Rule Library

Sigma Rules

351 rules found for "initial-access"

3,707Total
3,116Detection
451Emerging
137Hunting
Detectionmediumtest

Users Authenticating To Other Azure AD Tenants

Detect when users in your Azure AD tenant are authenticating to other Azure AD Tenants.

Azuresigninlogs
TA0004 · Privilege EscalationTA0003 · PersistenceTA0005 · Defense EvasionTA0001 · Initial Access+1
Mike DuddingtonThu Jun 30cloud
Detectionmediumtest

User Access Blocked by Azure Conditional Access

Detect access has been blocked by Conditional Access policies. The access policy does not allow token issuance which might be sights≈ of unauthorizeed login to valid accounts.

Azuresigninlogs
TA0004 · Privilege EscalationTA0003 · PersistenceTA0005 · Defense EvasionTA0006 · Credential Access+3
AlertIQSun Oct 10cloud
Detectionmediumtest

Google Cloud Kubernetes Admission Controller

Identifies when an admission controller is executed in GCP Kubernetes. A Kubernetes Admission controller intercepts, and possibly modifies, requests to the Kubernetes API server. The behavior of this admission controller is determined by an admission webhook (MutatingAdmissionWebhook or ValidatingAdmissionWebhook) that the user deploys in the cluster. An adversary can use such webhooks as the MutatingAdmissionWebhook for obtaining persistence in the cluster. For example, attackers can intercept and modify the pod creation operations in the cluster and add their malicious container to every created pod. An adversary can use the webhook ValidatingAdmissionWebhook, which could be used to obtain access credentials. An adversary could use the webhook to intercept the requests to the API server, record secrets, and other sensitive information.

Google Cloudgcp.audit
TA0004 · Privilege EscalationTA0001 · Initial AccessTA0005 · Defense EvasionTA0003 · Persistence+4
Austin SongerThu Nov 25cloud
Detectionhighexperimental

Azure Login Bypassing Conditional Access Policies

Detects a successful login to the Microsoft Intune Company Portal which could allow bypassing Conditional Access Policies and InTune device trust using a tool like TokenSmith.

Microsoft 365audit
TA0004 · Privilege EscalationTA0003 · PersistenceTA0001 · Initial AccessTA0005 · Defense Evasion+1
Josh Nickels+1Wed Jan 08cloud
Detectionmediumtest

Microsoft 365 - Impossible Travel Activity

Detects when a Microsoft Cloud App Security reported a risky sign-in attempt due to a login associated with an impossible travel.

Microsoft 365threat_management
TA0004 · Privilege EscalationTA0003 · PersistenceTA0005 · Defense EvasionTA0001 · Initial Access+1
Austin SongerMon Jul 06cloud
Detectionmediumtest

Logon from a Risky IP Address

Detects when a Microsoft Cloud App Security reported when a user signs into your sanctioned apps from a risky IP address.

Microsoft 365threat_management
TA0004 · Privilege EscalationTA0003 · PersistenceTA0005 · Defense EvasionTA0001 · Initial Access+1
Austin SongerMon Aug 23cloud
Detectionmediumtest

Microsoft 365 - User Restricted from Sending Email

Detects when a Security Compliance Center reported a user who exceeded sending limits of the service policies and because of this has been restricted from sending email.

Microsoft 365threat_management
TA0001 · Initial AccessT1199 · Trusted Relationship
Austin SongerThu Aug 19cloud
Detectionmediumtest

Cisco Duo Successful MFA Authentication Via Bypass Code

Detects when a successful MFA authentication occurs due to the use of a bypass code. A bypass code is a temporary passcode created by an administrator for a specific user to access a Duo-protected application. These are generally used as "backup codes," so that enrolled users who are having problems with their mobile devices (e.g., mobile service is disrupted, the device is lost or stolen, etc.) or who temporarily can't use their enrolled devices (on a plane without mobile data services) can still access their Duo-protected systems.

Ciscoduo
TA0006 · Credential AccessTA0005 · Defense EvasionTA0001 · Initial Access
Nikita KhalimonenkovWed Apr 17identity
Detectionhightest

Okta FastPass Phishing Detection

Detects when Okta FastPass prevents a known phishing site.

Oktaokta
TA0001 · Initial AccessT1566 · Phishing
Austin SongerSun May 07identity
Detectionhightest

Okta New Admin Console Behaviours

Detects when Okta identifies new activity in the Admin Console.

