heroui logo

Malicious Content Detected

Panther Rules

View Source
Summary
The rule 'Malicious Content Detected' addresses the detection of malicious content, specifically scenarios where vulnerabilities or unwanted software, such as viruses, are flagged within Box applications. It leverages Box's event logging to monitor user-generated events and identify those linked to potentially harmful content. The rule is associated with the MITRE ATT&CK tactic TA0002 and specifically the technique T1204, which relates to user execution strategies. Upon detection of a file marked as malicious, or any alerts generated around files, the system captures various event types, including 'FILE_MARKED_MALICIOUS' and 'SHIELD_ALERT'. It then classifies a high-severity response to contain or investigate the incident promptly. The runbook advises a thorough investigation to determine if the alert is a false positive or if the detected virus necessitates further action, fostering a proactive approach to malware threats in cloud environments.
Categories
  • Cloud
  • Web
  • Application
Data Sources
  • User Account
  • Application Log
ATT&CK Techniques
  • T1204
Created: 2022-09-02