Rule Library

Sigma Rules

115 rules found for "Austin Songer"

3,707Total
3,116Detection
451Emerging
137Hunting
Detectionmediumtest

Azure Domain Federation Settings Modified

Identifies when an user or application modified the federation settings on the domain.

Azureauditlogs
TA0004 · Privilege EscalationTA0003 · PersistenceTA0005 · Defense EvasionTA0001 · Initial Access+1
Austin SongerMon Sep 06cloud
Detectionhightest

Azure Subscription Permission Elevation Via AuditLogs

Detects when a user has been elevated to manage all Azure Subscriptions. This change should be investigated immediately if it isn't planned. This setting could allow an attacker access to Azure subscriptions in your environment.

Azureauditlogs
TA0004 · Privilege EscalationTA0003 · PersistenceTA0005 · Defense EvasionTA0001 · Initial Access+1
Austin SongerFri Nov 26cloud
Detectionmediumtest

Azure Unusual Authentication Interruption

Detects when there is a interruption in the authentication process.

Azuresigninlogs
TA0004 · Privilege EscalationTA0003 · PersistenceTA0005 · Defense EvasionTA0001 · Initial Access+1
Austin SongerFri Nov 26cloud
Detectionlowtest

Google Cloud Storage Buckets Enumeration

Detects when storage bucket is enumerated in Google Cloud.

Google Cloudgcp.audit
TA0007 · Discovery
Austin SongerSat Aug 14cloud
Detectionmediumtest

Google Cloud Storage Buckets Modified or Deleted

Detects when storage bucket is modified or deleted in Google Cloud.

Google Cloudgcp.audit
TA0040 · Impact
Austin SongerSat Aug 14cloud
Detectionmediumtest

Google Cloud Re-identifies Sensitive Information

Identifies when sensitive information is re-identified in google Cloud.

Google Cloudgcp.audit
TA0040 · ImpactT1565 · Data Manipulation
Austin SongerSun Aug 15cloud
Detectionmediumtest

Google Cloud DNS Zone Modified or Deleted

Identifies when a DNS Zone is modified or deleted in Google Cloud.

Google Cloudgcp.audit
TA0040 · Impact
Austin SongerSun Aug 15cloud
Detectionmediumtest

Google Cloud Firewall Modified or Deleted

Detects when a firewall rule is modified or deleted in Google Cloud Platform (GCP).

Google Cloudgcp.audit
TA0005 · Defense EvasionT1562 · Impair Defenses
Austin SongerFri Aug 13cloud
Detectionmediumtest

Google Full Network Traffic Packet Capture

Identifies potential full network packet capture in gcp. This feature can potentially be abused to read sensitive data from unencrypted internal traffic.

Google Cloudgcp.audit
TA0009 · CollectionT1074 · Data Staged
Austin SongerFri Aug 13cloud
Detectionmediumtest

Google Cloud Kubernetes Admission Controller

Identifies when an admission controller is executed in GCP Kubernetes. A Kubernetes Admission controller intercepts, and possibly modifies, requests to the Kubernetes API server. The behavior of this admission controller is determined by an admission webhook (MutatingAdmissionWebhook or ValidatingAdmissionWebhook) that the user deploys in the cluster. An adversary can use such webhooks as the MutatingAdmissionWebhook for obtaining persistence in the cluster. For example, attackers can intercept and modify the pod creation operations in the cluster and add their malicious container to every created pod. An adversary can use the webhook ValidatingAdmissionWebhook, which could be used to obtain access credentials. An adversary could use the webhook to intercept the requests to the API server, record secrets, and other sensitive information.

Google Cloudgcp.audit
TA0004 · Privilege EscalationTA0001 · Initial AccessTA0005 · Defense EvasionTA0003 · Persistence+4
Austin SongerThu Nov 25cloud
Detectionmediumtest

Google Cloud Kubernetes CronJob

Identifies when a Google Cloud Kubernetes CronJob runs in Azure Cloud. Kubernetes Job is a controller that creates one or more pods and ensures that a specified number of them successfully terminate. Kubernetes Job can be used to run containers that perform finite tasks for batch jobs. Kubernetes CronJob is used to schedule Jobs. An Adversary may use Kubernetes CronJob for scheduling execution of malicious code that would run as a container in the cluster.

Google Cloudgcp.audit
TA0003 · PersistenceTA0004 · Privilege EscalationTA0002 · Execution
Austin SongerMon Nov 22cloud
Detectionmediumtest

Google Cloud Kubernetes RoleBinding

Detects the creation or patching of potential malicious RoleBinding. This includes RoleBindings and ClusterRoleBinding.

Google Cloudgcp.audit
TA0006 · Credential Access
Austin SongerMon Aug 09cloud
Detectionmediumtest

Google Cloud Kubernetes Secrets Modified or Deleted

Identifies when the Secrets are Modified or Deleted.

