[APT] Iranian State-Aligned Identity Intrusion Campaign
Report Type
APT Threat Intelligence Report
Threat Category
Iranian State-Aligned Identity Intrusion and Disruption
Assessment Date
April 06, 2026
Primary Impact Domain
Enterprise Identity Security and Internet-Facing Service Resilience
BLUF
Iranian state-aligned cyber activity presents a material business risk through scalable credential compromise and coordinated service disruption capable of impacting operational continuity and customer-facing systems. The technical cause is a phishing-driven credential acquisition model combined with authentication abuse that enables adversaries to operate within legitimate identity workflows, bypassing traditional intrusion detection mechanisms. The current threat posture reflects mature, behavior-driven tradecraft that does not rely on software vulnerabilities, allowing rapid targeting across enterprises with minimal dependency on environment-specific conditions. Organizations must immediately prioritize identity-centric detection, enforce comprehensive multi-factor authentication coverage, and implement cross-telemetry correlation to identify credential misuse early and prevent escalation.
Executive Risk Translation
Credential misuse is the primary entry vector, meaning organizations without real-time identity anomaly detection are exposed to unauthorized access and downstream operational disruption.
S3 Why This Matters Now
This activity is operationally significant because it enables adversaries to scale access without reliance on vulnerabilities, eliminating dependency on exploit development and patch cycles.
Phishing-driven credential acquisition combined with authentication abuse allows adversaries to bypass perimeter defenses and operate within legitimate identity activity, reducing detection likelihood and increasing dwell time.
Observed activity demonstrates concurrent credential targeting and opportunistic service disruption, increasing the probability of simultaneous unauthorized access and operational impact within enterprise environments.
Organizations lacking identity baselining, consistent multi-factor authentication enforcement, and cross-telemetry correlation are disproportionately exposed to early-stage compromise and delayed detection.
S4 Key Judgments
· Iranian state-aligned activity prioritizes credential acquisition over exploit-based intrusion, enabling scalable and repeatable enterprise targeting (T1566 – Phishing, T1078 – Valid Accounts)
· Detection effectiveness is constrained in environments lacking identity-centric correlation across email, authentication, endpoint, and network telemetry
· Password spraying and distributed authentication abuse are persistent access mechanisms against externally exposed identity services (T1110 – Brute Force)
· Service disruption activity may coincide with credential-based access, increasing the likelihood of operational impact (T1498 – Network Denial of Service)
· Organizations without identity baselining and behavioral anomaly detection capabilities will experience delayed detection following credential compromise
S5 Executive Risk Summary
This threat creates elevated enterprise risk through unauthorized use of valid credentials, enabling adversaries to operate within normal identity activity and delay detection.
Risk exposure is driven by the adversary’s ability to authenticate using valid credentials, enabling unauthorized access to persist within normal user activity patterns and reducing detection probability.
Operational impact may include unauthorized access to enterprise systems, degradation of service availability, and disruption to customer-facing operations.
Risk exposure increases in environments with externally accessible authentication services, inconsistent multi-factor authentication enforcement, and limited visibility into user activity across devices and network interactions.
S6 Executive Cost Summary
This cost analysis was developed by the CyberDax team using expert judgment and assisted analytical tools to support clarity and consistency.
· Low Impact
$50,000 – $200,000
Isolated credential compromise affecting a limited number of user accounts with rapid detection and containment, requiring targeted identity reset, session invalidation, and minimal operational disruption
· Moderate Impact
$200,000 – $900,000
Credential compromise across multiple users with delayed detection, requiring enterprise-wide credential resets, authentication system validation, incident response coordination, and partial disruption to business operations
· High Impact
$900,000 – $3,000,000+
Widespread credential compromise combined with sustained unauthorized access or service disruption, requiring full identity infrastructure remediation, extended incident response, operational downtime, and recovery of customer-facing systems
S6A Key Cost Drivers
· Scope and privilege level of compromised user accounts
· Duration of unauthorized access prior to detection and containment
· Extent of service disruption impacting business operations
· Complexity of identity remediation and authentication system validation
· Dependency on externally exposed authentication and service infrastructure
S6B Compliance and Risk Context
Compliance Exposure Indicator
Credential compromise and unauthorized access to enterprise systems may trigger regulatory reporting obligations under data protection, identity security, and service availability requirements where user data or operational continuity is affected.
Risk Register Entry
· Risk Name
Credential-Based Unauthorized Access and Service Disruption
· Risk Description
Credential compromise enables unauthorized access to enterprise systems and may coincide with service disruption, resulting in operational impact and regulatory exposure
· Risk Category
Identity Security and Service Availability
· Likelihood
High
· Impact
Moderate to High
Annualized Risk Exposure
Annualized exposure reflects repeated campaign activity leveraging scalable credential-based intrusion methods, with recurrence probability driven by widespread phishing targeting and externally exposed authentication services.
S7 Risk Drivers
Risk drivers represent the primary conditions that increase the likelihood and impact of this threat activity within enterprise environments.
· Reliance on identity-based access without behavioral anomaly detection or identity monitoring
· Exposure of authentication services to the internet without sufficient protection against credential abuse and distributed login attempts
· Incomplete enforcement of multi-factor authentication across user accounts and access pathways
· Lack of correlation between email interaction, authentication activity, and endpoint or network behavior
· High dependency on externally accessible services for business operations
S8 Bottom Line for Executives
This threat is driven by the misuse of legitimate authentication mechanisms rather than system compromise, making identity the primary control point for detection and prevention.
Organizations must prioritize identity-centric monitoring, enforce strong authentication controls, and implement cross-telemetry correlation to detect credential misuse before escalation occurs.
Failure to align detection capabilities with identity-based threat activity will result in delayed detection and increased operational impact.
S9 Board-Level Takeaway
This threat reflects a structural shift toward identity-based intrusion, where adversaries achieve access without breaching traditional security boundaries.
Board-level oversight should prioritize investment in identity security controls, including multi-factor authentication enforcement, behavioral detection capabilities, and cross-system visibility to ensure early identification of unauthorized access.
Sustained underinvestment in identity security will result in persistent exposure to credential-based intrusion and increased likelihood of operational disruption affecting business continuity and stakeholder trust.
S10 Threat Overview
This activity reflects Iranian state-aligned cyber operations conducted in the context of active geopolitical conflict involving the United States and its allies, with cyber activity functioning as a parallel instrument of retaliation, coercion, and strategic pressure.
The campaign relies on phishing-driven credential harvesting and authentication abuse to obtain valid account access, enabling adversaries to operate within legitimate identity workflows and bypass traditional intrusion detection mechanisms.
Operational objectives include unauthorized access to enterprise systems, intelligence collection, and disruption of services supporting U.S.-aligned economic, technological, and infrastructure ecosystems.
The threat is characterized by global reach, scalable targeting, and minimal dependency on technical vulnerabilities, allowing rapid execution across enterprise environments.
S11 Campaign Activity and Timeline
Observed activity reflects persistent cyber operations aligned with ongoing geopolitical escalation between Iran and the United States and its allies.
Campaign intensity increases during periods of heightened military or political tension, with cyber activity functioning as a responsive and scalable mechanism for retaliation and signaling.
Campaign execution consistently chains targeted phishing, credential acquisition, and authentication abuse across multiple organizations in parallel to maximize access during escalation periods.
Operations are continuous but surge-driven, with escalation events correlating to increased targeting breadth, higher activity volume, and elevated likelihood of concurrent disruption activity.
S12 Initial Access Vector
Primary initial access is achieved through phishing-driven credential harvesting (T1566 – Phishing), including:
· Emails containing links to credential harvesting pages designed to replicate legitimate authentication portals
· Use of spoofed or lookalike domains aligned with enterprise services to increase user trust and interaction likelihood
· Targeting of privileged, high-value, or access-bearing enterprise users with exposure to externally accessible authentication services
Secondary access mechanisms include distributed authentication attempts such as password spraying against externally accessible identity services (T1110 – Brute Force).
This access model enables adversaries to pursue strategic enterprise targets across global environments without dependency on software vulnerabilities or patch status.
S13 Exploitability and Exposure Assessment
This threat model is independent of exploitable software vulnerabilities, resulting in broad and immediate exposure across organizations regardless of patch posture.
Exposure is driven by:
· User susceptibility to phishing and credential harvesting
· Availability of externally exposed authentication services
· Inconsistent enforcement of multi-factor authentication
· Lack of identity behavior monitoring and anomaly detection
Because access is obtained through valid credentials, risk cannot be reduced through vulnerability remediation and instead requires identity-centric defensive controls.
S14 Sectors / Countries Affected
Sectors Affected
· Government and public sector organizations
· Critical infrastructure operators, including energy, water, transportation, and communications systems
· Defense industrial base organizations and entities supporting military, intelligence, or national security functions
· Technology and telecommunications providers supporting cloud, AI, communications, and digital platform infrastructure
· Financial services organizations supporting global economic systems
· Industrial, logistics, and supply chain organizations supporting U.S. or allied operations
Countries Affected
Targeting is globally distributed but strategically prioritized based on geopolitical alignment and operational relevance.
Primary targeting includes:
· United States
· Israel
· NATO member states and key allied nations
· Middle East regions with U.S. or allied military, diplomatic, or economic presence
Secondary targeting includes:
· Global enterprises operating within or supporting U.S. or allied ecosystems
· Multinational organizations with supply chain, infrastructure, defense-adjacent, or technology dependencies linked to primary targets
Global enterprises are treated as intentional targets when they support or enable U.S. or allied strategic interests, rather than as incidental victims.
S15 Adversary Capability Profiling
Adversary capability reflects a mature and strategically aligned operational model centered on identity-based intrusion and scalable targeting.
Skill Level
Moderate to high, with demonstrated capability in large-scale phishing operations, authentication abuse, and coordinated multi-target campaigns
Infrastructure Maturity
Flexible and rapidly deployable infrastructure, including short-lived phishing domains and distributed authentication sources designed to evade detection
Scalability
High, enabled by automation of phishing delivery and distributed access attempts across global targets
Operational Adaptability
Strong, with the ability to rapidly adjust targeting priorities, infrastructure, and campaign focus based on geopolitical developments
Escalation Potential
High, with demonstrated ability to expand from credential compromise to broader operational disruption aligned with strategic objectives
S16 Targeting Probability Assessment
Targeting likelihood is driven by geopolitical alignment, identity exposure, and operational value to U.S. or allied systems.
High Probability Targets
Organizations directly supporting U.S. or allied government operations, critical infrastructure, defense functions, or strategic technology capabilities, particularly those with exposed authentication services
Moderate Probability Targets
Enterprises with indirect alignment to U.S. or allied interests or participation in global supply chains, with partial identity security controls
Lower Probability Targets
Organizations with limited geopolitical relevance, strong identity security controls, enforced multi-factor authentication, and comprehensive behavioral monitoring
Targeting is strategically prioritized rather than random, with global enterprises included based on alignment and operational relevance.
S17 MITRE ATT&CK Chain Flow Mapping
The attack chain is structured around identity compromise and authentication abuse rather than exploit-driven intrusion.
Stage 1
· User Targeting and Phishing Delivery
o Adversaries deliver phishing content designed to induce user interaction with malicious links or credential harvesting pages (T1566 – Phishing)
Stage 2
· Credential Acquisition
o User interaction with adversary-controlled phishing infrastructure results in capture of valid enterprise credentials (T1566 – Phishing)
Stage 3
· Authentication Abuse
o Adversaries attempt access using harvested credentials or conduct distributed authentication attempts against exposed identity services
§ T1078 – Valid Accounts
§ T1110 – Brute Force
Stage 4
· Initial Access via Valid Accounts
o Successful authentication enables adversaries to access enterprise environments through legitimate identity pathways without software exploitation
§ T1078 – Valid Accounts
Stage 5
· Post-Authentication Discovery
o Adversaries may enumerate accessible accounts, services, or resources depending on objectives and target environment
§ T1087 – Account Discovery
Stage 6
· Persistence Through Continued Credential or Session Use
o Adversaries may maintain access through continued use of compromised credentials or active sessions depending on detection timing and defensive response
§ T1078 – Valid Accounts
Stage 7
· Operational Impact and Strategic Disruption
o Adversaries may conduct service disruption or availability degradation aligned with conflict-driven retaliation objectives to impose operational or economic impact
§ T1498 – Network Denial of Service
This chain reflects a behavior-driven intrusion model aligned with conflict-driven cyber operations focused on access, pressure, and disruption rather than opportunistic exploitation.
S18 Attack Path Narrative (Signal-Aligned Execution Flow)
This attack path reflects a conflict-aligned intrusion model where adversaries deliberately target enterprise environments supporting U.S. and allied interests to enable intelligence collection, operational disruption, and strategic pressure.
Execution begins with targeted phishing campaigns directed at privileged and access-bearing users within strategically relevant organizations. Targeting is selective and aligned to geopolitical objectives rather than broad distribution.
Phishing content directs users to credential harvesting infrastructure designed to replicate enterprise authentication services, enabling credential capture without reliance on exploit-based techniques.
Following credential acquisition, adversaries initiate authentication attempts against externally exposed identity services using harvested credentials, supplemented where necessary by distributed password spraying to expand access across prioritized targets.
Successful authentication enables entry through legitimate identity pathways, allowing activity to blend with normal user behavior and reduce detection probability.
Post-authentication activity remains controlled and purpose-driven, focused on identifying accessible systems, user privileges, and operationally relevant resources while maintaining behavioral consistency.
Persistence is sustained through continued credential use or session reuse, enabling ongoing access without triggering identity or endpoint-based controls.
During escalation conditions, adversaries transition to disruption operations targeting internet-facing services associated with prioritized organizations to impose operational degradation and economic pressure.
S19 Attack Chain Risk Amplification Summary
This attack model amplifies risk through alignment of intrusion activity with geopolitical objectives, increasing targeting precision and potential impact.
Credential-based access bypasses traditional security controls, enabling immediate execution across globally distributed targets without reliance on vulnerabilities or system misconfiguration.
Detection failure risk is driven by adversary activity blending into legitimate identity workflows, requiring correlated visibility across email delivery, authentication events, endpoint execution, and network communication to identify compromise.
Selective targeting of high-value organizations increases the likelihood that compromised credentials provide access to sensitive systems, critical infrastructure, or operational environments.
During escalation periods, the combination of credential compromise and disruption activity creates a dual-impact condition in which adversaries maintain access while degrading service availability across targeted environments.
Organizations lacking identity baselining, behavioral analytics, and cross-telemetry correlation face increased likelihood of delayed detection, prolonged access, and amplified operational impact.
S20 Tactics, Techniques, and Procedures
Adversary tradecraft is centered on identity compromise, authentication abuse, and strategic targeting of U.S. and allied organizations.
T1566 – Phishing
Used to deliver targeted credential harvesting campaigns against privileged users within strategically relevant organizations, with infrastructure engineered to replicate enterprise authentication services and maximize credential capture
T1110 – Brute Force
Used as distributed password spraying against externally exposed authentication services to expand access across prioritized targets where credential harvesting alone is insufficient
T1078 – Valid Accounts
Used to authenticate into enterprise environments using compromised credentials, enabling sustained access through legitimate identity workflows to systems of operational relevance
T1087 – Account Discovery
Used post-authentication to identify accessible accounts, roles, and systems that provide access to sensitive or operationally significant resources
T1498 – Network Denial of Service
Used during escalation conditions to disrupt availability of internet-facing services associated with targeted organizations, amplifying operational and economic impact
These techniques are executed in a coordinated manner to enable scalable access, sustained presence, and disruption aligned with conflict-driven objectives.
S20A Adversary Tradecraft Summary
Adversary tradecraft operates as an identity-centric intrusion model designed to achieve access, persistence, and disruption without reliance on software exploitation.
Operations prioritize selective targeting of privileged users and strategically relevant organizations aligned with U.S. and allied interests.
Execution relies on credential compromise to establish low-visibility access through legitimate authentication pathways, followed by controlled expansion to identify and maintain access to systems of operational value.
Tradecraft maintains persistent access while retaining the capability to initiate disruption operations during escalation conditions.
This model enables scalable targeting, rapid adaptation to geopolitical developments, and sustained operational pressure against prioritized environments without dependency on exploit development.
S21 Detection Strategy Overview
Detection Philosophy
This threat activity is driven by credential acquisition and misuse at scale, enabled by phishing and authentication abuse rather than exploit-dependent intrusion. The adversary’s effectiveness relies on blending malicious authentication into legitimate enterprise identity activity, making identity-layer detection the primary control point.
Detection must be anchored in correlated behavioral signals across three primary telemetry pillars:
· Email security gateway telemetry
· Endpoint / EDR process telemetry
· DNS / web proxy network telemetry
No single telemetry source provides sufficient fidelity. Early detection depends on linking user-targeting activity, authentication anomalies, and post-authentication behavior into a unified sequence.
Detection Approach
Detection must focus on time-bound correlation of identity and user-interaction events, specifically the transition from phishing exposure to credential use.
