heroui logo

Thinkst Canary Incident

Panther Rules

View Source
Summary
The Thinkst Canary Incident rule is designed to detect unauthorized access attempts to a canary resource. In this scenario, a canary is a decoy resource that is monitored for any interactions, which, when detected, indicate a potential security incident. The rule specifically looks for log entries that signify a canary incident, such as when a shared file is opened from an unexpected source IP. In this case, an alert has been triggered due to a file being accessed from a known, suspicious IP (192.168.110.14) against a virtual canary resource (VirtualCanary-unnamed). The rule is set with a high severity level, suggesting that such incidents are of significant concern and warrant immediate attention. The rule alerts for incidents sourced from this specific IP at various times, with a deduplication period established to avoid repetitive alerts within a 60-minute window. This provides an effective way to monitor for repeated access attempts to canary resources that could indicate attempted data breaches or insider threats.
Categories
  • Endpoint
  • Network
  • Cloud
Data Sources
  • User Account
  • File
  • Network Traffic
Created: 2024-10-17