Rule Library

Sigma Rules

801 rules found for "privilege-escalation"

3,707Total
3,116Detection
451Emerging
137Hunting
Detectionmediumtest

Bitbucket Global Permission Changed

Detects global permissions change activity.

bitbucketaudit
TA0003 · PersistenceTA0004 · Privilege EscalationT1098 · Account Manipulation
Muhammad FaisalSun Feb 25application
Detectionmediumtest

Bitbucket User Login Failure

Detects user authentication failure events. Please note that this rule can be noisy and it is recommended to use with correlation based on "author.name" field.

bitbucketaudit
TA0004 · Privilege EscalationTA0003 · PersistenceTA0001 · Initial AccessTA0005 · Defense Evasion+3
Muhammad FaisalSun Feb 25application
Detectionlowtest

Github New Secret Created

Detects when a user creates action secret for the organization, environment, codespaces or repository.

githubaudit
TA0005 · Defense EvasionTA0003 · PersistenceTA0004 · Privilege EscalationTA0001 · Initial Access+1
Muhammad FaisalFri Jan 20application
Detectionmediumtest

Github Outside Collaborator Detected

Detects when an organization member or an outside collaborator is added to or removed from a project board or has their permission level changed or when an owner removes an outside collaborator from an organization or when two-factor authentication is required in an organization and an outside collaborator does not use 2FA or disables 2FA.

githubaudit
TA0004 · Privilege EscalationTA0003 · PersistenceTA0009 · CollectionT1098.001 · Additional Cloud Credentials+2
Muhammad FaisalFri Jan 20application
Detectionlowtest

Github Self Hosted Runner Changes Detected

A self-hosted runner is a system that you deploy and manage to execute jobs from GitHub Actions on GitHub.com. This rule detects changes to self-hosted runners configurations in the environment. The self-hosted runner configuration changes once detected, it should be validated from GitHub UI because the log entry may not provide full context.

githubaudit
TA0040 · ImpactTA0007 · DiscoveryTA0009 · CollectionTA0005 · Defense Evasion+6
Muhammad FaisalFri Jan 27application
Detectionmediumtest

Github SSH Certificate Configuration Changed

Detects when changes are made to the SSH certificate configuration of the organization.

githubaudit
TA0001 · Initial AccessTA0005 · Defense EvasionTA0003 · PersistenceTA0004 · Privilege Escalation+1
Romain GaillardMon Jul 29application
Detectionmediumtest

Kubernetes Admission Controller Modification

Detects when a modification (create, update or replace) action is taken that affects mutating or validating webhook configurations, as they can be used by an adversary to achieve persistence or exfiltrate access credentials.

Kubernetesaudit
TA0004 · Privilege EscalationTA0001 · Initial AccessTA0005 · Defense EvasionTA0003 · Persistence+4
kelnageThu Jul 11application
Detectionmediumtest

Kubernetes CronJob/Job Modification

Detects when a Kubernetes CronJob or Job is created or modified. A Kubernetes Job creates one or more pods to accomplish a specific task, and a CronJob creates Jobs on a recurring schedule. An adversary can take advantage of this Kubernetes object to schedule Jobs to run containers that execute malicious code within a cluster, allowing them to achieve persistence.

Kubernetesaudit
TA0003 · PersistenceTA0004 · Privilege EscalationTA0002 · Execution
kelnageThu Jul 11application
Detectionlowtest

Container With A hostPath Mount Created

Detects creation of a container with a hostPath mount. A hostPath volume mounts a directory or a file from the node to the container. Attackers who have permissions to create a new pod in the cluster may create one with a writable hostPath volume and chroot to escape to the underlying node.

