
Summary
The 'Unusual Remote File Directory' detection rule identifies potential lateral movement activity within a network by monitoring file transfers to directories that are typically not scrutinized. The rule utilizes machine learning to detect anomalies in file transfers, specifically focusing on a remote file transfer to unusual directories, signaling an evasion tactic employed by malicious actors. As common monitoring systems usually focus on well-known directories, attackers may exploit lesser-known paths to execute lateral movements without being detected. This alert is triggered when a file transfer event is identified that deviates from established norms based on prior activity, thus providing an early warning mechanism for potential compromises. Additionally, the rule requires integration with the Lateral Movement Detection features of Elastic's security suite, ensuring the necessary data sources, like file and RDP process logs, are being collected to facilitate effective threat identification.
Categories
- Endpoint
- Cloud
- On-Premise
Data Sources
- File
- Network Traffic
- Application Log
ATT&CK Techniques
- T1210
Created: 2023-10-12