighting alerts tied to specific detection rules that have not been seen previously for the host.
Multiple Alerts in Same ATT&CK Tactic by Host
2 rules 4 TTPsThis rule correlates multiple security alerts associated with the same ATT&CK tactic on a single host within a defined time window, helping to identify hosts exhibiting concentrated malicious behavior indicative of an active intrusion or post-compromise activity, focusing on Credential Access, Defense Evasion, Execution, and Command and Control tactics.
Kubernetes Rapid Secret GET Activity Against Multiple Objects
2 rules 1 TTPDetects an unusual volume of Kubernetes API get requests against multiple distinct Secret objects from the same client fingerprint, potentially indicating credential access or in-cluster reconnaissance.
Execution of a Downloaded Windows Script
3 rules 7 TTPsThis rule identifies the creation and subsequent execution of a Windows script downloaded from the internet, a technique used by adversaries for initial access and execution on Windows systems.
Suspicious RDP Client Image Load
2 rules 1 TTPThe rule detects suspicious loading of the Remote Desktop Services ActiveX Client (mstscax.dll) from unusual locations, potentially indicating RDP lateral movement on Windows systems.
Multiple Remote Management Tool Vendors on Same Host
3 rulesThis detection identifies a Windows host where two or more distinct remote monitoring and management (RMM) or remote-access tool vendors are observed starting processes within the same eight-minute window, potentially indicating compromise, shadow IT, or attacker staging of redundant access.
High Variance in RDP Session Duration Detected via Machine Learning
2 rules 2 TTPsA machine learning job has detected unusually high variance of RDP session duration, potentially indicating lateral movement and session persistence by threat actors.