Google Cloudgcp.audit
TA0006 · Credential Access
Austin SongerMon Aug 09cloud
Detectionmediumtest

Google Cloud Service Account Disabled or Deleted

Identifies when a service account is disabled or deleted in Google Cloud.

Google Cloudgcp.audit
TA0040 · ImpactT1531 · Account Access Removal
Austin SongerSat Aug 14cloud
Detectionmediumtest

Google Cloud Service Account Modified

Identifies when a service account is modified in Google Cloud.

Google Cloudgcp.audit
TA0040 · Impact
Austin SongerSat Aug 14cloud
Detectionmediumtest

Google Cloud SQL Database Modified or Deleted

Detect when a Cloud SQL DB has been modified or deleted.

Google Cloudgcp.audit
TA0040 · Impact
Austin SongerFri Oct 15cloud
Detectionmediumtest

Google Cloud VPN Tunnel Modified or Deleted

Identifies when a VPN Tunnel Modified or Deleted in Google Cloud.

Google Cloudgcp.audit
TA0040 · Impact
Austin SongerMon Aug 16cloud
Detectionmediumtest

Google Workspace Application Removed

Detects when an an application is removed from Google Workspace.

Google Cloudgoogle_workspace.admin
TA0040 · Impact
Austin SongerThu Aug 26cloud
Detectionmediumtest

Google Workspace Granted Domain API Access

Detects when an API access service account is granted domain authority.

Google Cloudgoogle_workspace.admin
TA0004 · Privilege EscalationTA0003 · PersistenceT1098 · Account Manipulation
Austin SongerMon Aug 23cloud
Detectionmediumtest

Google Workspace MFA Disabled

Detects when multi-factor authentication (MFA) is disabled.

Google Cloudgoogle_workspace.admin
TA0040 · Impact
Austin SongerThu Aug 26cloud
Detectionmediumtest

Google Workspace Role Modified or Deleted

Detects when an a role is modified or deleted in Google Workspace.

Google Cloudgoogle_workspace.admin
TA0040 · Impact
Austin SongerTue Aug 24cloud
Detectionmediumtest

Google Workspace Role Privilege Deleted

Detects when an a role privilege is deleted in Google Workspace.

Google Cloudgoogle_workspace.admin
TA0040 · Impact
Austin SongerTue Aug 24cloud
Detectionmediumtest

Google Workspace User Granted Admin Privileges

Detects when an Google Workspace user is granted admin privileges.

Google Cloudgoogle_workspace.admin
TA0004 · Privilege EscalationTA0003 · PersistenceT1098 · Account Manipulation
Austin SongerMon Aug 23cloud
Detectionmediumtest

Activity from Suspicious IP Addresses

Detects when a Microsoft Cloud App Security reported users were active from an IP address identified as risky by Microsoft Threat Intelligence. These IP addresses are involved in malicious activities, such as Botnet C&C, and may indicate compromised account.

Microsoft 365threat_detection
TA0011 · Command and ControlT1573 · Encrypted Channel
Austin SongerMon Aug 23cloud
Detectionmediumtest

Activity Performed by Terminated User

Detects when a Microsoft Cloud App Security reported for users whose account were terminated in Azure AD, but still perform activities in other platforms such as AWS or Salesforce. This is especially relevant for users who use another account to manage resources, since these accounts are often not terminated when a user leaves the company.

Microsoft 365threat_management
TA0040 · Impact
Austin SongerMon Aug 23cloud
Detectionmediumtest

Activity from Anonymous IP Addresses

Detects when a Microsoft Cloud App Security reported when users were active from an IP address that has been identified as an anonymous proxy IP address.

Microsoft 365threat_management
TA0011 · Command and ControlT1573 · Encrypted Channel
Austin SongerMon Aug 23cloud
Detectionmediumtest

Activity from Infrequent Country

Detects when a Microsoft Cloud App Security reported when an activity occurs from a location that wasn't recently or never visited by any user in the organization.

Microsoft 365threat_management
TA0011 · Command and ControlT1573 · Encrypted Channel
Austin SongerMon Aug 23cloud
Detectionmediumtest

Data Exfiltration to Unsanctioned Apps

Detects when a Microsoft Cloud App Security reported when a user or IP address uses an app that is not sanctioned to perform an activity that resembles an attempt to exfiltrate information from your organization.

Microsoft 365threat_management
TA0010 · ExfiltrationT1537 · Transfer Data to Cloud Account
Austin SongerMon Aug 23cloud
Detectionmediumtest

Microsoft 365 - Impossible Travel Activity

Detects when a Microsoft Cloud App Security reported a risky sign-in attempt due to a login associated with an impossible travel.

