github-actions[bot]
5832aec32b
Update ATT&CK coverage URL(s) in docs-dev/ATT&CK-coverage.md ( #4731 )
2025-05-20 07:44:22 +05:30
Terrance DeJesus
82bee3e9c2
[Rule Tuning] Microsoft Graph First Occurrence of Client Request ( #4728 )
...
* tuning 'Microsoft Graph First Occurrence of Client Request'
* updated update date
2025-05-19 14:56:21 -04:00
Terrance DeJesus
fcd70b284b
[New Rule] Multiple Microsoft 365 User Account Lockouts in Short Time Window ( #4717 )
...
* new rule 'Multiple Microsoft 365 User Account Lockouts in Short Time Window'
* adjusted logic
---------
Co-authored-by: shashank-elastic <91139415+shashank-elastic@users.noreply.github.com >
Co-authored-by: Colson Wilhoit <48036388+DefSecSentinel@users.noreply.github.com >
2025-05-19 14:44:46 -04:00
Terrance DeJesus
3e0a9ec47b
[Rule Tuning] Potential Microsoft 365 User Account Brute Force ( #4716 )
...
* tuning M365 brute force rule
* updated logic
* updated references
* adds minstack for values
* removed ignoring MSFT ASN
* Update rules/integrations/o365/credential_access_microsoft_365_potential_user_account_brute_force.toml
Co-authored-by: shashank-elastic <91139415+shashank-elastic@users.noreply.github.com >
---------
Co-authored-by: shashank-elastic <91139415+shashank-elastic@users.noreply.github.com >
Co-authored-by: Colson Wilhoit <48036388+DefSecSentinel@users.noreply.github.com >
2025-05-19 14:08:38 -04:00
Terrance DeJesus
0d366d6a15
[New Rule] Microsoft Entra ID Protection - Risk Detections ( #4725 )
...
* new rule 'Microsoft Entra ID Protection - Risk Detections'
* added timing bypass
---------
Co-authored-by: Colson Wilhoit <48036388+DefSecSentinel@users.noreply.github.com >
Co-authored-by: shashank-elastic <91139415+shashank-elastic@users.noreply.github.com >
2025-05-19 13:51:26 -04:00
shashank-elastic
43cdc7ff51
Refresh MITRE version ( #4729 )
2025-05-19 22:49:33 +05:30
Jonhnathan
e6fb73970d
[Rule Tuning] Startup or Run Key Registry Modification ( #4710 )
2025-05-19 22:12:37 +05:30
Jonhnathan
9af2bf4a66
[Rule Tuning] Unusual Scheduled Task Update ( #4714 )
2025-05-19 21:51:14 +05:30
Emmanuel Ferdman
2ad2d68c4a
Resolve datetime.utcfromtimestamp deprecation ( #4719 )
2025-05-19 21:35:07 +05:30
Samirbous
f2f9cdac66
Update initial_access_azure_o365_with_network_alert.toml ( #4723 )
...
Co-authored-by: shashank-elastic <91139415+shashank-elastic@users.noreply.github.com >
2025-05-19 20:54:19 +05:30
Jonhnathan
47059e22f2
[Rule Tuning] Backup Deletion with Wbadmin ( #4715 )
2025-05-19 20:34:25 +05:30
Terrance DeJesus
909ff9c07e
new hunt 'Microsoft Entra Infrequent Suspicious OData Client Requests' ( #4708 )
...
Co-authored-by: Colson Wilhoit <48036388+DefSecSentinel@users.noreply.github.com >
2025-05-09 22:14:42 -04:00
Terrance DeJesus
8f27c24528
[New Rule] Suspicious Email Access by First-Party Application via Microsoft Graph ( #4704 )
...
* new rule 'Suspicious Email Access by First-Party Application via Microsoft Graph'
* updated patch version
---------
Co-authored-by: Colson Wilhoit <48036388+DefSecSentinel@users.noreply.github.com >
2025-05-09 20:49:08 -04:00
Terrance DeJesus
d83e1c711a
[New Rule] Microsoft Entra Session Reuse with Suspicious Graph Access ( #4711 )
...
