
Summary
This detection rule, authored by Elastic, is designed to trigger alerts when Elastic Defend generates alerts indicating ransomware prevention activities on endpoints. Specifically, it captures scenarios where ransomware attempts are blocked according to the behaviors monitored by Elastic Defend. The rule focuses solely on prevention events, meaning that it will not alert on cases where ransomware was detected but not prevented. The primary functionality of this detection rule revolves around immediate investigation capabilities for security teams, enhancing their response to ransomware-related threats. The detection strategy incorporates various types of protection against ransomware, including behavioral monitoring to recognize generic encryption methods, canary files that signal unauthorized access attempts, and kernel-level protection for the Master Boot Record (MBR) to thwart ransomware attacks at a critical system level. Overall, the rule aims to maintain a low rate of false positives, acknowledging the potential impact of legitimate software similar in operation to ransomware. To ensure effective incident management, it aligns with best practices for triaging alerts, analyzing processes and user activity, and mitigating potential breaches when ransomware is suspected.
Categories
- Endpoint
Data Sources
- Pod
- User Account
- Container
- Image
- Application Log
ATT&CK Techniques
- T1486
Created: 2024-03-24