
Summary
This detection rule is designed to identify potential exploit attempts that utilize command and script interpreters, which are blocked by Zscaler's web proxy. The rule utilizes logs generated by the Zscaler proxy to monitor and analyze blocked actions that contain references to exploits. Through statistical aggregation by various parameters - including user, threat name, hostname, file class, and URL - the analytic creates a comprehensive view of blocked exploit activity. By capturing such data, the detection helps security teams better understand and mitigate threats that could lead to unauthorized code execution and privilege escalation, ultimately enhancing the security posture of the organization. Organizations must customize detection parameters to align with their specific threat landscape and ensure relevant monitoring. Moreover, since false positives largely stem from Zscaler’s configuration, care should be taken to review the settings to minimize erroneous alerts.
Categories
- Web
- Cloud
- Infrastructure
Data Sources
- Web Credential
- Network Traffic
ATT&CK Techniques
- T1566
Created: 2024-11-15