Required detection sequence:
· Delivery of phishing content or user interaction with embedded links or attachments
· Authentication attempts from atypical source attributes, including unfamiliar IP ranges, geolocation anomalies, or abnormal session patterns
· Successful authentication followed by first-time access behavior, including new device usage, new application access, or abnormal access timing
· Endpoint activity associated with newly established sessions, including browser-based access or token reuse patterns
· Outbound network communication to recently registered or low-prevalence domains associated with credential harvesting infrastructure
Detection confidence is highest when these behaviors occur in close temporal proximity and are tied to the same user identity.
Detection Priorities
Detection engineering must prioritize behaviors that indicate credential targeting and post-authentication misuse, with emphasis on:
· User exposure to phishing content and interaction events (T1566 – Phishing)
· Authentication anomalies indicating credential use outside established behavioral baselines (T1078 – Valid Accounts)
· Repeated authentication failures or distributed login attempts consistent with password spraying (T1110 – Brute Force)
· Access to internet-facing services following anomalous authentication, indicating potential exploitation of exposed applications (T1190 – Exploit Public-Facing Application)
· Sustained or abnormal inbound traffic patterns affecting availability of public services (T1498 – Network Denial of Service)
Priority weighting must favor identity compromise indicators over infrastructure-based indicators, as credential misuse provides earlier and more reliable detection opportunities.
Detection Challenges
· Use of valid credentials eliminates many traditional intrusion indicators
· Phishing infrastructure is rapidly deployed and abandoned, limiting reuse of indicators
· Authentication anomalies may appear low-signal without established behavioral baselines
· Distributed attack patterns reduce the visibility of brute force and spraying activity at single control points
· High-volume legitimate traffic can obscure early-stage disruption activity
Strategic Detection Insight
Organizations that prioritize:
· IOC-driven blocking
· Static signature detection
will detect this activity late or not at all, particularly after credential compromise.
Organizations that implement:
· Identity behavior baselining
· Correlation of email interaction, authentication events, and endpoint activity
· Monitoring of first-time or abnormal access patterns
will detect this activity at the point of credential misuse, significantly reducing attacker dwell time and limiting escalation potential.
S22 Primary Detection Signals
Email Security Gateway Telemetry Signals
Detection signals must focus on user-targeting activity and phishing interaction indicators, which represent the earliest observable stage of this threat.
· Inbound emails containing embedded links or attachments originating from newly registered or low-reputation domains
· Emails with mismatched sender identity attributes, including spoofed domains or anomalous reply-to addresses
· User interaction events with embedded links, including click-through activity to external domains
· Delivery of emails containing credential harvesting themes, including login prompts or account verification requests
· Multiple users receiving similar phishing content within a constrained time window
These signals provide initial access visibility and must be correlated with downstream authentication activity.
Endpoint / EDR Process Telemetry Signals
Endpoint telemetry must capture post-interaction behavior and session establishment activity, particularly following successful authentication events.
· First-time login sessions on endpoints not previously associated with the user identity
· New browser process activity immediately following email interaction events
· Access to authentication portals or login pages via endpoint browser processes
· Session establishment without corresponding historical device or process patterns
· Token reuse or session persistence indicators without expected re-authentication behavior
These signals provide confirmation of user interaction and session initiation, bridging initial access to credential misuse.
DNS / Web Proxy Network Telemetry Signals
Network telemetry must identify communication with adversary-controlled infrastructure used for credential harvesting and phishing operations.
· DNS queries to recently registered domains or domains with low global prevalence
· Outbound connections to domains not previously observed within the enterprise environment
· Web requests to domains mimicking authentication services or login portals
· Repeated DNS resolution attempts to short-lived or disposable domains
· Sudden appearance and disappearance of domains associated with user interaction activity
These signals provide visibility into external infrastructure leveraged during credential harvesting and initial access.
Identity and Authentication Telemetry Signals
Identity telemetry provides the most reliable detection surface for identifying credential misuse and active account compromise.
· Successful authentication from unfamiliar IP addresses, geolocations, or network ranges
· Login activity from geographically disparate locations within infeasible timeframes
· Authentication attempts outside established behavioral baselines, including abnormal access times
· First-time access to applications or services not previously used by the identity
· Rapid transition from failed authentication attempts to successful login events
These signals indicate credential compromise and must be prioritized for early detection and response.
Service Interaction and Availability Signals
Service-level telemetry must detect abnormal interaction patterns consistent with scanning, exploitation attempts, or disruption activity.
· Sudden increases in inbound traffic volume to internet-facing services
· Repeated requests to specific endpoints consistent with automated scanning behavior
· High-frequency connection attempts from distributed or rotating source IP ranges
· Traffic patterns indicative of protocol abuse or resource exhaustion attempts
· Degradation of service performance correlated with abnormal inbound traffic patterns
These signals provide visibility into disruption activity and opportunistic exploitation of exposed services.
Cross-Pillar Correlation Signals
High-confidence detection requires correlation of activity across telemetry sources to identify multi-stage attack progression.
· Email interaction event followed by anomalous authentication activity within a constrained time window
· Authentication anomaly followed by first-time endpoint activity and new network connections
· DNS query to a newly observed domain followed by authentication from an unfamiliar source
· Multiple users interacting with similar phishing content followed by distributed authentication anomalies
· Authentication anomalies occurring alongside increased access to sensitive services or abnormal resource interaction
These correlations represent coordinated attack behavior and significantly increase detection confidence while reducing false positives.
S23 Telemetry Requirements
Email Security Gateway Telemetry Requirements
Effective detection requires detailed visibility into email delivery, message attributes, and user interaction events associated with phishing activity.
· Full email header logging, including sender domain, reply-to address, originating IP, and authentication results (SPF, DKIM, DMARC)
· Message metadata capturing attachment presence, embedded URLs, and message classification
· URL extraction and rewriting visibility for embedded links within email content
· User interaction telemetry, including link click events and attachment execution indicators
· Campaign-level visibility enabling identification of similar messages delivered to multiple users within a defined timeframe
Without user interaction telemetry and URL visibility, early-stage phishing detection is significantly degraded.
Endpoint / EDR Process Telemetry Requirements
Endpoint telemetry must provide process-level and session-level visibility to identify post-interaction behavior and session establishment activity.
· Process creation logs with parent-child relationships, including browser processes and spawned authentication sessions
· User session tracking, including login events tied to specific endpoints and devices
· Browser activity visibility, including access to external domains and authentication portals
· Device association data linking user identities to known and previously used endpoints
· Token and session handling visibility to detect session persistence or reuse
Lack of process lineage or session visibility limits the ability to confirm user interaction and correlate authentication activity to endpoint behavior.
DNS / Web Proxy Network Telemetry Requirements
Network telemetry must provide domain-level and connection-level visibility to identify communication with adversary-controlled infrastructure.
· DNS query logging, including domain name, query timestamp, and requesting host identity
· Domain enrichment data, including domain age, registration patterns, and global prevalence
· Web proxy logs capturing outbound HTTP and HTTPS requests, including destination domains and URLs
· TLS inspection capability to identify access to credential harvesting pages over encrypted channels
· Historical domain resolution tracking to identify short-lived or disposable infrastructure
Without DNS and web request visibility, identification of phishing infrastructure and external communication patterns is significantly constrained.
Identity and Authentication Telemetry Requirements
Identity telemetry is critical for detecting credential misuse and must provide detailed visibility into authentication behavior and access patterns.
· Authentication logs capturing successful and failed login attempts, including timestamp, source IP, and geolocation data
· User identity context, including role, normal access patterns, and historical login behavior
· Multi-factor authentication (MFA) event logs, including prompts, approvals, and failures
· Application access logs indicating services accessed following authentication events
· Session metadata, including device identifiers, session duration, and authentication method
Without enriched identity context and authentication detail, detection of anomalous access and credential misuse is unreliable.
Service Interaction and Availability Telemetry Requirements
Service-level telemetry must capture interaction patterns with internet-facing systems to detect scanning, exploitation attempts, and disruption activity.
· Web server and application logs capturing request frequency, endpoints accessed, and response codes
· Traffic volume metrics for internet-facing services, including baseline and deviation tracking
· Source IP distribution data to identify distributed access patterns or scanning behavior
· API and service interaction logs capturing abnormal request sequences or access attempts
· Performance and availability metrics indicating service degradation or abnormal load conditions
Without service-level visibility and baseline comparison, detection of disruption activity and exploitation attempts is limited.
Cross-Pillar Correlation Telemetry Requirements
Effective detection depends on the ability to correlate telemetry across sources and enrich events with contextual intelligence.
· Centralized logging or SIEM capability enabling correlation across email, endpoint, network, and identity telemetry
· Time synchronization across all telemetry sources to support accurate sequence-based detection
· Asset and identity mapping to link user accounts, devices, and network activity
· Threat intelligence enrichment, including domain reputation, IP reputation, and infrastructure classification
· Historical baseline data to support behavioral anomaly detection across users, devices, and services
Without cross-source correlation and enrichment, detection remains fragmented and high-confidence multi-stage detection is not achievable.
S24 Detection Opportunities and Gaps
Email Security Gateway Detection Opportunities and Gaps
Detection opportunities are strongest at the point of phishing delivery and user interaction; gaps emerge when interaction visibility or message-level context is incomplete.
· Detected Opportunity
Email delivery monitoring enables identification of phishing campaigns targeting multiple users within a defined timeframe
· Detected Opportunity
URL extraction and rewriting provides visibility into embedded link destinations prior to user interaction
· Partially Detected
User interaction events are detectable only when click tracking or attachment execution telemetry is enabled
· Gap
Lack of visibility into encrypted or external email channels limits detection of phishing delivered outside monitored gateways
· Gap
Absence of campaign-level aggregation reduces ability to identify distributed phishing attempts across user populations
Endpoint / EDR Detection Opportunities and Gaps
Detection opportunities exist in identifying post-interaction behavior and session establishment; gaps arise when process lineage or user-session linkage is incomplete.
· Detected Opportunity
Process creation telemetry enables identification of browser-based access following phishing interaction
· Detected Opportunity
Device-user association allows detection of first-time endpoint usage by a compromised identity
· Partially Detected
Browser activity visibility is limited when endpoint telemetry does not capture full URL or session context
· Gap
Lack of token-level visibility prevents reliable detection of session reuse or persistence mechanisms
· Gap
Incomplete process lineage reduces ability to link user interaction to subsequent authentication or access behavior
DNS / Web Proxy Detection Opportunities and Gaps
Detection opportunities focus on identifying communication with adversary-controlled infrastructure; gaps emerge when domain context or encrypted traffic visibility is limited.
· Detected Opportunity
DNS logging enables identification of newly registered or low-prevalence domains associated with phishing infrastructure
· Detected Opportunity
Web proxy visibility allows detection of outbound requests to suspicious or previously unseen domains
· Partially Detected
Domain classification accuracy is dependent on enrichment data quality and timeliness
· Gap
Lack of TLS inspection limits visibility into credential harvesting activity over encrypted channels
· Gap
Absence of historical domain tracking reduces ability to identify short-lived or disposable infrastructure patterns
Identity and Authentication Detection Opportunities and Gaps
Detection opportunities are strongest at the point of credential misuse; gaps arise when identity baselining or contextual enrichment is insufficient.
· Detected Opportunity
Authentication logs enable identification of anomalous login behavior, including unfamiliar locations and access patterns
· Detected Opportunity
MFA telemetry provides visibility into abnormal authentication flows and user interaction anomalies
· Partially Detected
Behavioral anomaly detection depends on availability of historical user baseline data
· Gap
Lack of identity enrichment limits ability to distinguish between legitimate and malicious access patterns
· Gap
Absence of session context reduces visibility into post-authentication activity and lateral access behavior
Service Interaction and Availability Detection Opportunities and Gaps
Detection opportunities exist in identifying abnormal service interaction patterns; gaps emerge when baseline traffic behavior and distribution analysis are not established.
· Detected Opportunity
Traffic volume monitoring enables identification of sudden spikes affecting service availability
· Detected Opportunity
Request pattern analysis allows detection of automated scanning or exploitation attempts
· Partially Detected
Distributed attack patterns may evade detection when analyzed at a single source or service level
· Gap
Lack of baseline traffic modeling limits ability to distinguish between legitimate load increases and malicious activity
· Gap
Incomplete source attribution reduces visibility into coordinated or distributed disruption attempts
Cross-Pillar Correlation Detection Opportunities and Gaps
Detection opportunities are maximized when telemetry sources are correlated; gaps arise when data remains siloed or time alignment is inconsistent.
· Detected Opportunity
Correlation of email interaction and authentication anomalies enables early detection of credential compromise
· Detected Opportunity
Linking identity activity with endpoint and network telemetry provides high-confidence detection of multi-stage attacks
· Partially Detected
Correlation accuracy depends on consistent time synchronization and identity mapping across systems
· Gap
Lack of centralized correlation capability prevents identification of multi-stage attack sequences
· Gap
Inconsistent telemetry ingestion or normalization reduces effectiveness of cross-source analysis
S25 Ultra-Tuned Detection Engineering Rules
Suricata
Rule 1 — Outbound Credential Submission to Non-Sanctioned Login-Themed Host
MITRE ATT&CK
· T1566 – Phishing
· T1078 – Valid Accounts
Purpose
Detect outbound credential submission to a login-themed host that is not an approved enterprise identity provider, representing likely phishing-driven credential harvesting over inspectable web traffic.
Classification
Alert-capable supporting detection
SOC Usage Mode
Alert-capable supporting detection
Minimum Deployment Requirement
· Suricata deployed where outbound HTTP or decrypted proxy traffic is visible
· http.request_body inspection enabled with request body limits sized to inspect credential forms
· Maintained allowlist dataset of sanctioned identity provider exact FQDNs
· Asset scoping that accurately reflects internal client address space
Enforcement Method
· Requires a single HTTP transaction to satisfy all of the following:
o POST request method
o Destination host not present in sanctioned identity provider dataset
o Login-themed host naming
o Login-themed URI pathing
o Request body containing both user-identifier and password-like parameters
· Alerting is permitted as a standalone Suricata detection because the rule enforces multiple aligned phishing-credential-submission conditions within one observed transaction
Implementation Constraint Notes
· HTTPS credential posting is only visible if TLS interception, proxy decryption, or equivalent SSL offload is in place
· Sanctioned identity provider dataset must include all legitimate external login destinations used by the enterprise
· Custom enterprise SSO paths may require URI regex localization
· Request body inspection depth must be validated against real production traffic and reverse proxy behavior
· This rule should not be deployed without dataset scoping and inspection-path validation
Tuning Explanation
This rule is intentionally narrow to reduce noise and enforce behavior-specific logic rather than generic web posting detection. It aligns to the Block 4 requirement to prioritize phishing interaction and credential misuse indicators over static IOC blocking or weak single-signal detections.
Variant Analysis
Covered variants
o Credential harvesting pages using common login-themed hostnames and paths
o Credential capture using standard HTML form submission over inspectable HTTP or decrypted HTTPS
o Common username, email, login, and password parameter naming variants
Variant gaps
o Direct-to-IP credential harvesting without meaningful host header semantics
o JavaScript or API-driven credential submission that does not expose expected parameter names
o Encrypted HTTPS sessions without decryption visibility
o Mobile app or embedded webview submission patterns that do not resemble standard browser form posts
Required compensating detection
o Proxy, endpoint, or identity correlation for encrypted, API-based, or application-native credential submission variants
Rule Regret Check
Deployment caution
Requires decrypted HTTP visibility or equivalent proxy-side inspection placement.
Confidence caution
Will miss encrypted credential submission, API-native submission patterns, and variants that do not expose recognizable credential parameters.
Coverage value
High-confidence, low-noise network detection for real credential harvesting behavior when deployed at the correct inspection point with a maintained allowlist.
Production Ready
Yes
Engineering Note
This rule is deployment-ready but requires tenant-side validation of inspection placement, request body visibility, sanctioned identity-provider dataset completeness, and environment-specific login-path tuning. Coverage remains conditional until those checks are completed and validated in live traffic.
System-ready code
alert http $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (
msg:"CYBERDAX APT IRAN outbound credential submission to non-sanctioned login-themed host";
flow:established,to_server;
http.method; content:"POST"; bsize:4;
http.host; dataset:isnotset,cdx_sanctioned_idp_domains, type string, load cdx_sanctioned_idp_domains.lst;
http.host; pcre:"/^(?:[^.]+\.){0,4}(?:login|signin|auth|account|verify|mfa|sso|session)[-.]?[a-z0-9-]*\./i";
http.uri; pcre:"/\/(?:login|signin|auth|account|verify|session|mfa|sso|oauth|saml|secure)(?:[\/\?\=&._-]|$)/Ui";
http.request_body; pcre:"/(?:^|[&;])(user(?:name)?|email|login|identifier)=[^&]{1,256}(?:&|;).{0,256}(pass(?:word)?|passwd|pwd)=/Pi";
classtype:policy-violation;
metadata:attack_target Client_Endpoint, deployment Perimeter, signature_severity Major, mitre_tactic Initial_Access, mitre_tactic Credential_Access, mitre_technique T1566, mitre_technique T1078;
sid:9002501;
rev:2;
)
Rule 2 — Suspicious Login-Themed DNS Query Followed by Non-Sanctioned TLS SNI Access
MITRE ATT&CK
· T1566 – Phishing
· T1078 – Valid Accounts
Purpose
Detect a client that first queries a suspicious login-themed domain and then initiates a TLS session to a suspicious non-sanctioned login-themed SNI within a constrained time window, indicating likely access to phishing or credential-harvesting infrastructure.
Classification
Alert-capable supporting detection
SOC Usage Mode
Alert-capable supporting detection
Minimum Deployment Requirement
· DNS and TLS visibility from the same client-observable sensor vantage point
· xbits support enabled with sufficient host-tracking capacity
· Maintained allowlist dataset of sanctioned identity provider exact FQDNs
· Reliable outbound client attribution from the same endpoint or network segment
Enforcement Method
· Supporting DNS rule sets an xbit on the source client when that client queries a suspicious login-themed domain not present in the sanctioned allowlist
· Alerting TLS rule fires only when the same client later establishes a TLS session with a suspicious login-themed non-sanctioned SNI within the configured expiration window
· Alerting is permitted as a standalone Suricata detection because it enforces a two-stage network sequence from the same source host, but it remains a network precursor detection, not full identity-confirmed compromise
Implementation Constraint Notes
· This rule tracks on ip_src because the DNS destination is often a resolver, not the final phishing host
· Exact string parity between DNS query names and TLS SNI values is not assumed; this rule intentionally matches suspicious themed naming on both stages rather than requiring identical domain strings
· CDN fronting, redirect chains, SNI suppression, Encrypted Client Hello, resolver centralization, or browser privacy features may reduce visibility
· Xbit expiration should remain short enough to reflect realistic user interaction windows and reduce unrelated follow-on TLS noise
· Do not oversell this rule as identity-confirming logic; it is a strong network-sequence precursor detector
Tuning Explanation
This rule implements the strongest realistic Suricata-native approximation of the Block 4 requirement to correlate suspicious infrastructure interaction across network events without pretending that Suricata can perform full user-identity correlation. It supports the report’s emphasis on linking phishing interaction indicators to downstream suspicious access behavior within constrained time windows.
Variant Analysis
Covered variants
o Login-themed phishing infrastructure exposed through observable DNS and visible TLS SNI
o Domains using common login, sign-in, verify, MFA, SSO, or auth-oriented naming
o User-driven suspicious infrastructure access patterns observable across DNS then TLS
Variant gaps
o Direct IP access with no meaningful DNS signal
o TLS handshakes without visible SNI
o Encrypted Client Hello or other privacy-preserving TLS features that conceal SNI
o Access paths where DNS is resolved elsewhere and not visible from the client vantage point
o Phishing domains that use non-login-themed naming conventions
Required compensating detection
o Proxy, endpoint, email, or SIEM correlation for no-SNI, DNS-hidden, or non-themed infrastructure variants
Rule Regret Check
Deployment caution
Requires DNS and TLS telemetry from the same client vantage point and sufficient xbit host tracking.
Confidence caution
Will not catch phishing flows that hide SNI, bypass observable DNS from the monitored client path, or use non-login-themed domains.
Coverage value
Strong encrypted-traffic precursor detector for phishing infrastructure access with materially better fidelity than a standalone suspicious TLS hostname alert.
Production Ready
Yes
Engineering Note
This rule is deployment-ready but requires validation of DNS visibility, TLS SNI visibility, xbit host-tracking capacity, and sanctioned identity-provider dataset completeness. Coverage remains conditional until those telemetry dependencies are verified in the monitored environment.
System-ready code
alert dns $HOME_NET any -> $EXTERNAL_NET 53 (
msg:"CYBERDAX APT IRAN supporting event suspicious login-themed DNS query by client";
dns.query;
dataset:isnotset,cdx_sanctioned_idp_domains, type string, load cdx_sanctioned_idp_domains.lst;
pcre:"/^(?:[^.]+\.){0,4}(?:login|signin|auth|account|verify|mfa|sso|session|okta|adfs|oauth|office365|microsoftonline|entra)[-.]?[a-z0-9-]*\.[a-z]{2,}$/i";
xbits:set,cdx_suspicious_login_dns,track ip_src,expire 900;
noalert;
sid:9002502;
rev:2;
)
alert tls $HOME_NET any -> $EXTERNAL_NET any (
msg:"CYBERDAX APT IRAN client accessed suspicious login-themed TLS SNI after matching DNS query";
flow:established,to_server;
tls.sni; dataset:isnotset,cdx_sanctioned_idp_domains, type string, load cdx_sanctioned_idp_domains.lst;
tls.sni; pcre:"/^(?:[^.]+\.){0,4}(?:login|signin|auth|account|verify|mfa|sso|session|okta|adfs|oauth|office365|microsoftonline|entra)[-.]?[a-z0-9-]*\.[a-z]{2,}$/i";
xbits:isset,cdx_suspicious_login_dns,track ip_src;
classtype:policy-violation;
metadata:attack_target Client_Endpoint, deployment Perimeter, signature_severity Major, mitre_tactic Initial_Access, mitre_tactic Credential_Access, mitre_technique T1566, mitre_technique T1078;
sid:9002503;
rev:2;
)
Rule 3 — Repeated Authentication POSTs to Protected Public Authentication Endpoints
MITRE ATT&CK
· T1110 – Brute Force
Purpose
Detect repeated authentication attempts from the same external source to protected internet-facing authentication endpoints, indicating concentrated password spraying or repeated credential-abuse activity.
Classification
Alert-capable
SOC Usage Mode
Alert-capable
Minimum Deployment Requirement
· Sensor visibility on inbound traffic to internet-facing authentication services
· Accurate scoping of protected authentication hosts in a maintained dataset
· Correct client IP visibility relative to reverse proxies, load balancers, and NAT boundaries
· Threshold tuning based on observed enterprise authentication volume and normal client concentration patterns
Enforcement Method
· Requires all of the following:
o External source to internal protected HTTP service
o POST request method
o Authentication-themed URI path
o Destination host present in protected authentication host dataset
o Repetition threshold exceeded by the same source within a constrained time window
· Alerting is permitted as a standalone Suricata detection for concentrated auth abuse from one source, but this rule must not be treated as sufficient standalone coverage for distributed low-and-slow spraying across many sources
Implementation Constraint Notes
· Must be deployed where original client source attribution is preserved or reliably reconstructed
· Threshold values must be environment-localized to real authentication traffic patterns
· Reverse proxy, SSO concentrator, WAF, and API gateway architectures may require deployment-point adaptation
· Full password-spraying coverage requires SIEM or identity-platform aggregation when the attack is distributed across many sources or many low-volume attempts
· This rule should not be described as full brute-force coverage without that compensating aggregation layer
Tuning Explanation
This rule focuses on repeated authentication attempts to known protected public auth paths rather than generic repeated POST activity, aligning with the Block 4 emphasis on authentication abuse and password spraying as priority detection behaviors. It is intentionally scoped to maximize operational signal at the network boundary while remaining honest about the detection gap for distributed spray campaigns.
Variant Analysis
Covered variants
o Concentrated password spraying or repeated login attempts from one source to standard web authentication endpoints
o Repeated access to common login, token, session, SAML, ADFS, and auth API paths
o Perimeter-observable authentication abuse against protected public services
Variant gaps
o Distributed low-and-slow spraying across many source IPs
o Authentication attempts over protocols or services not visible as HTTP POST transactions
o Mobile, thick-client, API, federated, or proprietary authentication workflows that do not expose the monitored path patterns
o Passwordless, token-first, or application-native auth variants that bypass observable web login endpoints
Required compensating detection
o SIEM, identity provider, application log, or cloud control-plane correlation for distributed or non-HTTP authentication abuse variants
Rule Regret Check
Deployment caution
Requires accurate protected-host scoping, preserved client attribution, and environment-specific threshold tuning.
Confidence caution
Best at detecting concentrated abuse from one source and should not be treated as full standalone coverage for distributed password spraying.
Coverage value
High operational value for perimeter detection of repeated authentication abuse against public enterprise login surfaces.
Production Ready
Yes
Engineering Note
This rule is deployment-ready but requires tenant-side validation of protected authentication host scoping, deployment position relative to reverse proxies or load balancers, and threshold calibration against baseline login volume. Coverage remains conditional until those factors are validated in production traffic.
System-ready code
alert http $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (
msg:"CYBERDAX APT IRAN repeated authentication POSTs to protected public auth endpoint possible password spraying";
flow:established,to_server;
http.method; content:"POST"; bsize:4;
http.host; dataset:isset,cdx_protected_auth_hosts, type string, load cdx_protected_auth_hosts.lst;
http.uri; pcre:"/\/(?:login|signin|auth|oauth2\/token|oauth\/token|session|saml|adfs|api\/v[0-9]+\/auth)(?:[\/\?\=&._-]|$)/Ui";
threshold:type threshold,track by_src,count 20,seconds 60;
classtype:attempted-user;
metadata:attack_target Server, deployment Perimeter, signature_severity Major, mitre_tactic Credential_Access, mitre_technique T1110;
sid:9002504;
rev:2;
)
SentinelOne
Rule 1 — Browser Access to Non-Sanctioned Login Infrastructure
MITRE ATT&CK
· T1566 – Phishing
· T1078 – Valid Accounts
Purpose
Detect browser access to login-themed external infrastructure that is not part of sanctioned enterprise authentication flows.
Classification
Alert-capable supporting detection
SOC Usage Mode
Alert-capable supporting detection
Minimum Deployment Requirement
· Endpoint web request or network telemetry
· Full browser process coverage
· Maintained allowlist of sanctioned authentication domains
· Verified availability of URL or domain fields
Enforcement Method
· Process is a browser
· Destination contains login/auth-related patterns
· Destination is NOT in sanctioned allowlist
Standalone Alerting Justification
Permitted because:
· Direct endpoint user-driven behavior
· Multi-condition narrowing (browser + auth pattern + allowlist exclusion)
· No reliance on external correlation
Implementation Constraint Notes
· Allowlist quality determines noise level
· SaaS-heavy environments require broader suppression sets
· If only domain (not URL) is available, expect reduced precision
Tuning Explanation
This rule is constrained to:
· Browser-only activity
· Authentication-themed destinations
· Known-good exclusion
This prevents generic web browsing alerts and aligns with phishing interaction detection requirements.
Expected Noise Profile
· Low if allowlist is mature
· Moderate in dynamic SaaS environments
Variant Analysis
Covered
· Browser phishing link interaction
· Fake login page navigation
Gaps
· Non-browser phishing
· Legitimate domain compromise
· API-based credential capture
Compensating Controls
· Email gateway telemetry
· DNS/web proxy analysis
Execution Validity Statement
Executable as a SentinelOne STAR rule template; requires tenant validation of:
· URL/domain field
· Process field
· Allowlist implementation
Rule Regret Check
Deployment caution
Requires strong allowlist hygiene.
Confidence caution
Limited by domain/URL visibility and SaaS diversity.
Coverage value
High-confidence early phishing interaction detection.
Production Ready
Conditional
Engineering Note
Deploy in alert mode first. Validate:
· Noise from legitimate login flows
· Coverage of enterprise authentication services
· URL vs domain visibility
System-ready code
event_type = "web_request"
AND lower(src_process_name) IN ("chrome.exe","msedge.exe","firefox.exe","brave.exe")
AND lower(coalesce(url, domain)) RLIKE "(login|signin|auth|verify|account|mfa|sso|session)"
AND lower(coalesce(url, domain)) NOT RLIKE "(^|\\.)okta\\.com|(^|\\.)microsoftonline\\.com|(^|\\.)office\\.com|(^|\\.)duo\\.com"
Rule 2 — Non-Browser Access to Browser Credential / Session Stores
MITRE ATT&CK
· T1555 – Credentials from Password Stores
· T1539 – Steal Web Session Cookie
Purpose
Detect non-browser processes accessing browser credential or cookie storage locations.
Classification
Alert-capable
SOC Usage Mode
Alert-capable
Minimum Deployment Requirement
· File access telemetry
· User profile path visibility
· Suppression list for approved tools
Enforcement Method
· Process is NOT a browser
· Process is NOT approved tooling
· Access to known credential/cookie storage paths
Standalone Alerting Justification
Permitted because:
· Direct endpoint access to sensitive credential stores
· No dependency on external telemetry
Implementation Constraint Notes
· Must suppress:
o Password managers
o Migration tools
o Forensic/admin tools
· Requires validation of file access event types
Tuning Explanation
Tightly scoped to:
· Known browser credential paths
· Non-browser access only
This eliminates generic file-access noise and targets credential theft behavior.
Expected Noise Profile
· Very low after suppression tuning
Variant Analysis
Covered
· Credential store access
· Cookie/session database access
Gaps
· In-memory theft
· Browser-internal access
· Cloud-only session abuse
Compensating Controls
· Identity provider telemetry
· Memory inspection tools
Execution Validity Statement
Executable if file access/read events are exposed in tenant; otherwise deploy as hunt-first.
Rule Regret Check
Deployment caution
Requires suppression tuning for legitimate tools.
Confidence caution
Dependent on file access visibility.
Coverage value
Very high-value credential theft detection.
Production Ready
Conditional
Engineering Note
Validate:
· File read vs open semantics
· Actual path structures in environment
· Tool suppression completeness
System-ready code
event_type IN ("file_access","file_open")
AND lower(src_process_name) NOT IN ("chrome.exe","msedge.exe","firefox.exe")
AND lower(src_process_name) NOT IN ("approved-tool.exe")
AND lower(target_file_path) RLIKE "chrome.*login data|chrome.*cookies|edge.*login data|firefox.*logins\\.json|firefox.*cookies"
Rule 3 — Browser-Initiated Execution of Suspicious Child Process
MITRE ATT&CK
· T1204 – User Execution
· T1059 – Command and Scripting Interpreter
Purpose
Detect browser-driven execution of suspicious interpreters or LOLBins.
Classification
Alert-capable supporting detection
SOC Usage Mode
Alert-capable supporting detection
Minimum Deployment Requirement
· Process creation telemetry
· Parent-child relationship visibility
· Command-line visibility
Enforcement Method
· Parent is browser
· Child is high-risk interpreter
· Command line contains suspicious execution indicators
Standalone Alerting Justification
Permitted because:
· Direct endpoint execution chain
· Strong behavioral signal
Implementation Constraint Notes
· Must suppress:
o Known enterprise helper processes
· Keep interpreter list narrow
Tuning Explanation
Requires BOTH:
· Suspicious parent-child relationship
· Suspicious command-line
This significantly reduces noise compared to generic process spawning.
Expected Noise Profile
· Low after suppression tuning
Variant Analysis
Covered
· Browser → PowerShell / CMD / script execution
· Download + execute patterns
Gaps
· Non-browser execution chains
· Credential-only phishing
Compensating Controls
· Email + endpoint correlation
· SIEM-based sequence detection
Execution Validity Statement
Executable with validated process and command-line fields.
Rule Regret Check
Deployment caution
Requires suppression tuning for legitimate helper processes.
Confidence caution
Does not detect non-execution phishing.
Coverage value
High-value early-stage execution detection.
Production Ready
Conditional
Engineering Note
Deploy in alert mode → validate Storyline patterns → tune suppressions → consider response actions.
System-ready code
event_type = "process_creation"
AND lower(parent_process_name) IN ("chrome.exe","msedge.exe","firefox.exe")
AND lower(process_name) IN ("powershell.exe","cmd.exe","wscript.exe","cscript.exe","mshta.exe","rundll32.exe")
AND lower(command_line) RLIKE "(http|https|download|string|encodedcommand|temp)"
Splunk
Rule 1 — Correlated Phishing Interaction → Suspicious Authentication → Suspicious External Login Infrastructure Access
MITRE ATT&CK
· T1566 – Phishing
· T1078 – Valid Accounts
Purpose
Detect a user-driven attack chain where phishing interaction is followed by suspicious successful authentication and subsequent access to non-sanctioned login-themed infrastructure.
Classification
Alert-capable
SOC Usage Mode
Alert-capable
Minimum Deployment Requirement
· Email telemetry with user-linked phishing interaction or alerts
· Authentication telemetry with:
o user
o src_ip
o action
o app/service
· Proxy or endpoint web telemetry with user attribution
· Lookup datasets:
o corporate IP ranges
o VPN egress ranges
o sanctioned login domains
o service accounts
Enforcement Method
· Stage 1: phishing interaction or phishing alert tied to user
· Stage 2: successful authentication from non-corporate, non-VPN source
· Stage 3: access to non-sanctioned login-themed destination
· All stages must occur within bounded time window
Standalone Alerting Justification
Permitted because detection requires three correlated attack stages tied to the same user, eliminating single-signal noise.
