heroui logo

Credential Access via TruffleHog Execution

Elastic Detection Rules

View Source
Summary
This detection rule is designed to identify the execution of TruffleHog, a tool that scans for high-entropy strings and sensitive information in code repositories. The rule notes that TruffleHog was misused by the Shai-Hulud worm to search for secrets in repositories, indicating potential malicious activity in accessing credentials. The rule triggers when a process event indicates the start of TruffleHog, specifically when executed with the arguments '--results=verified' and '--json' targeting the filesystem. Despite its legitimate use in security assessments, the rule emphasizes monitoring this tool due to its potential for abuse.
Categories
  • Endpoint
  • Linux
  • Windows
  • macOS
Data Sources
  • Process
ATT&CK Techniques
  • T1003
  • T1555
Created: 2025-09-18