
Summary
The 'Permission Theft - Detected - Elastic Endgame' rule identifies unauthorized access attempts related to privilege escalation through token manipulation. It employs a query-based detection methodology utilizing the Elastic Endgame data source, alerting security teams to possible incidents involving access token tampering. The rule is configured to generate a high volume of alerts to maximize detection rates, benefiting from an automatic adjustment for its maximum alerts capacity through Kibana settings. This capability is crucial in tracking suspicious behaviors linked to token protection events, which are indicative of unauthorized permission escalation strategies. The rule emphasizes triage procedures, including review of the alert details, investigation of user accounts involved, correlation with other incidents, and possible false positive analysis to minimize alert noise. In response to any detected threats, organizations are advised to isolate affected systems, revoke suspicious tokens, enhance monitoring, and consider reporting to the security operations center (SOC). The rule's efficacy is further framed within MITRE ATT&CK under the tactics of Privilege Escalation (TA0004) and specifically targets the technique of Access Token Manipulation (T1134).
Categories
- Endpoint
- Cloud
- Application
Data Sources
- Pod
- Container
- User Account
- Process
ATT&CK Techniques
- T1134
Created: 2020-02-18