
Summary
This detection rule is designed to identify potential lateral movement or post-compromise activities that may occur when a compromised host uses its credentials to access other systems or resources within the network or even cloud services. It does so by correlating alerts from different sources where the source IP of one alert matches the host IP of another alert. The rule leverages Elastic's data querying language (ESQL) to filter, evaluate, and analyze relevant alerts over a specified timeframe (last 30 minutes). The correlation indicates that a host may be leveraging previously gained access to authenticate against additional targets, thus raising the possibility of a security breach. Given its high-risk score of 73, any detection triggered by this rule should prompt immediate investigation, as the behavior exhibited can lead to broader network compromises. The investigation guide advises on following specific steps including examining alert timelines, conducting correlation analysis against logs, verifying potential indicators of compromise, and assessing impacts across the network. Remediation strategies require prompt action to isolate the affected host and eliminate any identified vulnerabilities and threats to prevent further exploitation.
Categories
- Network
- Endpoint
- Cloud
- Linux
- Windows
Data Sources
- User Account
- Network Traffic
- Process
- Logon Session
Created: 2025-12-31