Rule Library

Sigma Rules

888 rules found for "persistence"

3,707Total
3,116Detection
451Emerging
137Hunting
Detectionmediumtest

Authentications To Important Apps Using Single Factor Authentication

Detect when authentications to important application(s) only required single-factor authentication

Azuresigninlogs
TA0004 · Privilege EscalationTA0003 · PersistenceTA0005 · Defense EvasionTA0001 · Initial Access+1
Mike DuddingtonThu Jul 28cloud
Detectionmediumtest

Device Registration or Join Without MFA

Monitor and alert for device registration or join events where MFA was not performed.

Azuresigninlogs
TA0004 · Privilege EscalationTA0003 · PersistenceTA0001 · Initial AccessTA0005 · Defense Evasion+1
Michael EppingTue Jun 28cloud
Detectionlowtest

Failed Authentications From Countries You Do Not Operate Out Of

Detect failed authentications from countries you do not operate out of.

Azuresigninlogs
TA0004 · Privilege EscalationTA0003 · PersistenceTA0005 · Defense EvasionTA0001 · Initial Access+3
Mike DuddingtonThu Jul 28cloud
Detectionlowtest

Azure AD Only Single Factor Authentication Required

Detect when users are authenticating without MFA being required.

Azuresigninlogs
TA0004 · Privilege EscalationTA0003 · PersistenceTA0005 · Defense EvasionTA0001 · Initial Access+3
Mike DuddingtonWed Jul 27cloud
Detectionhightest

Suspicious SignIns From A Non Registered Device

Detects risky authentication from a non AD registered device without MFA being required.

Azuresigninlogs
TA0004 · Privilege EscalationTA0003 · PersistenceTA0001 · Initial AccessTA0005 · Defense Evasion+1
Harjot SinghTue Jan 10cloud
Detectionhightest

Sign-ins from Non-Compliant Devices

Monitor and alert for sign-ins where the device was non-compliant.

Azuresigninlogs
TA0004 · Privilege EscalationTA0003 · PersistenceTA0001 · Initial AccessTA0005 · Defense Evasion+1
Michael EppingTue Jun 28cloud
Detectionlowtest

Sign-ins by Unknown Devices

Monitor and alert for Sign-ins by unknown devices from non-Trusted locations.

Azuresigninlogs
TA0004 · Privilege EscalationTA0003 · PersistenceTA0001 · Initial AccessTA0005 · Defense Evasion+1
Michael EppingTue Jun 28cloud
Detectionhightest

Potential MFA Bypass Using Legacy Client Authentication

Detects successful authentication from potential clients using legacy authentication via user agent strings. This could be a sign of MFA bypass using a password spray attack.

Azuresigninlogs
TA0004 · Privilege EscalationTA0003 · PersistenceTA0005 · Defense EvasionTA0001 · Initial Access+3
Harjot SinghMon Mar 20cloud
Detectionmediumtest

Application Using Device Code Authentication Flow

Device code flow is an OAuth 2.0 protocol flow specifically for input constrained devices and is not used in all environments. If this type of flow is seen in the environment and not being used in an input constrained device scenario, further investigation is warranted. This can be a misconfigured application or potentially something malicious.

Azuresigninlogs
T1078 · Valid AccountsTA0005 · Defense EvasionTA0003 · PersistenceTA0004 · Privilege Escalation+1
Mark Morowczynski+1Wed Jun 01cloud
Detectionmediumtest

Applications That Are Using ROPC Authentication Flow

Resource owner password credentials (ROPC) should be avoided if at all possible as this requires the user to expose their current password credentials to the application directly. The application then uses those credentials to authenticate the user against the identity provider.

Azuresigninlogs
T1078 · Valid AccountsTA0005 · Defense EvasionTA0003 · PersistenceTA0004 · Privilege Escalation+1
Mark Morowczynski+1Wed Jun 01cloud
Detectionmediumtest

Account Disabled or Blocked for Sign in Attempts

Detects when an account is disabled or blocked for sign in but tried to log in

Azuresigninlogs
TA0004 · Privilege EscalationTA0003 · PersistenceTA0005 · Defense EvasionTA0001 · Initial Access+1
Yochana HendersonFri Jun 17cloud
Detectionhightest

Sign-in Failure Due to Conditional Access Requirements Not Met

Define a baseline threshold for failed sign-ins due to Conditional Access failures

Azuresigninlogs
TA0004 · Privilege EscalationTA0003 · PersistenceTA0005 · Defense EvasionTA0001 · Initial Access+3
Yochana HendersonWed Jun 01cloud
Detectionhightest

Use of Legacy Authentication Protocols

Alert on when legacy authentication has been used on an account

Azuresigninlogs
TA0004 · Privilege EscalationTA0003 · PersistenceTA0005 · Defense EvasionTA0001 · Initial Access+3
Yochana HendersonFri Jun 17cloud
Detectionmediumtest

Login to Disabled Account

Detect failed attempts to sign in to disabled accounts.

