Sponsor of the Day:
Jerkmate
https://detection.fyi/sigmahq/sigma/emerging-threats/2020/ta/lazarus/proc_creation_win_apt_lazarus_group_activity/
Lazarus Group Activity | Detection.FYI
Detects different process execution behaviors as described in various threat reports on Lazarus group activity
activity detection fyilazarus group
https://detection.fyi/sigmahq/sigma/emerging-threats/2017/malware/plugx/proc_creation_win_malware_plugx_susp_exe_locations/
Potential PlugX Activity | Detection.FYI
Detects the execution of an executable that is typically used by PlugX for DLL side loading starting from an uncommon location
activity detection fyipotentialplugx
https://detection.fyi/sigmahq/sigma/cloud/aws/cloudtrail/aws_passed_role_to_glue_development_endpoint/
AWS Glue Development Endpoint Activity | Detection.FYI
Detects possible suspicious glue development endpoint activity.
activity detection fyiaws gluedevelopmentendpoint
https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_rasdial_execution/
Suspicious RASdial Activity | Detection.FYI
Detects suspicious process related to rasdial.exe
activity detection fyisuspicious
https://detection.fyi/sigmahq/sigma/emerging-threats/2021/malware/conti/proc_creation_win_malware_conti_ransomware_commands/
Potential Conti Ransomware Activity | Detection.FYI
Detects a specific command used by the Conti ransomware group
activity detection fyiconti ransomwarepotential
https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_susp_crypto_mining_monero/
Potential Crypto Mining Activity | Detection.FYI
Detects command line parameters or strings often used by crypto miners
activity detection fyicrypto miningpotential
https://detection.fyi/sigmahq/sigma/emerging-threats/2018/ta/apt32-oceanlotus/registry_event_apt_oceanlotus_registry/
OceanLotus Registry Activity | Detection.FYI
Detects registry keys created in OceanLotus (also known as APT32) attacks
activity detection fyiregistry
https://detection.fyi/sigmahq/sigma/cloud/aws/cloudtrail/aws_ec2_import_key_pair_activity/
AWS Key Pair Import Activity | Detection.FYI
Detects the import of SSH key pairs into AWS EC2, which may indicate an attacker attempting to gain unauthorized access to instances. This activity could lead …
activity detection fyiaws keypairimport
https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_susp_eventlog_content_recon/
Potentially Suspicious EventLog Recon Activity Using Log Query Utilities | Detection.FYI
Detects execution of different log query utilities and commands to search and dump the content of specific event logs or look for specific event IDs. This …
potentially suspiciousactivity usingdetection fyieventlogrecon
https://detection.fyi/sigmahq/sigma/emerging-threats/2023/ta/equationgroup/proxy_apt_equation_group_triangulation_c2_coms/
Potential Operation Triangulation C2 Beaconing Activity - Proxy | Detection.FYI
Detects potential beaconing activity to domains used in 0day attacks on iOS devices and revealed by Kaspersky and the FSB
operation triangulationproxy detectionpotentialc2activity
https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_susp_gather_network_info_execution/
Suspicious Reconnaissance Activity Via GatherNetworkInfo.VBS | Detection.FYI
Detects execution of the built-in script located in
activity viadetection fyisuspiciousreconnaissancevbs
https://detection.fyi/loginsoft-research/detection-rules/threat-detection/cve-2022-26134/cve-2022-26134_confluence_exploit_activity_webserver/
Confluence Exploit Activity on Webserver Logs | Detection.FYI
Detection for Confluence server activity found on webserver logs
detection fyiconfluenceexploitactivitywebserver
https://detection.fyi/sigmahq/sigma/web/proxy_generic/proxy_ua_rclone/
Rclone Activity via Proxy | Detection.FYI
Detects the use of rclone, a command-line program to manage files on cloud storage, via its default user-agent string
activity viaproxy detectionrclonefyi
https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_hktl_sliver_c2_execution_pattern/
HackTool - Sliver C2 Implant Activity Pattern | Detection.FYI
Detects process activity patterns as seen being used by Sliver C2 framework implants
pattern detection fyihacktoolsliverc2implant
https://detection.fyi/sigmahq/sigma/emerging-threats/2023/exploits/cve-2023-46747/web_cve_2023_46747_f5_remote_code_execution/
CVE-2023-46747 Exploitation Activity - Webserver | Detection.FYI
Detects exploitation activity of CVE-2023-46747 an unauthenticated remote code execution vulnerability in F5 BIG-IP.
cve 2023detection fyiexploitationactivitywebserver
https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_secedit_execution/
Potential Suspicious Activity Using SeCEdit | Detection.FYI
Detects potential suspicious behaviour using secedit.exe. Such as exporting or modifying the security policy
potential suspiciousactivity usingdetection fyi
https://detection.fyi/sigmahq/sigma/windows/file/file_event/file_event_win_susp_dpapi_backup_and_cert_export_ioc/
DPAPI Backup Keys And Certificate Export Activity IOC | Detection.FYI
Detects file names with specific patterns seen generated and used by tools such as Mimikatz and DSInternals related to exported or stolen DPAPI backup keys and...
backup keysdetection fyicertificateexportactivity
https://detection.fyi/sigmahq/sigma/windows/builtin/security/win_security_susp_lsass_dump/
Password Dumper Activity on LSASS | Detection.FYI
Detects process handle on LSASS process with certain access mask and object type SAM_DOMAIN
detection fyipassworddumperactivitylsass
https://detection.fyi/sigmahq/sigma/windows/image_load/image_load_scrcons_wmi_scripteventconsumer/
WMI ActiveScriptEventConsumers Activity Via Scrcons.EXE DLL Load | Detection.FYI
Detects signs of the WMI script host process
activity viadll loaddetection fyiwmiexe
https://detection.fyi/sigmahq/sigma/emerging-threats/2025/exploits/cve-2025-59287/win_wsus_exploit_cve_2025_59287/
Exploitation Activity of CVE-2025-59287 - WSUS Deserialization | Detection.FYI
Detects cast exceptions in Windows Server Update Services (WSUS) application logs that highly indicate exploitation attempts of CVE-2025-59287, a …
cve 2025detection fyiexploitationactivitywsus