Kubernetesapplicationaudit
T1611 · Escape to HostTA0004 · Privilege Escalation
Leo TsaousisTue Mar 26application
Detectionlowtest

Privileged Container Deployed

Detects the creation of a "privileged" container, an action which could be indicative of a threat actor mounting a container breakout attacks. A privileged container is a container that can access the host with all of the root capabilities of the host machine. This allows it to view, interact and modify processes, network operations, IPC calls, the file system, mount points, SELinux configurations etc. as the root user on the host. Various versions of "privileged" containers can be specified, e.g. by setting the securityContext.privileged flag in the resource specification, setting non-standard Linux capabilities, or configuring the hostNetwork/hostPID fields

Kubernetesapplicationaudit
T1611 · Escape to HostTA0004 · Privilege Escalation
Leo TsaousisTue Mar 26application
Detectionmediumtest

Kubernetes Rolebinding Modification

Detects when a Kubernetes Rolebinding is created or modified.

Kubernetesaudit
TA0004 · Privilege Escalation
kelnageThu Jul 11application
Detectionlowtest

Kubernetes Unauthorized or Unauthenticated Access

Detects when a request to the Kubernetes API is rejected due to lack of authorization or due to an expired authentication token being used. This may indicate an attacker attempting to leverage credentials they have obtained.

Kubernetesaudit
TA0004 · Privilege Escalation
kelnageFri Apr 12application
Detectionhightest

OpenCanary - SSH Login Attempt

Detects instances where an SSH service on an OpenCanary node has had a login attempt.

opencanaryapplication
TA0004 · Privilege EscalationTA0005 · Defense EvasionTA0001 · Initial AccessTA0008 · Lateral Movement+4
Security Onion SolutionsFri Mar 08application
Detectionhightest

OpenCanary - SSH New Connection Attempt

Detects instances where an SSH service on an OpenCanary node has had a connection attempt.

opencanaryapplication
TA0004 · Privilege EscalationTA0005 · Defense EvasionTA0001 · Initial AccessTA0008 · Lateral Movement+4
Security Onion SolutionsFri Mar 08application
Detectionhightest

OpenCanary - Telnet Login Attempt

Detects instances where a Telnet service on an OpenCanary node has had a login attempt.

opencanaryapplication
TA0004 · Privilege EscalationTA0003 · PersistenceTA0005 · Defense EvasionTA0001 · Initial Access+3
Security Onion SolutionsFri Mar 08application
Detectionhightest

Remote Schedule Task Lateral Movement via ATSvc

Detects remote RPC calls to create or execute a scheduled task via ATSvc

rpc_firewallapplication
TA0004 · Privilege EscalationTA0008 · Lateral MovementTA0002 · ExecutionTA0003 · Persistence+2
Sagie Dulce+1Sat Jan 01application
Detectionhightest

Remote Schedule Task Lateral Movement via ITaskSchedulerService

Detects remote RPC calls to create or execute a scheduled task

rpc_firewallapplication
TA0004 · Privilege EscalationTA0003 · PersistenceTA0002 · ExecutionTA0008 · Lateral Movement+2
Sagie Dulce+1Sat Jan 01application
Detectionhightest

Remote Schedule Task Lateral Movement via SASec

Detects remote RPC calls to create or execute a scheduled task via SASec

rpc_firewallapplication
TA0004 · Privilege EscalationTA0008 · Lateral MovementTA0002 · ExecutionTA0003 · Persistence+2
Sagie Dulce+1Sat Jan 01application
Detectionmediumtest

Suspicious SQL Query

Detects suspicious SQL query keywrods that are often used during recon, exfiltration or destructive activities. Such as dropping tables and selecting wildcard fields

database
TA0010 · ExfiltrationTA0001 · Initial AccessTA0004 · Privilege EscalationTA0003 · Persistence+2
@juju4Tue Dec 27category
Detectionmediumexperimental

AWS Successful Console Login Without MFA

Detects successful AWS console logins that were performed without Multi-Factor Authentication (MFA). This alert can be used to identify potential unauthorized access attempts, as logging in without MFA can indicate compromised credentials or misconfigured security settings.