Azuresigninlogs
TA0004 · Privilege EscalationTA0003 · PersistenceTA0005 · Defense EvasionTA0001 · Initial Access+1
AlertIQSun Oct 10cloud
Detectionmediumtest

Multifactor Authentication Denied

User has indicated they haven't instigated the MFA prompt and could indicate an attacker has the password for the account.

Azuresigninlogs
TA0004 · Privilege EscalationTA0003 · PersistenceTA0005 · Defense EvasionTA0001 · Initial Access+4
AlertIQThu Mar 24cloud
Detectionmediumtest

Multifactor Authentication Interrupted

Identifies user login with multifactor authentication failures, which might be an indication an attacker has the password for the account but can't pass the MFA challenge.

Azuresigninlogs
TA0004 · Privilege EscalationTA0003 · PersistenceTA0005 · Defense EvasionTA0001 · Initial Access+4
AlertIQSun Oct 10cloud
Detectionmediumtest

Azure Unusual Authentication Interruption

Detects when there is a interruption in the authentication process.

Azuresigninlogs
TA0004 · Privilege EscalationTA0003 · PersistenceTA0005 · Defense EvasionTA0001 · Initial Access+1
Austin SongerFri Nov 26cloud
Detectionmediumtest

Users Authenticating To Other Azure AD Tenants

Detect when users in your Azure AD tenant are authenticating to other Azure AD Tenants.

Azuresigninlogs
TA0004 · Privilege EscalationTA0003 · PersistenceTA0005 · Defense EvasionTA0001 · Initial Access+1
Mike DuddingtonThu Jun 30cloud
Detectionmediumtest

User Access Blocked by Azure Conditional Access

Detect access has been blocked by Conditional Access policies. The access policy does not allow token issuance which might be sights≈ of unauthorizeed login to valid accounts.

Azuresigninlogs
TA0004 · Privilege EscalationTA0003 · PersistenceTA0005 · Defense EvasionTA0006 · Credential Access+3
AlertIQSun Oct 10cloud
Detectionmediumtest

GCP Access Policy Deleted

Detects when an access policy that is applied to a GCP cloud resource is deleted. An adversary would be able to remove access policies to gain access to a GCP cloud resource.

Google Cloudgcp.audit
TA0003 · PersistenceTA0004 · Privilege EscalationT1098 · Account Manipulation
Bryan LimFri Jan 12cloud
Detectionmediumtest

Google Cloud Kubernetes Admission Controller

Identifies when an admission controller is executed in GCP Kubernetes. A Kubernetes Admission controller intercepts, and possibly modifies, requests to the Kubernetes API server. The behavior of this admission controller is determined by an admission webhook (MutatingAdmissionWebhook or ValidatingAdmissionWebhook) that the user deploys in the cluster. An adversary can use such webhooks as the MutatingAdmissionWebhook for obtaining persistence in the cluster. For example, attackers can intercept and modify the pod creation operations in the cluster and add their malicious container to every created pod. An adversary can use the webhook ValidatingAdmissionWebhook, which could be used to obtain access credentials. An adversary could use the webhook to intercept the requests to the API server, record secrets, and other sensitive information.

Google Cloudgcp.audit
TA0004 · Privilege EscalationTA0001 · Initial AccessTA0005 · Defense EvasionTA0003 · Persistence+4
Austin SongerThu Nov 25cloud
Detectionmediumtest

Google Cloud Kubernetes CronJob

Identifies when a Google Cloud Kubernetes CronJob runs in Azure Cloud. Kubernetes Job is a controller that creates one or more pods and ensures that a specified number of them successfully terminate. Kubernetes Job can be used to run containers that perform finite tasks for batch jobs. Kubernetes CronJob is used to schedule Jobs. An Adversary may use Kubernetes CronJob for scheduling execution of malicious code that would run as a container in the cluster.

