Rule Library

Sigma Rules

171 rules found for "impact"

3,707Total
3,116Detection
451Emerging
137Hunting
Detectionmediumtest

Google Cloud VPN Tunnel Modified or Deleted

Identifies when a VPN Tunnel Modified or Deleted in Google Cloud.

Google Cloudgcp.audit
TA0040 · Impact
Austin SongerMon Aug 16cloud
Detectionmediumtest

Google Workspace Application Removed

Detects when an an application is removed from Google Workspace.

Google Cloudgoogle_workspace.admin
TA0040 · Impact
Austin SongerThu Aug 26cloud
Detectionmediumtest

Google Workspace MFA Disabled

Detects when multi-factor authentication (MFA) is disabled.

Google Cloudgoogle_workspace.admin
TA0040 · Impact
Austin SongerThu Aug 26cloud
Detectionmediumtest

Google Workspace Role Modified or Deleted

Detects when an a role is modified or deleted in Google Workspace.

Google Cloudgoogle_workspace.admin
TA0040 · Impact
Austin SongerTue Aug 24cloud
Detectionmediumtest

Google Workspace Role Privilege Deleted

Detects when an a role privilege is deleted in Google Workspace.

Google Cloudgoogle_workspace.admin
TA0040 · Impact
Austin SongerTue Aug 24cloud
Detectionmediumtest

Activity Performed by Terminated User

Detects when a Microsoft Cloud App Security reported for users whose account were terminated in Azure AD, but still perform activities in other platforms such as AWS or Salesforce. This is especially relevant for users who use another account to manage resources, since these accounts are often not terminated when a user leaves the company.

Microsoft 365threat_management
TA0040 · Impact
Austin SongerMon Aug 23cloud
Detectionmediumtest

Microsoft 365 - Potential Ransomware Activity

Detects when a Microsoft Cloud App Security reported when a user uploads files to the cloud that might be infected with ransomware.

Microsoft 365threat_management
TA0040 · ImpactT1486 · Data Encrypted for Impact
Austin SongerThu Aug 19cloud
Detectionmediumtest

Microsoft 365 - Unusual Volume of File Deletion

Detects when a Microsoft Cloud App Security reported a user has deleted a unusual a large volume of files.

Microsoft 365threat_management
TA0040 · ImpactT1485 · Data Destruction
Austin SongerThu Aug 19cloud
Detectionmediumtest

Okta API Token Revoked

Detects when a API Token is revoked.

Oktaokta
TA0040 · Impact
Austin SongerSun Sep 12identity
Detectionmediumtest

Okta Application Modified or Deleted

Detects when an application is modified or deleted.

Oktaokta
TA0040 · Impact
Austin SongerSun Sep 12identity
Detectionmediumtest

Okta Application Sign-On Policy Modified or Deleted

Detects when an application Sign-on Policy is modified or deleted.

Oktaokta
TA0040 · Impact
Austin SongerSun Sep 12identity
Detectionmediumtest

Okta Network Zone Deactivated or Deleted

Detects when an Network Zone is Deactivated or Deleted.

Oktaokta
TA0040 · Impact
Austin SongerSun Sep 12identity
Detectionlowtest

Okta Policy Modified or Deleted

Detects when an Okta policy is modified or deleted.

Oktaokta
TA0040 · Impact
Austin SongerSun Sep 12identity
Detectionmediumtest

Okta Policy Rule Modified or Deleted

Detects when an Policy Rule is Modified or Deleted.

Oktaokta
TA0040 · Impact
Austin SongerSun Sep 12identity
Detectionmediumtest

Okta Unauthorized Access to App

Detects when unauthorized access to app occurs.

Oktaokta
TA0040 · Impact
Austin SongerSun Sep 12identity
Detectionmediumtest

Okta User Account Locked Out

Detects when an user account is locked out.

Oktaokta
TA0040 · ImpactT1531 · Account Access Removal
Austin SongerSun Sep 12identity
Detectionlowtest

OneLogin User Assumed Another User

Detects when an user assumed another user account.

oneloginonelogin.events
TA0040 · Impact
Austin SongerTue Oct 12identity
Detectionlowtest

OneLogin User Account Locked

Detects when an user account is locked or suspended.

oneloginonelogin.events
TA0040 · Impact
Austin SongerTue Oct 12identity
Detectionlowstable

Overwriting the File with Dev Zero or Null

Detects overwriting (effectively wiping/deleting) of a file.

Linuxauditd
TA0040 · ImpactT1485 · Data Destruction
Jakob Weinzettl+1Wed Oct 23linux
Detectioninformationaltest

System Shutdown/Reboot - Linux

Adversaries may shutdown/reboot systems to interrupt access to, or aid in the destruction of, those systems.

