heroui logo

Audio Capture via PowerShell

Sigma Rules

View Source
Summary
This detection rule identifies potential audio capture activities on Windows systems using PowerShell Cmdlets. Specifically, it looks for instances where the command line arguments contain specific keywords associated with audio device management, such as `WindowsAudioDevice-Powershell-Cmdlet`, `Toggle-AudioDevice`, `Get-AudioDevice`, `Set-AudioDevice`, and `Write-AudioDevice`. These Cmdlets can be indicative of malicious activities, particularly if used in an unauthorized context. Given the capability of these commands, they pose a risk not just from a security perspective but also from a privacy standpoint, allowing attackers to potentially capture sensitive audio data. This rule, based on insights from Atomic Blue Detections and adapted by numerous cybersecurity professionals, helps in monitoring and flagging suspicious use of PowerShell concerning audio devices.
Categories
  • Windows
  • Endpoint
Data Sources
  • Process
ATT&CK Techniques
  • T1123
Created: 2019-10-24