Implementation Constraint Notes
· Requires consistent user normalization across all telemetry sources
· Proxy or endpoint web logs must map to user identity
· Sanctioned domain lookup must be accurate and maintained
· Service accounts must be excluded
· Time window must remain constrained to prevent unrelated correlation
Tuning Explanation
This rule enforces a strict multi-stage correlation model. It was intentionally designed without transaction to improve performance and auditability while preserving sequence logic.
Expected Noise Profile
· Low with mature lookups and normalized user mapping
· Moderate if web telemetry lacks user attribution
Variant Analysis
Covered
· Phishing → credential use → suspicious infrastructure access
· Multi-stage identity compromise behavior
Gaps
· Credential theft without phishing evidence
· Abuse limited to sanctioned cloud services
· Weak user attribution environments
Compensating Controls
· Authentication anomaly rules
· Endpoint credential/session detection
· Identity-provider risk detections
Execution Validity Statement
Executable when required fields are normalized and lookup datasets are present and maintained. Customer data dependency is explicitly required.
Rule Regret Check
Deployment caution
Requires cross-source user normalization and lookup accuracy.
Confidence caution
Will miss attack paths lacking phishing or user-attributed web activity.
Coverage value
Very high-confidence, low-noise identity-chain detection.
Production Ready
Yes (with declared customer dependencies)
Engineering Note
Deploy in alert-only mode initially. Validate correlation fidelity, lookup completeness, and timing alignment before enabling automated response.
System-ready code
(
search index=email
| eval norm_user=lower(coalesce(user,recipient,mail_to))
| where isnotnull(norm_user)
| where action IN ("click","open","visit") OR like(alert_name,"%phish%") OR like(signature,"%malicious URL%")
| stats earliest(_time) AS phish_time BY norm_user
)
| append [
search index=auth
| eval norm_user=lower(user), norm_app=lower(coalesce(app,dest,service))
| lookup cdx_corporate_ip_ranges ip AS src_ip OUTPUT is_corporate
| lookup cdx_vpn_egress_ranges ip AS src_ip OUTPUT is_vpn
| lookup cdx_service_accounts user AS norm_user OUTPUT is_service
| where action="success" AND isnull(is_corporate) AND isnull(is_vpn) AND isnull(is_service)
| stats earliest(_time) AS auth_time values(src_ip) AS src_ip values(norm_app) AS app BY norm_user
]
| append [
search index=proxy
| eval norm_user=lower(user), norm_domain=lower(coalesce(url_domain,domain))
| lookup cdx_sanctioned_login_domains domain AS norm_domain OUTPUT is_sanctioned
| where isnull(is_sanctioned)
| where match(norm_domain,"(login|signin|auth|verify|account|mfa|sso)")
| stats earliest(_time) AS infra_time values(norm_domain) AS domain BY norm_user
]
| stats max(phish_time) AS phish_time max(auth_time) AS auth_time max(infra_time) AS infra_time values(src_ip) AS src_ip values(app) AS app values(domain) AS domain BY norm_user
| where isnotnull(phish_time) AND isnotnull(auth_time) AND isnotnull(infra_time)
| where auth_time>=phish_time AND infra_time>=auth_time AND (infra_time-phish_time)<=2700
Rule 2 — External Failure Burst Followed by Successful Access into New Application Context
MITRE ATT&CK
· T1110 – Brute Force
· T1078 – Valid Accounts
Purpose
Detect concentrated failed authentication attempts followed by successful access into a new or rarely used application context.
Classification
Alert-capable
SOC Usage Mode
Alert-capable
Minimum Deployment Requirement
· Authentication telemetry with normalized fields
· Lookup datasets:
o corporate IP ranges
o VPN ranges
o service accounts
o user-app baseline
Enforcement Method
· External source only
· Failure burst and success within time window
· Access to application not in baseline
Standalone Alerting Justification
Permitted because detection requires both attack pressure and successful access, plus novelty constraint.
Implementation Constraint Notes
· Requires mature user-app baseline
· If baseline weak:
o restrict to sensitive apps
o increase thresholds
Expected Noise Profile
· Low with mature baseline
· Moderate if baseline incomplete
Execution Validity Statement
Executable when baseline lookup exists and authentication fields are normalized.
Production Ready
Yes (with declared customer dependencies)
System-ready code
search index=auth
| eval norm_user=lower(user), norm_app=lower(coalesce(app,dest,service))
| lookup cdx_corporate_ip_ranges ip AS src_ip OUTPUT is_corporate
| lookup cdx_vpn_egress_ranges ip AS src_ip OUTPUT is_vpn
| where isnull(is_corporate) AND isnull(is_vpn)
| bin span=15m _time
| stats count(eval(action="failure")) AS failures count(eval(action="success")) AS successes BY _time norm_user src_ip norm_app
| where failures>=8 AND successes>=1
| lookup cdx_user_app_baseline user AS norm_user app AS norm_app OUTPUT is_known
| where isnull(is_known)
Rule 3 — Distributed Password Spraying from External Source
MITRE ATT&CK
· T1110 – Brute Force
Purpose
Detect external password spraying across multiple users from a single source.
Classification
Alert-capable
SOC Usage Mode
Alert-capable
Minimum Deployment Requirement
· Authentication telemetry
· Lookup datasets:
o corporate ranges
o VPN ranges
o scanner exclusions
Enforcement Method
· External source only
· High user spread
· Failure volume threshold
· Severity increases if success occurs
Standalone Alerting Justification
Permitted because multi-user failure behavior is a strong indicator of password spraying.
Expected Noise Profile
· Low with proper exclusions
Execution Validity Statement
Executable with normalized auth fields and exclusion lookups.
Production Ready
Yes
System-ready code
search index=auth
| eval norm_user=lower(user)
| lookup cdx_corporate_ip_ranges ip AS src_ip OUTPUT is_corporate
| lookup cdx_vpn_egress_ranges ip AS src_ip OUTPUT is_vpn
| lookup cdx_known_auth_scanners ip AS src_ip OUTPUT is_scanner
| where isnull(is_corporate) AND isnull(is_vpn) AND isnull(is_scanner)
| bin span=20m _time
| stats dc(eval(if(action="failure",norm_user,null()))) AS targeted_users count(eval(action="failure")) AS total_failures dc(eval(if(action="success",norm_user,null()))) AS success_users BY _time src_ip
| where targeted_users>=10 AND total_failures>=25
Elastic
Rule 1 — External Password Spraying from Single Source (Primary Detection)
MITRE ATT&CK
· T1110 – Brute Force
Purpose
Detect password spraying where a single external source attempts authentication across many users.
Elastic Rule Type
Threshold Rule
Classification
Alert-capable
SOC Usage Mode
Alert-capable
Minimum Deployment Requirement
· user.name
· source.ip
· event.outcome
· Exclusion datasets:
o corporate IP ranges
o VPN ranges
o scanner infrastructure
Enforcement Method
· External source only
· Distinct user count threshold
· Failure volume threshold
Standalone Alerting Justification
Permitted because multi-user failure activity from a single external source is a strong and well-established attack signal.
Implementation Constraint Notes
· Must exclude trusted and internal ranges
· Must exclude scanners and testing systems
· Must validate that service-account activity does not distort user counts
Expected Noise Profile
· Low with proper exclusions
Variant Analysis
Covered
· Classic password spraying
· Credential stuffing via single source
Gaps
· Distributed spray
· Trusted egress abuse
Execution Validity Statement
Executable with normalized authentication telemetry and maintained exclusion datasets.
Production Ready
Yes
System-ready code
event.category:authentication and event.outcome:failure and source.ip:* and user.name:* and
not cidrmatch(source.ip, "CDX_CORPORATE_RANGES") and
not cidrmatch(source.ip, "CDX_VPN_RANGES") and
not source.ip: ("CDX_KNOWN_SCANNERS")
Rule Builder Configuration
· Group by: source.ip
· Time window: 20 minutes
· Failures ≥ 25
· Distinct users ≥ 10
Rule 2 — Distributed Password Spraying Across Multiple Sources (Gap Closure Detection)
MITRE ATT&CK
· T1110 – Brute Force
Purpose
Detect coordinated password spraying distributed across multiple external IPs targeting many users within a short time window.
Elastic Rule Type
ES|QL Rule
Classification
Alert-capable supporting detection
SOC Usage Mode
Alert-capable supporting detection
Minimum Deployment Requirement
· Same as Rule 1
· Stable authentication telemetry
Enforcement Method
· External failures only
· Multiple source IPs
· Multiple distinct users
· Aggregate failure threshold
Standalone Alerting Justification
Permitted because aggregated multi-source targeting behavior indicates coordinated attack activity.
Implementation Constraint Notes
· More sensitive to noisy integrations
· Requires strong exclusion hygiene
· Should be deployed after Rule 1 stabilization
Expected Noise Profile
· Low to moderate
Variant Analysis
Covered
· Distributed password spraying
· Low-and-slow spray avoiding single-IP thresholds
Gaps
· Extremely low-frequency attacks
· Trusted egress abuse
Execution Validity Statement
Executable with normalized telemetry and maintained exclusion datasets.
Production Ready
Yes (with declared dependencies)
System-ready code
FROM auth-*
| WHERE event.outcome == "failure"
AND user.name IS NOT NULL
AND source.ip IS NOT NULL
AND CIDR_MATCH(source.ip, "CDX_CORPORATE_RANGES") == false
AND CIDR_MATCH(source.ip, "CDX_VPN_RANGES") == false
AND source.ip NOT IN ("CDX_KNOWN_SCANNERS")
| EVAL bucket = DATE_TRUNC(15 minutes, @timestamp)
| STATS
total_failures = COUNT(*),
targeted_users = COUNT_DISTINCT(user.name),
source_ips = COUNT_DISTINCT(source.ip)
BY bucket
| WHERE total_failures >= 40 AND targeted_users >= 10 AND source_ips >= 5
Rule 3 — External Failure Burst Followed by Successful Authentication (Compromise Indicator)
MITRE ATT&CK
· T1110 – Brute Force
· T1078 – Valid Accounts
Purpose
Detect successful authentication following concentrated failed attempts from the same external source.
Elastic Rule Type
ES|QL Rule
Classification
Alert-capable
SOC Usage Mode
Alert-capable
Minimum Deployment Requirement
· Authentication telemetry:
o user.name
o source.ip
o event.outcome
Enforcement Method
· External source only
· Failure threshold
· Success condition
· Same user and source
Standalone Alerting Justification
Permitted because detection combines attack pressure with successful access.
Implementation Constraint Notes
· Must exclude trusted ranges
· Must exclude service accounts
· Must maintain tight time window
Expected Noise Profile
· Low
Variant Analysis
Covered
· Credential guessing with success
· Credential replay
Gaps
· Distributed attacks
· Token-based abuse
Execution Validity Statement
Executable with normalized authentication telemetry.
Production Ready
Yes
System-ready code
FROM auth-*
| WHERE user.name IS NOT NULL
AND source.ip IS NOT NULL
AND event.outcome IN ("failure","success")
AND CIDR_MATCH(source.ip, "CDX_CORPORATE_RANGES") == false
AND CIDR_MATCH(source.ip, "CDX_VPN_RANGES") == false
| EVAL bucket = DATE_TRUNC(15 minutes, @timestamp)
| STATS
failures = COUNT(IF(event.outcome == "failure", 1, NULL)),
successes = COUNT(IF(event.outcome == "success", 1, NULL))
BY bucket, user.name, source.ip
| WHERE failures >= 8 AND successes >= 1
QRadar
Required Supporting Building Blocks
BB:Exclude Trusted Corporate Source IPs
Purpose
Exclude enterprise-controlled infrastructure.
Required Content
· Corporate NAT ranges
· Data center egress IPs
· Approved cloud egress
Operational Role
Ensures only external sources are evaluated.
BB:Exclude Approved VPN Source IPs
Purpose
Exclude legitimate remote access traffic.
Required Content
· VPN exit IP ranges
Operational Role
Prevents user-originated access from triggering detections.
BB:Exclude Known Scanners and Auth Test Systems
Purpose
Remove synthetic authentication noise.
Required Content
· Vulnerability scanners
· QA/test systems
· Red-team infrastructure
Operational Role
Prevents false positives from testing activity.
BB:Exclude Service and Automation Accounts
Purpose
Reduce non-human authentication noise.
Required Content
· Service accounts
· Automation identities
Operational Role
Prevents distortion of user-based thresholds.
Rule Name
External Password Spraying from Single Source
MITRE ATT&CK
· T1110 – Brute Force
Purpose
Detect password spraying from a single external source.
QRadar Rule Type
CRE Event Rule with aggregation
Classification
Alert-capable
SOC Usage Mode
Alert-capable
Minimum Deployment Requirement
· DSM parsing for Username, Source IP, Failure events
· Building blocks:
o Corporate IP exclusion
o VPN exclusion
o Scanner exclusion
Enforcement Method
· Authentication failures
· External source only
· Group by Source IP
· COUNT ≥ 25
· UNIQUE Username ≥ 10
· WITHIN 20 minutes
Standalone Alerting Justification
Strong known attack pattern.
Implementation Constraint Notes
· Validate DSM parsing
· Ensure exclusions are complete
Tuning Explanation
Primary low-noise detection rule.
Expected Noise Profile
Low
Variant Analysis
Covered
· Classic spraying
Gaps
· Distributed spray
Compensating Controls
· Rule 2
Execution Validity Statement
Executable with proper parsing and exclusions.
Rule Regret Check
Deployment caution
Requires accurate exclusions
Confidence caution
Misses distributed spray
Coverage value
Primary detection
Production Ready
Yes
Engineering Note
Incomplete without building blocks.
System-ready code
WHEN Authentication Failure
AND NOT matches BB:Exclude Trusted Corporate Source IPs
AND NOT matches BB:Exclude Approved VPN Source IPs
AND NOT matches BB:Exclude Known Scanners
GROUP BY Source IP
HAVING COUNT >= 25
AND UNIQUE Username >= 10
WITHIN 20 minutes
CREATE OFFENSE "Password Spraying Detected from Single Source"
Rule Name
Distributed Password Spraying Across Multiple Sources
MITRE ATT&CK
· T1110 – Brute Force
Purpose
Detect distributed password spraying.
QRadar Rule Type
CRE Event Rule (global aggregation)
Classification
Alert-capable supporting detection
SOC Usage Mode
Alert-capable supporting detection
Minimum Deployment Requirement
Same as Rule 1
Enforcement Method
· Authentication failures
· External sources
· COUNT ≥ 40
· UNIQUE Username ≥ 10
· UNIQUE Source IP ≥ 5
· WITHIN 15 minutes
Standalone Alerting Justification
Indicates coordinated attack behavior.
Implementation Constraint Notes
· Noise-sensitive
· Requires stable environment
Tuning Explanation
Gap-closure rule.
Expected Noise Profile
Low to moderate
Variant Analysis
Covered
· Distributed spray
Gaps
· Very slow attacks
Compensating Controls
· Rule 1
Execution Validity Statement
Executable with clean exclusions.
Rule Regret Check
Deployment caution
Sensitive to auth storms
Confidence caution
May alert during outages
Coverage value
Gap closure
Production Ready
Yes
Engineering Note
Deploy after Rule 1.
System-ready code
WHEN Authentication Failure
AND NOT matches BB:Exclude Trusted Corporate Source IPs
AND NOT matches BB:Exclude Approved VPN Source IPs
AND NOT matches BB:Exclude Known Scanners
GROUP ALL EVENTS
HAVING COUNT >= 40
AND UNIQUE Username >= 10
AND UNIQUE Source IP >= 5
WITHIN 15 minutes
CREATE OFFENSE "Distributed Password Spraying Detected"
Rule Name
External Failure Burst Followed by Successful Authentication
MITRE ATT&CK
· T1110 – Brute Force
· T1078 – Valid Accounts
Purpose
Detect successful login after repeated failures.
QRadar Rule Type
CRE Event Rule with sequential condition
Classification
Alert-capable
SOC Usage Mode
Alert-capable
Minimum Deployment Requirement
· DSM parsing for success/failure
· Building blocks:
o Corporate exclusion
o VPN exclusion
o Service account exclusion
Enforcement Method
· Failures ≥ 8
· Same Source IP + Username
· Followed by success
· Within 15 minutes
Standalone Alerting Justification
Combines pressure and success.
Implementation Constraint Notes
· Requires reliable parsing
· Must exclude noisy identities
Tuning Explanation
Compromise indicator.
Expected Noise Profile
Low
Variant Analysis
Covered
· Successful compromise
Gaps
· Distributed attacks
Compensating Controls
· Rule 1 and Rule 2
Execution Validity Statement
Executable with proper parsing.
Rule Regret Check
Deployment caution
Sensitive to retries
Confidence caution
Weaker for distributed patterns
Coverage value
Strong signal
Production Ready
Yes
Engineering Note
Deploy after Rule 1.
