heroui logo

Headless Browser Usage

Splunk Security Content

View Source
Summary
The analytic rule 'Headless Browser Usage' is designed to detect the presence of headless browser processes within an organization by monitoring specific command line arguments like '--headless' and '--disable-gpu'. This detection leverages the Endpoint.Processes data model and utilizes key data sources such as Sysmon EventID 1, Windows Event Log Security 4688, and CrowdStrike ProcessRollup2. The use of headless browsers can be a red flag, as these tools are often exploited by malicious actors for nefarious activities, including web scraping and orchestrating automated attacks without user detection. Such activities, if confirmed malicious, may lead to significant security breaches, including unauthorized data extraction and covert interactions with web applications. By applying this analytic, organizations can baseline legitimate use of headless browsers while identifying potential threats that seek to exploit them.
Categories
  • Endpoint
Data Sources
  • Windows Registry
  • Process
ATT&CK Techniques
  • T1564.003
  • T1185
Created: 2024-11-13