heroui logo

Package installation

Anvilogic Forge

View Source
Summary
This detection rule focuses on identifying the installation of programming packages using popular package managers such as pip (Python), gem (Ruby), and npm (JavaScript). The rule aims to highlight potentially malicious package installations that could lead to Dependency confusion attacks, where an attacker could publish a package to a public repository with the same name as a legitimate package, tricking a system into installing the malicious version instead of the intended one. The logic involves monitoring Windows Event ID 4688, which logs process creation events, and filters these events for commands related to package installation from the aforementioned tools. Additionally, conditions are put in place to extract requirements from a `requirements.txt` file and identify specific flags used in the installation process, gathering relevant data for further analysis and potential incident response.
Categories
  • Endpoint
  • Windows
Data Sources
  • Windows Registry
  • Application Log
ATT&CK Techniques
  • T1105
Created: 2024-02-09