Skip to content

Commit 46b2cab

Browse files
Update latest docs
1 parent e65a934 commit 46b2cab

32 files changed

Lines changed: 2872 additions & 84 deletions

File tree

docs/detections/prebuilt-rules/downloadable-packages/8-19-19/prebuilt-rule-8-19-19-connection-to-commonly-abused-web-services.asciidoc

Lines changed: 351 additions & 0 deletions
Large diffs are not rendered by default.
Lines changed: 94 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,94 @@
1+
[[prebuilt-rule-8-19-19-data-encrypted-via-openssl-utility]]
2+
=== Data Encrypted via OpenSSL Utility
3+
4+
Identifies the execution of the OpenSSL utility to encrypt data. Adversaries may use OpenSSL to encrypt data to disrupt the availability of their target's data and may attempt to hold the organization's data to ransom for the purposes of extortion.
5+
6+
*Rule type*: eql
7+
8+
*Rule indices*:
9+
10+
* endgame-*
11+
* logs-crowdstrike.fdr*
12+
* logs-endpoint.events.process-*
13+
* logs-sentinel_one_cloud_funnel.*
14+
* auditbeat-*
15+
* logs-auditd_manager.auditd-*
16+
* logs-system.security*
17+
* logs-windows.forwarded*
18+
* logs-windows.sysmon_operational-*
19+
* winlogbeat-*
20+
21+
*Severity*: low
22+
23+
*Risk score*: 21
24+
25+
*Runs every*: 5m
26+
27+
*Searches indices from*: now-9m ({ref}/common-options.html#date-math[Date Math format], see also <<rule-schedule, `Additional look-back time`>>)
28+
29+
*Maximum alerts per execution*: 100
30+
31+
*References*: None
32+
33+
*Tags*:
34+
35+
* Domain: Endpoint
36+
* OS: Linux
37+
* OS: Windows
38+
* OS: macOS
39+
* Use Case: Threat Detection
40+
* Tactic: Defense Evasion
41+
* Tactic: Collection
42+
* Data Source: Elastic Defend
43+
* Data Source: Elastic Endgame
44+
* Data Source: Crowdstrike
45+
* Data Source: SentinelOne
46+
* Data Source: Auditd Manager
47+
* Data Source: Windows Security Event Logs
48+
* Data Source: Sysmon
49+
50+
*Version*: 1
51+
52+
*Rule authors*:
53+
54+
* Elastic
55+
56+
*Rule license*: Elastic License v2
57+
58+
59+
==== Rule query
60+
61+
62+
[source, js]
63+
----------------------------------
64+
process where event.type == "start" and event.action in ("start", "exec", "executed", "exec_event", "ProcessRollup2") and
65+
process.name : "openssl*" and process.args : "enc" and process.args : "-in" and process.args : "-out"
66+
67+
----------------------------------
68+
69+
*Framework*: MITRE ATT&CK^TM^
70+
71+
* Tactic:
72+
** Name: Defense Evasion
73+
** ID: TA0005
74+
** Reference URL: https://attack.mitre.org/tactics/TA0005/
75+
* Technique:
76+
** Name: Obfuscated Files or Information
77+
** ID: T1027
78+
** Reference URL: https://attack.mitre.org/techniques/T1027/
79+
* Sub-technique:
80+
** Name: Encrypted/Encoded File
81+
** ID: T1027.013
82+
** Reference URL: https://attack.mitre.org/techniques/T1027/013/
83+
* Tactic:
84+
** Name: Collection
85+
** ID: TA0009
86+
** Reference URL: https://attack.mitre.org/tactics/TA0009/
87+
* Technique:
88+
** Name: Data Staged
89+
** ID: T1074
90+
** Reference URL: https://attack.mitre.org/techniques/T1074/
91+
* Sub-technique:
92+
** Name: Local Data Staging
93+
** ID: T1074.001
94+
** Reference URL: https://attack.mitre.org/techniques/T1074/001/
Lines changed: 64 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,64 @@
1+
[[prebuilt-rule-8-19-19-kubernetes-secret-access-via-unusual-user-agent]]
2+
=== Kubernetes Secret Access via Unusual User Agent
3+
4+
This rule detects when secrets are accessed via an unusual user agent, user name and source IP. Attackers may attempt to access secrets in a Kubernetes cluster to gain access to sensitive information after gaining access to the cluster.
5+
6+
*Rule type*: new_terms
7+
8+
*Rule indices*:
9+
10+
* logs-kubernetes.audit_logs-*
11+
12+
*Severity*: low
13+
14+
*Risk score*: 21
15+
16+
*Runs every*: 5m
17+
18+