System-ready code
WHEN Authentication Failure
AND NOT matches BB:Exclude Trusted Corporate Source IPs
AND NOT matches BB:Exclude Approved VPN Source IPs
AND NOT matches BB:Exclude Service and Automation Accounts
GROUP BY Source IP, Username
HAVING COUNT >= 8
WITHIN 15 minutes
FOLLOWED BY Authentication Success
WITH SAME Source IP AND Username
CREATE OFFENSE "External Failure Burst Followed by Successful Authentication"
Sigma
Required Supporting Dependencies
Dependency Name
Field Mapping Normalization
Purpose
Ensure Sigma fields map correctly to backend-native fields.
Required Content
· SourceIp
· TargetUser
· EventType
· Authentication success/failure outcome
Operational Role
Prevents detection degradation caused by schema mismatch.
Dependency Name
Trusted Network Exclusions
Purpose
Exclude sanctioned infrastructure from auth-abuse detections.
Required Content
· Corporate IP ranges
· VPN IP ranges
Operational Role
Ensures detections remain external-source focused.
Dependency Name
Scanner and Test System Exclusions
Purpose
Remove synthetic authentication activity.
Required Content
· Scanner IPs
· QA/test systems
· Red-team testing infrastructure
Operational Role
Prevents false positives from authorized testing.
Dependency Name
Service and Automation Account Exclusions
Purpose
Reduce non-human authentication noise.
Required Content
· Service accounts
· Automation identities
· Machine-auth accounts where applicable
Operational Role
Prevents threshold distortion and noisy retry patterns.
Rule Name
External Password Spraying from Single Source
MITRE ATT&CK
· T1110 – Brute Force
Purpose
Detect repeated authentication failures from one external source targeting many distinct user accounts within a short interval.
Sigma Rule Type
Correlation Rule
Classification
Alert-capable
SOC Usage Mode
Alert-capable
Minimum Deployment Requirement
· Authentication failure logs
· Field mapping for:
o SourceIp
o TargetUser
o Authentication failure indicator
· Backend support for:
o event aggregation
o grouping by SourceIp
o distinct TargetUser counting
· Trusted network and scanner exclusions
Enforcement Method
· Authentication failures only
· External source only
· Group by SourceIp
· COUNT ≥ 25
· DISTINCT TargetUser ≥ 10
· WITHIN 20 minutes
Standalone Alerting Justification
Permitted because repeated failures against many users from one external source is a strong, well-established password-spraying pattern.
Implementation Constraint Notes
· This rule is only full-fidelity on backends that support distinct-count correlation
· If the target backend cannot support distinct-user counting, this Sigma rule remains the canonical design but must be implemented natively in the destination platform
· Do not silently downgrade the logic
Tuning Explanation
This is the primary Sigma auth-abuse rule because it is the strongest and lowest-noise portable detection in the set.
Expected Noise Profile
Low
Variant Analysis
Covered
· Classic password spraying
· Credential stuffing concentrated through one source
Gaps
· Distributed password spraying
· Trusted-egress abuse
· Passwordless or token-first abuse
Compensating Controls
· Distributed spraying rule
· Failure-to-success compromise rule
· Backend-native identity anomaly detections
Execution Validity Statement
Conditionally executable. Full execution fidelity requires a backend that supports grouped aggregation and distinct-user counting.
Rule Regret Check
Deployment caution
Requires backend support for distinct-user aggregation.
Confidence caution
Will miss distributed and trusted-egress spraying.
Coverage value
Primary, high-confidence password-spraying detection.
Production Ready
Yes, with declared customer and backend dependencies
Engineering Note
This rule is complete as a Sigma design artifact. It is not complete as an operational deployment unless the target backend can preserve distinct-user correlation semantics.
System-ready code
title: External Password Spraying from Single Source
id: cdx-sigma-001
status: stable
description: Detects authentication failures from one external source targeting many users within a short period.
author: CyberDax
date: 2026-04-06
tags:
- attack.t1110
- cdx.backend_requires_correlation
- cdx.backend_requires_distinct_count
logsource:
category: authentication
detection:
selection:
EventType: AuthenticationFailure
filter_internal:
SourceIp|cidr:
- CORPORATE_RANGES
- VPN_RANGES
filter_scanner:
SourceIp:
- SCANNER_IPS
filter_service:
TargetUser:
- SERVICE_ACCOUNTS
condition: selection and not 1 of filter_*
fields:
- SourceIp
- TargetUser
falsepositives:
- Authorized authentication testing from undeclared infrastructure
level: high
---
title: Correlation - External Password Spraying from Single Source
status: stable
correlation:
type: event_count
rules:
- External Password Spraying from Single Source
group-by:
- SourceIp
timespan: 20m
condition:
gte: 25
generate: true
x-cyberdax-requirements:
distinct_target_user_count: ">=10"
backend_requirement: "must support distinct count of TargetUser per SourceIp"
fidelity_warning: "native backend implementation required if distinct TargetUser correlation cannot be preserved"
Rule Name
Distributed Password Spraying Across Multiple Sources
MITRE ATT&CK
· T1110 – Brute Force
Purpose
Detect coordinated authentication failures distributed across multiple external IPs targeting many user accounts in a short period.
Sigma Rule Type
Correlation Rule
Classification
Alert-capable supporting detection
SOC Usage Mode
Alert-capable supporting detection
Minimum Deployment Requirement
· Authentication failure logs
· Field mapping for:
o SourceIp
o TargetUser
· Backend support for:
o total event counting
o distinct TargetUser counting
o distinct SourceIp counting
· Trusted network and scanner exclusions
Enforcement Method
· Authentication failures only
· External sources only
· COUNT ≥ 40
· DISTINCT TargetUser ≥ 10
· DISTINCT SourceIp ≥ 5
· WITHIN 15 minutes
Standalone Alerting Justification
Permitted as a supporting detection because many external sources targeting many users in one bounded window is strong evidence of coordinated distributed auth abuse.
Implementation Constraint Notes
· This rule is more backend-sensitive than Rule 1
· If the backend cannot support both distinct SourceIp and distinct TargetUser cardinality, implement natively in the destination SIEM
· Do not ship this as “equivalent” if translation degrades either count dimension
Tuning Explanation
This is the gap-closure rule for distributed spraying that avoids single-source thresholds.
Expected Noise Profile
Low to moderate
Variant Analysis
Covered
· Distributed password spraying
· Lower-volume spray kept below per-source thresholds
Gaps
· Very slow attacks across long periods
· Trusted-egress abuse
· Token-first abuse
Compensating Controls
· Rule 1
· Backend-native identity anomaly detections
· IdP-native detections for risky sign-in patterns
Execution Validity Statement
Conditionally executable. Full fidelity requires multi-cardinality backend support.
Rule Regret Check
Deployment caution
Requires backend support for distinct-user and distinct-source aggregation.
Confidence caution
More noise-sensitive than the single-source spray rule.
Coverage value
Critical gap-closure analytic for distributed spraying.
Production Ready
Yes, with declared customer and backend dependencies
Engineering Note
This rule should remain supporting, not primary. If backend conversion weakens either distinct-count condition, native implementation is required.
System-ready code
title: Distributed Password Spraying Across Multiple Sources
id: cdx-sigma-002
status: stable
description: Detects distributed authentication failures across multiple external IPs targeting many users.
author: CyberDax
date: 2026-04-06
tags:
- attack.t1110
- cdx.backend_requires_correlation
- cdx.backend_requires_multi_cardinality
logsource:
category: authentication
detection:
selection:
EventType: AuthenticationFailure
filter_internal:
SourceIp|cidr:
- CORPORATE_RANGES
- VPN_RANGES
filter_scanner:
SourceIp:
- SCANNER_IPS
filter_service:
TargetUser:
- SERVICE_ACCOUNTS
condition: selection and not 1 of filter_*
fields:
- SourceIp
- TargetUser
falsepositives:
- Large benign authentication disruptions from undeclared external services
level: medium
---
title: Correlation - Distributed Password Spraying Across Multiple Sources
status: stable
correlation:
type: event_count
rules:
- Distributed Password Spraying Across Multiple Sources
timespan: 15m
condition:
gte: 40
generate: true
x-cyberdax-requirements:
distinct_target_user_count: ">=10"
distinct_source_ip_count: ">=5"
backend_requirement: "must support multi-cardinality aggregation over TargetUser and SourceIp"
fidelity_warning: "native backend implementation required if either distinct count cannot be preserved"
Rule Name
External Failure Burst Followed by Successful Authentication
MITRE ATT&CK
· T1110 – Brute Force
· T1078 – Valid Accounts
Purpose
Detect successful authentication following repeated failures from the same external source against the same user within a short interval.
Sigma Rule Type
Correlation Rule
Classification
Alert-capable
SOC Usage Mode
Alert-capable
Minimum Deployment Requirement
· Authentication success and failure logs
· Field mapping for:
o SourceIp
o TargetUser
o Authentication success/failure outcome
· Backend support for:
o temporal ordering or paired correlation
o grouping on SourceIp and TargetUser
· Trusted network and service-account exclusions
Enforcement Method
· Same SourceIp + TargetUser
· Failure count ≥ 8
· Followed by successful authentication
· WITHIN 15 minutes
Standalone Alerting Justification
Permitted because it combines attack pressure with access outcome, making it a materially stronger compromise indicator than failures alone.
Implementation Constraint Notes
· This is the most backend-sensitive rule in the Sigma set
· If the backend cannot preserve ordered correlation on SourceIp + TargetUser, implement natively
· Do not claim backend equivalence unless temporal ordering is preserved
Tuning Explanation
This is the compromise-indicator rule. It is narrower and more implementation-sensitive than the spray rules, but still valuable when temporal correlation is supported.
Expected Noise Profile
Low
Variant Analysis
Covered
· Credential guessing resulting in successful access
· Replay from one source against one user
· External auth pressure followed by login success
Gaps
· Distributed auth pressure
· Existing trusted-session abuse
· Token-first or passwordless auth flows
Compensating Controls
· Rule 1
· Rule 2
· Backend-native identity and MFA abuse detections
Execution Validity Statement
Conditionally executable. Full fidelity requires backend support for ordered or paired temporal correlation on SourceIp + TargetUser.
Rule Regret Check
Deployment caution
Requires backend sequencing support and reliable success/failure normalization.
Confidence caution
Most backend-sensitive rule in the Sigma set and weaker for distributed patterns.
Coverage value
Strong compromise indicator when temporal correlation is preserved.
Production Ready
Yes, with declared customer and backend dependencies
Engineering Note
If the backend cannot support temporal sequencing faithfully, retain this Sigma rule as the canonical detection definition and implement the operational rule natively.
System-ready code
title: External Authentication Failure Burst
id: cdx-sigma-003a
status: stable
description: Detects external authentication failures for the same user and source.
author: CyberDax
date: 2026-04-06
tags:
- attack.t1110
- cdx.backend_requires_correlation
- cdx.backend_requires_temporal_order
logsource:
category: authentication
detection:
selection:
EventType: AuthenticationFailure
filter_internal:
SourceIp|cidr:
- CORPORATE_RANGES
- VPN_RANGES
filter_service:
TargetUser:
- SERVICE_ACCOUNTS
condition: selection and not 1 of filter_*
fields:
- SourceIp
- TargetUser
level: medium
---
title: External Authentication Success
id: cdx-sigma-003b
status: stable
description: Detects external authentication success for the same user and source.
author: CyberDax
date: 2026-04-06
tags:
- attack.t1078
- cdx.backend_requires_correlation
- cdx.backend_requires_temporal_order
logsource:
category: authentication
detection:
selection:
EventType: AuthenticationSuccess
filter_internal:
SourceIp|cidr:
- CORPORATE_RANGES
- VPN_RANGES
filter_service:
TargetUser:
- SERVICE_ACCOUNTS
condition: selection and not 1 of filter_*
fields:
- SourceIp
- TargetUser
level: high
---
title: Correlation - External Failure Burst Followed by Successful Authentication
status: stable
correlation:
type: temporal_ordered
rules:
- External Authentication Failure Burst
- External Authentication Success
group-by:
- SourceIp
- TargetUser
timespan: 15m
generate: true
x-cyberdax-requirements:
failure_count: ">=8"
backend_requirement: "must support ordered temporal correlation grouped by SourceIp and TargetUser"
fidelity_warning: "native backend implementation required if ordered correlation cannot be preserved"
YARA
Required Supporting Dependencies
Dependency Name
Suspicious Artifact Scan Scope Definition
Purpose
Constrain YARA scanning to high-value, low-noise artifact locations.
Required Content
· email detonation output paths
· endpoint quarantine or malware repository paths
· suspicious download directories under investigation
· unpacked phishing kit folders
· recovered webroot or staging artifacts from incident response
Operational Role
Prevents broad indiscriminate scanning of legitimate enterprise code, templates, and repositories.
Dependency Name
Approved Template and Research Exclusions
Purpose
Prevent legitimate branded templates, research artifacts, and lab materials from triggering detections.
Required Content
· sanctioned login page templates
· approved SSO branding assets
· internal phishing simulation artifacts
· internal reverse-proxy lab or training materials
· approved browser migration, password-management, or forensic tools
Operational Role
Reduces false positives by excluding known-good artifacts that may otherwise resemble malicious content.
Dependency Name
Deployment Context Classification
Purpose
Define where each rule is intended to be used.
Required Content
· endpoint artifact triage
· email attachment analysis
· malware repository scanning
· suspicious web-content review
· IR collection review
Operational Role
Ensures each rule is deployed in the correct analytical context instead of broad uncontrolled scanning.
Rule Name
External Credential-Harvesting HTML or JavaScript Page Artifact
MITRE ATT&CK
· T1566 – Phishing
· T1056 – Input Capture
Purpose
Detect credential-harvesting page artifacts that contain login capture logic, username and password field semantics, and suspicious external submission or lure behavior.
YARA Rule Type
Standard YARA file-content rule
Classification
Alert-capable supporting detection
SOC Usage Mode
Alert-capable supporting detection
Minimum Deployment Requirement
· Deployment context:
o email attachment detonation
o endpoint artifact triage
o suspicious web-content triage
o unpacked phishing kit review
· Dependencies:
o Suspicious Artifact Scan Scope Definition
o Approved Template and Research Exclusions
o Deployment Context Classification
· Readable HTML, HTM, JS, or text-based content
Enforcement Method
· Require both username and password capture semantics
· Require either:
o suspicious external submission behavior
o or login-form semantics plus lure language
· Constrain filesize to common phishing-page artifact size
· Encode intended scan scope and exclusions in metadata
Standalone Alerting Justification
Permitted because this rule targets a concrete phishing artifact rather than speculative runtime behavior.
Implementation Constraint Notes
· Do not run this broadly across sanctioned enterprise web repositories without exclusions
· If legitimate SSO templates are in scope, exclude by path, repository, or deployment bucket
· Best used on suspicious artifacts, not on general-purpose web application source trees
Tuning Explanation
This rule is hardened to avoid firing on generic login pages alone. It requires credential-capture semantics plus suspicious submission or lure logic, which materially reduces noise.
Expected Noise Profile
· Low when deployed against suspicious artifact collections
· Moderate if applied broadly across legitimate template repositories without exclusions
Variant Analysis
Covered
· Fake login pages that capture username and password
· MFA-themed lure pages
· HTML or JavaScript phishing artifacts with external submit behavior
Gaps
· Purely server-side phishing logic
· Dynamic phishing content not present in recovered files
· Minimal reverse-proxy phishing kits with almost no static lure content
Compensating Controls
· Reverse-proxy phishing config rule
· Email security detections
· Proxy, DNS, IdP, and session-abuse detections
Execution Validity Statement
Executable as a production YARA rule when scan scope and exclusions are explicitly controlled.
Rule Regret Check
Deployment caution
Do not deploy this against sanctioned enterprise template stores without exclusion control.
Confidence caution
Will miss phishing implementations that do not leave recoverable client-side page artifacts.
Coverage value
High-value artifact detector for credential-harvesting pages recovered from endpoints, emails, or phishing kit bundles.
