heroui logo

Credentials In Files

Sigma Rules

View Source
Summary
This rule detects the extraction of sensitive credentials, specifically passwords, on macOS systems by analyzing process creation events. The detection logic targets two main selection criteria: the use of the 'grep' command, which must end with '/grep' and have 'password' present in the command line, and the usage of the 'laZagne' tool. If either of these conditions is met, the rule triggers an alert indicating a potential credential extraction attempt. This can help security teams identify malicious activities aimed at unauthorized retrieval of sensitive data from files, which poses a security risk to the organization.
Categories
  • macOS
  • Endpoint
Data Sources
  • Process
ATT&CK Techniques
  • T1552.001
Created: 2020-10-19