*Searches indices from*: None ({ref}/common-options.html#date-math[Date Math format], see also <<rule-schedule, `Additional look-back time`>>)
19+
20+
*Maximum alerts per execution*: 100
21+
22+
*References*: None
23+
24+
*Tags*:
25+
26+
* Data Source: Kubernetes
27+
* Domain: Kubernetes
28+
* Domain: Cloud
29+
* Use Case: Threat Detection
30+
* Tactic: Credential Access
31+
32+
*Version*: 1
33+
34+
*Rule authors*:
35+
36+
* Elastic
37+
38+
*Rule license*: Elastic License v2
39+
40+
41+
==== Rule query
42+
43+
44+
[source, js]
45+
----------------------------------
46+
event.dataset:"kubernetes.audit_logs" and kubernetes.audit.objectRef.resource:"secrets" and
47+
kubernetes.audit.verb:("get" or "list") and user_agent.original:(* and not (*kubernetes/$Format))
48+
49+
----------------------------------
50+
51+
*Framework*: MITRE ATT&CK^TM^
52+
53+
* Tactic:
54+
** Name: Credential Access
55+
** ID: TA0006
56+
** Reference URL: https://attack.mitre.org/tactics/TA0006/
57+
* Technique:
58+
** Name: Unsecured Credentials
59+
** ID: T1552
60+
** Reference URL: https://attack.mitre.org/techniques/T1552/
61+
* Sub-technique:
62+
** Name: Container API
63+
** ID: T1552.007
64+
** Reference URL: https://attack.mitre.org/techniques/T1552/007/
Lines changed: 139 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,139 @@
1+
[[prebuilt-rule-8-19-19-m365-azure-monitor-alert-email-with-financial-or-billing-theme]]
2+
=== M365 Azure Monitor Alert Email with Financial or Billing Theme
3+
4+
Detects Azure Monitor alert notification emails with financial or billing themed subject lines delivered to organization users. Adversaries abuse Azure Monitor alert rules to deliver callback phishing emails from Microsoft's legitimate azure-noreply@microsoft.com address. Because the emails originate from Microsoft's own infrastructure, they pass SPF, DKIM, and DMARC checks, bypassing email security filters and increasing victim trust. The attacker embeds a fraudulent billing or security lure in the alert rule description, which is rendered in the notification email body. Observed subject patterns include invoice numbers, payment references, and order confirmations.
5+
6+
*Rule type*: esql
7+
8+
*Rule indices*: None
9+
10+
*Severity*: low
11+
12+
*Risk score*: 21
13+
14+
*Runs every*: 5m
15+
16+
*Searches indices from*: now-9m ({ref}/common-options.html#date-math[Date Math format], see also <<rule-schedule, `Additional look-back time`>>)
17+
18+
*Maximum alerts per execution*: 100
19+
20+
*References*:
21+
22+
* https://www.bleepingcomputer.com/news/security/microsoft-azure-monitor-alerts-abused-in-callback-phishing-campaigns/
23+
24+
*Tags*:
25+
26+
* Domain: Cloud
27+
* Domain: Email
28+
* Data Source: Microsoft 365
29+
* Data Source: Microsoft Exchange Online Message Trace
30+
* Use Case: Threat Detection
31+
* Tactic: Initial Access
32+
* Resources: Investigation Guide
33+
34+
*Version*: 1
35+
36+
*Rule authors*:
37+
38+
* Elastic
39+
40+
*Rule license*: Elastic License v2
41+
42+
43+
==== Investigation guide
44+
45+
46+
47+
*Triage and analysis*
48+
49+
50+
51+
*Investigating M365 Azure Monitor Alert Email with Financial or Billing Theme*
52+
53+
54+
Azure Monitor alert rules can be abused by adversaries to deliver callback phishing emails from Microsoft's legitimate `azure-noreply@microsoft.com` address. The attacker creates a metric or activity log alert in their own Azure tenant with a phishing lure embedded in the description field, then adds victim email addresses to an action group. When the alert fires, Microsoft sends the notification email — complete with the embedded lure — directly to the victims.
55+
56+
57+
*Possible investigation steps*
58+
59+
60+
- Review the `email.subject` field to determine if the alert name matches known phishing patterns (e.g., `INV-`, `Payment Reference`, `order-`, `Funds Received`).
61+
