
Summary
The rule 'Slack Potentially Malicious File Shared' is designed to detect incidents where potentially malicious files are shared via Slack, an important communication tool in many organizations. This detection is crucial as sharing malicious files can lead to initial access through phishing schemes or spear-phishing attacks, which are significant threats to organizational cybersecurity. The rule monitors Slack audit logs for specific actions that indicate the sharing of files flagged as containing malicious content. If a user shares a file marked with malicious content, the rule triggers a detection alert. The severity of this rule is categorized as 'Critical' given the potential impact of file-sharing incidents that could lead to larger security breaches. The rule implements a deduplication period of 60 minutes to reduce alert fatigue by avoiding multiple notifications for the same event within that timeframe. There are also conditions attached to the alerts, such as the need to identify problematic IP addresses and associated email accounts from which the files originate, enabling organizations to take swift investigative actions against the suspected malicious activity.
Categories
- Cloud
- Application
- Identity Management
- Other
Data Sources
- User Account
- Application Log
- Network Traffic
ATT&CK Techniques
- T1566.001
- T0123
Created: 2022-09-02