
Summary
The detection rule titled 'Shai-Hulud Workflow File Creation or Modification' aims to identify the creation or deletion of malicious GitHub Actions workflow files that are linked to the Shai-Hulud worm variants. These files are critical for exfiltrating sensitive information such as credentials and propagating malware across software repositories. The rule specifically focuses on particular file paths associated with threat vectors including 'shai-hulud-workflow.yml', 'discussion.yaml', and patterns for exfiltration workflows. Utilizing Sysmon on both Linux and Windows platforms, the detection capabilities are grounded on filesystem events that capture file actions in the specified directories. The detection logic is implemented using a Splunk search that aggregates event data representing file activities linked to these malicious workflows, enabling security teams to respond swiftly to potential threats.
Categories
- Endpoint
Data Sources
- Pod
- Container
- User Account
- File
- Network Traffic
ATT&CK Techniques
- T1574.006
- T1554
- T1195
- T1195.001
Created: 2025-11-25