Oktaokta
TA0004 · Privilege EscalationTA0003 · PersistenceTA0005 · Defense EvasionTA0001 · Initial Access+1
kelnageThu Sep 07identity
Detectionmediumtest

Suspicious OpenSSH Daemon Error

Detects suspicious SSH / SSHD error messages that indicate a fatal or suspicious error that could be caused by exploiting attempts

Linuxsshd
TA0001 · Initial AccessT1190 · Exploit Public-Facing Application
Florian Roth (Nextron Systems)Fri Jun 30linux
Detectionhightest

Suspicious Named Error

Detects suspicious DNS error messages that indicate a fatal or suspicious error that could be caused by exploiting attempts

Linuxsyslog
TA0001 · Initial AccessT1190 · Exploit Public-Facing Application
Florian Roth (Nextron Systems)Tue Feb 20linux
Detectionmediumtest

Suspicious VSFTPD Error Messages

Detects suspicious VSFTPD error messages that indicate a fatal or suspicious error that could be caused by exploiting attempts

Linuxvsftpd
TA0001 · Initial AccessT1190 · Exploit Public-Facing Application
Florian Roth (Nextron Systems)Wed Jul 05linux
Detectionhightest

OMIGOD SCX RunAsProvider ExecuteScript

Rule to detect the use of the SCX RunAsProvider ExecuteScript to execute any UNIX/Linux script using the /bin/sh shell. Script being executed gets created as a temp file in /tmp folder with a scx* prefix. Then it is invoked from the following directory /etc/opt/microsoft/scx/conf/tmpdir/. The file in that directory has the same prefix scx*. SCXcore, started as the Microsoft Operations Manager UNIX/Linux Agent, is now used in a host of products including Microsoft Operations Manager, Microsoft Azure, and Microsoft Operations Management Suite.

LinuxProcess Creation
TA0004 · Privilege EscalationTA0001 · Initial AccessTA0002 · ExecutionT1068 · Exploitation for Privilege Escalation+2
Roberto Rodriguez (Cyb3rWard0g)+2Fri Oct 15linux
Detectionhightest

OMIGOD SCX RunAsProvider ExecuteShellCommand

Rule to detect the use of the SCX RunAsProvider Invoke_ExecuteShellCommand to execute any UNIX/Linux command using the /bin/sh shell. SCXcore, started as the Microsoft Operations Manager UNIX/Linux Agent, is now used in a host of products including Microsoft Operations Manager, Microsoft Azure, and Microsoft Operations Management Suite.

LinuxProcess Creation
TA0004 · Privilege EscalationTA0001 · Initial AccessTA0002 · ExecutionT1068 · Exploitation for Privilege Escalation+2
Roberto Rodriguez (Cyb3rWard0g)+2Fri Oct 15linux
Detectionlowtest

Remote Access Tool - Team Viewer Session Started On Linux Host

Detects the command line executed when TeamViewer starts a session started by a remote host. Once a connection has been started, an investigator can verify the connection details by viewing the "incoming_connections.txt" log file in the TeamViewer folder.

LinuxProcess Creation
TA0003 · PersistenceTA0001 · Initial AccessT1133 · External Remote Services
Josh Nickels+1Mon Mar 11linux
Detectionmediumtest

User Added To Admin Group Via Dscl

Detects attempts to create and add an account to the admin group via "dscl"

macOSProcess Creation
TA0003 · PersistenceTA0005 · Defense EvasionTA0001 · Initial AccessTA0004 · Privilege Escalation+1
Sohan G (D4rkCiph3r)Sun Mar 19macos
Detectionmediumtest

User Added To Admin Group Via DseditGroup

Detects attempts to create and/or add an account to the admin group, thus granting admin privileges.

macOSProcess Creation
TA0003 · PersistenceTA0005 · Defense EvasionTA0001 · Initial AccessTA0004 · Privilege Escalation+1
Sohan G (D4rkCiph3r)Tue Aug 22macos
Detectionmediumtest

Root Account Enable Via Dsenableroot

Detects attempts to enable the root account via "dsenableroot"

macOSProcess Creation
TA0004 · Privilege EscalationTA0005 · Defense EvasionT1078 · Valid AccountsT1078.001 · Default Accounts+3
Sohan G (D4rkCiph3r)Tue Aug 22macos
Detectionmediumtest

Disk Image Mounting Via Hdiutil - MacOS

Detects the execution of the hdiutil utility in order to mount disk images.

macOSProcess Creation
TA0001 · Initial AccessTA0009 · CollectionT1566.001 · Spearphishing AttachmentT1560.001 · Archive via Utility
Omar KhaledSat Aug 10macos
Detectionlowtest

Remote Access Tool - Team Viewer Session Started On MacOS Host

Detects the command line executed when TeamViewer starts a session started by a remote host. Once a connection has been started, an investigator can verify the connection details by viewing the "incoming_connections.txt" log file in the TeamViewer folder.

