Commit Graph

569 Commits

Author SHA1 Message Date
Ruben Groenewoud 5d3e17eaff [Rule Tuning] Dynamic Linker Copy (#5841) 2026-03-17 17:12:08 +01:00
Ruben Groenewoud 99bdb22a8d [Rule Tuning] Base64 Decoded Payload Piped to Interpreter (#5811) 2026-03-09 15:06:14 +01:00
Ruben Groenewoud aaf99b1873 [Rule Tuning] agent.id --> host.id new_terms Key Modification (#5802)
* [Rule Tuning] `agent.id` --> `host.id` Migration

* Updated_date bump
2026-03-02 13:24:25 +01:00
Eric Forte 4201fe6f8a [Rule Tuning] Telnet Authentication Bypass Rule Tuning (#5771)
* Add xinetd in process names
2026-02-25 15:43:18 -05:00
Ruben Groenewoud c349c8eca7 [New Rules] Kernel Discovery & BPF Load/Tampering via bpftool (#5743)
* [New Rules] BPF Load & Tampering via bpftool

* Update persistence_bpf_program_or_map_load.toml

* [New Rule] Kernel Instrumentation Discovery via kprobes and tracefs

* Update defense_evasion_bpf_program_tampering.toml

* Update persistence_bpf_program_or_map_load.toml

* Enhance note with investigation and response details

Added detailed investigation guide and response steps for kernel instrumentation discovery via kprobes and tracefs.
2026-02-23 16:33:17 +01:00
Ruben Groenewoud 56c737c1d0 [New/Tuning] New LKM Load Rule & FN Tuning Tunneling Rules (#5742)
* [New/Tuning] New LKM Load Rule & FN Tuning Tunneling Rules

* ++

* Update persistence_kernel_module_load_from_unusual_location.toml

* Update persistence_kernel_module_load_from_unusual_location.toml

* Apply suggestion from @Aegrah

* Update persistence_kernel_module_load_from_unusual_location.toml
2026-02-23 10:01:42 +01:00
Ruben Groenewoud e012e88342 [Rule Tuning] Kernel Module Load via Built-in Utility (#5736)
* [Rule Tuning] Kernel Module Load via Built-in Utility

* Apply suggestion from @eric-forte-elastic

Co-authored-by: Eric Forte <119343520+eric-forte-elastic@users.noreply.github.com>

* Refine process.args conditions for modprobe

* Refactor notes and references in kernel module load rule

Removed detailed notes and investigation steps related to kernel module loading via insmod utility. Updated note section and added a reference link.

* Update persistence_insmod_kernel_module_load.toml

* Update persistence_insmod_kernel_module_load.toml

* Update kernel module load rule for clarity and tactics

---------

Co-authored-by: Eric Forte <119343520+eric-forte-elastic@users.noreply.github.com>
2026-02-23 09:48:12 +01:00
Ruben Groenewoud 0c7e6516f9 [Rule Tuning] System Information Discovery via dmidecode from Parent Shell (#5732) 2026-02-17 17:49:56 +01:00
Ruben Groenewoud 440ff43810 [Rule Tuning] Adding D4C Compatibility to Compatible Container-Related Rules (#5685)
* Updated kubernetes.audit.requestObject.spec.containers.image type of text to Keyword

* [Rule Tuning] Adding D4C Compatibility to Compatible Container-Related Rules
2026-02-06 09:38:56 +01:00
Ruben Groenewoud 3cba3d7982 [Rule Tuning] Dormant & Deprecated Rule Clean-Up (#5672)
* Updated kubernetes.audit.requestObject.spec.containers.image type of text to Keyword

* [Rule Tuning] Dormant & Deprecated Rule Clean-Up

* [Rule Tuning] Dormant & Deprecated Rule Clean-Up

* Few more deprecations

* ++

* Update unit test syntax fix

* Update bad bytes

* ++
2026-02-05 13:24:21 +01:00
Samirbous 88e0b14709 [Tuning] ESQL Dynamic unique value fields (#5569)
* [Tuning] Extract dynamic field with 1 value to ECS fields for alerts exclusion

Extract dynamic field with 1 value to ECS fields for alerts exclusion:

Esql.host_id_values -> host.is
Esql.agent_id_values -> agent.id
Esql.host_name_values -> host.name

* Update multiple_alerts_by_host_ip_and_source_ip.toml

* Update newly_observed_elastic_defend_alert.toml

* Update defense_evasion_base64_decoding_activity.toml

* Update discovery_subnet_scanning_activity_from_compromised_host.toml

* Update persistence_web_server_sus_command_execution.toml

* Update persistence_web_server_sus_child_spawned.toml

* Update rules/cross-platform/multiple_alerts_elastic_defend_netsecurity_by_host.toml

Co-authored-by: Mika Ayenson, PhD <Mikaayenson@users.noreply.github.com>

* Update rules/linux/impact_potential_bruteforce_malware_infection.toml

Co-authored-by: Mika Ayenson, PhD <Mikaayenson@users.noreply.github.com>

* Update rules/linux/command_and_control_frequent_egress_netcon_from_sus_executable.toml

Co-authored-by: Mika Ayenson, PhD <Mikaayenson@users.noreply.github.com>

* Apply suggestions from code review

Co-authored-by: Mika Ayenson, PhD <Mikaayenson@users.noreply.github.com>

* Update rules/cross-platform/multiple_alerts_elastic_defend_netsecurity_by_host.toml

Co-authored-by: Mika Ayenson, PhD <Mikaayenson@users.noreply.github.com>

* Update rules/cross-platform/newly_observed_elastic_defend_alert.toml

Co-authored-by: Mika Ayenson, PhD <Mikaayenson@users.noreply.github.com>

* Update rules/cross-platform/newly_observed_elastic_detection_rule.toml

Co-authored-by: Mika Ayenson, PhD <Mikaayenson@users.noreply.github.com>

* Update rules/windows/credential_access_rare_webdav_destination.toml

Co-authored-by: Mika Ayenson, PhD <Mikaayenson@users.noreply.github.com>

* Update credential_access_rare_webdav_destination.toml

---------

Co-authored-by: Mika Ayenson, PhD <Mikaayenson@users.noreply.github.com>
2026-01-26 16:34:16 +00:00
Ruben Groenewoud 6626475119 [Rule Tuning] Several Community DR Issues (#5615)
* [Rule Tuning] Suspicious Network Connection via systemd

* [Rule Tuning] Systemd-udevd Rule File Creation

* ++
2026-01-26 17:08:49 +01:00
Mika Ayenson, PhD bbe83452b4 Revert "[Rule Tuning] Adding D4C Compatibility to Compatible K8s-related Rules (#5578)" (#5620)
This reverts commit c608b673bf.
2026-01-26 08:31:53 -06:00
Ruben Groenewoud c608b673bf [Rule Tuning] Adding D4C Compatibility to Compatible K8s-related Rules (#5578)
* [Rule Tuning] Adding D4C Compatibility to Compatible K8s-related Rules

* Update manifests & schemas

* [New/Updated] Migrated `process.command_line` --> `process.args` for Compatibility

* Pyproject.toml Patch

* ++
2026-01-26 13:28:08 +01:00
Samirbous 3497c7b0b5 [New] Potential Telnet Authentication Bypass (CVE-2026-24061) (#5612)
* [New] Potential Telnet Authentication Bypass (CVE-2026-24061)

https://www.safebreach.com/blog/safebreach-labs-root-cause-analysis-and-poc-exploit-for-cve-2026-24061/"

https://security-tracker.debian.org/tracker/CVE-2026-24061

* Update lateral_movement_telnet_auth_bypass_via_envar.toml

* Update lateral_movement_telnet_auth_bypass_via_envar.toml

* Update lateral_movement_telnet_auth_bypass_via_envar.toml

* Apply suggestion from @Aegrah

Co-authored-by: Ruben Groenewoud <78494512+Aegrah@users.noreply.github.com>

* Update initial_access_telnet_auth_bypass_via_user_envar.toml

* Update rules/linux/initial_access_telnet_auth_bypass_via_user_envar.toml

* added rule for auditd

* Update rules/linux/initial_access_telnet_auth_bypass_envar_auditd.toml

* Update rules/linux/initial_access_telnet_auth_bypass_envar_auditd.toml

* Update initial_access_telnet_auth_bypass_envar_auditd.toml

---------

Co-authored-by: Ruben Groenewoud <78494512+Aegrah@users.noreply.github.com>
2026-01-26 10:18:23 +00:00
ailiffa e459d8c25a [Rule Tuning] Potential Disabling of AppArmor - Restore AppArmor service filters (#5574) 2026-01-19 09:19:24 -03:00
shashank-elastic 1ce072a4e5 Prep for Release 9.3 (#5548) 2026-01-12 21:07:07 +05:30
Ruben Groenewoud 11769a4be3 [New/Tuning] Several New Linux Rules (#5531)
* [New/Tuning] Several New Linux Rules

* Update collection_potential_video_recording_or_screenshot_activity.toml

* Update discovery_dmidecode_system_discovery.toml

* Update rules/linux/collection_potential_audio_recording_activity.toml

Co-authored-by: Eric Forte <119343520+eric-forte-elastic@users.noreply.github.com>

* Update exfiltration_potential_wget_data_exfiltration.toml

* [New Rule] Linux User or Group Deletion

---------

Co-authored-by: Eric Forte <119343520+eric-forte-elastic@users.noreply.github.com>
2026-01-08 16:00:50 +01:00
Ruben Groenewoud ee936cb154 [New Rule] Potential Password Spraying Attack via SSH (#5515)
* [New Rule] Potential Password Spraying Attack via SSH

* ++

* Update rules/linux/credential_access_potential_password_spraying_attack.toml

Co-authored-by: Jonhnathan <26856693+w0rk3r@users.noreply.github.com>

* Update credential_access_potential_password_spraying_attack.toml

* Update credential_access_potential_password_spraying_attack.toml

* Change time bucket duration from 1 to 5 minutes

---------

Co-authored-by: Jonhnathan <26856693+w0rk3r@users.noreply.github.com>
2026-01-08 13:43:52 +01:00
Ruben Groenewoud 1c1632e0b9 [Rule Tuning] Linux DR Tuning - 3 (#5483)
* [Rule Tuning] Linux DR Tuning - 3

* Update rules/linux/credential_access_aws_creds_search_inside_container.toml

* Adjust thresholds and expand event action handling

* Update credential_access_potential_linux_ssh_bruteforce_external.toml

* Increase threshold for SSH brute force detection

* Update credential_access_potential_linux_ssh_bruteforce_internal.toml

* Update credential_access_ssh_backdoor_log.toml

Removed 'auditbeat-*' from the index list.

* Refactor credential access rule for clarity

Removed redundant event.action expansion and filtering logic.

* Refactor ESQL query for SSH brute force detection

Refactor ESQL query to improve readability and maintainability by moving the event.action expansion and filtering logic.

* Update credential_access_potential_linux_ssh_bruteforce_internal.toml

* Update credential_access_potential_successful_linux_ftp_bruteforce.toml

* Update credential_access_potential_successful_linux_rdp_bruteforce.toml

* Update credential_access_potential_linux_ssh_bruteforce_internal.toml

* Add time window truncation to bruteforce rule

* Add time window truncation to SSH brute force rule

* Update credential_access_potential_linux_ssh_bruteforce_internal.toml

* Update SSH brute force detection rule to EQL

* Update CIDR match conditions for SSH brute force rule

* Update EQL query for SSH brute force detection
2026-01-08 13:32:43 +01:00
Ruben Groenewoud e1698890a4 [Rule Tuning] Linux DR Tuning - 7 (#5504)
* [Rule Tuning] Linux DR Tuning - 7

* Update execution_egress_connection_from_entrypoint_in_container.toml

* Update execution_kubernetes_direct_api_request_via_curl_or_wget.toml

* Update rules/linux/execution_perl_tty_shell.toml

* Update execution_perl_tty_shell.toml

* Update rules/linux/execution_unix_socket_communication.toml

* Update execution_file_made_executable_via_chmod_inside_container.toml

* Remove duplicate Crowdstrike data source entry

---------

Co-authored-by: Colson Wilhoit <48036388+DefSecSentinel@users.noreply.github.com>
2026-01-08 11:10:46 +01:00
Ruben Groenewoud ccd3f70ee8 [Rule Tuning] Linux DR Tuning - 6 (#5497)
* [Rule Tuning] Linux DR Tuning - 6

* Fix syntax error in discovery_esxi_software_via_grep.toml

* Update discovery_pam_version_discovery.toml

* Update discovery_virtual_machine_fingerprinting.toml

* Revise investigation title for kernel module enumeration

Updated the title of the investigation section to clarify focus on unusual kernel module enumeration.

* Update discovery_port_scanning_activity_from_compromised_host.toml

* Enhance ESQL query for subnet scanning detection

Updated ESQL query to include additional fields and conditions for better analysis of connection attempts from compromised hosts.

* Remove Elastic Endgame data source from rule

---------

Co-authored-by: Colson Wilhoit <48036388+DefSecSentinel@users.noreply.github.com>
2026-01-08 10:45:32 +01:00
Ruben Groenewoud c2747b0b29 [Rule Tuning] Linux DR Tuning - 4 (#5484)
* [Rule Tuning] Linux DR Tuning - 4

* Update defense_evasion_file_mod_writable_dir.toml

* Update command_and_control_frequent_egress_netcon_from_sus_executable.toml

* Remove duplicate host.name entry in TOML file

* Fix formatting in defense_evasion_file_mod_writable_dir.toml

* Update command_and_control_frequent_egress_netcon_from_sus_executable.toml

* Add additional fields to base64 decoding activity rule

---------

Co-authored-by: Colson Wilhoit <48036388+DefSecSentinel@users.noreply.github.com>
2026-01-08 10:11:05 +01:00
Ruben Groenewoud b13afcdeaa [Rule Tuning] Linux DR Tuning - 8 (#5505)
* [Rule Tuning] Linux DR Tuning - 8

* Revise investigation guide for THC tool downloads

Updated investigation guide to reflect THC tool instead of SSH-IT worm. Enhanced description for clarity.

* Update exfiltration_unusual_file_transfer_utility_launched.toml

* Refine ESQL query for brute force malware detection

Updated the query to include additional fields and modified the conditions for filtering events.

---------

Co-authored-by: Colson Wilhoit <48036388+DefSecSentinel@users.noreply.github.com>
2026-01-08 10:01:11 +01:00
Ruben Groenewoud d968f62a5a [Rule Tuning] Linux DR Tuning - 10 (#5510)
* [Rule Tuning] Linux DR Tuning - 10

* Update persistence_udev_rule_creation.toml

* Refactor ESQL query for Linux process events

* Refactor query in persistence_web_server_sus_command_execution rule

Removed unnecessary fields from the query and added new fields for event dataset and data stream namespace.

* Update persistence_systemd_netcon.toml

* Update persistence_web_server_sus_child_spawned.toml

* Refactor process.parent.name conditions in TOML file

* Update persistence_web_server_unusual_command_execution.toml

* Update persistence_web_server_unusual_command_execution.toml

---------

Co-authored-by: Colson Wilhoit <48036388+DefSecSentinel@users.noreply.github.com>
2026-01-08 09:32:57 +01:00
Ruben Groenewoud 80ee91b0f2 [Rule Tuning] Linux DR Tuning - 11 (#5511)
* [Rule Tuning] Linux DR Tuning - 11

* Update privilege_escalation_potential_suid_sgid_exploitation.toml

* Update rules/linux/privilege_escalation_suspicious_uid_guid_elevation.toml

* Update privilege_escalation_docker_escape_via_nsenter.toml

---------

Co-authored-by: Colson Wilhoit <48036388+DefSecSentinel@users.noreply.github.com>
2026-01-07 16:31:13 +01:00
Ruben Groenewoud a973da1a6b [Rule Tuning] Linux DR Tuning - 9 (#5508)
* [Rule Tuning] Linux DR Tuning - 9

* Update rules/linux/persistence_apt_package_manager_file_creation.toml

* Fix formatting in persistence_boot_file_copy.toml

* Update persistence_chkconfig_service_add.toml

* Change user.id values to string format in TOML

* Fix condition for Java process working directory

* Fix logical operator in OpenSSL passwd hash rule

* Fix syntax for working_directory check

* Fix condition for original file name check

* Update persistence_web_server_unusual_command_execution.toml

* Add cloud CLI tools to persistence rules

---------

Co-authored-by: Colson Wilhoit <48036388+DefSecSentinel@users.noreply.github.com>
2026-01-07 16:18:38 +01:00
Ruben Groenewoud 473df70fbb [Rule Tuning] Linux DR Tuning - 5 (#5494)
* [Rule Tuning] Linux DR Tuning - 5

* Fix query syntax for shared object detection rule

* Update defense_evasion_kernel_module_removal.toml

* Fix condition for process working directory check

* Refactor query in defense_evasion_symlink_binary rule

---------

Co-authored-by: Colson Wilhoit <48036388+DefSecSentinel@users.noreply.github.com>
2026-01-07 15:55:06 +01:00
Ruben Groenewoud 066096f766 [Rule Tuning] Linux DR Tuning - 2 (#5481)
* [Rule Tuning] Linux DR Tuning - 2

* Update command_and_control_linux_proxychains_activity.toml
2026-01-06 17:00:55 +01:00
Ruben Groenewoud 019c263ed2 [Rule Tuning] Linux DR Tuning - 1 (#5122)
* [Rule Tuning] Linux DR Tuning - 1

* Added integrations

* Update command_and_control_git_repo_or_file_download_to_sus_dir.toml

* Update collection_linux_clipboard_activity.toml

* Update collection_linux_clipboard_activity.toml

* Update rules/linux/command_and_control_aws_cli_endpoint_url_used.toml

Co-authored-by: Samirbous <64742097+Samirbous@users.noreply.github.com>

* Update collection_linux_clipboard_activity.toml

* Update rules/linux/command_and_control_aws_cli_endpoint_url_used.toml

---------

Co-authored-by: Samirbous <64742097+Samirbous@users.noreply.github.com>
2026-01-06 16:18:04 +01:00
Ruben Groenewoud 5bc834bfc6 [Rule Tuning] Shared Object Created or Changed by Previously Unknown … (#5469)
* [Rule Tuning] Shared Object Created or Changed by Previously Unknown Process

* Update rules/linux/persistence_shared_object_creation.toml

Co-authored-by: Ruben Groenewoud <78494512+Aegrah@users.noreply.github.com>

---------

Co-authored-by: Samirbous <64742097+Samirbous@users.noreply.github.com>
2025-12-19 14:32:31 +01:00
Samirbous b996a29451 [Tuning] Diverse Rules Tuning (#5482)
* [Tuning] Diverse Rules Tuning

* Update persistence_shell_profile_modification.toml

* Update defense_evasion_ml_suspicious_windows_event_low_probability.toml

* Update defense_evasion_ml_suspicious_windows_event_high_probability.toml

* Update defense_evasion_ml_suspicious_windows_event_high_probability.toml

* ++

* Update persistence_suspicious_ssh_execution_xzbackdoor.toml

* Update persistence_suspicious_ssh_execution_xzbackdoor.toml

* Update credential_access_potential_linux_ssh_bruteforce_internal.toml

* Update persistence_shell_profile_modification.toml

* Revert "Update credential_access_potential_linux_ssh_bruteforce_internal.toml"

This reverts commit bad889a30d3f4a028de2b6624307f75b279a205b.

* Update persistence_web_server_sus_destination_port.toml

* Update defense_evasion_ml_suspicious_windows_event_high_probability.toml

* Update defense_evasion_ml_suspicious_windows_event_low_probability.toml

---------

Co-authored-by: Jonhnathan <26856693+w0rk3r@users.noreply.github.com>
Co-authored-by: Ruben Groenewoud <78494512+Aegrah@users.noreply.github.com>
2025-12-18 15:30:12 +00:00
Ruben Groenewoud a16307ecff [New/Tuning] Linux Tunneling Rules (#5452) 2025-12-15 10:44:08 +01:00
Ruben Groenewoud 294e8292b8 [Rule Tuning] Security File Access via Common Utilities (#5453)
* [Rule Tuning] Security File Access via Common Utilities

* ++

---------

Co-authored-by: Samirbous <64742097+Samirbous@users.noreply.github.com>
2025-12-15 10:25:36 +01:00
Samirbous 3726611b93 [Tuning] Top Noisy Rules (#5449)
* [Tuning] Windows BruteForce Rules Tuning

#1 Multiple Logon Failure from the same Source Address: converted to ES|QL and raised the threshold to 100 failed auths, alert quality should be better since it aggregates all failed auths info into one alert vs multiple EQL matches. (expected reduction more than 50%)

#2 Privileged Account Brute Force - coverted to ESQL and set the threshold to 50 in a minute. this should drop noise volume by more than 50%.