* new rule 'Microsoft Entra Session Reuse with Suspicious Graph Access'
* fixed tags; linted
* fixed mitre mappings
* updated name and investigation guide
2025-05-09 20:32:22 -04:00
Jonhnathan
d30e65e5a2
[Rule Tuning] Unusual File Creation - Alternate Data Stream ( #4712 )
2025-05-09 13:56:54 -03:00
Terrance DeJesus
762857f15f
[Rule Tuning] Tuning Suspicious Mailbox Permission Delegation in Exchange Online ( #4705 )
...
* rule tuning 'Suspicious Mailbox Permission Delegation in Exchange Online'
* Update rules/integrations/o365/persistence_exchange_suspicious_mailbox_permission_delegation.toml
* updated date
2025-05-08 11:01:00 -04:00
shashank-elastic
0f3bfcd98a
Fix new term doc broken link ( #4706 )
2025-05-07 17:03:58 +05:30
github-actions[bot]
acab8b4c6e
Lock versions for releases: 8.14,8.15,8.16,8.17,8.18,9.0 ( #4703 )
2025-05-07 07:34:20 +05:30
github-actions[bot]
69498a97ac
Update ATT&CK coverage URL(s) in docs-dev/ATT&CK-coverage.md ( #4702 )
2025-05-06 23:12:56 +05:30
Eric Forte
639d748ec2
[FR] Add check-version-lock dev command ( #4650 )
...
* Add check-version-lock dev command
* Bump the version
* Add Check Double Bumps to lock-versions workflow
* Replace return with ctx aware exit
* Bump Version
* Update Double Bump Modulo calculation
* Update if formatting
* Undo formatting typo
* Add logic to process the local file
* Update for descriptiveness
* Allow double bump branch for testing
* Pass github token
* Re-restrict to main
* Patch version bump
* Add comment if no double bumps found
* Bump Version
2025-05-06 13:26:23 -04:00
James Valente
36d595ae2f
[Rule Tuning] Add exceptions for non-interactive signin failures for Entra M365 Bruteforce ( #4405 )
...
* Add exceptions for non-interactive signin failures.
Include exceptions for error codes, restricted to `NonInteractiveUserSignInLogs` and token refreshes:
- 70043 : Refresh token expired or no longer valid due to conditional access frequency checks
- 70044 : Session expired or no longer valid due to conditional access frequency checks
- 50057 : User account is disabled
* Update rules/integrations/azure/credential_access_entra_signin_brute_force_microsoft_365.toml
* Update metadata for `updated_date`
---------
Co-authored-by: Terrance DeJesus <99630311+terrancedejesus@users.noreply.github.com >
Co-authored-by: Samirbous <64742097+Samirbous@users.noreply.github.com >
Co-authored-by: Mika Ayenson, PhD <Mikaayenson@users.noreply.github.com >
Co-authored-by: shashank-elastic <91139415+shashank-elastic@users.noreply.github.com >
2025-05-06 22:43:15 +05:30
Ruben Groenewoud
3a601a10fb
[New Rule] Unusual Exim4 Child Process ( #4684 )
2025-05-06 22:24:34 +05:30
Ruben Groenewoud
c145e33f16
[New Rule] Unusual Execution from Kernel Thread (kthreadd) Parent ( #4683 )
2025-05-06 22:08:43 +05:30
Ruben Groenewoud
608e02e27e
[New Rule] Linux Telegram API Request ( #4677 )
2025-05-06 21:53:19 +05:30
Jonhnathan
d3aa4b2f38
[Rule Tuning] Reduce Severity from Critical to High ( #4637 )
2025-05-06 21:37:47 +05:30
Ruben Groenewoud
944428d81e
[New Rule] Unusual LD_PRELOAD/LD_LIBRARY_PATH Command Line Arguments ( #4685 )
2025-05-06 21:21:58 +05:30
Jonhnathan
e028bf7954
[New Rule] Potential Dynamic IEX Reconstruction via Environment Variables ( #4633 )
2025-05-06 21:06:06 +05:30
Terrance DeJesus
a34a26ddec
[Rule Tuning] Excluding Microsoft Entra ID Service Principal Addition Invoked by MSFT Identity ( #4700 )
...
