Rule Library

Sigma Rules

171 rules found for "impact"

3,707Total
3,116Detection
451Emerging
137Hunting
Detectionmediumtest

Github Delete Action Invoked

Detects delete action in the Github audit logs for codespaces, environment, project and repo.

githubaudit
TA0040 · ImpactTA0009 · CollectionT1213.003 · Code Repositories
Muhammad FaisalThu Jan 19application
Detectionlowexperimental

GitHub Repository Archive Status Changed

Detects when a GitHub repository is archived or unarchived, which may indicate unauthorized changes to repository status.

githubaudit
TA0003 · PersistenceTA0005 · Defense EvasionTA0040 · Impact
Ivan SaakovSat Oct 18application
Detectionlowtest

Github Self Hosted Runner Changes Detected

A self-hosted runner is a system that you deploy and manage to execute jobs from GitHub Actions on GitHub.com. This rule detects changes to self-hosted runners configurations in the environment. The self-hosted runner configuration changes once detected, it should be validated from GitHub UI because the log entry may not provide full context.

githubaudit
TA0040 · ImpactTA0007 · DiscoveryTA0009 · CollectionTA0005 · Defense Evasion+6
Muhammad FaisalFri Jan 27application
Detectionlowtest

Deployment Deleted From Kubernetes Cluster

Detects the removal of a deployment from a Kubernetes cluster. This could indicate disruptive activity aiming to impact business operations.

Kubernetesapplicationaudit
T1498 · Network Denial of ServiceTA0040 · Impact
Leo TsaousisTue Mar 26application
Detectionhightest

OpenCanary - NTP Monlist Request

Detects instances where an NTP service on an OpenCanary node has had a NTP monlist request.

opencanaryapplication
TA0040 · ImpactT1498 · Network Denial of Service
Security Onion SolutionsFri Mar 08application
Detectioncriticaltest

Antivirus Ransomware Detection

Detects a highly relevant Antivirus alert that reports ransomware. This event must not be ignored just because the AV has blocked the malware but investigate, how it came there in the first place.

Antivirus Alert
T1486 · Data Encrypted for ImpactTA0040 · Impact
Florian Roth (Nextron Systems)+1Thu May 12category
Detectionmediumtest

RDS Database Security Group Modification

Detects changes to the security group entries for RDS databases. This can indicate that a misconfiguration has occurred which potentially exposes the database to the public internet, a wider audience within the VPC or that removal of valid rules has occurred which could impact the availability of the database to legitimate services and users.

AWScloudtrail
TA0001 · Initial AccessT1190 · Exploit Public-Facing Application
jamesc-grafanaThu Jul 11cloud
Detectionmediumexperimental

AWS SAML Provider Deletion Activity

Detects the deletion of an AWS SAML provider, potentially indicating malicious intent to disrupt administrative or security team access. An attacker can remove the SAML provider for the information security team or a team of system administrators, to make it difficult for them to work and investigate at the time of the attack and after it.

AWScloudtrail
T1078.004 · Cloud AccountsTA0004 · Privilege EscalationTA0005 · Defense EvasionTA0001 · Initial Access+3
Ivan SaakovThu Dec 19cloud
Detectionmediumtest

AWS S3 Bucket Versioning Disable

Detects when S3 bucket versioning is disabled. Threat actors use this technique during AWS ransomware incidents prior to deleting S3 objects.

AWScloudtrail
TA0040 · ImpactT1490 · Inhibit System Recovery
Sean Johnstone | Unit 42Sat Oct 28cloud
Detectionmediumstable

AWS EC2 Disable EBS Encryption

Identifies disabling of default Amazon Elastic Block Store (EBS) encryption in the current region. Disabling default encryption does not change the encryption status of your existing volumes.

AWScloudtrail
TA0040 · ImpactT1486 · Data Encrypted for ImpactT1565 · Data Manipulation
Sittikorn STue Jun 29cloud
Detectionmediumtest

AWS EFS Fileshare Modified or Deleted

Detects when a EFS Fileshare is modified or deleted. You can't delete a file system that is in use. If the file system has any mount targets, the adversary must first delete them, so deletion of a mount will occur before deletion of a fileshare.

AWScloudtrail
TA0040 · Impact
Austin SongerSun Aug 15cloud
Detectionmediumtest

AWS EFS Fileshare Mount Modified or Deleted

Detects when a EFS Fileshare Mount is modified or deleted. An adversary breaking any file system using the mount target that is being deleted, which might disrupt instances or applications using those mounts.

AWScloudtrail
TA0040 · ImpactT1485 · Data Destruction
Austin SongerSun Aug 15cloud
Detectionlowtest

AWS EKS Cluster Created or Deleted

Identifies when an EKS cluster is created or deleted.

