-
Notifications
You must be signed in to change notification settings - Fork 529
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Rule Tuning] Google Drive Direct Download Detection #3391
Comments
Related requests to tune this rule: |
Update 01-23-2024After some initial triage, it appears that direct download links to Google Drive with parameter While this is the case, the threat of leveraging Google Drive for malware distribution is still prevalent, however, further research and emulation will need to be conducted to properly tune this rule. Regarding performance, the rule can also be adjusted - specifically with the initial sequence and wildcard usage. Since we have no visibility into the URL requested during the TLS connection, we are unable to write logic on URL parameters. As a result, we must rely on a collection of events with DNS traffic, process and file based events. Go code to download directly from Google Drive and execute batch script- used for testing:
|
Be aware that this OR after the first block makes nearly always the following parts useless, e.g. in our environment Please check if instead of the "or" "and" would be correct.
Also the benign process list does not contain firefox and chrome binaries on linux machines, only the windows parts.
|
Update 02-01-2024After some research and discussion, we have expanded the scope of this rule tuning issue. We will be decoupling some of the activity attempted to be identified with the original rule, as well as creating new rules to detect similar activity. Details can be found in the tuning pull request: #3411 (comment) A tasklist has been added at the top of this tuning to add additional scope. |
This issue has been automatically marked as stale because it has not had recent activity. It will be closed if no further activity occurs. Thank you for your contributions. |
Closing this issue. Original tuning has been completed. Further investigation revealed that HTTPS and TLS are used for making connections to Google Drive by default and thus we do not have proper visibility via existing integrations. |
Link to rule
https://github.com/elastic/detection-rules/blob/main/rules/cross-platform/command_and_control_google_drive_malicious_file_download.toml
Description
This rule has some performance and false-positive considerations that should be addressed. The maxspan is small, however the use of wildcards and
OR
logic may be too broad and cause performance issues when the first sequence query is collecting events.Tasks
The text was updated successfully, but these errors were encountered: