Rule Library

Sigma Rules

451 rules found

3,707Total
3,116Detection
451Emerging
137Hunting
Emerging Threathighexperimental

Katz Stealer Suspicious User-Agent

Detects network connections with a suspicious user-agent string containing "katz-ontop", which may indicate Katz Stealer activity.

Zeek (Bro)http
TA0011 · Command and ControlT1071.001 · Web Protocolsdetection.emerging-threats
Swachchhanda Shrawan Poudel (Nextron Systems)Thu May 222025
Emerging Threathighexperimental

Kalambur Backdoor Curl TOR SOCKS Proxy Execution

Detects the execution of the "curl.exe" command, referencing "SOCKS" and ".onion" domains, which could be indicative of Kalambur backdoor activity.

WindowsProcess Creation
TA0002 · ExecutionTA0011 · Command and ControlT1090 · ProxyT1573 · Encrypted Channel+4
Arda Buyukkaya (EclecticIQ)Tue Feb 112025
Emerging Threathighexperimental

Shai-Hulud Malicious GitHub Workflow Creation

Detects creation of shai-hulud-workflow.yml file associated with Shai Hulud worm targeting NPM supply chain attack that exfiltrates GitHub secrets

LinuxFile Event
TA0003 · PersistenceTA0006 · Credential AccessT1552.001 · Credentials In FilesTA0009 · Collection+2
Swachchhanda Shrawan Poudel (Nextron Systems)Wed Sep 242025
Emerging Threathighexperimental

Shai-Hulud Malware Indicators - Linux

Detects potential Shai-Hulud malware indicators based on specific command line arguments associated with its execution.

LinuxProcess Creation
TA0002 · ExecutionT1059 · Command and Scripting Interpreterdetection.emerging-threats
Swachchhanda Shrawan Poudel (Nextron Systems)Tue Nov 252025
Emerging Threathighexperimental

Shai-Hulud Malicious Bun Execution - Linux

Detects the execution of `bun_environment.js` via the Bun runtime, a behavior associated with the Shai-Hulud "Second Coming" NPM supply chain attack. The malware uses a `setup_bun.js` script to install the Bun runtime if not present, and then executes the malicious `bun_environment.js` payload.

LinuxProcess Creation
T1195.002 · Compromise Software Supply ChainT1203 · Exploitation for Client ExecutionTA0002 · ExecutionTA0001 · Initial Access+1
Swachchhanda Shrawan Poudel (Nextron Systems)Tue Nov 252025
Emerging Threathighexperimental

Shai-Hulud 2.0 Malicious NPM Package Installation - Linux

Detects the command-line installation of specific malicious npm packages and versions associated with the Shai-Hulud 2.0 supply chain attack.

LinuxProcess Creation
TA0001 · Initial AccessTA0002 · ExecutionT1195.002 · Compromise Software Supply Chaindetection.emerging-threats
Swachchhanda Shrawan Poudel (Nextron Systems)Fri Nov 282025
Emerging Threathighexperimental

Shai-Hulud NPM Package Malicious Exfiltration via Curl

Detects potential Shai Hulud NPM package attack attempting to exfiltrate data via curl to external webhook sites.

LinuxProcess Creation
TA0010 · ExfiltrationT1041 · Exfiltration Over C2 ChannelTA0009 · CollectionT1005 · Data from Local System+1
Swachchhanda Shrawan Poudel (Nextron Systems)Wed Sep 242025
Emerging Threathighexperimental

Shai-Hulud Malware Indicators - Windows

Detects potential Shai-Hulud malware indicators based on specific command line arguments associated with its execution.

WindowsProcess Creation
TA0002 · ExecutionT1059 · Command and Scripting Interpreterdetection.emerging-threats
Swachchhanda Shrawan Poudel (Nextron Systems)Tue Nov 252025
Emerging Threathighexperimental

Shai-Hulud Malicious Bun Execution

Detects the execution of `bun_environment.js` via the Bun runtime, a behavior associated with the Shai-Hulud "Second Coming" NPM supply chain attack. The malware uses a `setup_bun.js` script to install the Bun runtime if not present, and then executes the malicious `bun_environment.js` payload.

WindowsProcess Creation
T1195.002 · Compromise Software Supply ChainT1203 · Exploitation for Client ExecutionTA0002 · ExecutionTA0001 · Initial Access+1
Swachchhanda Shrawan Poudel (Nextron Systems)Tue Nov 252025
Emerging Threathighexperimental

Shai-Hulud 2.0 Malicious NPM Package Installation

Detects the command-line installation of specific malicious npm packages and versions associated with the Shai-Hulud 2.0 supply chain attack.

WindowsProcess Creation
TA0001 · Initial AccessTA0002 · ExecutionT1195.002 · Compromise Software Supply Chaindetection.emerging-threats
Swachchhanda Shrawan Poudel (Nextron Systems)Fri Nov 282025
Emerging Threathighexperimental

Axios NPM Compromise File Creation Indicators - Linux

Detects file creation events linked to the Axios NPM supply chain compromise. Axios is a popular JavaScript HTTP client. On March 30, 2026, malicious versions (1.14.1, 0.30.4) were published to npm, injecting a dependency (plain-crypto-js@4.2.1) that executed a postinstall script as a cross-platform RAT dropper.