* ++

* Update execution_shell_evasion_linux_binary.toml

* Update execution_shell_evasion_linux_binary.toml

* Update defense_evasion_indirect_exec_forfiles.toml

* Update lateral_movement_remote_file_copy_hidden_share.toml

* Update lateral_movement_remote_file_copy_hidden_share.toml

* Update persistence_service_windows_service_winlog.toml

* Update credential_access_lsass_openprocess_api.toml

* Update persistence_suspicious_scheduled_task_runtime.toml

* Update impact_hosts_file_modified.toml

* Update defense_evasion_process_termination_followed_by_deletion.toml

* Update rules/windows/credential_access_lsass_openprocess_api.toml

* Update rules/windows/credential_access_bruteforce_admin_account.toml

Co-authored-by: Ruben Groenewoud <78494512+Aegrah@users.noreply.github.com>

* Update rules/windows/credential_access_lsass_openprocess_api.toml

Co-authored-by: Ruben Groenewoud <78494512+Aegrah@users.noreply.github.com>

* Update rules/windows/credential_access_bruteforce_multiple_logon_failure_same_srcip.toml

Co-authored-by: Ruben Groenewoud <78494512+Aegrah@users.noreply.github.com>

* Update credential_access_lsass_openprocess_api.toml

* Update impact_hosts_file_modified.toml

* Update credential_access_dollar_account_relay.toml

* Update credential_access_new_terms_secretsmanager_getsecretvalue.toml

---------

Co-authored-by: Ruben Groenewoud <78494512+Aegrah@users.noreply.github.com>
2025-12-12 14:28:12 +00:00
Ruben Groenewoud 2b1a4acae0 [Rule Tuning] Suspicious Network Connection via systemd (#5432) 2025-12-12 13:28:47 +01:00
Ruben Groenewoud d16ee304d5 [Rule Tuning] Unusual Web Server Command Execution (#5450)
* [Rule Tuning] Unusual Web Server Command Execution

* ++
2025-12-12 13:01:12 +01:00
shashank-elastic 58a514340b December Schema Refresh (#5420) 2025-12-08 22:07:46 +05:30
Ruben Groenewoud 7aacebba02 [Rule Tuning] Creation or Modification of Pluggable Authentication Module or Configuration (#5421) 2025-12-08 18:54:23 +05:30
Terrance DeJesus 7a884ebe2b [Rule Tuning] Node.js Pre or Post-Install Script Execution to Cross-Platform (#5403)
* [Rule Tuning] Node.js Pre or Post-Install Script Execution to Cross-Platform
Fixes #5402

* removed rule from Linux directory

* adjusted mitre for unit tests

* Update rules/cross-platform/execution_nodejs_pre_or_post_install_script_execution.toml

Co-authored-by: Ruben Groenewoud <78494512+Aegrah@users.noreply.github.com>

* expanding to S1

* adding integration metadata

* Add 'start' action to Node.js install script detection

* Update rules/cross-platform/execution_nodejs_pre_or_post_install_script_execution.toml

---------

Co-authored-by: Ruben Groenewoud <78494512+Aegrah@users.noreply.github.com>
2025-12-04 09:07:12 -05:00
Ruben Groenewoud 4fc6aa9a35 [New Rule] Unusual Web Server Command Execution (#5392)
* [New Rule] Unusual Web Server Command Execution

* ++

* Add node and java to unusual command execution rule
2025-12-03 16:29:08 +01:00
Ruben Groenewoud f098336ff9 [New Rule] Pod or Container Creation with Suspicious Command-Line (#5379)
* [New Rule] Pod or Container Creation with Suspicious Command-Line

* Added container domain tag

* Update execution_suspicious_pod_or_container_creation_command_execution.toml

* Refine EQL query for suspicious pod/container creation

* Update rules/linux/execution_suspicious_pod_or_container_creation_command_execution.toml

