
Summary
This rule detects potential exploitation attempts associated with the PrintNightmare vulnerability (CVE-2021-1675) by monitoring DLL deletions from the Spooler Service driver folder on Windows systems. The detection logic captures attempts to delete files in the directory where printer drivers are stored, specifically targeting deletions involving the 'spoolsv.exe' process. Given the nature of the vulnerability, which enables remote code execution and privilege escalation, this detection rule is critical for identifying malicious actions that could compromise system integrity and non-authorized access to user privileges. The presence of such an activity may indicate an unauthorized exploitation of the Print Spooler service, making early detection crucial for mitigation, recovery, and maintaining security posture.
Categories
- Endpoint
- Windows
Data Sources
- File
Created: 2021-07-01