AWScloudtrail
TA0001 · Initial AccessTA0005 · Defense EvasionTA0003 · PersistenceTA0004 · Privilege Escalation+1
Thuya+1Sat Oct 18cloud
Detectionhightest

Malicious Usage Of IMDS Credentials Outside Of AWS Infrastructure

Detects when an instance identity has taken an action that isn't inside SSM. This can indicate that a compromised EC2 instance is being used as a pivot point.

AWScloudtrail
TA0004 · Privilege EscalationTA0005 · Defense EvasionTA0001 · Initial AccessTA0003 · Persistence+2
jamesc-grafanaThu Jul 11cloud
Detectionhightest

Potential Malicious Usage of CloudTrail System Manager

Detect when System Manager successfully executes commands against an instance.

AWScloudtrail
TA0004 · Privilege EscalationTA0001 · Initial AccessT1566 · PhishingT1566.002 · Spearphishing Link
jamesc-grafanaThu Jul 11cloud
Detectionmediumexperimental

AWS SAML Provider Deletion Activity

Detects the deletion of an AWS SAML provider, potentially indicating malicious intent to disrupt administrative or security team access. An attacker can remove the SAML provider for the information security team or a team of system administrators, to make it difficult for them to work and investigate at the time of the attack and after it.

AWScloudtrail
T1078.004 · Cloud AccountsTA0004 · Privilege EscalationTA0005 · Defense EvasionTA0001 · Initial Access+3
Ivan SaakovThu Dec 19cloud
Detectionmediumexperimental

AWS Key Pair Import Activity

Detects the import of SSH key pairs into AWS EC2, which may indicate an attacker attempting to gain unauthorized access to instances. This activity could lead to initial access, persistence, or privilege escalation, potentially compromising sensitive data and operations.

AWScloudtrail
TA0001 · Initial AccessTA0005 · Defense EvasionT1078 · Valid AccountsTA0003 · Persistence+1
Ivan SaakovThu Dec 19cloud
Detectionmediumtest

AWS IAM Backdoor Users Keys

Detects AWS API key creation for a user by another user. Backdoored users can be used to obtain persistence in the AWS environment. Also with this alert, you can detect a flow of AWS keys in your org.

AWScloudtrail
TA0003 · PersistenceTA0004 · Privilege EscalationT1098 · Account Manipulation
falokerWed Feb 12cloud
Detectionhightest

AWS IAM S3Browser LoginProfile Creation

Detects S3 Browser utility performing reconnaissance looking for existing IAM Users without a LoginProfile defined then (when found) creating a LoginProfile.

AWScloudtrail
TA0002 · ExecutionTA0003 · PersistenceTA0005 · Defense EvasionTA0001 · Initial Access+3
daniel.bohannonWed May 17cloud
Detectionhightest

AWS IAM S3Browser Templated S3 Bucket Policy Creation

Detects S3 browser utility creating Inline IAM policy containing default S3 bucket name placeholder value of "<YOUR-BUCKET-NAME>".

AWScloudtrail
TA0002 · ExecutionT1059.009 · Cloud APITA0003 · PersistenceTA0005 · Defense Evasion+3
daniel.bohannonWed May 17cloud
Detectionhightest

AWS IAM S3Browser User or AccessKey Creation

Detects S3 Browser utility creating IAM User or AccessKey.

AWScloudtrail
TA0004 · Privilege EscalationTA0002 · ExecutionTA0003 · PersistenceTA0005 · Defense Evasion+3
daniel.bohannonWed May 17cloud
Detectionmediumexperimental

New AWS Lambda Function URL Configuration Created

Detects when a user creates a Lambda function URL configuration, which could be used to expose the function to the internet and potentially allow unauthorized access to the function's IAM role for AWS API calls. This could give an adversary access to the privileges associated with the Lambda service role that is attached to that function.