* Update execution_suspicious_pod_or_container_creation_command_execution.toml

* Update process name conditions for suspicious execution
2025-12-03 16:14:33 +01:00
Ruben Groenewoud d3745c21a7 [Rule Tuning] Python Startup Hook Rules (#5400) 2025-12-03 15:13:26 +01:00
Samirbous 02979fec68 [New/Tuning] NPM Shai-Hulud coverage (#5368)
* [New/Tuning] NPM Shai-Hulud coverage

https://socket.dev/blog/shai-hulud-strikes-again-v2

* Update command_and_control_curl_wget_spawn_via_nodejs_parent.toml

* Update command_and_control_curl_wget_spawn_via_nodejs_parent.toml

* Update command_and_control_curl_wget_spawn_via_nodejs_parent.toml

* Update credential_access_trufflehog_execution.toml

* Update credential_access_trufflehog_execution.toml

* Update credential_access_trufflehog_execution.toml

* Update rules/cross-platform/command_and_control_curl_wget_spawn_via_nodejs_parent.toml

Co-authored-by: Ruben Groenewoud <78494512+Aegrah@users.noreply.github.com>

* Update rules/cross-platform/command_and_control_curl_wget_spawn_via_nodejs_parent.toml

Co-authored-by: Ruben Groenewoud <78494512+Aegrah@users.noreply.github.com>

* Update rules/cross-platform/command_and_control_curl_wget_spawn_via_nodejs_parent.toml

Co-authored-by: Ruben Groenewoud <78494512+Aegrah@users.noreply.github.com>

* Update rules/cross-platform/execution_register_github_actions_runner.toml

Co-authored-by: Ruben Groenewoud <78494512+Aegrah@users.noreply.github.com>

* Update rules/cross-platform/execution_via_github_actions_runner.toml

Co-authored-by: Ruben Groenewoud <78494512+Aegrah@users.noreply.github.com>

* Create initial_access_github_register_self_hosted_runner.toml

* Update initial_access_github_register_self_hosted_runner.toml

* Update initial_access_github_register_self_hosted_runner.toml

* Update initial_access_github_register_self_hosted_runner.toml

---------

Co-authored-by: Ruben Groenewoud <78494512+Aegrah@users.noreply.github.com>
Co-authored-by: Jonhnathan <26856693+w0rk3r@users.noreply.github.com>
2025-12-02 10:57:12 +00:00
Ruben Groenewoud 4a042d1a22 [Rule Tuning] File Deletion via Shred (#5381)
* [Rule Tuning] File Deletion via Shred

* ++

* Update integrations and query for file deletion rule
2025-12-02 10:13:29 +01:00
Ruben Groenewoud a6569a824f [Rule Tuning] At Job Created or Modified (#5378) 2025-12-02 09:55:41 +01:00
Terrance DeJesus d510d32730 [New Rule] Webshell Deployed via Apache Struts CVE-2023-50164 Exploitation (#5345)
* [New Rule] Webshell Deployed via Apache Struts CVE-2023-50164 Exploitation
Fixes #5344

* Update rules/linux/initial_access_apache_struts_cve_2023_50164_exploitation_to_webshell.toml

* added investigation guide

* removed vulnerability tag

* Update rules/linux/initial_access_apache_struts_cve_2023_50164_exploitation_to_webshell.toml

* Update rules/linux/initial_access_apache_struts_cve_2023_50164_exploitation_to_webshell.toml

* Update rules/linux/initial_access_apache_struts_cve_2023_50164_exploitation_to_webshell.toml

* Update rules/linux/initial_access_apache_struts_cve_2023_50164_exploitation_to_webshell.toml

Co-authored-by: Eric Forte <119343520+eric-forte-elastic@users.noreply.github.com>

---------

Co-authored-by: Eric Forte <119343520+eric-forte-elastic@users.noreply.github.com>
2025-11-24 15:08:39 -05:00
shashank-elastic 5386345ca7 Add Investigation Guides for Rules (#5357) 2025-11-25 01:08:15 +05:30
Ruben Groenewoud 726b3c47ce [New Rule] Proxy Shell Execution via Busybox (#5348)
* [New Rule] Proxy Shell Execution via Busybox

* Update defense_evasion_busybox_indirect_shell_spawn.toml
2025-11-24 15:51:39 +01:00
Ruben Groenewoud 7fc895ee38 [New Rule] Curl or Wget Egress Network Connection via LoLBin (#5347)
* [New Rule] Curl or Wget Egress Network Connection via LoLBin

* Update defense_evasion_curl_or_wget_executed_via_lolbin.toml
2025-11-24 15:38:38 +01:00