Production Ready
Yes, with declared customer dependencies
Engineering Note
This rule is only complete when the customer defines:
· the suspicious artifact scan scope
· sanctioned template exclusions
· intended deployment context
System-ready code
rule CDX_YARA_External_Credential_Harvesting_Page
{
meta:
description = "Detects credential-harvesting HTML or JavaScript artifacts with login-field capture and suspicious submission behavior"
author = "CyberDax"
date = "2026-04-06"
attack_1 = "T1566"
attack_2 = "T1056"
cdx_artifact_only = "true"
cdx_scan_scope = "suspicious_artifacts_only"
cdx_deployment_context = "email_detonation,endpoint_artifact_triage,phishing_kit_review"
cdx_exclusions_required = "approved_login_templates,research_materials,simulation_artifacts"
cdx_fidelity_warning = "broad unsupervised repository scanning may increase noise"
strings:
$form_login = /<form[^>]{0,512}(login|signin|auth|verify|account|mfa|sso)/ nocase ascii
$pwd_field = /name\s*=\s*["'](pass|password|passwd|pwd)["']/ nocase ascii
$user_field = /name\s*=\s*["'](user|username|email|login|identifier)["']/ nocase ascii
$submit_ext = /action\s*=\s*["']https?:\/\/(?![^"']*(microsoftonline\.com|office\.com|office365\.com|live\.com|okta\.com|duo\.com))[^"']+/ nocase ascii
$mfa_lure = /(mfa|2fa|verification code|approve sign-?in|confirm your account)/ nocase ascii
$brand_lure = /(sign in|verify your account|session expired|unusual activity)/ nocase ascii
condition:
filesize < 500KB and
$pwd_field and
$user_field and
(
$submit_ext or
( $form_login and 1 of ($mfa_lure, $brand_lure) )
)
}
Rule Name
Browser Credential and Session Store Theft Tool or Script Artifact
MITRE ATT&CK
· T1555 – Credentials from Password Stores
· T1539 – Steal Web Session Cookie
Purpose
Detect tools or scripts that target browser credential or session stores and combine that access with extraction, decryption, staging, or exfiltration behavior.
YARA Rule Type
Standard YARA file-content rule
Classification
Alert-capable
SOC Usage Mode
Alert-capable
Minimum Deployment Requirement
· Deployment context:
o endpoint artifact triage
o malware repository scanning
o suspicious attachment or download analysis
· Dependencies:
o Suspicious Artifact Scan Scope Definition
o Approved Template and Research Exclusions
o Deployment Context Classification
· Readable strings from scripts, binaries, or bundled tooling
Enforcement Method
· Require browser-store target strings
· Require theft-oriented operational logic:
o SQLite access
o decryption
o copy/staging
· Require exfiltration or upload behavior
· Encode intended scan scope and exclusions in metadata
Standalone Alerting Justification
Permitted because this rule targets a concrete theft-oriented artifact that combines sensitive store targeting with operational theft behavior.
Implementation Constraint Notes
· Exclude approved browser migration tools, password managers, and forensic utilities if in scope
· Best used on suspicious scripts, binaries, quarantine, and recovered tooling
· Do not use broad internal script-repository scanning without explicit exclusions
Tuning Explanation
This rule is hardened to require browser-store targets plus theft-oriented behavior plus exfiltration or upload semantics. That keeps it lower-noise than simple path-string detection.
Expected Noise Profile
· Low when used on suspicious artifacts and quarantine
· Moderate if broad internal admin or migration script repositories are scanned without exclusions
Variant Analysis
Covered
· Tools targeting Chrome, Edge, or Firefox credential/session stores
· Artifacts referencing Login Data, Cookies, Web Data, logins.json, key4.db, or cookies.sqlite
· Tooling that combines store access with extraction, decryption, or exfiltration
Gaps
· In-memory-only theft
· Living-off-the-land access with minimal strings
· Cloud-only session abuse after prior theft
Compensating Controls
· Endpoint behavioral detections
· IdP and cloud-session detections
· Reverse-proxy phishing config rule
Execution Validity Statement
Executable as a production YARA rule when scan scope and approved-tool exclusions are explicitly controlled.
Rule Regret Check
Deployment caution
Must exclude sanctioned migration, password-management, and forensic tooling if those artifacts are in scope.
Confidence caution
Will miss in-memory theft and highly stripped artifacts with minimal readable strings.
Coverage value
Very high-value artifact detector for browser credential and session theft tooling.
Production Ready
Yes, with declared customer dependencies
Engineering Note
This rule is only complete when the customer defines:
· approved-tool exclusions
· suspicious artifact paths
· deployment context
System-ready code
rule CDX_YARA_Browser_Credential_Session_Store_Theft_Tool
{
meta:
description = "Detects tooling that targets browser credential or session stores and pairs access with theft-oriented behavior"
author = "CyberDax"
date = "2026-04-06"
attack_1 = "T1555"
attack_2 = "T1539"
cdx_artifact_only = "true"
cdx_scan_scope = "suspicious_artifacts_only"
cdx_deployment_context = "endpoint_artifact_triage,malware_repository,attachment_analysis"
cdx_exclusions_required = "approved_password_managers,migration_tools,forensic_utilities"
cdx_fidelity_warning = "broad internal script scanning may increase noise"
strings:
$chrome_login = "Login Data" ascii wide
$chrome_cookies = "Cookies" ascii wide
$chrome_webdata = "Web Data" ascii wide
$firefox_login = "logins.json" ascii wide
$firefox_key4 = "key4.db" ascii wide
$firefox_cookie = "cookies.sqlite" ascii wide
$local_state = "Local State" ascii wide
$sqlite1 = "sqlite3" ascii wide
$sqlite2 = "SELECT origin_url, username_value, password_value" ascii wide
$decrypt1 = "CryptUnprotectData" ascii wide
$decrypt2 = "os_crypt" ascii wide
$copy1 = "copyfile" ascii wide
$copy2 = "shutil.copy" ascii wide
$exfil1 = "requests.post" ascii wide
$exfil2 = "Invoke-WebRequest" ascii wide
$exfil3 = "WinHttpOpenRequest" ascii wide
$exfil4 = "upload" ascii wide
$exfil5 = "multipart/form-data" ascii wide
condition:
filesize < 2MB and
2 of ($chrome_*,$firefox_*,$local_state) and
1 of ($sqlite*,$decrypt*,$copy*) and
1 of ($exfil*)
}
Rule Name
Reverse-Proxy Phishing Kit Configuration or Session-Capture Artifact
MITRE ATT&CK
· T1566 – Phishing
· T1539 – Steal Web Session Cookie
· T1078 – Valid Accounts
Purpose
Detect reverse-proxy phishing kit configuration artifacts or phishlet-style files used to capture sessions, cookies, tokens, or credentials.
YARA Rule Type
Standard YARA file-content rule
Classification
Alert-capable supporting detection
SOC Usage Mode
Alert-capable supporting detection
Minimum Deployment Requirement
· Deployment context:
o IR artifact review
o phishing kit directory review
o suspicious repository or staging review
· Dependencies:
o Suspicious Artifact Scan Scope Definition
o Approved Template and Research Exclusions
o Deployment Context Classification
· Readable config or template files
Enforcement Method
· Require multiple phishlet-style or reverse-proxy capture semantics
· Require credential/session/token capture semantics
· Require auth-provider or login lure semantics
· Tighten condition so generic proxy configs do not satisfy it
· Encode intended scan scope and exclusions in metadata
Standalone Alerting Justification
Permitted because this rule targets a concrete configuration artifact associated with session or credential capture.
Implementation Constraint Notes
· Exclude sanctioned internal reverse-proxy research, labs, and training materials if in scope
· Use this on suspicious configs or investigation collections, not on broad general-purpose infrastructure repositories
· This rule is intended for phishing/session-capture proxy artifacts, not generic reverse proxies
Tuning Explanation
This rule is tightened beyond the prior version by requiring a more specific combination:
· reverse-proxy capture semantics
· credential/session semantics
· auth-provider or lure semantics
That reduces the chance of generic proxy configuration matches.
Expected Noise Profile
· Low when used on suspicious config artifacts or recovered phishing kit content
· Moderate if used across broad security-research repositories without exclusions
Variant Analysis
Covered
· Reverse-proxy phishing kit configs
· Session-cookie or token-capture config artifacts
· Credential field capture config logic tied to auth-provider lures
Gaps
· Minimal custom frameworks with no recognizable config semantics
· Purely runtime-only session capture with no recovered config artifacts
· Generic reverse proxies not built for credential or session capture
Compensating Controls
· Credential-harvesting page rule
· IdP, proxy, and session-abuse detections
· Endpoint detections for credential-store theft
Execution Validity Statement
Executable as a production YARA rule when suspicious config scope and sanctioned research exclusions are explicitly controlled.
Rule Regret Check
Deployment caution
Must exclude sanctioned internal lab, research, or training artifacts if present in scan scope.
Confidence caution
Will miss custom or minimal frameworks that do not expose recognizable capture-oriented config strings.
Coverage value
High-value artifact detector for reverse-proxy phishing and session-capture kit components.
Production Ready
Yes, with declared customer dependencies
Engineering Note
This rule is only complete when the customer defines:
· suspicious config scan scope
· internal lab and research exclusions
· deployment context
System-ready code
rule CDX_YARA_Reverse_Proxy_Phishing_Kit_Config
{
meta:
description = "Detects reverse-proxy phishing kit or phishlet-style configuration artifacts used for session or credential capture"
author = "CyberDax"
date = "2026-04-06"
attack_1 = "T1566"
attack_2 = "T1539"
attack_3 = "T1078"
cdx_artifact_only = "true"
cdx_scan_scope = "suspicious_artifacts_only"
cdx_deployment_context = "ir_artifact_review,phishing_kit_review,suspicious_config_review"
cdx_exclusions_required = "internal_proxy_labs,research_materials,training_artifacts"
cdx_fidelity_warning = "broad scanning of generic proxy repositories may increase noise"
strings:
$rp1 = "proxy_hosts" ascii wide
$rp2 = "sub_filters" ascii wide
$rp3 = "landing_path" ascii wide
$rp4 = "js_inject" ascii wide
$cap1 = "auth_tokens" ascii wide
$cap2 = "credentials" ascii wide
$cap3 = "cookies" ascii wide
$cap4 = "session" ascii wide
$cap5 = "password" ascii wide
$cap6 = "username" ascii wide
$idp1 = "login.microsoftonline.com" ascii wide
$idp2 = "okta.com" ascii wide
$idp3 = "duosecurity.com" ascii wide
$idp4 = "office.com" ascii wide
$idp5 = "microsoftonline.com" ascii wide
condition:
filesize < 1MB and
2 of ($rp*) and
2 of ($cap*) and
1 of ($idp*)
}
AWS
Required Supporting Dependencies
Dependency Name
Trusted Administrative Network Scope
Purpose
Define which source networks are sanctioned for administrative access.
Required Content
· corporate egress CIDRs
· VPN egress CIDRs
· approved break-glass admin access CIDRs, if used
Operational Role
Supports triage and response context for management-plane events.
Dependency Name
Sensitive Role Inventory
Purpose
Define which IAM roles require heightened scrutiny.
Required Content
· administrator roles
· security tooling roles
· privileged cross-account roles
· break-glass or incident-response roles
Operational Role
Constrains the AssumeRole detection to roles that matter.
Dependency Name
SourceIdentity Governance Standard
Purpose
Define whether selected role-assumption flows must include SourceIdentity.
Required Content
· exact roles or role prefixes requiring SourceIdentity
· permitted source-identity naming or governance convention
· trust-policy enforcement standard using sts:SourceIdentity where applicable
Operational Role
Makes the role-assumption detection enforceable instead of speculative. AWS documents that SourceIdentity can be required via the sts:SourceIdentity trust-policy condition key and can be used in CloudTrail for attribution.
Dependency Name
Deployment Scope Classification
Purpose
Define whether rules operate at:
· single-account scope
· centralized multi-account scope
· organization-wide delegated scope
Required Content
· covered accounts
· covered Regions
· whether EventBridge deployment is per account or centralized
· whether CloudTrail management events are organization-managed
Operational Role
Prevents silent coverage gaps caused by fragmented account or Region deployment.
Rule Name
Root Console Login Success Without MFA
MITRE ATT&CK
· T1078 – Valid Accounts
Purpose
Detect successful AWS root console sign-ins where CloudTrail shows MFA was not used.
AWS Rule Type
Amazon EventBridge event pattern on CloudTrail management events
Classification
Alert-capable
SOC Usage Mode
Alert-capable
Minimum Deployment Requirement
· CloudTrail management events enabled
· EventBridge rule on each required account / Region path or centrally where architecture supports it
· tested response target
· Deployment Scope Classification completed
Enforcement Method
· Match CloudTrail-delivered console sign-in events
· Match signin.amazonaws.com
· Match ConsoleLogin
· Match userIdentity.type = Root
· Match successful console login
· Match MFAUsed = No
Standalone Alerting Justification
Permitted because successful root console sign-in without MFA is a high-confidence, very low-noise administrative risk event. CloudTrail documents ConsoleLogin events for root sign-ins and the presence of MFAUsed in additionalEventData.
Implementation Constraint Notes
· Root console sign-in events are recorded in CloudTrail and root sign-in is especially sensitive; this should always be high severity.
· Ensure coverage does not assume only one Region or one account path unless the customer architecture truly centralizes collection
· This rule should feed immediate review or containment workflow
Tuning Explanation
This is the strongest AWS-native rule in the set because it is explicit, field-based, and does not depend on baseline logic or correlation state.
Expected Noise Profile
· Very low
Variant Analysis
Covered
· successful root console login without MFA
· direct root-account administrative use
Gaps
· failed root sign-ins
· root API use without console sign-in
· root sign-in with MFA
Compensating Controls
· root access-key creation rule
· organization-level root-use guardrails
· SIEM review of other root-user CloudTrail activity
Execution Validity Statement
Executable as a production EventBridge rule when CloudTrail management events are enabled and deployment scope is fully defined.
Rule Regret Check
Deployment caution
Requires verified account and Region coverage plus a tested critical response path.
Confidence caution
Will not detect root credential abuse that never generates a console sign-in event.
Coverage value
Very high-value, very low-noise root-account compromise indicator.
Production Ready
Yes, with declared customer dependencies
Engineering Note
This rule is only complete when the customer defines:
· covered accounts
· covered Regions
· EventBridge deployment model
· response target
System-ready code
{
"source": ["aws.cloudtrail"],
"detail-type": ["AWS Console Sign In via CloudTrail"],
"detail": {
"eventSource": ["signin.amazonaws.com"],
"eventName": ["ConsoleLogin"],
"userIdentity": {
"type": ["Root"]
},
"responseElements": {
"ConsoleLogin": ["Success"]
},
"additionalEventData": {
"MFAUsed": ["No"]
}
},
"x-cyberdax-requirements": {
"cdx_control_plane_only": true,
"cdx_stateless_engine": true,
"cdx_deployment_context": "cloudtrail_management_event_detection",
"cdx_scope_required": "account_and_region_coverage_must_be_defined",
"cdx_fidelity_warning": "coverage can fragment if EventBridge or CloudTrail scope is incomplete"
}
}
Rule Name
Root Access Key Creation
MITRE ATT&CK
· T1098 – Account Manipulation
· T1078 – Valid Accounts
Purpose
Detect creation of an AWS access key tied to the root account.
AWS Rule Type
Amazon EventBridge event pattern on CloudTrail management events
Classification
Alert-capable
SOC Usage Mode
Alert-capable
Minimum Deployment Requirement
· CloudTrail management events enabled
· EventBridge rule deployed in all covered scope
· critical response target
· Deployment Scope Classification completed
Enforcement Method
· Match CloudTrail-delivered management events
· Match iam.amazonaws.com
· Match CreateAccessKey
· Match userIdentity.type = Root
Standalone Alerting Justification
Permitted because root access-key creation is almost always exceptional and AWS documents that CreateAccessKey can be used to manage root-user credentials when no user name is specified.
Implementation Constraint Notes
· This should be treated as critical unless the customer has a formally approved root-key exception process
· Immediate verification and containment workflow should be pre-defined
· This rule is only useful if management-event coverage is complete
Tuning Explanation
This is stronger than generic IAM user key-creation detection because root-key creation is rarer and higher-confidence.
Expected Noise Profile
· Very low
Variant Analysis
Covered
· root access-key creation
· root credential persistence through new key issuance
Gaps
· IAM user access-key creation
· use of already-existing root keys
· STS abuse without long-term key creation
Compensating Controls
· separate IAM user key-creation governance
· STS role-assumption detections
· credential inventory and key-age controls
Execution Validity Statement
Executable as a production EventBridge rule when CloudTrail management events are enabled and response workflow exists.
Rule Regret Check
Deployment caution
Requires pre-defined critical response workflow and verified CloudTrail scope.
Confidence caution
Will not detect use of existing root credentials.
Coverage value
Very high-value, extremely low-noise credential-persistence indicator.
Production Ready
Yes, with declared customer dependencies
Engineering Note
This rule is only complete when the customer defines:
· response workflow
· covered account / Region scope
· any root-key exception standard
System-ready code
{
"source": ["aws.cloudtrail"],
"detail-type": ["AWS API Call via CloudTrail"],
"detail": {
"eventSource": ["iam.amazonaws.com"],
"eventName": ["CreateAccessKey"],
"userIdentity": {
"type": ["Root"]
}
},
"x-cyberdax-requirements": {
"cdx_control_plane_only": true,
"cdx_stateless_engine": true,
"cdx_deployment_context": "cloudtrail_management_event_detection",
"cdx_scope_required": "account_and_region_coverage_must_be_defined",
"cdx_fidelity_warning": "requires complete management-event logging and critical response workflow"
}
}
Rule Name
AssumeRole to Sensitive Role Without Required SourceIdentity
MITRE ATT&CK
· T1078 – Valid Accounts
Purpose
Detect AssumeRole activity into sensitive roles where the customer requires SourceIdentity, but the event shows that the source identity field is absent.
