
Summary
The MCP Postgres Suspicious Query rule is designed to flag potentially malicious SQL queries executed on MCP PostgreSQL servers. The rule focuses on detecting certain patterns indicative of attacks such as privilege escalation, credential theft, and schema reconnaissance—common tactics seen in SQL injection attacks and compromised credential scenarios. The detection logic utilizes specific SQL keywords to assess the nature of the executed queries. The rule is implemented through a Splunk query that identifies suspicious activity by evaluating the content of the SQL parameter values against known malicious patterns. By applying these evaluations, the rule categorizes the attack into one of several types and employs statistics to provide insight into the volume and nature of suspicious queries over time. The implementation requires the MCP Technology Add-on for proper logging and field extraction, and it's essential to set appropriate alerting thresholds based on organizational context. Although the rule is robust, certain legitimate administrative activities can be flagged as false positives, necessitating careful monitoring and tuning.
Categories
- Database
- Web
Data Sources
- Malware Repository
- Network Traffic
- Application Log
ATT&CK Techniques
- T1555
Created: 2026-02-05