
Summary
This detection rule identifies potential spoofing attempts by monitoring mismatches between the expected and actual agent IDs associated with events in environments using the Elastic Agent version 7.14 or higher. The presence of the status 'agent_id_mismatch' indicates a discrepancy that could mean adversaries are attempting to disguise unauthorized activities, which would enable them to evade security measures. This rule executes a query that checks for events with mismatched agent IDs to help security teams pinpoint potential breaches, followed by specified investigatory steps that include reviewing logs, correlating anomalous agent IDs with their respective API keys, and checking source IP addresses for suspicious activity. If mismatches emerge, a thorough analysis of the environment can reveal if they are due to legitimate reasons like updates, or possibly indicate malicious operations requiring immediate attention. Steps for response include isolating affected systems, revoking compromised API keys, and enhancing monitoring measures.
Categories
- Endpoint
- Cloud
- Infrastructure
Data Sources
- Container
- File
- Process
- Logon Session
- Application Log
ATT&CK Techniques
- T1036
Created: 2021-07-14