LoFP LoFP / t1552.001

t1552.001

TitleTags
a third party application can access the filezilla xml config files. filter is needed.
administrative or software activity
as the script block is a blob of text. false positive may occur with scripts that contain the keyword as a reference or simply use it for detection.
commonly run by administrators
files that accidentally contain these strings
key being modified or deleted may be performed by a system administrator.
key modified or deleted from unfamiliar users should be investigated. if known behavior is causing false positives, it can be exempted from the rule.
key vault being modified or deleted may be performed by a system administrator.
key vault modified or deleted from unfamiliar users should be investigated. if known behavior is causing false positives, it can be exempted from the rule.
known false positives include legitimate development activities where developers search for configuration files, environment variables, or authentication modules as part of normal coding tasks, as well as security audits involving authorized security reviews or code scanning tools searching for hardcoded secrets. additionally, documentation lookups for example config files or authentication documentation may trigger this detection, along with refactoring tasks where developers rename or consolidate credential management code across a codebase, and onboarding activities where new developers explore unfamiliar codebases to understand authentication flows.
legitimate access of the console history file is possible
legitimate administration activities
legitimate developers searching code for refactoring purposes, security teams conducting authorized secret scanning, devops engineers modifying workflow files, and repository administrators managing branch protection settings.
legitimate usage of chflags by administrators and users.
legitimate use of trufflehog by security teams or developers.
low but possible. generic filenames like cloud.json or environment.json may appear in legitimate contexts. correlate with npm install activity or suspicious parent processes.
secrets being modified or deleted may be performed by a system administrator.
secrets modified or deleted from unfamiliar users should be investigated. if known behavior is causing false positives, it can be exempted from the rule.
unknown
valid usernames with high entropy or source/destination system pairs with multiple authenticating users will make it difficult to identify the real user authenticating.