AWS Rule Type
Amazon EventBridge event pattern on CloudTrail management events
Classification
Alert-capable supporting detection
SOC Usage Mode
Alert-capable supporting detection
Minimum Deployment Requirement
· CloudTrail management events enabled
· EventBridge rule deployed in covered scope
· Sensitive Role Inventory completed
· SourceIdentity Governance Standard completed
· trust-policy or governance requirement for SourceIdentity actually in force for the targeted roles
Enforcement Method
· Match CloudTrail-delivered management events
· Match sts.amazonaws.com
· Match AssumeRole
· Match only sensitive role ARNs or prefixes
· Match absence of requestParameters.sourceIdentity
Standalone Alerting Justification
Permitted only where the customer has explicitly defined a SourceIdentity governance standard. AWS documents that SourceIdentity is visible in CloudTrail and can be required using the sts:SourceIdentity trust-policy condition key.
Implementation Constraint Notes
· Do not deploy this generically without governance
· If SourceIdentity is not mandatory for the targeted role set, remove this rule rather than weakening it
· This is intentionally a supporting rule, not a primary rule
· Event pattern behavior depends on the actual event shape; the absent-field match should be validated against representative CloudTrail examples before production use. EventBridge event patterns match only specified fields when present and support field-based operators, so event-shape validation matters here.
Tuning Explanation
This rule is strong only when it enforces an existing governance standard. Without that governance, it becomes policy noise instead of attack detection.
Expected Noise Profile
· Low when scoped to roles that mandate SourceIdentity
· High if deployed without governance scoping
Variant Analysis
Covered
· sensitive role assumptions missing required attribution
· privileged role use violating source-identity governance
Gaps
· roles where SourceIdentity is not required
· abuse of already-issued role sessions
· misleading but syntactically present source-identity values
Compensating Controls
· trust-policy enforcement with sts:SourceIdentity
· downstream CloudTrail review of role session activity
· SIEM correlation for privileged role actions
Execution Validity Statement
Executable as a production EventBridge rule only when the customer has defined sensitive roles, required SourceIdentity, and validated the absent-field event pattern against real CloudTrail samples.
Rule Regret Check
Deployment caution
Do not deploy unless source-identity governance is formalized and event-shape validation has been performed.
Confidence caution
Without governance or event-shape validation, this rule risks policy-noise or missed matches.
Coverage value
Strong attribution-enforcement detection when governance exists.
Production Ready
Yes, with declared customer dependencies
Engineering Note
This rule is only complete when the customer defines:
· sensitive role scope
· required source-identity standard
· validation of absent-field matching against real CloudTrail examples
System-ready code
{
"source": ["aws.cloudtrail"],
"detail-type": ["AWS API Call via CloudTrail"],
"detail": {
"eventSource": ["sts.amazonaws.com"],
"eventName": ["AssumeRole"],
"requestParameters": {
"roleArn": [
{ "prefix": "arn:aws:iam::123456789012:role/Admin" },
{ "prefix": "arn:aws:iam::123456789012:role/Security" }
],
"sourceIdentity": [
{ "exists": false }
]
}
},
"x-cyberdax-requirements": {
"cdx_control_plane_only": true,
"cdx_stateless_engine": true,
"cdx_deployment_context": "cloudtrail_management_event_detection",
"cdx_scope_required": "sensitive_role_inventory_and_org_scope_must_be_defined",
"cdx_backend_validation_required": "validate_request_shape_for_sourceIdentity_absence",
"cdx_fidelity_warning": "rule is valid only where SourceIdentity governance is mandatory"
}
}
Azure
Required Supporting Dependencies
Dependency Name
Workspace Ingestion Scope
Purpose
Ensure the required identity and Graph logs are present in the same Log Analytics workspace.
Required Content
· Microsoft Entra AuditLogs
· MicrosoftGraphActivityLogs
· documented workspace scope and retention
Operational Role
Prevents silent alert gaps caused by missing log sources. Microsoft Graph activity logs must be sent to Log Analytics through diagnostic settings before they can be queried there.
Dependency Name
Privileged Role Inventory
Purpose
Define which role assignments are considered high risk.
Required Content
· privileged built-in roles
· privileged custom roles
· governed roleDefinition IDs or names
Operational Role
Keeps the role-assignment rule high-fidelity instead of broad and noisy.
Dependency Name
Approved Automation and Admin Exclusions
Purpose
Reduce noise from sanctioned automation.
Required Content
· approved AppId values
· approved ServicePrincipalId values
· approved admin workflows that intentionally create credentials
Operational Role
Supports low-noise Graph credential creation detections.
Dependency Name
Deployment Scope Classification
Purpose
Define tenant and workspace scope for the alert rules.
Required Content
· covered tenant
· covered workspace
· action group ownership
· evaluation frequency standard
Operational Role
Prevents incomplete alert coverage and inconsistent scheduling.
Rule Name
Privileged Role Assignment in Microsoft Entra Audit Logs
MITRE ATT&CK
· T1098 – Account Manipulation
· T1078 – Valid Accounts
Purpose
Detect assignment of privileged Microsoft Entra roles.
Azure Rule Type
Azure Monitor Scheduled Query Rule
Classification
Alert-capable
SOC Usage Mode
Alert-capable
Minimum Deployment Requirement
· AuditLogs ingested to Log Analytics
· Privileged Role Inventory defined
· scheduled query rule deployed with action group
· workspace scope defined
· evaluation model defined:
o run every 5 minutes
o look back 5 minutes
o alert on any returned result
Enforcement Method
· Query AuditLogs
· Match role-assignment activity
· Restrict to privileged role additions only
· Alert on any returned row
Standalone Alerting Justification
Permitted because privileged role assignment is a strong, high-value identity-control event, and Entra audit logs are the authoritative source for directory change activity.
Implementation Constraint Notes
· Query starts with the table for performance
· Query remains scoped to AuditLogs
· Privileged role filtering is mandatory
· Do not deploy without defined privileged role inventory
Tuning Explanation
This rule was tightened so it no longer fires on generic role membership changes. It now requires privileged-role scoping, which materially reduces noise.
Expected Noise Profile
· Low when privileged roles are explicitly scoped
· Moderate if privileged-role inventory is incomplete
Variant Analysis
Covered
· privileged role assignment
· unauthorized identity privilege elevation
Gaps
· abuse of already-assigned privileges
· PIM activation patterns not represented here
· role assignments outside workspace scope
Compensating Controls
· Entra PIM monitoring
· SIEM correlation for downstream privileged activity
Execution Validity Statement
Executable as a production scheduled query rule when AuditLogs are ingested and privileged roles are explicitly defined.
Rule Regret Check
Deployment caution
Requires privileged-role filtering and defined workspace scope.
Confidence caution
Will not detect misuse of existing privileged assignments.
Coverage value
High-confidence privilege-escalation detection.
Production Ready
Yes, with declared customer dependencies
Engineering Note
This rule is only complete when the customer provides the privileged role list or roleDefinition identifiers to enforce.
System-ready code
let PrivilegedRoles = dynamic([
"Global Administrator",
"Privileged Role Administrator",
"User Administrator",
"Security Administrator",
"Cloud Application Administrator"
]);
AuditLogs
| where TimeGenerated > ago(5m)
| where OperationName contains "Add member to role"
| mv-expand TR = TargetResources
| extend RoleName = tostring(TR.displayName)
| where RoleName in (PrivilegedRoles)
| project TimeGenerated, OperationName, RoleName, InitiatedBy, TargetResources, Result
Alert Evaluation Model
· Frequency: every 5 minutes
· Lookup window: last 5 minutes
· Trigger: greater than 0 results
Enforcement Metadata
{
"cdx_identity_plane": true,
"cdx_graph_dependency": false,
"cdx_stateless_engine": false,
"cdx_deployment_context": "azure_monitor_scheduled_query_identity_detection",
"cdx_scope_required": "tenant_and_workspace_scope_must_be_defined",
"cdx_fidelity_warning": "privileged-role inventory is required for low-noise operation"
}
Rule Name
Microsoft Graph Application Password Credential Creation
MITRE ATT&CK
· T1098 – Account Manipulation
Purpose
Detect Microsoft Graph API use that adds a password credential to an application object.
Azure Rule Type
Azure Monitor Scheduled Query Rule
Classification
Alert-capable
SOC Usage Mode
Alert-capable
Minimum Deployment Requirement
· MicrosoftGraphActivityLogs ingested to Log Analytics
· approved automation exclusions defined
· scheduled query rule deployed with action group
· workspace scope defined
· evaluation model defined:
o run every 5 minutes
o look back 5 minutes
o alert on any returned result
Enforcement Method
· Query MicrosoftGraphActivityLogs
· Match:
o RequestMethod == "POST"
o RequestUri for /applications/{id}/addPassword
o successful response
· Exclude approved automation identities directly in query
Standalone Alerting Justification
Permitted because Microsoft Graph activity logs provide an audit trail of Graph API requests, and Microsoft Graph documents the application addPassword endpoint explicitly.
Implementation Constraint Notes
· Query must stay scoped to MicrosoftGraphActivityLogs
· Automation exclusions must be enforced in query, not only in notes
· Do not broaden to generic application updates
Tuning Explanation
This rule is strong because it targets the exact Graph endpoint used to create an application secret and now includes explicit allowlist hooks to keep noise low.
Expected Noise Profile
· Low when approved automation is excluded
· Moderate if legitimate secret rotation is common and allowlists are incomplete
Variant Analysis
Covered
· application password credential creation through Graph
· persistence by adding new application secrets
Gaps
· certificate-based credential creation through different endpoints
· use of pre-existing credentials
· secret changes outside Graph logging scope
Compensating Controls
· service principal credential-creation rule
· app governance and secret rotation review
· SIEM correlation for downstream token use
Execution Validity Statement
Executable as a production scheduled query rule when MicrosoftGraphActivityLogs are ingested and approved automation exclusions are defined.
Rule Regret Check
Deployment caution
Requires Graph log ingestion and maintained allowlists for approved automation.
Confidence caution
Will not detect use of existing application credentials.
Coverage value
High-confidence persistence detection for application credentials.
Production Ready
Yes, with declared customer dependencies
Engineering Note
This rule is only complete when the customer defines approved application and service principal automation identities.
System-ready code
let ApprovedAppIds = dynamic(["APPID_ALLOWLIST_PLACEHOLDER"]);
let ApprovedServicePrincipals = dynamic(["SPN_ALLOWLIST_PLACEHOLDER"]);
MicrosoftGraphActivityLogs
| where TimeGenerated > ago(5m)
| where RequestMethod == "POST"
| where RequestUri matches regex @"/applications/[^/]+/addPassword"
| where ResponseStatusCode between (200 .. 299)
| where AppId !in (ApprovedAppIds)
| where ServicePrincipalId !in (ApprovedServicePrincipals)
| project TimeGenerated, AppId, ServicePrincipalId, UserId, IPAddress, RequestUri, ResponseStatusCode
Alert Evaluation Model
· Frequency: every 5 minutes
· Lookup window: last 5 minutes
· Trigger: greater than 0 results
Enforcement Metadata
{
"cdx_identity_plane": true,
"cdx_graph_dependency": true,
"cdx_stateless_engine": false,
"cdx_deployment_context": "azure_monitor_scheduled_query_graph_detection",
"cdx_scope_required": "workspace_ingestion_and_allowlists_must_be_defined",
"cdx_fidelity_warning": "approved automation exclusions are required for low-noise operation"
}
Rule Name
Microsoft Graph Service Principal Password Credential Creation
MITRE ATT&CK
· T1098 – Account Manipulation
Purpose
Detect Microsoft Graph API use that adds a password credential to a service principal.
Azure Rule Type
Azure Monitor Scheduled Query Rule
Classification
Alert-capable
SOC Usage Mode
Alert-capable
Minimum Deployment Requirement
· MicrosoftGraphActivityLogs ingested to Log Analytics
· approved automation exclusions defined
· scheduled query rule deployed with action group
· workspace scope defined
· evaluation model defined:
o run every 5 minutes
o look back 5 minutes
o alert on any returned result
Enforcement Method
· Query MicrosoftGraphActivityLogs
· Match:
o RequestMethod == "POST"
o RequestUri for /servicePrincipals/{id}/addPassword
o successful response
· Exclude approved automation identities directly in query
Standalone Alerting Justification
Permitted because Microsoft Graph activity logs record the API request, and Microsoft Graph documents the service principal addPassword endpoint explicitly.
Implementation Constraint Notes
Query must stay scoped to MicrosoftGraphActivityLogs
· Approved automation must be excluded in query
· Do not collapse this into generic service principal modifications
Tuning Explanation
This is a narrow, high-confidence Graph-native secret-creation detection and now includes direct allowlist hooks to reduce noise.
Expected Noise Profile
· Low when approved automation is excluded
· Moderate if legitimate service principal secret rotation is common and allowlists are incomplete
Variant Analysis
Covered
· service principal password credential creation through Graph
· persistence by adding new service principal secrets
Gaps
· certificate-based credential creation through other endpoints
· use of existing service principal credentials
· non-Graph credential changes
Compensating Controls
· application password credential rule
· service principal sign-in monitoring
· downstream Graph or token-use detections
Execution Validity Statement
Executable as a production scheduled query rule when MicrosoftGraphActivityLogs are ingested and automation exclusions are defined.
Rule Regret Check
Deployment caution
Requires Graph log ingestion and approved automation exclusions.
Confidence caution
Will not detect use of existing service principal credentials.
Coverage value
High-confidence persistence detection for service principal credentials.
Production Ready
Yes, with declared customer dependencies
Engineering Note
This rule is only complete when the customer defines approved service principal secret-management workflows.
System-ready code
let ApprovedAppIds = dynamic(["APPID_ALLOWLIST_PLACEHOLDER"]);
let ApprovedServicePrincipals = dynamic(["SPN_ALLOWLIST_PLACEHOLDER"]);
MicrosoftGraphActivityLogs
| where TimeGenerated > ago(5m)
| where RequestMethod == "POST"
| where RequestUri matches regex @"/servicePrincipals/[^/]+/addPassword"
| where ResponseStatusCode between (200 .. 299)
| where AppId !in (ApprovedAppIds)
| where ServicePrincipalId !in (ApprovedServicePrincipals)
| project TimeGenerated, AppId, ServicePrincipalId, UserId, IPAddress, RequestUri, ResponseStatusCode
Alert Evaluation Model
· Frequency: every 5 minutes
· Lookup window: last 5 minutes
· Trigger: greater than 0 results
Enforcement Metadata
{
"cdx_identity_plane": true,
"cdx_graph_dependency": true,
"cdx_stateless_engine": false,
"cdx_deployment_context": "azure_monitor_scheduled_query_graph_detection",
"cdx_scope_required": "workspace_ingestion_and_allowlists_must_be_defined",
"cdx_fidelity_warning": "approved automation exclusions are required for low-noise operation"
}
GCP
Required Supporting Dependencies
Project / Org Scope
· all projects OR org-level aggregation
Privileged Role Inventory
Example:
· roles/owner
· roles/editor
· roles/iam.securityAdmin
· roles/resourcemanager.projectIamAdmin
Approved Automation Allowlist
· service accounts
· CI/CD pipelines
Rule Name
Privileged IAM Policy Binding Creation
MITRE ATT&CK
· T1098 – Account Manipulation
· T1078 – Valid Accounts
Purpose
Detect IAM bindings granting privileged roles.
GCP Rule Type
Eventarc Trigger (Audit Log)
Classification
Alert-capable
SOC Usage Mode
Alert-capable
Minimum Deployment Requirement
· Admin Activity logs enabled
· Eventarc trigger deployed org-wide
· privileged roles defined
Enforcement Method
· Match:
o SetIamPolicy
· Parse IAM bindings
· Require privileged role match
· Exclude allowlisted automation
Standalone Alerting Justification
IAM policy change is direct privilege escalation.
Implementation Constraint Notes
· Must filter roles explicitly
· Must exclude automation in logic
Tuning Explanation
Now requires:
· privileged role
· non-allowlisted actor
Expected Noise Profile
Low
Variant Analysis
Covered
· privilege escalation via IAM
Gaps
· misuse of existing privileges
Execution Validity Statement
Executable as Eventarc trigger.
