heroui logo

Common Ransomware Notes

Splunk Security Content

View Source
Summary
This rule is designed to detect the creation of files that are commonly associated with ransomware notes. These notes are typically generated during ransomware attacks and are critical indicators of such malicious activities. The detection mechanism utilizes file-system activity logs from the Endpoint Filesystem data model, which are generally collected via endpoint detection and response (EDR) tools, notably from Sysmon EventID 11. Identifying the presence of these ransom notes is essential as they signify an impending ransomware attack, which can result in severe repercussions, including data encryption, potential data loss, operational disruption, and significant financial implications due to ransom demands. The rule filters results based on known file names associated with various ransomware families, aiding security teams in their hunt for threats before they escalate.
Categories
  • Endpoint
Data Sources
  • File
ATT&CK Techniques
  • T1485
Created: 2024-11-13