
Summary
This rule is designed to detect the execution of the PSAttack PowerShell hacking tool, commonly used in penetration tests and by malicious actors. It specifically looks for instances where the PowerShell Script Block Logging feature captures strings indicative of the PSAttack tool, specifically the phrase 'PS ATTACK!!!'. Precautions should be taken to ensure that Script Block Logging is enabled on the Windows environment to facilitate detection. This rule has a high severity level, indicating a strong potential threat. It is crucial to monitor the PowerShell logs for this specific signature to identify potential unauthorized use of the PSAttack tool that could compromise system integrity.
Categories
- Windows
- Endpoint
Data Sources
- Script
- Process
Created: 2017-03-05