heroui logo

Microsoft Teams Sensitive File Access By Uncommon Applications

Sigma Rules

View Source
Summary
This detection rule is designed to identify unauthorized access to sensitive files associated with Microsoft Teams, specifically files stored in leveldb and cookies format. It focuses on detecting access attempts by uncommon applications that do not typically interact with these files. The rule works by monitoring the file access activities on Windows systems. When a file path matches specified conditions for Teams’ cookies or leveldb storage, and if the accessing application does not correspond to the legitimate Teams executable, an alert is triggered. This highlights potential credential theft or misuse attempts that exploit how Teams stores authentication tokens in a vulnerable manner.
Categories
  • Endpoint
  • Windows
Data Sources
  • File
Created: 2024-07-22