
Summary
The rule titled 'Locate Credentials' is designed to detect adversarial behavior associated with searching for stored credentials on local and remote file systems. Threat actors may utilize commands like 'locate', 'find', 'dpkg', and 'grep' to discover files that may contain sensitive information such as passwords or keys. Such files can include user-generated credential stores, system configuration files, or even source code repositories that may inadvertently store credentials. The rule utilizes a Splunk logic format to parse endpoint data for specific terms that indicate the presence of credential access activities. It searches for evidence of process titles associated with credential discovery attempts and tracks command line arguments that match common password or key terms. Alerts are generated if unusual patterns such as multiple similar processes from the same host are detected, indicative of potential credential exploitation. This rule is particularly relevant given its association with various threat actor groups such as Alloy Taurus and Lancyfly, and noted malware like ALPHV/BlackCat and Conti.
Categories
- Endpoint
- Linux
- Cloud
- Web
Data Sources
- Process
- File
- Logon Session
ATT&CK Techniques
- T1552.001
- T1552.006
- T1552.004
- T1552
Created: 2024-02-09