Skip to content

Commit 0f5a198

Browse files
Update rules based on review comments
1 parent 9fe163b commit 0f5a198

18 files changed

+100
-185
lines changed

pyproject.toml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
[project]
22
name = "detection_rules"
3-
version = "1.0.2"
3+
version = "1.0.3"
44
description = "Detection Rules is the home for rules used by Elastic Security. This repository is used for the development, maintenance, testing, validation, and release of rules for Elastic Security’s Detection Engine."
55
readme = "README.md"
66
requires-python = ">=3.12"

rules/cross-platform/credential_access_cookies_chromium_browsers_debugging.toml

Lines changed: 38 additions & 42 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,10 @@
11
[metadata]
22
creation_date = "2020/12/21"
33
integration = ["endpoint", "windows", "system"]
4+
min_stack_comments = "Breaking change at 8.14.0 for the Windows Integration."
5+
min_stack_version = "8.14.0"
46
maturity = "production"
5-
updated_date = "2025/03/24"
7+
updated_date = "2025/02/21"
68

79
[rule]
810
author = ["Elastic"]
@@ -25,41 +27,6 @@ language = "eql"
2527
license = "Elastic License v2"
2628
max_signals = 33
2729
name = "Potential Cookies Theft via Browser Debugging"
28-
note = """## Triage and analysis
29-
30-
> **Disclaimer**:
31-
> This investigation guide was created using generative AI technology and has been reviewed to improve its accuracy and relevance. While every effort has been made to ensure its quality, we recommend validating the content and adapting it to suit your specific environment and operational needs.
32-
33-
### Investigating Potential Cookies Theft via Browser Debugging
34-
35-
Chromium-based browsers support debugging features that allow developers to inspect and modify web applications. Adversaries can exploit these features to access session cookies, enabling unauthorized access to web services. The detection rule identifies suspicious browser processes using debugging arguments, which may indicate cookie theft attempts, by monitoring specific process names and arguments across different operating systems.
36-
37-
### Possible investigation steps
38-
39-
- Review the process details to confirm the presence of suspicious debugging arguments such as "--remote-debugging-port=*", "--remote-debugging-targets=*", or "--remote-debugging-pipe=*". Check if these arguments were used in conjunction with "--user-data-dir=*" and ensure "--remote-debugging-port=0" is not present.
40-
- Identify the user account associated with the suspicious browser process to determine if it aligns with expected behavior or if it might be compromised.
41-
- Investigate the source IP address and network activity associated with the process to identify any unusual or unauthorized access patterns.
42-
- Check for any recent changes or anomalies in the user's account activity, such as unexpected logins or access to sensitive applications.
43-
- Correlate the event with other security alerts or logs to identify if this activity is part of a broader attack pattern or campaign.
44-
- If possible, capture and analyze the network traffic associated with the process to detect any data exfiltration attempts or communication with known malicious IP addresses.
45-
46-
### False positive analysis
47-
48-
- Development and testing activities may trigger the rule when developers use debugging features for legitimate purposes. To manage this, create exceptions for known developer machines or user accounts frequently involved in web application development.
49-
- Automated testing frameworks that utilize browser debugging for testing web applications can also cause false positives. Identify and exclude processes initiated by these frameworks by specifying their unique process names or user accounts.
50-
- Browser extensions or tools that rely on debugging ports for functionality might be flagged. Review and whitelist these extensions or tools if they are verified as safe and necessary for business operations.
51-
- Remote support or troubleshooting sessions using debugging features can be mistaken for suspicious activity. Implement a policy to log and review such sessions, allowing exceptions for recognized support tools or personnel.
52-
- Continuous integration/continuous deployment (CI/CD) pipelines that involve browser automation may inadvertently match the rule criteria. Exclude these processes by identifying and filtering based on the CI/CD system's user accounts or process identifiers.
53-
54-
### Response and remediation
55-
56-
- Immediately isolate the affected system from the network to prevent further unauthorized access or data exfiltration.
57-
- Terminate any suspicious browser processes identified with debugging arguments to stop potential cookie theft in progress.
58-
- Conduct a thorough review of access logs for the affected web applications or services to identify any unauthorized access attempts using stolen cookies.
59-
- Invalidate all active sessions for the affected user accounts and force a re-authentication to ensure that any stolen session cookies are rendered useless.
60-
- Implement stricter browser security policies, such as disabling remote debugging features in production environments, to prevent similar exploitation in the future.
61-
- Escalate the incident to the security operations team for further investigation and to determine if additional systems or data have been compromised.