Linuxauditd
TA0040 · ImpactT1529 · System Shutdown/Reboot
Igor Fits+1Thu Oct 15linux
Detectionmediumexperimental

Potential Abuse of Linux Magic System Request Key

Detects the potential abuse of the Linux Magic SysRq (System Request) key by adversaries with root or sufficient privileges to silently manipulate or destabilize a system. By writing to /proc/sysrq-trigger, they can crash the system, kill processes, or disrupt forensic analysis—all while bypassing standard logging. Though intended for recovery and debugging, SysRq can be misused as a stealthy post-exploitation tool. It is controlled via /proc/sys/kernel/sysrq or permanently through /etc/sysctl.conf.

Linuxauditd
TA0002 · ExecutionT1059.004 · Unix ShellTA0040 · ImpactT1529 · System Shutdown/Reboot+2
Milad CheraghiFri May 23linux
Detectionhightest

Commands to Clear or Remove the Syslog - Builtin

Detects specific commands commonly used to remove or empty the syslog

Linux
TA0040 · ImpactT1565.001 · Stored Data Manipulation
Max Altgelt (Nextron Systems)Fri Sep 10linux
Detectionmediumtest

Suspicious Log Entries

Detects suspicious log entries in Linux log files

Linux
TA0040 · Impact
Florian Roth (Nextron Systems)Sat Mar 25linux
Detectionhighstable

Linux Crypto Mining Pool Connections

Detects process connections to a Monero crypto mining pool

LinuxNetwork Connection
TA0040 · ImpactT1496 · Resource Hijacking
Florian Roth (Nextron Systems)Tue Oct 26linux
Detectionhightest

Linux Crypto Mining Indicators

Detects command line parameters or strings often used by crypto miners

LinuxProcess Creation
TA0040 · ImpactT1496 · Resource Hijacking
Florian Roth (Nextron Systems)Tue Oct 26linux
Detectionlowtest

DD File Overwrite

Detects potential overwriting and deletion of a file using DD.

LinuxProcess Creation
TA0040 · ImpactT1485 · Data Destruction
Roberto Rodriguez (Cyb3rWard0g)+2Fri Oct 15linux
Detectionmediumtest

ESXi Storage Information Discovery Via ESXCLI

Detects execution of the "esxcli" command with the "storage" flag in order to retrieve information about the storage status and other related information. Seen used by malware such as DarkSide and LockBit.

LinuxProcess Creation
TA0007 · DiscoveryTA0002 · ExecutionT1033 · System Owner/User DiscoveryT1007 · System Service Discovery+1
Nasreddine Bencherchali (Nextron Systems)+1Mon Sep 04linux
Detectionmediumtest

ESXi VM Kill Via ESXCLI

Detects execution of the "esxcli" command with the "vm" and "kill" flag in order to kill/shutdown a specific VM.

LinuxProcess Creation
TA0002 · ExecutionTA0040 · Impactattack.t1059.012T1529 · System Shutdown/Reboot
Nasreddine Bencherchali (Nextron Systems)+1Mon Sep 04linux
Detectionmediumtest

ESXi VSAN Information Discovery Via ESXCLI

Detects execution of the "esxcli" command with the "vsan" flag in order to retrieve information about virtual storage. Seen used by malware such as DarkSide.

LinuxProcess Creation
TA0007 · DiscoveryTA0002 · ExecutionT1033 · System Owner/User DiscoveryT1007 · System Service Discovery+1
Nasreddine Bencherchali (Nextron Systems)+1Mon Sep 04linux
Detectionmediumtest

Group Has Been Deleted Via Groupdel

Detects execution of the "groupdel" binary. Which is used to delete a group. This is sometimes abused by threat actors in order to cover their tracks

LinuxProcess Creation
TA0040 · ImpactT1531 · Account Access Removal
Tuan Le (NCSGroup)Mon Dec 26linux
Detectionhightest

History File Deletion

Detects events in which a history file gets deleted, e.g. the ~/bash_history to remove traces of malicious activity

LinuxProcess Creation
TA0040 · ImpactT1565.001 · Stored Data Manipulation
Florian Roth (Nextron Systems)Mon Jun 20linux
Detectionmediumtest

Potential Suspicious Change To Sensitive/Critical Files

Detects changes of sensitive and critical files. Monitors files that you don't expect to change without planning on Linux system.

LinuxProcess Creation
TA0040 · ImpactT1565.001 · Stored Data Manipulation
Tue May 30linux
Detectionhighexperimental

Mask System Power Settings Via Systemctl

Detects the use of systemctl mask to disable system power management targets such as suspend, hibernate, or hybrid sleep. Adversaries may mask these targets to prevent a system from entering sleep or shutdown states, ensuring their malicious processes remain active and uninterrupted. This behavior can be associated with persistence or defense evasion, as it impairs normal system power operations to maintain long-term access or avoid termination of malicious activity.

