heroui logo

Non Firefox Process Access Firefox Profile Dir

Splunk Security Content

View Source
Summary
This detection rule identifies unauthorized access to the Firefox profile directory by non-Firefox processes. The rule is particularly important as the Firefox profile directory contains sensitive user information including login credentials, cookies, and browsing history that, if accessed by malicious processes, could lead to data exfiltration or unauthorized access to user accounts. The analytic utilizes Windows Security Event logs, focusing on event code 4663, to monitor access attempts to the directory located at "C:\Users\<username>\AppData\Roaming\Mozilla\Firefox\Profiles*". The rule works by filtering out legitimate access by Firefox and other known browser processes to highlight suspicious activities that may signal malware or unwanted software attempting to harvest sensitive information. This serves as a critical component in detecting potential threats to user privacy and system security.
Categories
  • Endpoint
Data Sources
  • Windows Registry
  • Windows Registry
ATT&CK Techniques
  • T1555
  • T1555.003
Created: 2024-11-13