62-
- Enhance monitoring and alerting for similar suspicious browser activities by refining detection rules and incorporating additional threat intelligence."""
6330
references = [
6431
"https://github.com/defaultnamehere/cookie_crimes",
6532
"https://embracethered.com/blog/posts/2020/cookie-crimes-on-mirosoft-edge/",
@@ -68,12 +35,6 @@ references = [
6835
]
6936
risk_score = 47
7037
rule_id = "027ff9ea-85e7-42e3-99d2-bbb7069e02eb"
71-
setup = """## Setup
72-
73-
### Additional notes
74-
75-
For information about troubleshooting maximum alerts warning please refer to this [guide](https://www.elastic.co/guide/en/security/current/alerts-ui-monitor.html#troubleshoot-max-alerts).
76-
"""
7738
severity = "medium"
7839
tags = [
7940
"Domain: Endpoint",
@@ -105,6 +66,41 @@ process where event.type in ("start", "process_started", "info") and
10566
"--remote-debugging-pipe=*") and
10667
process.args : "--user-data-dir=*" and not process.args:"--remote-debugging-port=0"
10768
'''
69+
note = """## Triage and analysis
70+
71+
> **Disclaimer**:
72+
> This investigation guide was created using generative AI technology and has been reviewed to improve its accuracy and relevance. While every effort has been made to ensure its quality, we recommend validating the content and adapting it to suit your specific environment and operational needs.
73+
74+
### Investigating Potential Cookies Theft via Browser Debugging
75+
76+
Chromium-based browsers support debugging features that allow developers to inspect and modify web applications. Adversaries can exploit these features to access session cookies, enabling unauthorized access to web services. The detection rule identifies suspicious browser processes using debugging arguments, which may indicate cookie theft attempts, by monitoring specific process names and arguments across different operating systems.
77+
78+
### Possible investigation steps
79+
80+
- Review the process details to confirm the presence of suspicious debugging arguments such as "--remote-debugging-port=*", "--remote-debugging-targets=*", or "--remote-debugging-pipe=*". Check if these arguments were used in conjunction with "--user-data-dir=*" and ensure "--remote-debugging-port=0" is not present.
81+
- Identify the user account associated with the suspicious browser process to determine if it aligns with expected behavior or if it might be compromised.
82+
- Investigate the source IP address and network activity associated with the process to identify any unusual or unauthorized access patterns.
83+
- Check for any recent changes or anomalies in the user's account activity, such as unexpected logins or access to sensitive applications.
84+
- Correlate the event with other security alerts or logs to identify if this activity is part of a broader attack pattern or campaign.
85+
- If possible, capture and analyze the network traffic associated with the process to detect any data exfiltration attempts or communication with known malicious IP addresses.
86+
87+
### False positive analysis
88+
89+
- Development and testing activities may trigger the rule when developers use debugging features for legitimate purposes. To manage this, create exceptions for known developer machines or user accounts frequently involved in web application development.
90+
- Automated testing frameworks that utilize browser debugging for testing web applications can also cause false positives. Identify and exclude processes initiated by these frameworks by specifying their unique process names or user accounts.
91+
- Browser extensions or tools that rely on debugging ports for functionality might be flagged. Review and whitelist these extensions or tools if they are verified as safe and necessary for business operations.
92+
- Remote support or troubleshooting sessions using debugging features can be mistaken for suspicious activity. Implement a policy to log and review such sessions, allowing exceptions for recognized support tools or personnel.
93+
- Continuous integration/continuous deployment (CI/CD) pipelines that involve browser automation may inadvertently match the rule criteria. Exclude these processes by identifying and filtering based on the CI/CD system's user accounts or process identifiers.
94+
95+
### Response and remediation
96+
97+
- Immediately isolate the affected system from the network to prevent further unauthorized access or data exfiltration.
98+
- Terminate any suspicious browser processes identified with debugging arguments to stop potential cookie theft in progress.
99+
- Conduct a thorough review of access logs for the affected web applications or services to identify any unauthorized access attempts using stolen cookies.
100+
- Invalidate all active sessions for the affected user accounts and force a re-authentication to ensure that any stolen session cookies are rendered useless.
101+
- Implement stricter browser security policies, such as disabling remote debugging features in production environments, to prevent similar exploitation in the future.
102+
- Escalate the incident to the security operations team for further investigation and to determine if additional systems or data have been compromised.
103+
- Enhance monitoring and alerting for similar suspicious browser activities by refining detection rules and incorporating additional threat intelligence."""
108104

