
Summary
This detection rule targets credential access on Linux and macOS endpoints by monitoring attempts to enumerate or access stored credentials in web browsers. Web browsers often save user credentials (usernames and passwords) in encrypted formats but can be vulnerable to extraction methods that reveal plaintext information. The rule is designed to capture instances where users execute common commands (e.g., find, cat, grep) that may interact with files associated with browsers like Chrome and Firefox, as well as specific files where credentials might be stored, including 'logins.json' and 'key3.db'. By identifying processes accessing these files, this rule helps in detecting potential credential theft attempts by adversaries who may reuse these credentials on other systems or accounts. This could enhance their access privileges significantly if they obtain credentials related to privileged accounts.
Categories
- Endpoint
- macOS
- Linux
Data Sources
- File
- Process
ATT&CK Techniques
- T1555.003
Created: 2024-02-09