heroui logo

Suspicious File Access to Browser Credential Storage

Sigma Rules

View Source
Summary
This detection rule identifies suspicious file access attempts to browser credential storage by processes that are not classified as browsers. The rule focuses on file access to specific paths associated with recognized web browsers, particularly looking for indicators of potential credential theft. Examples include accessing browser-generated files such as Login Data, Cookies, and databases that store sensitive user information across various less conventional or less common browsers. By monitoring access to these paths, the rule aims to flag unauthorized access attempts that are characteristic of credential-stealing malware. The detection leverages the principle of monitoring files against known browser paths and structures while also applying a set of filters to eliminate benign cases, thus increasing the precision of the detection.
Categories
  • Endpoint
  • Windows
Data Sources
  • File
Created: 2025-05-22