Skip to content

Commit a7ac291

Browse files
Aegrahtradebot-elastic
authored andcommitted
[New Rule] Credential Access via TruffleHog Execution (#5129)
* [New Rule] Credential Access via TruffleHog Execution * Update credential_access_trufflehog_execution.toml * Update rules/cross-platform/credential_access_trufflehog_execution.toml Co-authored-by: Jonhnathan <[email protected]> * Update rules/cross-platform/credential_access_trufflehog_execution.toml Co-authored-by: Jonhnathan <[email protected]> --------- Co-authored-by: Jonhnathan <[email protected]> (cherry picked from commit 1636a8f)
1 parent 8624725 commit a7ac291

File tree

1 file changed

+62
-0
lines changed

1 file changed

+62
-0
lines changed
Lines changed: 62 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,62 @@
1+
[metadata]
2+
creation_date = "2025/09/18"
3+
integration = ["endpoint"]
4+
maturity = "production"
5+
updated_date = "2025/09/18"
6+
7+
[rule]
8+
author = ["Elastic"]
9+
description = """
10+
This rule detects the execution of TruffleHog, a tool used to search for high-entropy strings and secrets
11+
in code repositories, which may indicate an attempt to access credentials. This tool was abused by the Shai-Hulud
12+
worm to search for credentials in code repositories.
13+
"""
14+
false_positives = [
15+
"""
16+
Trufflehog is a legitimate open-source tool used by security professionals and developers to search for sensitive
17+
information, such as passwords, API keys, and other secrets, within code repositories. It is commonly employed
18+
during security assessments and code reviews to identify potential vulnerabilities.
19+
""",
20+
]
21+
from = "now-9m"
22+
index = ["logs-endpoint.events.process-*"]
23+
language = "eql"
24+
license = "Elastic License v2"
25+
name = "Credential Access via TruffleHog Execution"
26+
references = ["https://www.elastic.co/blog/shai-hulud-worm-npm-supply-chain-compromise"]
27+
risk_score = 21
28+
rule_id = "47595dea-452b-4d37-b82d-6dd691325139"
29+
severity = "low"
30+
tags = [
31+
"Domain: Endpoint",
32+
"OS: Linux",
33+
"OS: Windows",
34+
"OS: macOS",
35+
"Use Case: Threat Detection",
36+
"Tactic: Credential Access",
37+
"Data Source: Elastic Defend"
38+
]
39+
timestamp_override = "event.ingested"
40+
type = "eql"
41+
query = '''
42+
process where event.type == "start" and process.name : ("trufflehog.exe", "trufflehog") and
43+
process.args == "--results=verified" and process.args == "--json" and process.args == "filesystem"
44+
'''
45+
46+
[[rule.threat]]
47+
framework = "MITRE ATT&CK"
48+
49+
[[rule.threat.technique]]
50+
id = "T1003"
51+
name = "OS Credential Dumping"
52+
reference = "https://attack.mitre.org/techniques/T1003/"
53+
54+
[[rule.threat.technique]]
55+
id = "T1555"
56+
name = "Credentials from Password Stores"
57+
reference = "https://attack.mitre.org/techniques/T1555/"
58+
59+
[rule.threat.tactic]
60+
id = "TA0006"
61+
name = "Credential Access"
62+
reference = "https://attack.mitre.org/tactics/TA0006/"

0 commit comments

Comments
 (0)