heroui logo

Windows Credentials from Password Stores Chrome Extension Access

Splunk Security Content

View Source
Summary
This rule detects instances where non-Chrome processes attempt to access Chrome extension files, specifically targeting events recorded in Windows Security logs (Event Code 4663). The presence of unauthorized processes accessing these files indicates a potential security risk as adversaries might leverage this access to extract sensitive data, including stored credentials from the Chrome browser. The specific file path monitored includes the Chrome user data and extension settings which, if accessed by malicious processes, could lead to significant security breaches. The detection leverages Splunk's query language to filter and count such access attempts, enabling detection of anomalous behavior indicative of credential theft or similar exploits.
Categories
  • Endpoint
Data Sources
  • Windows Registry
ATT&CK Techniques
  • T1012
Created: 2024-12-10