LoFP LoFP / legitimate use of trufflehog by security teams or developers.

Techniques

Sample rules

PUA - TruffleHog Execution

Description

Detects execution of TruffleHog, a tool used to search for secrets in different platforms like Git, Jira, Slack, SharePoint, etc. that could be used maliciously. While it is a legitimate tool, intended for use in CI pipelines and security assessments, It was observed in the Shai-Hulud malware campaign targeting npm packages to steal sensitive information.

Detection logic

condition: selection_img or all of selection_cli_*
selection_cli_platform:
  CommandLine|contains:
  - ' docker --image '
  - ' Git '
  - ' GitHub '
  - ' Jira '
  - ' Slack '
  - ' Confluence '
  - ' SharePoint '
  - ' s3 '
  - ' gcs '
selection_cli_verified:
  CommandLine|contains: ' --results=verified'
selection_img:
  Image|endswith: \trufflehog.exe

PUA - TruffleHog Execution - Linux

Description

Detects execution of TruffleHog, a tool used to search for secrets in different platforms like Git, Jira, Slack, SharePoint, etc. that could be used maliciously. While it is a legitimate tool, intended for use in CI pipelines and security assessments, It was observed in the Shai-Hulud malware campaign targeting npm packages to steal sensitive information.

Detection logic

condition: selection_img or all of selection_cli_*
selection_cli_platform:
  CommandLine|contains:
  - ' docker --image '
  - ' Git '
  - ' GitHub '
  - ' Jira '
  - ' Slack '
  - ' Confluence '
  - ' SharePoint '
  - ' s3 '
  - ' gcs '
selection_cli_verified:
  CommandLine|contains: ' --results=verified'
selection_img:
  Image|endswith: /trufflehog