LoFP LoFP / t1552.001

t1552.001

TitleTags
a third party application can access the filezilla xml config files. filter is needed.
administrative or software activity
as the script block is a blob of text. false positive may occur with scripts that contain the keyword as a reference or simply use it for detection.
commonly run by administrators
files that accidentally contain these strings
key being modified or deleted may be performed by a system administrator.
key modified or deleted from unfamiliar users should be investigated. if known behavior is causing false positives, it can be exempted from the rule.
key vault being modified or deleted may be performed by a system administrator.
key vault modified or deleted from unfamiliar users should be investigated. if known behavior is causing false positives, it can be exempted from the rule.
legitimate access of the console history file is possible
legitimate administration activities
legitimate usage of chflags by administrators and users.
legitimate use of trufflehog by security teams or developers.
low but possible. generic filenames like cloud.json or environment.json may appear in legitimate contexts. correlate with npm install activity or suspicious parent processes.
secrets modified or deleted from unfamiliar users should be investigated. if known behavior is causing false positives, it can be exempted from the rule.
unknown
valid usernames with high entropy or source/destination system pairs with multiple authenticating users will make it difficult to identify the real user authenticating.