LinuxFile Event
TA0001 · Initial AccessT1195.002 · Compromise Software Supply ChainTA0011 · Command and ControlT1105 · Ingress Tool Transfer+1
Swachchhanda Shrawan Poudel (Nextron Systems)Wed Apr 012026
Emerging Threathighexperimental

Axios NPM Compromise File Creation Indicators - MacOS

Detects file creation events linked to the Axios NPM supply chain compromise on macOS devices. Axios is a popular JavaScript HTTP client. On March 30, 2026, malicious versions (1.14.1, 0.30.4) were published to npm, injecting a dependency (plain-crypto-js@4.2.1) that executed a postinstall script as a cross-platform RAT dropper.

macOSFile Event
TA0001 · Initial AccessT1195.002 · Compromise Software Supply ChainTA0011 · Command and ControlT1105 · Ingress Tool Transfer+1
Swachchhanda Shrawan Poudel (Nextron Systems)Wed Apr 012026
Emerging Threathighexperimental

Axios NPM Compromise File Creation Indicators - Windows

Detects file creation events linked to the Axios NPM supply chain compromise. Axios is a popular JavaScript HTTP client. On March 30, 2026, malicious versions (1.14.1, 0.30.4) were published to npm, injecting a dependency (plain-crypto-js@4.2.1) that executed a postinstall script as a cross-platform RAT dropper. The dropper contacted a C2 server, delivered platform-specific payloads, deleted itself, and replaced package.json to evade detection. The attack used cscript.exe (VBScript), curl.exe (C2), and PowerShell masquerading as Windows Terminal.

WindowsFile Event
TA0001 · Initial AccessT1195.002 · Compromise Software Supply Chaindetection.emerging-threats
Swachchhanda Shrawan Poudel (Nextron Systems)Wed Apr 012026
Emerging Threathighexperimental

Axios NPM Compromise Malicious C2 Domain DNS Query

Detects DNS queries for the malicious C2 domain associated with the plain-crypto-js/Axios npm package supply chain compromise. On March 30, 2026, malicious versions (1.14.1, 0.30.4) were published to npm, injecting a dependency (plain-crypto-js@4.2.1) that executed a postinstall script as a cross-platform RAT dropper. This detection detects endpoints attempting to resolve the attacker's C2 domain (sfrclak.com) used for command and control communication.

dns
TA0011 · Command and ControlT1071.001 · Web ProtocolsT1568 · Dynamic Resolutiondetection.emerging-threats
Swachchhanda Shrawan Poudel (Nextron Systems)Wed Apr 012026
Emerging Threathighexperimental

Axios NPM Compromise Indicators - Linux

Detects the Linux-specific execution chain of the plain-crypto-js malicious npm dependency by Axios NPM package, including payload download via curl and detached execution using nohup and python3. On March 30, 2026, malicious versions (1.14.1, 0.30.4) were published to npm, injecting a dependency (plain-crypto-js@4.2.1) that executed a postinstall script as a cross-platform RAT dropper. The dropper contacted a C2 server, delivered platform-specific payloads, deleted itself, and replaced package.json to evade detection.

LinuxProcess Creation
TA0001 · Initial AccessT1195.002 · Compromise Software Supply ChainTA0002 · ExecutionTA0011 · Command and Control+5
Swachchhanda Shrawan Poudel (Nextron Systems)Wed Apr 012026
Emerging Threathighexperimental

Axios NPM Compromise Indicators - macOS

Detects the macOS-specific execution chain of the plain-crypto-js malicious npm dependency in Axios NPM Package, including AppleScript execution via osascript, payload download, permission modification, execution, and cleanup.

macOSProcess Creation
TA0001 · Initial AccessT1195.002 · Compromise Software Supply ChainTA0002 · ExecutionTA0011 · Command and Control+5
Swachchhanda Shrawan Poudel (Nextron Systems)Wed Apr 012026
Emerging Threathighexperimental

Axios NPM Compromise Indicators - Windows

Detects the specific Windows execution chain and process tree associated with the Axios NPM supply chain compromise. On March 30, 2026, malicious versions (1.14.1, 0.30.4) were published to npm, injecting a dependency (plain-crypto-js@4.2.1) that executed a postinstall script as a cross-platform RAT dropper. The dropper contacted a C2 server, delivered platform-specific payloads, deleted itself, and replaced package.json to evade detection. The attack used cscript.exe (VBScript), curl.exe (C2), and PowerShell masquerading as Windows Terminal.

WindowsProcess Creation
TA0001 · Initial AccessT1195.002 · Compromise Software Supply ChainTA0002 · ExecutionTA0011 · Command and Control+5
Swachchhanda Shrawan Poudel (Nextron Systems)Wed Apr 012026
Emerging Threathighexperimental

TeamPCP LiteLLM Supply Chain Attack Persistence Indicators

Detects the creation of specific persistence files as observed in the LiteLLM PyPI supply chain attack. In March 2026, a supply chain attack was discovered involving the popular open-source LLM framework LiteLLM by Threat Actor TeamPCP. The malicious package harvests every credential on the system, encrypts and exfiltrates them, and installs a persistent C2 backdoor.

LinuxFile Event
TA0003 · PersistenceTA0004 · Privilege EscalationT1543.002 · Systemd ServiceTA0001 · Initial Access+2
Swachchhanda Shrawan Poudel (Nextron Systems)Mon Mar 302026
Emerging Threathighexperimental

LiteLLM / TeamPCP Supply Chain Attack Indicators

Detects process executions related to the backdoored versions of LiteLLM (v1.82.7 or v1.82.8). In March 2026, a supply chain attack was discovered involving the popular open-source LLM framework LiteLLM by Threat Actor TeamPCP. The malicious package harvests every credential on the system, encrypts and exfiltrates them, and installs a persistent C2 backdoor.

LinuxProcess Creation
TA0001 · Initial AccessT1195.002 · Compromise Software Supply ChainTA0009 · CollectionT1560.001 · Archive via Utility+4
Swachchhanda Shrawan Poudel (Nextron Systems)Mon Mar 302026