
Summary
This detection rule identifies unauthorized access to the Chrome user data file known as "Login Data," which holds sensitive information such as saved user passwords in an SQLite format. The detection leverages Windows Security Event logs, specifically monitoring Event Code 4663, to trigger alerts whenever non-Chrome processes attempt to access this file. The presence of such activity might indicate that a threat actor is trying to extract and decrypt saved passwords from users' Chrome profiles. If confirmed as malicious activity, it could lead to unauthorized access to sensitive accounts and escalate privileges within the environment. This detection mechanism thus serves as a preventative measure against potential credential theft, reinforcing the need for vigilant monitoring of unusual access patterns targeting sensitive user data.
Categories
- Windows
- Endpoint
Data Sources
- Windows Registry
- Windows Registry
ATT&CK Techniques
- T1012
Created: 2025-01-27