Google Cloudgcp.audit
TA0003 · PersistenceTA0004 · Privilege EscalationTA0002 · Execution
Austin SongerMon Nov 22cloud
Detectionmediumtest

Google Workspace Application Access Level Modified

Detects when an access level is changed for a Google workspace application. An access level is part of BeyondCorp Enterprise which is Google Workspace's way of enforcing Zero Trust model. An adversary would be able to remove access levels to gain easier access to Google workspace resources.

Google Cloudgoogle_workspace.admin
TA0003 · PersistenceTA0004 · Privilege EscalationT1098.003 · Additional Cloud Roles
Bryan LimFri Jan 12cloud
Detectionmediumtest

Google Workspace Granted Domain API Access

Detects when an API access service account is granted domain authority.

Google Cloudgoogle_workspace.admin
TA0004 · Privilege EscalationTA0003 · PersistenceT1098 · Account Manipulation
Austin SongerMon Aug 23cloud
Detectionmediumtest

Google Workspace User Granted Admin Privileges

Detects when an Google Workspace user is granted admin privileges.

Google Cloudgoogle_workspace.admin
TA0004 · Privilege EscalationTA0003 · PersistenceT1098 · Account Manipulation
Austin SongerMon Aug 23cloud
Detectionhighexperimental

Azure Login Bypassing Conditional Access Policies

Detects a successful login to the Microsoft Intune Company Portal which could allow bypassing Conditional Access Policies and InTune device trust using a tool like TokenSmith.

Microsoft 365audit
TA0004 · Privilege EscalationTA0003 · PersistenceTA0001 · Initial AccessTA0005 · Defense Evasion+1
Josh Nickels+1Wed Jan 08cloud
Detectionhightest

Disabling Multi Factor Authentication

Detects disabling of Multi Factor Authentication.

Microsoft 365audit
TA0003 · PersistenceTA0005 · Defense EvasionTA0006 · Credential AccessT1556.006 · Multi-Factor Authentication
Splunk Threat Research Team (original rule)+1Mon Sep 18cloud
Detectionmediumtest

New Federated Domain Added - Exchange

Detects the addition of a new Federated Domain.

Microsoft 365exchange
TA0003 · PersistenceT1136.003 · Cloud Account
Splunk Threat Research Team (original rule)+1Tue Feb 08cloud
Detectionmediumtest

Microsoft 365 - Impossible Travel Activity

Detects when a Microsoft Cloud App Security reported a risky sign-in attempt due to a login associated with an impossible travel.

Microsoft 365threat_management
TA0004 · Privilege EscalationTA0003 · PersistenceTA0005 · Defense EvasionTA0001 · Initial Access+1
Austin SongerMon Jul 06cloud
Detectionmediumtest

Logon from a Risky IP Address

Detects when a Microsoft Cloud App Security reported when a user signs into your sanctioned apps from a risky IP address.

Microsoft 365threat_management
TA0004 · Privilege EscalationTA0003 · PersistenceTA0005 · Defense EvasionTA0001 · Initial Access+1
Austin SongerMon Aug 23cloud
Detectionmediumtest

Okta Admin Role Assigned to an User or Group

Detects when an the Administrator role is assigned to an user or group.

Oktaokta
TA0004 · Privilege EscalationTA0003 · PersistenceT1098.003 · Additional Cloud Roles
Austin SongerSun Sep 12identity
Detectionmediumtest

Okta Admin Role Assignment Created

Detects when a new admin role assignment is created. Which could be a sign of privilege escalation or persistence

Oktaokta
TA0003 · Persistence
Nikita KhalimonenkovThu Jan 19identity
Detectionmediumtest

Okta API Token Created

Detects when a API token is created

Oktaokta
TA0003 · Persistence
Austin SongerSun Sep 12identity
Detectionmediumtest

Okta Identity Provider Created

Detects when a new identity provider is created for Okta.

Oktaokta
TA0004 · Privilege EscalationTA0003 · PersistenceT1098.001 · Additional Cloud Credentials
kelnageThu Sep 07identity
Detectionmediumtest

Okta MFA Reset or Deactivated

Detects when an attempt at deactivating or resetting MFA.

Oktaokta
TA0003 · PersistenceTA0006 · Credential AccessTA0005 · Defense EvasionT1556.006 · Multi-Factor Authentication
Austin SongerTue Sep 21identity
Detectionhightest

Okta New Admin Console Behaviours

Detects when Okta identifies new activity in the Admin Console.