AWScloudtrail
TA0001 · Initial AccessTA0004 · Privilege Escalation
Ivan SaakovThu Dec 19cloud
Detectionlowtest

AWS New Lambda Layer Attached

Detects when a user attached a Lambda layer to an existing Lambda function. A malicious Lambda layer could execute arbitrary code in the context of the function's IAM role. This would give an adversary access to resources that the function has access to.

AWScloudtrail
TA0004 · Privilege Escalation
Austin SongerThu Sep 23cloud
Detectionlowtest

AWS Glue Development Endpoint Activity

Detects possible suspicious glue development endpoint activity.

AWScloudtrail
TA0004 · Privilege Escalation
Austin SongerSun Oct 03cloud
Detectionhighexperimental

Modification or Deletion of an AWS RDS Cluster

Detects modifications to an RDS cluster or its deletion, which may indicate potential data exfiltration attempts, unauthorized access, or exposure of sensitive information.

AWScloudtrail
TA0010 · ExfiltrationT1020 · Automated Exfiltration
Ivan SaakovFri Dec 06cloud
Detectionmediumtest

AWS Root Credentials

Detects AWS root account usage

AWScloudtrail
TA0004 · Privilege EscalationTA0005 · Defense EvasionTA0001 · Initial AccessTA0003 · Persistence+1
vitaliy0x1Tue Jan 21cloud
Detectionlowtest

AWS Route 53 Domain Transfer Lock Disabled

Detects when a transfer lock was removed from a Route 53 domain. It is recommended to refrain from performing this action unless intending to transfer the domain to a different registrar.

AWScloudtrail
TA0003 · PersistenceTA0004 · Privilege EscalationTA0006 · Credential AccessT1098 · Account Manipulation
Elastic Security+1Thu Jul 22cloud
Detectionlowtest

AWS Route 53 Domain Transferred to Another Account

Detects when a request has been made to transfer a Route 53 domain to another AWS account.

AWScloudtrail
TA0003 · PersistenceTA0006 · Credential AccessTA0004 · Privilege EscalationT1098 · Account Manipulation
Elastic Security+1Thu Jul 22cloud
Detectionlowtest

AWS STS AssumeRole Misuse

Identifies the suspicious use of AssumeRole. Attackers could move laterally and escalate privileges.

AWScloudtrail
TA0008 · Lateral MovementTA0004 · Privilege EscalationTA0005 · Defense EvasionT1548 · Abuse Elevation Control Mechanism+2
Austin SongerSat Jul 24cloud
Detectionlowtest

AWS STS GetSessionToken Misuse

Identifies the suspicious use of GetSessionToken. Tokens could be created and used by attackers to move laterally and escalate privileges.

AWScloudtrail
TA0008 · Lateral MovementTA0004 · Privilege EscalationTA0005 · Defense EvasionT1548 · Abuse Elevation Control Mechanism+2
Austin SongerSat Jul 24cloud
Detectionmediumtest

AWS Suspicious SAML Activity

Identifies when suspicious SAML activity has occurred in AWS. An adversary could gain backdoor access via SAML.

AWScloudtrail
TA0005 · Defense EvasionTA0001 · Initial AccessTA0008 · Lateral MovementTA0003 · Persistence+5
Austin SongerWed Sep 22cloud
Detectionhightest

AWS User Login Profile Was Modified

Detects activity when someone is changing passwords on behalf of other users. An attacker with the "iam:UpdateLoginProfile" permission on other users can change the password used to login to the AWS console on any user that already has a login profile setup.

AWScloudtrail
TA0003 · PersistenceTA0004 · Privilege EscalationT1098 · Account Manipulation
toffeebr33kMon Aug 09cloud
Detectionmediumtest

User Added to an Administrator's Azure AD Role

User Added to an Administrator's Azure AD Role

Azureactivitylogs
TA0001 · Initial AccessTA0005 · Defense EvasionTA0003 · PersistenceTA0004 · Privilege Escalation+2
Raphaël CALVETMon Oct 04cloud
Detectionmediumtest

Number Of Resource Creation Or Deployment Activities

Number of VM creations or deployment activities occur in Azure via the azureactivity log.