Microsoft 365threat_management
TA0004 · Privilege EscalationTA0003 · PersistenceTA0005 · Defense EvasionTA0001 · Initial Access+1
Austin SongerMon Jul 06cloud
Detectionmediumtest

Logon from a Risky IP Address

Detects when a Microsoft Cloud App Security reported when a user signs into your sanctioned apps from a risky IP address.

Microsoft 365threat_management
TA0004 · Privilege EscalationTA0003 · PersistenceTA0005 · Defense EvasionTA0001 · Initial Access+1
Austin SongerMon Aug 23cloud
Detectionmediumtest

Microsoft 365 - Potential Ransomware Activity

Detects when a Microsoft Cloud App Security reported when a user uploads files to the cloud that might be infected with ransomware.

Microsoft 365threat_management
TA0040 · ImpactT1486 · Data Encrypted for Impact
Austin SongerThu Aug 19cloud
Detectionlowtest

Suspicious Inbox Forwarding

Detects when a Microsoft Cloud App Security reported suspicious email forwarding rules, for example, if a user created an inbox rule that forwards a copy of all emails to an external address.

Microsoft 365threat_management
TA0010 · ExfiltrationT1020 · Automated Exfiltration
Austin SongerSun Aug 22cloud
Detectionmediumtest

Suspicious OAuth App File Download Activities

Detects when a Microsoft Cloud App Security reported when an app downloads multiple files from Microsoft SharePoint or Microsoft OneDrive in a manner that is unusual for the user.

Microsoft 365threat_management
TA0010 · Exfiltration
Austin SongerMon Aug 23cloud
Detectionmediumtest

Microsoft 365 - Unusual Volume of File Deletion

Detects when a Microsoft Cloud App Security reported a user has deleted a unusual a large volume of files.

Microsoft 365threat_management
TA0040 · ImpactT1485 · Data Destruction
Austin SongerThu Aug 19cloud
Detectionmediumtest

Microsoft 365 - User Restricted from Sending Email

Detects when a Security Compliance Center reported a user who exceeded sending limits of the service policies and because of this has been restricted from sending email.

Microsoft 365threat_management
TA0001 · Initial AccessT1199 · Trusted Relationship
Austin SongerThu Aug 19cloud
Detectionmediumtest

Okta Admin Role Assigned to an User or Group

Detects when an the Administrator role is assigned to an user or group.

Oktaokta
TA0004 · Privilege EscalationTA0003 · PersistenceT1098.003 · Additional Cloud Roles
Austin SongerSun Sep 12identity
Detectionmediumtest

Okta API Token Created

Detects when a API token is created

Oktaokta
TA0003 · Persistence
Austin SongerSun Sep 12identity
Detectionmediumtest

Okta API Token Revoked

Detects when a API Token is revoked.

Oktaokta
TA0040 · Impact
Austin SongerSun Sep 12identity
Detectionmediumtest

Okta Application Modified or Deleted

Detects when an application is modified or deleted.

Oktaokta
TA0040 · Impact
Austin SongerSun Sep 12identity
Detectionmediumtest

Okta Application Sign-On Policy Modified or Deleted

Detects when an application Sign-on Policy is modified or deleted.

Oktaokta
TA0040 · Impact
Austin SongerSun Sep 12identity
Detectionhightest

Okta FastPass Phishing Detection

Detects when Okta FastPass prevents a known phishing site.

Oktaokta
TA0001 · Initial AccessT1566 · Phishing
Austin SongerSun May 07identity
Detectionmediumtest

Okta MFA Reset or Deactivated

Detects when an attempt at deactivating or resetting MFA.

Oktaokta
TA0003 · PersistenceTA0006 · Credential AccessTA0005 · Defense EvasionT1556.006 · Multi-Factor Authentication
Austin SongerTue Sep 21identity
Detectionmediumtest

Okta Network Zone Deactivated or Deleted

Detects when an Network Zone is Deactivated or Deleted.

Oktaokta
TA0040 · Impact
Austin SongerSun Sep 12identity
Detectionlowtest

Okta Policy Modified or Deleted

Detects when an Okta policy is modified or deleted.

Oktaokta
TA0040 · Impact
Austin SongerSun Sep 12identity
Detectionmediumtest

Okta Policy Rule Modified or Deleted

Detects when an Policy Rule is Modified or Deleted.

Oktaokta
TA0040 · Impact
Austin SongerSun Sep 12identity
Detectionmediumtest

Okta Security Threat Detected

Detects when an security threat is detected in Okta.

Oktaokta
TA0011 · Command and Control
Austin SongerSun Sep 12identity
Detectionmediumtest

Okta Unauthorized Access to App

Detects when unauthorized access to app occurs.

Oktaokta
TA0040 · Impact
Austin SongerSun Sep 12identity
Detectionmediumtest

Okta User Account Locked Out

Detects when an user account is locked out.

Oktaokta
TA0040 · ImpactT1531 · Account Access Removal
Austin SongerSun Sep 12identity