AWScloudtrail
TA0040 · ImpactT1485 · Data Destruction
Austin SongerMon Aug 16cloud
Detectionlowtest

AWS ElastiCache Security Group Modified or Deleted

Identifies when an ElastiCache security group has been modified or deleted.

AWScloudtrail
TA0040 · ImpactT1531 · Account Access Removal
Austin SongerSat Jul 24cloud
Detectionhighexperimental

AWS KMS Imported Key Material Usage

Detects the import or deletion of key material in AWS KMS, which can be used as part of ransomware attacks. This activity is uncommon and provides a high certainty signal.

AWScloudtrail
TA0040 · ImpactT1486 · Data Encrypted for ImpactTA0042 · Resource DevelopmentT1608.003 · Install Digital Certificate
toopriceySat Oct 18cloud
Detectionmediumtest

Azure Application Deleted

Identifies when a application is deleted in Azure.

Azureactivitylogs
TA0005 · Defense EvasionTA0040 · ImpactT1489 · Service Stop
Austin SongerFri Sep 03cloud
Detectionmediumtest

Azure Application Gateway Modified or Deleted

Identifies when a application gateway is modified or deleted.

Azureactivitylogs
TA0040 · Impact
Austin SongerMon Aug 16cloud
Detectionmediumtest

Azure Application Security Group Modified or Deleted

Identifies when a application security group is modified or deleted.

Azureactivitylogs
TA0040 · Impact
Austin SongerMon Aug 16cloud
Detectionlowtest

Azure Container Registry Created or Deleted

Detects when a Container Registry is created or deleted.

Azureactivitylogs
TA0040 · ImpactT1485 · Data DestructionT1496 · Resource HijackingT1489 · Service Stop
Austin SongerSat Aug 07cloud
Detectionmediumtest

Azure Device No Longer Managed or Compliant

Identifies when a device in azure is no longer managed or compliant

Azureactivitylogs
TA0040 · Impact
Austin SongerFri Sep 03cloud
Detectionmediumtest

Azure Device or Configuration Modified or Deleted

Identifies when a device or device configuration in azure is modified or deleted.

Azureactivitylogs
TA0040 · ImpactT1485 · Data DestructionT1565.001 · Stored Data Manipulation
Austin SongerFri Sep 03cloud
Detectionmediumtest

Azure DNS Zone Modified or Deleted

Identifies when DNS zone is modified or deleted.

Azureactivitylogs
TA0040 · ImpactT1565.001 · Stored Data Manipulation
Austin SongerSun Aug 08cloud
Detectionmediumtest

Azure Firewall Modified or Deleted

Identifies when a firewall is created, modified, or deleted.

Azureactivitylogs
TA0040 · ImpactTA0005 · Defense EvasionT1562.004 · Disable or Modify System Firewall
Austin SongerSun Aug 08cloud
Detectionmediumtest

Azure Firewall Rule Collection Modified or Deleted

Identifies when Rule Collections (Application, NAT, and Network) is being modified or deleted.

Azureactivitylogs
TA0040 · ImpactTA0005 · Defense EvasionT1562.004 · Disable or Modify System Firewall
Austin SongerSun Aug 08cloud
Detectionmediumtest

Azure Keyvault Key Modified or Deleted

Identifies when a Keyvault Key is modified or deleted in Azure.

Azureactivitylogs
TA0040 · ImpactTA0006 · Credential AccessT1552 · Unsecured CredentialsT1552.001 · Credentials In Files
Austin SongerMon Aug 16cloud
Detectionmediumtest

Azure Key Vault Modified or Deleted

Identifies when a key vault is modified or deleted.

Azureactivitylogs
TA0040 · ImpactTA0006 · Credential AccessT1552 · Unsecured CredentialsT1552.001 · Credentials In Files
Austin SongerMon Aug 16cloud
Detectionmediumtest

Azure Keyvault Secrets Modified or Deleted

Identifies when secrets are modified or deleted in Azure.

Azureactivitylogs
TA0040 · ImpactTA0006 · Credential AccessT1552 · Unsecured CredentialsT1552.001 · Credentials In Files
Austin SongerMon Aug 16cloud
Detectionlowtest

Azure Kubernetes Cluster Created or Deleted

Detects when a Azure Kubernetes Cluster is created or deleted.

Azureactivitylogs
TA0040 · ImpactT1485 · Data DestructionT1496 · Resource HijackingT1489 · Service Stop
Austin SongerSat Aug 07cloud
Detectionmediumtest

Azure Kubernetes Network Policy Change

Identifies when a Azure Kubernetes network policy is modified or deleted.

Azureactivitylogs
TA0040 · ImpactTA0006 · Credential AccessT1485 · Data DestructionT1496 · Resource Hijacking+1
Austin SongerSat Aug 07cloud
Detectionmediumtest

Azure Kubernetes Pods Deleted

Identifies the deletion of Azure Kubernetes Pods.

