heroui logo

Windows Non Discord App Access Discord LevelDB

Splunk Security Content

View Source
Summary
This detection rule investigates unauthorized access attempts to the Discord LevelDB database by applications that are not part of the Discord software itself. It employs Windows Security Event logs, specifically event code 4663, to capture instances where other processes try to access files in the Discord LevelDB directory. Such behavior could signify potential threats, including credential theft or unauthorized data access, which can compromise user information stored within Discord. The rule filters out legitimate processes by ensuring that the accessing process does not match the Discord executable path and excludes common Windows system directories, thus concentrating on suspicious activity that could lead to security breaches.
Categories
  • Endpoint
Data Sources
  • Windows Registry
ATT&CK Techniques
  • T1012
  • T1552
Created: 2024-11-22