
Summary
This rule captures and detects the usage of the 'Get-Clipboard' cmdlet in PowerShell, which can be used to access the content of the clipboard in Windows environments. Clipboard operations, while seemingly benign, can be exploited by threat actors to exfiltrate sensitive data or facilitate lateral movement within a network. The rule focuses on capturing process creation events where the command line arguments include 'Get-Clipboard'. This detection mechanism is crucial for identifying potential data theft or command execution related to clipboard access. The medium severity level indicates that its occurrence warrants further investigation to assess the context of the command and verify if it's part of a legitimate operation or a malicious act. Regular monitoring based on this rule can help enhance the security posture against data exfiltration tactics employed by adversaries.
Categories
- Windows
- Endpoint
Data Sources
- Process
- Command
Created: 2020-05-02