Oktaokta
TA0004 · Privilege EscalationTA0003 · PersistenceTA0005 · Defense EvasionTA0001 · Initial Access+1
kelnageThu Sep 07identity
Detectionlowtest

Service Reload or Start - Linux

Detects the start, reload or restart of a service.

Linuxauditd
TA0004 · Privilege EscalationTA0003 · PersistenceT1543.002 · Systemd Service
Jakob Weinzettl+2Mon Sep 23linux
Detectionlowtest

Use Of Hidden Paths Or Files

Detects calls to hidden files or files located in hidden directories in NIX systems.

Linuxauditd
TA0004 · Privilege EscalationTA0003 · PersistenceTA0005 · Defense EvasionT1574.001 · DLL Search Order Hijacking
David BurkettFri Dec 30linux
Detectionhightest

Modification of ld.so.preload

Identifies modification of ld.so.preload for shared object injection. This technique is used by attackers to load arbitrary code into processes.

Linuxauditd
TA0004 · Privilege EscalationTA0003 · PersistenceTA0005 · Defense EvasionT1574.006 · Dynamic Linker Hijacking
E.M. Anhaus (originally from Atomic Blue Detections+2Thu Oct 24linux
Detectionmediumtest

Systemd Service Creation

Detects a creation of systemd services which could be used by adversaries to execute malicious code.

Linuxauditd
TA0004 · Privilege EscalationTA0003 · PersistenceT1543.002 · Systemd Service
Pawel MazurThu Feb 03linux
Detectionmediumtest

Unix Shell Configuration Modification

Detect unix shell configuration modification. Adversaries may establish persistence through executing malicious commands triggered when a new shell is opened.

Linuxauditd
TA0004 · Privilege EscalationTA0003 · PersistenceT1546.004 · .bash_profile and .bashrc
Peter Matkovski+1Mon Mar 06linux
Detectionmediumtest

Creation Of An User Account

Detects the creation of a new user account. Such accounts may be used for persistence that do not require persistent remote access tools to be deployed on the system.

Linuxauditd
T1136.001 · Local AccountTA0003 · Persistence
Marie Euler+1Mon May 18linux
Detectionhightest

Loading of Kernel Module via Insmod

Detects loading of kernel modules with insmod command. Loadable Kernel Modules (LKMs) are pieces of code that can be loaded and unloaded into the kernel upon demand. Adversaries may use LKMs to obtain persistence within the system or elevate the privileges.

Linuxauditd
TA0003 · PersistenceTA0004 · Privilege EscalationT1547.006 · Kernel Modules and Extensions
Pawel MazurTue Nov 02linux
Detectionlowexperimental

Special File Creation via Mknod Syscall

Detects usage of the `mknod` syscall to create special files (e.g., character or block devices). Attackers or malware might use `mknod` to create fake devices, interact with kernel interfaces, or establish covert channels in Linux systems. Monitoring the use of `mknod` is important because this syscall is rarely used by legitimate applications, and it can be abused to bypass file system restrictions or create backdoors.

Linuxauditd
TA0004 · Privilege EscalationTA0003 · PersistenceT1543.003 · Windows Service
Milad CheraghiSat May 31linux
Detectioncriticaltest

Webshell Remote Command Execution

Detects possible command execution by web application/web shell

Linuxauditd
TA0003 · PersistenceT1505.003 · Web Shell
Ilyas Ochkov+2Sat Oct 12linux
Detectionmediumtest

Modifying Crontab

Detects suspicious modification of crontab file.

Linuxcron
TA0004 · Privilege EscalationTA0002 · ExecutionTA0003 · PersistenceT1053.003 · Cron
Pawel MazurSat Apr 16linux
Detectionhightest

Code Injection by ld.so Preload

Detects the ld.so preload persistence file. See `man ld.so` for more information.

Linux
TA0005 · Defense EvasionTA0003 · PersistenceTA0004 · Privilege EscalationT1574.006 · Dynamic Linker Hijacking
Christian Burkard (Nextron Systems)Wed May 05linux
Detectionhightest

Potential Suspicious BPF Activity - Linux

Detects the presence of "bpf_probe_write_user" BPF helper-generated warning messages. Which could be a sign of suspicious eBPF activity on the system.

Linux
TA0003 · PersistenceTA0005 · Defense Evasion
Red Canary+1Wed Jan 25linux