109105

110106
[[rule.threat]]

rules/cross-platform/defense_evasion_timestomp_touch.toml

Lines changed: 1 addition & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
creation_date = "2020/11/03"
33
integration = ["endpoint"]
44
maturity = "production"
5-
updated_date = "2025/03/24"
5+
updated_date = "2025/01/15"
66

77
[rule]
88
author = ["Elastic"]
@@ -25,10 +25,6 @@ events will not define `event.ingested` and default fallback for EQL rules was n
2525
Hence for this rule to work effectively, users will need to add a custom ingest pipeline to populate
2626
`event.ingested` to @timestamp.
2727
For more details on adding a custom ingest pipeline refer - https://www.elastic.co/guide/en/fleet/current/data-streams-pipeline-tutorial.html
28-
29-
### Additional notes
30-
31-
For information about troubleshooting maximum alerts warning please refer to this [guide](https://www.elastic.co/guide/en/security/current/alerts-ui-monitor.html#troubleshoot-max-alerts).
3228
"""
3329
severity = "medium"
3430
tags = [

rules/cross-platform/guided_onboarding_sample_rule.toml

Lines changed: 1 addition & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
[metadata]
22
creation_date = "2022/09/22"
33
maturity = "production"
4-
updated_date = "2025/03/24"
4+
updated_date = "2025/01/15"
55

66
[rule]
77
author = ["Elastic"]
@@ -63,12 +63,6 @@ This alert will show once every 24 hours for each host. It is safe to disable th
6363
references = ["https://www.elastic.co/guide/en/security/current/prebuilt-rules.html"]
6464
risk_score = 21
6565
rule_id = "a198fbbd-9413-45ec-a269-47ae4ccf59ce"
66-
setup = """## Setup
67-
68-
### Additional notes
69-
70-
For information about troubleshooting maximum alerts warning please refer to this [guide](https://www.elastic.co/guide/en/security/current/alerts-ui-monitor.html#troubleshoot-max-alerts).
71-
"""
7266
severity = "low"
7367
tags = ["Use Case: Guided Onboarding", "Resources: Investigation Guide"]
7468
timestamp_override = "event.ingested"

rules/cross-platform/privilege_escalation_setuid_setgid_bit_set_via_chmod.toml

Lines changed: 1 addition & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
creation_date = "2020/04/23"
33
integration = ["endpoint"]
44
maturity = "production"
5-
updated_date = "2025/03/24"
5+
updated_date = "2025/01/15"
66

77
[rule]
88
author = ["Elastic"]
@@ -22,12 +22,6 @@ name = "SUID/SGID Bit Set"
2222
references = ["https://www.elastic.co/security-labs/primer-on-persistence-mechanisms"]
2323
risk_score = 21
2424
rule_id = "8a1b0278-0f9a-487d-96bd-d4833298e87a"
25-
setup = """## Setup
26-
27-
### Additional notes
28-
29-
For information about troubleshooting maximum alerts warning please refer to this [guide](https://www.elastic.co/guide/en/security/current/alerts-ui-monitor.html#troubleshoot-max-alerts).
30-
"""
3125
severity = "low"
3226
tags = [
3327
"Domain: Endpoint",

rules/linux/credential_access_potential_linux_ssh_bruteforce_external.toml

Lines changed: 1 addition & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
creation_date = "2022/09/14"
33
integration = ["system"]
44
maturity = "production"
5-
updated_date = "2025/03/24"
5+
updated_date = "2025/01/15"
66

77
[rule]
88
author = ["Elastic"]
@@ -75,10 +75,6 @@ Filebeat is a lightweight shipper for forwarding and centralizing log data. Inst
7575
- This rule requires the “Filebeat System Module” to be enabled.
7676
- The system module collects and parses logs created by the system logging service of common Unix/Linux based distributions.
7777
- To run the system module of Filebeat on Linux follow the setup instructions in the [helper guide](https://www.elastic.co/guide/en/beats/filebeat/current/filebeat-module-system.html).
78-
79-
### Additional notes
80-
81-
For information about troubleshooting maximum alerts warning please refer to this [guide](https://www.elastic.co/guide/en/security/current/alerts-ui-monitor.html#troubleshoot-max-alerts).
8278
"""
8379
severity = "low"
8480
tags = ["Domain: Endpoint", "OS: Linux", "Use Case: Threat Detection", "Tactic: Credential Access", "Resources: Investigation Guide"]

rules/linux/credential_access_potential_linux_ssh_bruteforce_internal.toml

Lines changed: 1 addition & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
creation_date = "2023/02/21"
33
integration = ["system"]
44
maturity = "production"
5-
updated_date = "2025/03/24"
5+
updated_date = "2025/01/15"
66