* tuning rule to exclude service principals added by MSFT
* added additional exclusions
* updated rule name and file name
* updated investigation guide and mitre
2025-05-06 11:19:50 -04:00
Jonhnathan
0cd7de6862
[New Rule] Potential PowerShell Obfuscation via Special Character Overuse ( #4632 )
2025-05-06 20:29:19 +05:30
Jonhnathan
b7016253ae
[New Rule] Potential PowerShell Obfuscation via High Numeric Character Proportion ( #4631 )
2025-05-06 20:13:34 +05:30
Jonhnathan
5d8f0c2ffe
[New Rule] Potential PowerShell Obfuscation via Backtick-Escaped Variable Expansion ( #4630 )
2025-05-06 19:58:01 +05:30
Jonhnathan
b6a755c84f
[New Rule][BBR] Potential PowerShell Obfuscation via High Special Character Proportion ( #4629 )
2025-05-06 19:41:33 +05:30
Jonhnathan
dc6cb3e811
[New Rule] Potential PowerShell Obfuscation via Concatenated Dynamic Command Invocation ( #4615 )
2025-05-06 19:26:15 +05:30
Jonhnathan
5ab73943a1
[New Rule] Potential PowerShell Obfuscation via Invalid Escape Sequences ( #4614 )
2025-05-06 19:10:10 +05:30
Jonhnathan
b5ac9707ba
[New Rule] PowerShell Obfuscation via Negative Index String Reversal ( #4610 )
2025-05-06 18:54:22 +05:30
Jonhnathan
c291638521
[New Rule] Potential PowerShell Obfuscation via Reverse Keywords ( #4609 )
2025-05-06 18:36:13 +05:30
Jonhnathan
7b9cd77bc2
[New Rule] Potential PowerShell Obfuscation via Character Array Reconstruction ( #4608 )
2025-05-06 18:18:29 +05:30
Jonhnathan
ebe77f2d86
[New Rule] Potential PowerShell Obfuscation via String Concatenation ( #4607 )
2025-05-06 18:02:35 +05:30
Ruben Groenewoud
fdc6b09d54
[New Rule] System Binary Symlink to Suspicious Location ( #4682 )
2025-05-06 17:46:47 +05:30
Ruben Groenewoud
25dc8498ae
[New Rule] Suspicious Named Pipe Creation ( #4681 )
2025-05-06 17:30:38 +05:30
Ruben Groenewoud
8b08795e00
[New Rule] Suspicious Kernel Feature Activity ( #4676 )
2025-05-06 17:13:24 +05:30
Ruben Groenewoud
0193af2842
[New Rule] Potential Data Exfiltration Through Curl ( #4678 )
2025-05-06 16:57:59 +05:30
Ruben Groenewoud
4030de9295
[New/Tuning] Potential Hex Payload Execution via Command-Line ( #4675 )
2025-05-06 16:29:03 +05:30
Ruben Groenewoud
eb3520a63b
[New Rule] Potential Backdoor Execution Through PAM_EXEC ( #4674 )
2025-05-06 16:13:23 +05:30
Samirbous
91acb4e9ce
[New] Windows Sandbox with Sensitive Configuration ( #4606 )
...
https://blog-en.itochuci.co.jp/entry/2025/03/12/140000
2025-05-06 15:58:39 +05:30
Samirbous
04f15aa08c
[New] Rare Connection to WebDAV Target ( #4667 )
2025-05-06 15:41:30 +05:30
Samirbous
70f758d9ad
[New] Microsoft Azure or Mail Sign-in from a Suspicious Source ( #4673 )
2025-05-06 15:21:11 +05:30
Ruben Groenewoud
403e20c2c6
[New Rule] Git Repository or File Download to Suspicious Directory ( #4663 )
2025-05-06 15:05:27 +05:30
Ruben Groenewoud
3f9e2edcb5
[New Rule] Manual Mount Discovery via /etc/exports ( #4662 )
2025-05-06 14:48:55 +05:30
Ruben Groenewoud
a9e8a78c09
[New Rule] Docker Release File Creation ( #4661 )
2025-05-06 14:31:52 +05:30