Azureactivitylogs
TA0004 · Privilege EscalationTA0003 · PersistenceT1098 · Account Manipulation
sawwinnnaungThu May 07cloud
Detectionmediumtest

Granting Of Permissions To An Account

Identifies IPs from which users grant access to other users on azure resources and alerts when a previously unseen source IP address is used.

Azureactivitylogs
TA0004 · Privilege EscalationTA0003 · PersistenceT1098.003 · Additional Cloud Roles
sawwinnnaungThu May 07cloud
Detectionmediumtest

Azure Kubernetes Admission Controller

Identifies when an admission controller is executed in Azure Kubernetes. A Kubernetes Admission controller intercepts, and possibly modifies, requests to the Kubernetes API server. The behavior of this admission controller is determined by an admission webhook (MutatingAdmissionWebhook or ValidatingAdmissionWebhook) that the user deploys in the cluster. An adversary can use such webhooks as the MutatingAdmissionWebhook for obtaining persistence in the cluster. For example, attackers can intercept and modify the pod creation operations in the cluster and add their malicious container to every created pod. An adversary can use the webhook ValidatingAdmissionWebhook, which could be used to obtain access credentials. An adversary could use the webhook to intercept the requests to the API server, record secrets, and other sensitive information.

Azureactivitylogs
TA0004 · Privilege EscalationTA0001 · Initial AccessTA0005 · Defense EvasionTA0003 · Persistence+4
Austin SongerThu Nov 25cloud
Detectionmediumtest

Azure Kubernetes CronJob

Identifies when a Azure Kubernetes CronJob runs in Azure Cloud. Kubernetes Job is a controller that creates one or more pods and ensures that a specified number of them successfully terminate. Kubernetes Job can be used to run containers that perform finite tasks for batch jobs. Kubernetes CronJob is used to schedule Jobs. An Adversary may use Kubernetes CronJob for scheduling execution of malicious code that would run as a container in the cluster.

Azureactivitylogs
TA0003 · PersistenceT1053.003 · CronTA0004 · Privilege EscalationTA0002 · Execution
Austin SongerMon Nov 22cloud
Detectionhightest

Azure Subscription Permission Elevation Via ActivityLogs

Detects when a user has been elevated to manage all Azure Subscriptions. This change should be investigated immediately if it isn't planned. This setting could allow an attacker access to Azure subscriptions in your environment.

Azureactivitylogs
TA0004 · Privilege EscalationTA0003 · PersistenceTA0005 · Defense EvasionTA0001 · Initial Access+1
Austin SongerFri Nov 26cloud
Detectionmediumtest

CA Policy Removed by Non Approved Actor

Monitor and alert on conditional access changes where non approved actor removed CA Policy.

Azureauditlogs
TA0004 · Privilege EscalationTA0006 · Credential AccessTA0005 · Defense EvasionTA0003 · Persistence+2
Corissa KoopmansTue Jul 19cloud
Detectionmediumtest

CA Policy Updated by Non Approved Actor

Monitor and alert on conditional access changes. Is Initiated by (actor) approved to make changes? Review Modified Properties and compare "old" vs "new" value.

Azureauditlogs
TA0004 · Privilege EscalationTA0006 · Credential AccessTA0005 · Defense EvasionTA0003 · Persistence+2
Corissa KoopmansTue Jul 19cloud
Detectionmediumtest

New CA Policy by Non-approved Actor

Monitor and alert on conditional access changes.

Azureauditlogs
TA0004 · Privilege EscalationTA0005 · Defense EvasionT1548 · Abuse Elevation Control Mechanism
Corissa KoopmansMon Jul 18cloud