
Summary
This detection rule is designed to identify the execution of TruffleHog, a tool that scans for high-entropy strings and sensitive information in code repositories. The rule notes that TruffleHog was misused by the Shai-Hulud worm to search for secrets in repositories, indicating potential malicious activity in accessing credentials. The rule triggers when a process event indicates the start of TruffleHog, specifically when executed with the arguments '--results=verified' and '--json' targeting the filesystem. Despite its legitimate use in security assessments, the rule emphasizes monitoring this tool due to its potential for abuse.
Categories
- Endpoint
- Linux
- Windows
- macOS
Data Sources
- Process
ATT&CK Techniques
- T1003
- T1555
Created: 2025-09-18