Azureactivitylogs
TA0040 · Impact
Austin SongerSat Jul 24cloud
Detectionmediumtest

Azure Kubernetes RoleBinding/ClusterRoleBinding Modified and Deleted

Detects the creation or patching of potential malicious RoleBinding/ClusterRoleBinding.

Azureactivitylogs
TA0040 · ImpactTA0006 · Credential AccessT1485 · Data DestructionT1496 · Resource Hijacking+1
Austin SongerSat Aug 07cloud
Detectionmediumtest

Azure Kubernetes Sensitive Role Access

Identifies when ClusterRoles/Roles are being modified or deleted.

Azureactivitylogs
TA0040 · ImpactT1485 · Data DestructionT1496 · Resource HijackingT1489 · Service Stop
Austin SongerSat Aug 07cloud
Detectionmediumtest

Azure Kubernetes Secret or Config Object Access

Identifies when a Kubernetes account access a sensitive objects such as configmaps or secrets.

Azureactivitylogs
TA0040 · ImpactT1485 · Data DestructionT1496 · Resource HijackingT1489 · Service Stop
Austin SongerSat Aug 07cloud
Detectionmediumtest

Azure Kubernetes Service Account Modified or Deleted

Identifies when a service account is modified or deleted.

Azureactivitylogs
TA0040 · ImpactT1531 · Account Access RemovalT1485 · Data DestructionT1496 · Resource Hijacking+1
Austin SongerSat Aug 07cloud
Detectionmediumtest

Azure Network Firewall Policy Modified or Deleted

Identifies when a Firewall Policy is Modified or Deleted.

Azureactivitylogs
TA0040 · ImpactTA0005 · Defense EvasionT1562.007 · Disable or Modify Cloud Firewall
Austin SongerThu Sep 02cloud
Detectionmediumtest

Azure Firewall Rule Configuration Modified or Deleted

Identifies when a Firewall Rule Configuration is Modified or Deleted.

Azureactivitylogs
TA0040 · Impact
Austin SongerSun Aug 08cloud
Detectionmediumtest

Azure Point-to-site VPN Modified or Deleted

Identifies when a Point-to-site VPN is Modified or Deleted.

Azureactivitylogs
TA0040 · Impact
Austin SongerSun Aug 08cloud
Detectionmediumtest

Azure Network Security Configuration Modified or Deleted

Identifies when a network security configuration is modified or deleted.

Azureactivitylogs
TA0040 · Impact
Austin SongerSun Aug 08cloud
Detectionmediumtest

Azure Virtual Network Device Modified or Deleted

Identifies when a virtual network device is being modified or deleted. This can be a network interface, network virtual appliance, virtual hub, or virtual router.

Azureactivitylogs
TA0040 · Impact
Austin SongerSun Aug 08cloud
Detectionmediumtest

Azure Suppression Rule Created

Identifies when a suppression rule is created in Azure. Adversary's could attempt this to evade detection.

Azureactivitylogs
TA0040 · Impact
Austin SongerMon Aug 16cloud
Detectionmediumtest

Azure Virtual Network Modified or Deleted

Identifies when a Virtual Network is modified or deleted in Azure.

Azureactivitylogs
TA0040 · Impact
Austin SongerSun Aug 08cloud
Detectionmediumtest

Azure VPN Connection Modified or Deleted

Identifies when a VPN connection is modified or deleted.

Azureactivitylogs
TA0040 · Impact
Austin SongerSun Aug 08cloud
Detectionmediumtest

Google Cloud Storage Buckets Modified or Deleted

Detects when storage bucket is modified or deleted in Google Cloud.

Google Cloudgcp.audit
TA0040 · Impact
Austin SongerSat Aug 14cloud
Detectionmediumtest

Google Cloud Re-identifies Sensitive Information

Identifies when sensitive information is re-identified in google Cloud.

Google Cloudgcp.audit
TA0040 · ImpactT1565 · Data Manipulation
Austin SongerSun Aug 15cloud
Detectionmediumtest

Google Cloud DNS Zone Modified or Deleted

Identifies when a DNS Zone is modified or deleted in Google Cloud.

Google Cloudgcp.audit
TA0040 · Impact
Austin SongerSun Aug 15cloud
Detectionmediumtest

Google Cloud Service Account Disabled or Deleted

Identifies when a service account is disabled or deleted in Google Cloud.

Google Cloudgcp.audit
TA0040 · ImpactT1531 · Account Access Removal
Austin SongerSat Aug 14cloud
Detectionmediumtest

Google Cloud Service Account Modified

Identifies when a service account is modified in Google Cloud.

Google Cloudgcp.audit
TA0040 · Impact
Austin SongerSat Aug 14cloud
Detectionmediumtest

Google Cloud SQL Database Modified or Deleted

Detect when a Cloud SQL DB has been modified or deleted.

Google Cloudgcp.audit
TA0040 · Impact
Austin SongerFri Oct 15cloud