Skip to content

Commit 55c41fb

Browse files
committed
add feedback changes
1 parent ddd8f6a commit 55c41fb

4 files changed

+13
-6
lines changed

rules/cross-platform/command_and_control_genai_process_suspicious_tld_connection.toml

Lines changed: 6 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -56,9 +56,9 @@ references = [
5656
"https://atlas.mitre.org/techniques/AML.T0086",
5757
"https://www.elastic.co/security-labs/elastic-advances-llm-security",
5858
]
59-
risk_score = 73
59+
risk_score = 47
6060
rule_id = "a1b2c3d4-e5f6-7890-abcd-ef1234567890"
61-
severity = "high"
61+
severity = "medium"
6262
tags = [
6363
"Domain: Endpoint",
6464
"OS: macOS",
@@ -98,7 +98,7 @@ network where host.os.type in ("macos", "windows") and
9898
"npx", "pnpm", "yarn", "bunx"
9999
) and
100100
101-
// Suspicious TLDs
101+
// Suspicious TLDs
102102
(
103103
// Windows DNS events
104104
(host.os.type == "windows" and dns.question.name != null and
@@ -107,6 +107,9 @@ network where host.os.type in ("macos", "windows") and
107107
// macOS network events
108108
(host.os.type == "macos" and destination.domain != null and
109109
destination.domain regex """.*\.(top|buzz|xyz|rest|ml|cf|gq|ga|onion|monster|cyou|quest|cc|bar|cfd|click|cam|surf|tk|shop|club|icu|pw|ws|online|fun|life|boats|store|hair|skin|motorcycles|christmas|lol|makeup|mom|bond|beauty|biz|live|work|zip|country|accountant|date|party|science|loan|win|men|faith|review|racing|download|host)""")
110+
111+
// Linux DNS events
112+
// Revist when available
110113
)
111114
'''
112115

rules/cross-platform/credential_access_genai_process_sensitive_file_access.toml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ description = """
1010
Detects when GenAI tools access sensitive files such as cloud credentials, SSH keys, browser password databases, or
1111
shell configurations. Attackers leverage GenAI agents to systematically locate and exfiltrate credentials, API keys, and
1212
tokens. Access to credential stores (.aws/credentials, .ssh/id_*) suggests harvesting, while writes to shell configs
13-
(.bashrc, .zshrc) indicate persistence attempts.
13+
(.bashrc, .zshrc) indicate persistence attempts. Note: On linux only creation events are available. Access events are not yet implemented.
1414
"""
1515
from = "now-9m"
1616
index = ["logs-endpoint.events.file*"]

rules/cross-platform/defense_evasion_genai_config_modification.toml

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -57,7 +57,6 @@ rule_id = "590fc62d-7386-4c75-92b0-af4517018da1"
5757
severity = "medium"
5858
tags = [
5959
"Domain: Endpoint",
60-
"OS: Linux",
6160
"OS: macOS",
6261
"OS: Windows",
6362
"Use Case: Threat Detection",

rules/cross-platform/defense_evasion_genai_process_encoding_prior_to_network_activity.toml

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -146,7 +146,12 @@ sequence by process.entity_id with maxspan=30s
146146
[network where event.type == "start"
147147
and event.action == "connection_attempted"
148148
and destination.ip != null
149-
and not cidrmatch(destination.ip, "10.0.0.0/8", "127.0.0.0/8", "169.254.0.0/16", "172.16.0.0/12", "192.168.0.0/16", "::1", "FE80::/10", "FF00::/8")
149+
and not cidrmatch(destination.ip, "10.0.0.0/8", "127.0.0.0/8", "169.254.0.0/16", "172.16.0.0/12", "192.0.0.0/24", "192.0.0.0/29",
150+
"192.0.0.8/32", "192.0.0.9/32", "192.0.0.10/32", "192.0.0.170/32", "192.0.0.171/32", "192.0.2.0/24",
151+
"192.31.196.0/24", "192.52.193.0/24", "192.168.0.0/16", "192.88.99.0/24", "224.0.0.0/4", "100.64.0.0/10",
152+
"192.175.48.0/24","198.18.0.0/15", "198.51.100.0/24", "203.0.113.0/24", "240.0.0.0/4", "::1", "FE80::/10",
153+
"FF00::/8")
154+
150155
] by process.entity_id
151156
'''
152157

0 commit comments

Comments
 (0)