77
[rule]
88
author = ["Elastic"]
@@ -71,10 +71,6 @@ Filebeat is a lightweight shipper for forwarding and centralizing log data. Inst
7171
- This rule requires the “Filebeat System Module” to be enabled.
7272
- The system module collects and parses logs created by the system logging service of common Unix/Linux based distributions.
7373
- To run the system module of Filebeat on Linux follow the setup instructions in the [helper guide](https://www.elastic.co/guide/en/beats/filebeat/current/filebeat-module-system.html).
74-
75-
### Additional notes
76-
77-
For information about troubleshooting maximum alerts warning please refer to this [guide](https://www.elastic.co/guide/en/security/current/alerts-ui-monitor.html#troubleshoot-max-alerts).
7874
"""
7975
severity = "medium"
8076
tags = ["Domain: Endpoint", "OS: Linux", "Use Case: Threat Detection", "Tactic: Credential Access", "Resources: Investigation Guide"]

rules/linux/defense_evasion_chattr_immutable_file.toml

Lines changed: 1 addition & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
creation_date = "2022/07/22"
33
integration = ["endpoint", "sentinel_one_cloud_funnel"]
44
maturity = "production"
5-
updated_date = "2025/03/24"
5+
updated_date = "2025/03/20"
66

77
[rule]
88
author = ["Elastic"]
@@ -93,10 +93,6 @@ Auditbeat is a lightweight shipper that you can install on your servers to audit
9393
9494
#### Custom Ingest Pipeline
9595
For versions <8.2, you need to add a custom ingest pipeline to populate `event.ingested` with @timestamp for non-elastic-agent indexes, like auditbeats/filebeat/winlogbeat etc. For more details to add a custom ingest pipeline refer to the [guide](https://www.elastic.co/guide/en/fleet/current/data-streams-pipeline-tutorial.html).
96-
97-
### Additional notes
98-
99-
For information about troubleshooting maximum alerts warning please refer to this [guide](https://www.elastic.co/guide/en/security/current/alerts-ui-monitor.html#troubleshoot-max-alerts).
10096
"""
10197
severity = "medium"
10298
tags = [

rules/linux/defense_evasion_hidden_file_dir_tmp.toml

Lines changed: 1 addition & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
creation_date = "2020/04/29"
33
integration = ["endpoint"]
44
maturity = "production"
5-
updated_date = "2025/03/24"
5+
updated_date = "2025/02/04"
66

77
[rule]
88
author = ["Elastic"]
@@ -64,10 +64,6 @@ Auditbeat is a lightweight shipper that you can install on your servers to audit
6464
6565
#### Custom Ingest Pipeline
6666
For versions <8.2, you need to add a custom ingest pipeline to populate `event.ingested` with @timestamp for non-elastic-agent indexes, like auditbeats/filebeat/winlogbeat etc. For more details to add a custom ingest pipeline refer to the [guide](https://www.elastic.co/guide/en/fleet/current/data-streams-pipeline-tutorial.html).
67-
68-
### Additional notes
69-
70-
For information about troubleshooting maximum alerts warning please refer to this [guide](https://www.elastic.co/guide/en/security/current/alerts-ui-monitor.html#troubleshoot-max-alerts).
7167
"""
7268
severity = "medium"
7369
tags = [

rules/linux/defense_evasion_hidden_shared_object.toml

Lines changed: 1 addition & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
creation_date = "2022/07/20"
33
integration = ["endpoint", "sentinel_one_cloud_funnel"]
44
maturity = "production"
5-
updated_date = "2025/03/24"
5+
updated_date = "2025/03/20"
66

77
[rule]
88
author = ["Elastic"]
@@ -92,10 +92,6 @@ Auditbeat is a lightweight shipper that you can install on your servers to audit
9292
9393
#### Custom Ingest Pipeline
9494
For versions <8.2, you need to add a custom ingest pipeline to populate `event.ingested` with @timestamp for non-elastic-agent indexes, like auditbeats/filebeat/winlogbeat etc. For more details to add a custom ingest pipeline refer to the [guide](https://www.elastic.co/guide/en/fleet/current/data-streams-pipeline-tutorial.html).
95-
96-
### Additional notes
97-
98-
For information about troubleshooting maximum alerts warning please refer to this [guide](https://www.elastic.co/guide/en/security/current/alerts-ui-monitor.html#troubleshoot-max-alerts).
9995
"""
10096
severity = "medium"
10197
tags = [

0 commit comments

Comments
 (0)