- Check the `email.to.address` field to identify which users received the email and whether they are high-value targets.
62+
- Search for additional emails from `azure-noreply@microsoft.com` to the same recipient within a short time window. The attack typically sends both a "Fired" and "Resolved" notification, doubling phishing impressions.
63+
- Look for an earlier "You're now in the X action group" notification email, which arrives before the phishing alert — this confirms the user was added to an external Azure Monitor action group.
64+
- Check email message headers for the originating Azure subscription and resource group, which are embedded in the alert details.
65+
- Contact the recipient to determine if they interacted with the email or called the phone number in the lure.
66+
- If the victim called the number, initiate incident response for potential credential theft, payment fraud, or remote access tool installation.
67+
68+
69+
*False positive analysis*
70+
71+
72+
- Legitimate Azure Monitor alerts with financial naming (e.g., a cost alert named "Invoice threshold exceeded") may match. Verify the alert originates from a known internal Azure subscription by examining the email body or message headers.
73+
- Internal teams that name alert rules with billing-related terms for cost management should be documented as exceptions.
74+
75+
76+
*Response and remediation*
77+
78+
79+
- If the email is confirmed as phishing, block the sender pattern and alert name in your email security gateway.
80+
- Quarantine or delete the phishing emails from affected mailboxes.
81+
- If the victim called the phone number, treat as a compromised account: reset credentials, revoke sessions, and audit for unauthorized access.
82+
- Report the Azure subscription ID from the email headers to Microsoft abuse team for takedown.
83+
- Consider implementing a mail flow rule to flag or quarantine Azure Monitor notification emails that contain phone numbers or financial language in the body.
84+
85+
86+
==== Rule query
87+
88+
89+
[source, js]
90+
----------------------------------
91+
from logs-microsoft_exchange_online_message_trace.* metadata _id, _version, _index
92+
93+
// Filter for Azure Monitor notification emails with financial/billing themed subjects
94+
| where event.dataset == "microsoft_exchange_online_message_trace.log"
95+
and email.from.address == "azure-noreply@microsoft.com"
96+
and event.outcome in ("success", "unknown")
97+
and email.subject like "*Azure Monitor alert*"
98+
and (
99+
email.subject like "*INV-*"
100+
or email.subject like "*invoice*"
101+
or email.subject like "*payment*"
102+
or email.subject like "*order-*"
103+
or email.subject like "*purchase*"
104+
or email.subject like "*funds*"
105+
or email.subject like "*receipt*"
106+
or email.subject like "*billing*"
107+
or email.subject like "*transaction*"
108+
or email.subject like "*refund*"
109+
or email.subject like "*charge*"
110+
or email.subject like "*subscription*"
111+
or email.subject like "*renewal*"
112+
or email.subject like "*overdue*"
113+
or email.subject like "*past due*"
114+
or email.subject like "*amount due*"
115+
or email.subject like "*wire transfer*"
116+
or email.subject like "*bank account*"
117+
or email.subject like "*credit card*"
118+
or email.subject like "*financial*"
119+
or email.subject like "*remittance*"
120+
)
121+
122+
| keep *
123+
124+
----------------------------------
125+
126+
*Framework*: MITRE ATT&CK^TM^
127+
128+
* Tactic:
129+
** Name: Initial Access
130+
** ID: TA0001
131+
** Reference URL: https://attack.mitre.org/tactics/TA0001/
132+
* Technique:
133+
** Name: Phishing
134+
** ID: T1566
135+
** Reference URL: https://attack.mitre.org/techniques/T1566/
136+
* Sub-technique:
137+
** Name: Spearphishing via Service
138+
** ID: T1566.003
139+
** Reference URL: https://attack.mitre.org/techniques/T1566/003/

0 commit comments

Comments
 (0)