
Summary
This detection rule identifies the usage of the NPPSpy hacktool, which is known for storing cleartext passwords of users in a local file. The primary concern with NPPSpy is that it can extract sensitive credentials, thereby providing attackers with direct access to user accounts without any additional authentication mechanisms. The detection is focused on monitoring file events within the Windows environment specifically targeting file names associated with NPPSpy, such as 'NPPSpy.txt' and 'NPPSpy.dll'. If any file event indicates the modification or creation of these specific files, it triggers an alert, marking a potentially malicious action. The detection rule provides insight into potential credential access incidents and helps organizations respond promptly to threats.
Categories
- Windows
- Endpoint
- Application
Data Sources
- File
ATT&CK Techniques
- T1003
Created: 2021-11-29