
Summary
This detection rule is designed to identify the execution of LogMeIn, a remote access tool that could be exploited by adversaries to establish an unauthorized connection or command and control channel within a network. LogMeIn is commonly used for legitimate technical support but can be misused for malicious purposes such as remote administration by attackers. The rule specifically looks for the presence of the 'LMIGuardianSvc' service, which is associated with LogMeIn's functions. Detection happens when any process creation events involving this service, which is owned by LogMeIn, Inc., are logged. The potential for false positives is acknowledged, as legitimate users may employ this software for valid purposes, thereby necessitating careful monitoring and validation of alerts derived from this rule.
Categories
- Endpoint
- Windows
Data Sources
- Process
ATT&CK Techniques
- T1219
Created: 2022-02-11