From 6560a6cc2084e8103dd3e053a4dd90aecc1df956 Mon Sep 17 00:00:00 2001 From: Swachchhanda Shrawan Poudel <87493836+swachchhanda000@users.noreply.github.com> Date: Wed, 29 Oct 2025 16:25:20 +0545 Subject: [PATCH] Merge PR #5711 from @swachchhanda000 - Add `PUA - AWS TruffleHog Execution` Co-authored-by: Nasreddine Bencherchali --- .../aws_cloudtrail_pua_trufflehog.yml | 25 +++++++++++++++++++ 1 file changed, 25 insertions(+) create mode 100644 rules/cloud/aws/cloudtrail/aws_cloudtrail_pua_trufflehog.yml diff --git a/rules/cloud/aws/cloudtrail/aws_cloudtrail_pua_trufflehog.yml b/rules/cloud/aws/cloudtrail/aws_cloudtrail_pua_trufflehog.yml new file mode 100644 index 000000000..23ade8c01 --- /dev/null +++ b/rules/cloud/aws/cloudtrail/aws_cloudtrail_pua_trufflehog.yml @@ -0,0 +1,25 @@ +title: PUA - AWS TruffleHog Execution +id: a840e606-7c8c-4684-9bc1-eb6b6155127f +status: experimental +description: | + Detects the execution of TruffleHog, a popular open-source tool used for scanning repositories for secrets and sensitive information, within an AWS environment. + It has been reported to be used by threat actors for credential harvesting. All detections should be investigated to determine if the usage is authorized by security teams or potentially malicious. +references: + - https://github.com/trufflesecurity/trufflehog + - https://www.rapid7.com/blog/post/tr-crimson-collective-a-new-threat-group-observed-operating-in-the-cloud/ +author: Swachchhanda Shrawan Poudel (Nextron Systems) +date: 2025-10-21 +tags: + - attack.credential-access + - attack.t1555 + - attack.t1003 +logsource: + product: aws + service: cloudtrail +detection: + selection: + userAgent: 'TruffleHog' + condition: selection +falsepositives: + - Legitimate use of TruffleHog by security teams for credential scanning. +level: medium