macOSProcess Creation
TA0003 · PersistenceTA0001 · Initial AccessT1133 · External Remote Services
Josh Nickels+1Mon Mar 11macos
Detectionmediumtest

Suspicious Browser Child Process - MacOS

Detects suspicious child processes spawned from browsers. This could be a result of a potential web browser exploitation.

macOSProcess Creation
TA0001 · Initial AccessTA0002 · ExecutionT1189 · Drive-by CompromiseT1203 · Exploitation for Client Execution+1
Sohan G (D4rkCiph3r)Wed Apr 05macos
Detectionmediumtest

Suspicious Execution via macOS Script Editor

Detects when the macOS Script Editor utility spawns an unusual child process.

macOSProcess Creation
T1566 · PhishingT1566.002 · Spearphishing LinkTA0001 · Initial AccessT1059 · Command and Scripting Interpreter+7
Tim Rauch+1Fri Oct 21macos
Detectionmediumtest

User Added To Admin Group Via Sysadminctl

Detects attempts to create and add an account to the admin group via "sysadminctl"

macOSProcess Creation
TA0003 · PersistenceTA0005 · Defense EvasionTA0001 · Initial AccessTA0004 · Privilege Escalation+1
Sohan G (D4rkCiph3r)Sun Mar 19macos
Detectionlowtest

Guest Account Enabled Via Sysadminctl

Detects attempts to enable the guest account using the sysadminctl utility

macOSProcess Creation
TA0004 · Privilege EscalationTA0003 · PersistenceTA0005 · Defense EvasionTA0001 · Initial Access+2
Sohan G (D4rkCiph3r)Sat Feb 18macos
Detectionlowtest

Cisco BGP Authentication Failures

Detects BGP failures which may be indicative of brute force attacks to manipulate routing

Ciscobgp
TA0001 · Initial AccessTA0003 · PersistenceTA0004 · Privilege EscalationTA0005 · Defense Evasion+5
Tim BrownMon Jan 09network
Detectionlowtest

Cisco LDP Authentication Failures

Detects LDP failures which may be indicative of brute force attacks to manipulate MPLS labels

Ciscoldp
TA0001 · Initial AccessTA0003 · PersistenceTA0004 · Privilege EscalationTA0005 · Defense Evasion+5
Tim BrownMon Jan 09network
Detectionhightest

DNS Query to External Service Interaction Domains

Detects suspicious DNS queries to external service interaction domains often used for out-of-band interactions after successful RCE

dns
TA0001 · Initial AccessT1190 · Exploit Public-Facing ApplicationTA0043 · ReconnaissanceT1595.002 · Vulnerability Scanning
Florian Roth (Nextron Systems)+1Tue Jun 07network
Detectionmediumexperimental

FortiGate - New VPN SSL Web Portal Added

Detects the addition of a VPN SSL Web Portal on a Fortinet FortiGate Firewall. This behavior was observed in pair with modification of VPN SSL settings.

fortigateevent
TA0003 · PersistenceTA0001 · Initial AccessT1133 · External Remote Services
Marco Pedrinazzi (InTheCyber)Sat Nov 01network
Detectionmediumexperimental

FortiGate - VPN SSL Settings Modified

Detects the modification of VPN SSL Settings (for example, the modification of authentication rules). This behavior was observed in pair with the addition of a VPN SSL Web Portal.

fortigateevent
TA0003 · PersistenceTA0001 · Initial AccessT1133 · External Remote Services
Marco Pedrinazzi (InTheCyber)Sat Nov 01network
Detectionlowtest

Huawei BGP Authentication Failures

Detects BGP failures which may be indicative of brute force attacks to manipulate routing.

huaweibgp
TA0001 · Initial AccessTA0003 · PersistenceTA0004 · Privilege EscalationTA0005 · Defense Evasion+5
Tim BrownMon Jan 09network
Detectionlowtest

Juniper BGP Missing MD5

Detects juniper BGP missing MD5 digest. Which may be indicative of brute force attacks to manipulate routing.

Juniperbgp
TA0001 · Initial AccessTA0003 · PersistenceTA0004 · Privilege EscalationTA0005 · Defense Evasion+5
Tim BrownMon Jan 09network
Detectionmediumexperimental

HTTP Request to Low Reputation TLD or Suspicious File Extension

Detects HTTP requests to low reputation TLDs (e.g. .xyz, .top, .ru) or ending in suspicious file extensions (.exe, .dll, .hta), which may indicate malicious activity.

