heroui logo

Potential Cookies Session Hijacking

Sigma Rules

View Source
Summary
This detection rule is designed to identify possible session hijacking attempts using the `curl.exe` tool on Windows systems. Specifically, it focuses on instances where the `curl` command is executed with flags (`-c` or `--cookie-jar`) that indicate the saving of cookie data. This behavior can be indicative of malicious activity, as attackers may use this to capture session cookies from legitimate user sessions, thereby gaining unauthorized access to web applications. The rule leverages event logs specifically associated with process creation on Windows to monitor for these particular command line executions of `curl.exe`. It requires that both the image used and the command line executed adhere to specified conditions, ensuring that detection accuracy is maintained while minimizing false positives. The rule's medium severity level reflects the potential threat it poses within an enterprise environment.
Categories
  • Windows
  • Endpoint
Data Sources
  • Process
Created: 2023-07-27