You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -27,7 +21,7 @@ note = """## Triage and analysis
27
21
28
22
### Investigating GenAI Process Accessing Sensitive Files
29
23
30
-
Generative AI tools are increasingly used in development environments, but they typically only access files within active project folders. When a GenAI process accesses sensitive files (credentials, keys, browser data, etc.) that are monitored by Elastic Defend, it strongly indicates suspicious credential harvesting or data collection activity. Attackers use GenAI to process and summarize sensitive data before extraction to reduce payload size and evade detection.
24
+
This rule detects GenAI tools accessing credential files, SSH keys, browser data, or shell configurations. While GenAI tools legitimately access project files, access to sensitive credential stores is unusual and warrants investigation.
Copy file name to clipboardExpand all lines: rules/cross-platform/command_and_control_genai_process_suspicious_tld_connection.toml
+27-24Lines changed: 27 additions & 24 deletions
Original file line number
Diff line number
Diff line change
@@ -1,20 +1,16 @@
1
1
[metadata]
2
-
creation_date = "2025/11/20"
2
+
creation_date = "2025/12/04"
3
3
integration = ["endpoint"]
4
4
maturity = "production"
5
-
updated_date = "2025/11/20"
5
+
updated_date = "2025/12/04"
6
6
7
7
[rule]
8
8
author = ["Elastic"]
9
9
description = """
10
-
Detects when Generative AI (GenAI) tools and frameworks establish network connections to suspicious top-level domains (TLDs)
11
-
commonly abused by malware for command and control (C2) operations. GenAI tools connecting to suspicious TLDs (e.g., .top, .xyz,
12
-
.ml, .cf, .gq, .onion) may indicate compromised tools, malicious GenAI agents, or adversaries using GenAI tools to establish
13
-
C2 communications. Attackers may leverage GenAI tools to generate and execute code that connects to malicious infrastructure,
14
-
or compromise legitimate GenAI tools to use them as a conduit for C2 traffic. This rule focuses on native GenAI executables
15
-
(e.g., Ollama, LM Studio, Claude Desktop, Cursor) and package managers (npx, pnpm, yarn, bunx) commonly used with GenAI frameworks.
16
-
The use of suspicious TLDs is a strong indicator of malicious intent, as legitimate GenAI services typically use well-established
17
-
domains.
10
+
Detects when GenAI tools connect to domains using suspicious TLDs commonly abused for malware C2 infrastructure.
11
+
TLDs like .top, .xyz, .ml, .cf, .onion are frequently used in phishing and malware campaigns. Legitimate GenAI
12
+
services use well-established domains (.com, .ai, .io), so connections to suspicious TLDs may indicate compromised
13
+
tools, malicious plugins, or AI-generated code connecting to attacker infrastructure.
18
14
"""
19
15
from = "now-9m"
20
16
index = ["logs-endpoint.events.*"]
@@ -25,7 +21,7 @@ note = """## Triage and analysis
25
21
26
22
### Investigating GenAI Process Connection to Suspicious Top Level Domain
27
23
28
-
GenAI tools connecting to suspicious TLDs is highly suspicious and may indicate a compromised GenAI tool being used for C2 communications, a malicious GenAI agent establishing command and control, or an adversary using GenAI tools to evade detection by using suspicious domains.
24
+
This rule detects GenAI tools connecting to domains with TLDs commonly abused by malware. The suspicious TLD filter makes this a high-signal rule with low expected volume.
0 commit comments