Zeek (Bro)http
TA0001 · Initial AccessTA0011 · Command and Control
@signalblur+1Wed Feb 26network
Detectionmediumtest

Apache Threading Error

Detects an issue in apache logs that reports threading related errors

apache
TA0001 · Initial AccessTA0008 · Lateral MovementT1190 · Exploit Public-Facing ApplicationT1210 · Exploitation of Remote Services
Florian Roth (Nextron Systems)Tue Jan 22web
Detectionlowtest

Download From Suspicious TLD - Blacklist

Detects download of certain file types from hosts in suspicious TLDs

Proxy Log
TA0001 · Initial AccessT1566 · PhishingTA0002 · ExecutionT1203 · Exploitation for Client Execution+1
Florian Roth (Nextron Systems)Tue Nov 07web
Detectionlowtest

Download From Suspicious TLD - Whitelist

Detects executable downloads from suspicious remote systems

Proxy Log
TA0001 · Initial AccessT1566 · PhishingTA0002 · ExecutionT1203 · Exploitation for Client Execution+1
Florian Roth (Nextron Systems)Mon Mar 13web
Detectionmediumtest

F5 BIG-IP iControl Rest API Command Execution - Proxy

Detects POST requests to the F5 BIG-IP iControl Rest API "bash" endpoint, which allows the execution of commands on the BIG-IP

Proxy Log
TA0001 · Initial AccessT1190 · Exploit Public-Facing Application
Nasreddine Bencherchali (Nextron Systems)+1Wed Nov 08web
Detectionhightest

Flash Player Update from Suspicious Location

Detects a flashplayer update from an unofficial location

Proxy Log
TA0001 · Initial AccessT1189 · Drive-by CompromiseTA0002 · ExecutionT1204.002 · Malicious File+2
Florian Roth (Nextron Systems)Wed Oct 25web
Detectionhightest

Hack Tool User Agent

Detects suspicious user agent strings user by hack tools in proxy logs

Proxy Log
TA0001 · Initial AccessT1190 · Exploit Public-Facing ApplicationTA0006 · Credential AccessT1110 · Brute Force
Florian Roth (Nextron Systems)Sat Jul 08web
Detectionhightest

Suspicious External WebDAV Execution

Detects executables launched from external WebDAV shares using the WebDAV Explorer integration, commonly seen in initial access campaigns.

Proxy Log
TA0001 · Initial AccessTA0042 · Resource DevelopmentT1584 · Compromise InfrastructureT1566 · Phishing
Ahmed FaroukFri May 10web
Detectionmediumtest

F5 BIG-IP iControl Rest API Command Execution - Webserver

Detects POST requests to the F5 BIG-IP iControl Rest API "bash" endpoint, which allows the execution of commands on the BIG-IP

Web Server Log
TA0002 · ExecutionT1190 · Exploit Public-Facing ApplicationTA0001 · Initial Access
Nasreddine Bencherchali (Nextron Systems)+1Wed Nov 08web
Detectionmediumtest

Successful IIS Shortname Fuzzing Scan

When IIS uses an old .Net Framework it's possible to enumerate folders with the symbol "~"

Web Server Log
TA0001 · Initial AccessT1190 · Exploit Public-Facing Application
François HubautWed Oct 06web
Detectionhightest

Java Payload Strings

Detects possible Java payloads in web access logs

Web Server Log
cve.2022-26134cve.2021-26084TA0001 · Initial AccessT1190 · Exploit Public-Facing Application
François Hubaut+2Sat Jun 04web
Detectionhightest

JNDIExploit Pattern

Detects exploitation attempt using the JNDI-Exploit-Kit

Web Server Log
TA0001 · Initial AccessT1190 · Exploit Public-Facing Application
Florian Roth (Nextron Systems)Sun Dec 12web
Detectionmediumtest

Path Traversal Exploitation Attempts

Detects path traversal exploitation attempts

Web Server Log
TA0001 · Initial AccessT1190 · Exploit Public-Facing Application
Subhash Popuri+3Sat Sep 25web
Detectionhightest

SQL Injection Strings In URI

Detects potential SQL injection attempts via GET requests in access logs.

Web Server Log
TA0001 · Initial AccessT1190 · Exploit Public-Facing Application
Saw Win Naung+2Sat Feb 22web
Detectionmediumtest

Suspicious User-Agents Related To Recon Tools

Detects known suspicious (default) user-agents related to scanning/recon tools

Web Server Log
TA0001 · Initial AccessT1190 · Exploit Public-Facing Application
Nasreddine Bencherchali (Nextron Systems)+1Tue Jul 19web
Detectionhightest

Cross Site Scripting Strings

Detects XSS attempts injected via GET requests in access logs

Web Server Log
TA0001 · Initial AccessT1189 · Drive-by Compromise
Saw Win Naung+1Sun Aug 15web