LinuxProcess Creation
TA0003 · PersistenceTA0040 · ImpactT1653 · Power Settings
Milad Cheraghi+1Fri Oct 17linux
Detectionmediumtest

User Has Been Deleted Via Userdel

Detects execution of the "userdel" binary. Which is used to delete a user account and related files. This is sometimes abused by threat actors in order to cover their tracks

LinuxProcess Creation
TA0040 · ImpactT1531 · Account Access Removal
Tuan Le (NCSGroup)Mon Dec 26linux
Detectionmediumtest

Suspicious MacOS Firmware Activity

Detects when a user manipulates with Firmward Password on MacOS. NOTE - this command has been disabled on silicon-based apple computers.

macOSProcess Creation
TA0040 · Impact
Austin SongerThu Sep 30macos
Detectioninformationaltest

System Shutdown/Reboot - MacOs

Adversaries may shutdown/reboot systems to interrupt access to, or aid in the destruction of, those systems.

macOSProcess Creation
TA0040 · ImpactT1529 · System Shutdown/Reboot
Igor Fits+2Mon Oct 19macos
Detectionmediumtest

Time Machine Backup Deletion Attempt Via Tmutil - MacOS

Detects deletion attempts of MacOS Time Machine backups via the native backup utility "tmutil". An adversary may perform this action before launching a ransonware attack to prevent the victim from restoring their files.

macOSProcess Creation
TA0040 · ImpactT1490 · Inhibit System Recovery
Pratinav ChandraWed May 29macos
Detectionmediumtest

Time Machine Backup Disabled Via Tmutil - MacOS

Detects disabling of Time Machine (Apple's automated backup utility software) via the native macOS backup utility "tmutil". An attacker can use this to prevent backups from occurring.

macOSProcess Creation
TA0040 · ImpactT1490 · Inhibit System Recovery
Pratinav ChandraWed May 29macos
Detectionmediumtest

New File Exclusion Added To Time Machine Via Tmutil - MacOS

Detects the addition of a new file or path exclusion to MacOS Time Machine via the "tmutil" utility. An adversary could exclude a path from Time Machine backups to prevent certain files from being backed up.

macOSProcess Creation
TA0040 · ImpactT1490 · Inhibit System Recovery
Pratinav ChandraWed May 29macos
Detectionmediumtest

Cisco Denial of Service

Detect a system being shutdown or put into different boot mode

Ciscoaaa
TA0040 · ImpactT1495 · Firmware CorruptionT1529 · System Shutdown/RebootT1565.001 · Stored Data Manipulation
Austin ClarkThu Aug 15network
Detectionmediumtest

Cisco File Deletion

See what files are being deleted from flash file systems

Ciscoaaa
TA0005 · Defense EvasionTA0040 · ImpactT1070.004 · File DeletionT1561.001 · Disk Content Wipe+1
Austin ClarkMon Aug 12network
Detectionmediumtest

Cisco Modify Configuration

Modifications to a config that will serve an adversary's impacts or persistence

Ciscoaaa
TA0004 · Privilege EscalationTA0002 · ExecutionTA0003 · PersistenceTA0040 · Impact+4
Austin ClarkMon Aug 12network
Detectionhighstable

Monero Crypto Coin Mining Pool Lookup

Detects suspicious DNS queries to Monero mining pools

dns
TA0040 · ImpactT1496 · Resource HijackingTA0010 · ExfiltrationT1567 · Exfiltration Over Web Service
Florian Roth (Nextron Systems)Sun Oct 24network
Detectionlowtest

DNS Events Related To Mining Pools

Identifies clients that may be performing DNS lookups associated with common currency mining pools.

Zeek (Bro)dns
TA0002 · ExecutionT1569.002 · Service ExecutionTA0040 · ImpactT1496 · Resource Hijacking
Saw Winn Naung+1Thu Aug 19network
Detectionhightest

Apache Segmentation Fault

Detects a segmentation fault error message caused by a crashing apache worker process

apache
TA0040 · ImpactT1499.004 · Application or System Exploitation
Florian Roth (Nextron Systems)Tue Feb 28web
Detectionhightest

Nginx Core Dump

Detects a core dump of a crashing Nginx worker process, which could be a signal of a serious problem or exploitation attempts.

nginx
TA0040 · ImpactT1499.004 · Application or System Exploitation
Florian Roth (Nextron Systems)Mon May 31web
Detectioncriticaltest

Audit CVE Event

Detects events generated by user-mode applications when they call the CveEventWrite API when a known vulnerability is trying to be exploited. MS started using this log in Jan. 2020 with CVE-2020-0601 (a Windows CryptoAPI vulnerability. Unfortunately, that is about the only instance of CVEs being written to this log.

Windowsapplication
TA0002 · ExecutionT1203 · Exploitation for Client ExecutionTA0004 · Privilege EscalationT1068 · Exploitation for Privilege Escalation+8
Florian Roth (Nextron Systems)+1Wed Jan 15windows
Detectionlowtest

Application Uninstalled

An application has been removed. Check if it is critical.

Windowsapplication
TA0040 · ImpactT1489 · Service Stop
François HubautFri Jan 28windows