Rule Regret Check
Deployment caution
Requires role list and allowlist
Confidence caution
Does not detect privilege misuse
Coverage value
High-confidence escalation detection
Production Ready
Yes, with declared dependencies
Engineering Note
Customer must define:
· privileged roles
· allowed automation identities
System-ready code
{
"eventFilters": [
{
"attribute": "type",
"value": "google.cloud.audit.log.v1.written"
}
],
"eventDataContentType": "application/json",
"serviceName": "cloudresourcemanager.googleapis.com",
"methodName": "SetIamPolicy",
"condition": {
"expression": "
protoPayload.methodName == 'SetIamPolicy' &&
protoPayload.serviceName == 'cloudresourcemanager.googleapis.com' &&
(
protoPayload.serviceData.policyDelta.bindingDeltas.exists(b,
b.role in [
'roles/owner',
'roles/editor',
'roles/iam.securityAdmin',
'roles/resourcemanager.projectIamAdmin'
]
)
) &&
!(
protoPayload.authenticationInfo.principalEmail in [
'ALLOWLIST@PROJECT.iam.gserviceaccount.com'
]
)
"
},
"x-cyberdax-requirements": {
"cdx_control_plane_only": true,
"cdx_stateless_engine": true,
"cdx_deployment_context": "gcp_eventarc_audit_log_detection",
"cdx_scope_required": "org_or_all_projects_required",
"cdx_fidelity_enforcement": "privileged_roles_and_allowlist_required"
}
}
Rule Name
Service Account Key Creation
MITRE ATT&CK
· T1098 – Account Manipulation
Purpose
Detect creation of new service account keys.
GCP Rule Type
Eventarc Trigger
Classification
Alert-capable
SOC Usage Mode
Alert-capable
Minimum Deployment Requirement
· Admin Activity logs enabled
· org/project scope defined
· allowlist defined
Enforcement Method
· Match:
o CreateServiceAccountKey
· Exclude approved service accounts
Standalone Alerting Justification
Creates long-term credential.
Implementation Constraint Notes
· Must enforce allowlist in logic
Tuning Explanation
Now enforces:
· event match
· allowlist exclusion
Expected Noise Profile
Low
Variant Analysis
Covered
· SA key creation
Gaps
· key usage
· token abuse
Execution Validity Statement
Executable via Eventarc.
Rule Regret Check
Deployment caution
Requires allowlist
Confidence caution
Does not detect key usage
Coverage value
Strong persistence detection
Production Ready
Yes, with declared dependencies
Engineering Note
Customer must define:
· approved service accounts
System-ready code
{
"eventFilters": [
{
"attribute": "type",
"value": "google.cloud.audit.log.v1.written"
}
],
"eventDataContentType": "application/json",
"serviceName": "iam.googleapis.com",
"methodName": "google.iam.admin.v1.CreateServiceAccountKey",
"condition": {
"expression": "
protoPayload.methodName == 'google.iam.admin.v1.CreateServiceAccountKey' &&
!(
protoPayload.authenticationInfo.principalEmail in [
'ALLOWLIST@PROJECT.iam.gserviceaccount.com'
]
)
"
},
"x-cyberdax-requirements": {
"cdx_control_plane_only": true,
"cdx_stateless_engine": true,
"cdx_deployment_context": "gcp_eventarc_audit_log_detection",
"cdx_scope_required": "org_or_project_scope_required",
"cdx_fidelity_enforcement": "allowlist_required"
}
}
S26 — Threat-to-Rule Traceability Matrix
Behavior
Phishing delivery and user interaction with malicious link or attachment
MITRE ATT&CK
· T1566 – Phishing
Detection Mapping
· Suricata — Suspicious Login-Themed DNS Query Followed by Non-Sanctioned TLS SNI Access
· SentinelOne — Browser Access to Non-Sanctioned Login Infrastructure
· Splunk — Correlated Phishing Interaction → Suspicious Authentication → Suspicious External Login Infrastructure Access
· Elastic — Suspicious External Authentication Domain Access Rule
· QRadar — Suspicious External Authentication Domain Access Rule
· Sigma — Suspicious External Authentication Domain Access Rule
Telemetry Dependency
· Email security gateway logs
· DNS logs
· web proxy logs
· endpoint web telemetry
Infrastructure Intelligence
· newly registered domains
· login-themed domain patterns
· low-prevalence domain clusters
Coverage Disposition
Partially Detected
Detection Notes
Email delivery without user interaction is not covered by S25 rules. Detection primarily occurs at user interaction and subsequent network access stages.
Behavior
Credential harvesting via phishing page (username and password capture)
MITRE ATT&CK
· T1056 – Input Capture
Detection Mapping
· Suricata — Outbound Credential Submission to Non-Sanctioned Login-Themed Host
· YARA — External Credential-Harvesting HTML or JavaScript Page Artifact
· SentinelOne — Browser Access to Non-Sanctioned Login Infrastructure
Telemetry Dependency
· HTTP request inspection or proxy logs
· endpoint file/artifact telemetry
· DNS/web logs
Infrastructure Intelligence
· external POST destinations
· phishing kit reuse patterns
· credential capture endpoints
Coverage Disposition
Partially Detected
Detection Notes
Detection depends on HTTP visibility or artifact recovery. Encrypted traffic without inspection reduces detection reliability.
Behavior
User credential submission to attacker-controlled infrastructure
MITRE ATT&CK
· T1056 – Input Capture
Detection Mapping
· Suricata — Outbound Credential Submission to Non-Sanctioned Login-Themed Host
· Splunk — Correlated Phishing Interaction → Suspicious Authentication → Suspicious External Login Infrastructure Access
· Elastic — Suspicious Credential POST Detection
· QRadar — Credential Submission to External Domain Rule
· Sigma — Suspicious Credential POST Detection
Telemetry Dependency
· HTTP request telemetry
· proxy logs
· DNS logs
Infrastructure Intelligence
· external authentication endpoints
· anomalous POST destinations
· domain reputation and age
Coverage Disposition
Partially Detected
Detection Notes
Detection is strong where request body inspection exists. Without TLS decryption, coverage is reduced.
Behavior
Reverse-proxy phishing and session cookie/token capture
MITRE ATT&CK
· T1539 – Steal Web Session Cookie
Detection Mapping
· YARA — Reverse-Proxy Phishing Kit Configuration Artifact
· SentinelOne — Non-Browser Access to Browser Credential / Session Stores
· Splunk — Session Token Anomaly Detection
· Elastic — External Failure Burst Followed by Successful Authentication
· QRadar — External Failure Burst Followed by Successful Authentication
· Sigma — External Failure Burst Followed by Successful Authentication
Telemetry Dependency
· endpoint telemetry (file + process)
· identity provider logs
· session metadata
Infrastructure Intelligence
· reverse-proxy frameworks
· session forwarding patterns
· TLS certificate reuse
Coverage Disposition
Partially Detected
Detection Notes
Session theft itself is rarely directly observable. Detection relies on downstream behavioral anomalies and artifact discovery.
Behavior
Initial authentication using stolen credentials
MITRE ATT&CK
· T1078 – Valid Accounts
Detection Mapping
· Splunk — External Failure Burst Followed by Successful Access into New Application Context
· Elastic — External Failure Burst Followed by Successful Authentication
· QRadar — External Failure Burst Followed by Successful Authentication
· Sigma — External Failure Burst Followed by Successful Authentication
Telemetry Dependency
· Entra Sign-in Logs
· AWS CloudTrail authentication logs
· GCP Audit Logs
· identity provider logs
Infrastructure Intelligence
· IP reputation
· ASN deviation
· geographic anomalies
Coverage Disposition
Partially Detected
Detection Notes
Detection depends on anomaly detection and correlation. Single successful login events are not inherently detectable.
Behavior
Password spraying from a single external source
MITRE ATT&CK
· T1110 – Brute Force
Detection Mapping
· Suricata — Repeated Authentication POSTs to Protected Public Authentication Endpoints
· Splunk — Distributed Password Spraying from External Source
· Elastic — External Password Spraying from Single Source
· QRadar — External Password Spraying from Single Source
· Sigma — External Password Spraying from Single Source
Telemetry Dependency
· authentication logs
· network authentication endpoints
· SIEM aggregation
Infrastructure Intelligence
· repeated source IP behavior
· authentication endpoint targeting patterns
Coverage Disposition
Partially Detected
Detection Notes
Effective for concentrated attacks. Does not fully cover distributed or low-volume spraying.
Behavior
Distributed password spraying across multiple sources
MITRE ATT&CK
· T1110 – Brute Force
Detection Mapping
· Elastic — Distributed Password Spraying Across Multiple Sources
· QRadar — Distributed Password Spraying Across Multiple Sources
· Sigma — Distributed Password Spraying Across Multiple Sources
Telemetry Dependency
· centralized authentication logs
· SIEM aggregation capability
Infrastructure Intelligence
· distributed IP clusters
· coordinated attack timing
Coverage Disposition
Partially Detected
Detection Notes
Requires aggregation across multiple sources. Not detectable at single-system level without correlation.
Behavior
Browser credential store and session data access
MITRE ATT&CK
· T1555 – Credentials from Password Stores
· T1539 – Steal Web Session Cookie
Detection Mapping
· SentinelOne — Non-Browser Access to Browser Credential / Session Stores
· YARA — Browser Credential and Session Store Theft Tool or Script Artifact
Telemetry Dependency
· endpoint file access telemetry
· process monitoring
· artifact scanning
Infrastructure Intelligence
· known credential storage paths
· extraction tooling patterns
Coverage Disposition
Detected
Detection Notes
High-confidence endpoint detection when file access telemetry is available and exclusions are tuned.
Behavior
Browser-driven execution of malicious or suspicious payloads
MITRE ATT&CK
· T1204 – User Execution
· T1059 – Command and Scripting Interpreter
Detection Mapping
· SentinelOne — Browser-Initiated Execution of Suspicious Child Process
Telemetry Dependency
· process creation telemetry
· command-line visibility
Infrastructure Intelligence
· LOLBin execution patterns
· script execution indicators
Coverage Disposition
Detected
Detection Notes
Strong behavioral signal with low noise when parent-child relationships are enforced.
Behavior
Application credential creation via Microsoft Graph
MITRE ATT&CK
· T1098 – Account Manipulation
Detection Mapping
· Azure — Microsoft Graph Application Password Credential Creation
Telemetry Dependency
· MicrosoftGraphActivityLogs
Infrastructure Intelligence
· Graph API endpoint usage
· application identity changes
Coverage Disposition
Detected
Detection Notes
Direct API-level visibility provides high-confidence detection.
Behavior
Service principal credential creation via Microsoft Graph
MITRE ATT&CK
· T1098 – Account Manipulation
Detection Mapping
· Azure — Microsoft Graph Service Principal Password Credential Creation
Telemetry Dependency
· MicrosoftGraphActivityLogs
Infrastructure Intelligence
· service principal modification patterns
Coverage Disposition
Detected
Detection Notes
High-confidence persistence detection.
Behavior
AWS root account misuse and credential creation
MITRE ATT&CK
· T1078 – Valid Accounts
· T1098 – Account Manipulation
Detection Mapping
· AWS — Root Console Login Success Without MFA
· AWS — Root Access Key Creation
Telemetry Dependency
· AWS CloudTrail
Infrastructure Intelligence
· root account usage patterns
Coverage Disposition
Detected
Detection Notes
Very high-confidence detection with minimal noise.
Behavior
Privileged role assignment and escalation in cloud identity systems
MITRE ATT&CK
· T1098 – Account Manipulation
Detection Mapping
· Azure — Privileged Role Assignment in Microsoft Entra Audit Logs
· GCP — Privileged IAM Policy Binding Creation
Telemetry Dependency
· Entra AuditLogs
· GCP Audit Logs
Infrastructure Intelligence
· role binding changes
· privilege escalation patterns
Coverage Disposition
Detected
Detection Notes
Direct control-plane detection with strong fidelity.
Behavior
Service account or cloud credential key creation
MITRE ATT&CK
· T1098 – Account Manipulation
Detection Mapping
· GCP — Service Account Key Creation
Telemetry Dependency
· GCP Audit Logs
Infrastructure Intelligence
· credential issuance patterns
Coverage Disposition
Detected
Detection Notes
High-confidence persistence detection.
Behavior
AssumeRole activity without required attribution (SourceIdentity gap)
MITRE ATT&CK
· T1078 – Valid Accounts
Detection Mapping
· AWS — AssumeRole to Sensitive Role Without Required SourceIdentity
Telemetry Dependency
· AWS CloudTrail
Infrastructure Intelligence
· role assumption patterns
· attribution gaps
Coverage Disposition
Partially Detected
Detection Notes
Detection is conditional on governance enforcement of SourceIdentity requirements.
Behavior
Authenticated session misuse and anomalous access behavior
MITRE ATT&CK
· T1078 – Valid Accounts
Detection Mapping
· Splunk — Correlated Phishing Interaction → Suspicious Authentication → Suspicious External Login Infrastructure Access
· Elastic — External Failure Burst Followed by Successful Authentication
· QRadar — External Failure Burst Followed by Successful Authentication
· Sigma — External Failure Burst Followed by Successful Authentication
Telemetry Dependency
· identity logs
· endpoint telemetry
· network telemetry
Infrastructure Intelligence
· anomalous session patterns
· abnormal access timing
Coverage Disposition
Hunt Only
Detection Notes
No deterministic detection exists. Requires behavioral correlation and analyst investigation.
S27 Behavior and Log Artifacts
Email Security Gateway Behavior and Log Artifacts
Phishing delivery and user interaction behavior manifests through observable email metadata, link interaction events, and campaign-level delivery patterns.
· Email logs show inbound messages with mismatched sender domains and reply-to fields inconsistent with originating infrastructure
· Header analysis reveals authentication anomalies, including SPF, DKIM, or DMARC failures associated with external sender domains
· URL rewriting or inspection logs capture embedded links directing to recently registered or low-prevalence domains
· User interaction telemetry records link click events or attachment access shortly after message delivery
· Campaign clustering appears as multiple users receiving structurally similar messages within a constrained time window
These artifacts establish initial access behavior and provide the earliest indication of user-targeting activity.
Endpoint / EDR Behavior and Log Artifacts
Post-interaction behavior is observable through endpoint process execution, session initiation, and device association patterns following credential use.
· Process creation logs show browser execution events initiated shortly after email interaction activity
· Parent-child process relationships indicate user-driven access to external authentication portals or login pages
· Endpoint session logs reflect first-time device usage associated with the authenticated identity
· Browser telemetry captures navigation to external domains associated with previously unseen or low-prevalence infrastructure
· Session persistence artifacts indicate continued access without expected re-authentication events
These artifacts confirm user interaction and provide evidence of session establishment and initial post-compromise activity.
DNS / Web Proxy Behavior and Log Artifacts
Adversary-controlled infrastructure interaction is visible through DNS queries and outbound network connections to suspicious or low-prevalence domains.
· DNS logs record queries to recently registered domains or domains with minimal historical presence
· Query patterns show repeated resolution attempts to domains used in credential harvesting or phishing delivery
· Web proxy logs capture outbound HTTP or HTTPS requests to domains mimicking authentication services
· Domain lifecycle artifacts show short-lived domain usage followed by rapid disappearance from query patterns
· Network logs reflect user-aligned connections to previously unseen external infrastructure
These artifacts provide visibility into external communication patterns associated with credential harvesting and initial access infrastructure.
Identity and Authentication Behavior and Log Artifacts
Credential misuse behavior is reflected in authentication logs, session anomalies, and deviations from established identity patterns.
· Authentication logs show successful login events from unfamiliar IP addresses or geographic regions
· Login sequences reflect rapid transitions from failed authentication attempts to successful access
· Session metadata indicates new device identifiers or access contexts not previously associated with the identity
· Application access logs show first-time access to services outside normal usage patterns
· MFA logs capture abnormal prompt patterns, including repeated requests or unusual approval sequences
These artifacts represent direct evidence of credential compromise and active account misuse.
Service Interaction and Availability Behavior and Log Artifacts
Service-level behavior associated with scanning, exploitation, and disruption is observable through traffic patterns and system performance indicators.
· Web server logs show increased request frequency targeting specific endpoints or application paths
· Traffic analysis reveals spikes in inbound connections exceeding established baseline thresholds
· Source IP distribution reflects high-volume requests originating from distributed or rotating address ranges
· API logs capture repeated or abnormal request sequences inconsistent with legitimate usage patterns
· Performance metrics indicate service degradation or latency increases correlated with abnormal traffic activity
These artifacts provide evidence of opportunistic exploitation attempts and disruption-focused activity.
Cross-Pillar Correlated Behavior and Log Artifacts
High-confidence detection is achieved by correlating artifacts across telemetry sources to identify multi-stage activity tied to a single identity or coordinated event sequence.
· Email interaction events are followed by authentication anomalies linked to the same user identity within a constrained timeframe
· Authentication anomalies correlate with first-time endpoint activity and new external network connections
· DNS queries to newly observed domains precede or coincide with anomalous login events
· Multiple users exhibit similar phishing interaction patterns followed by distributed authentication anomalies
· Identity-level anomalies align with abnormal service interaction or access to sensitive resources
These correlated artifacts represent full attack progression and significantly increase detection confidence while reducing false positives.
S28 Detection Strategy and SOC Implementation Guidance
Detection Strategy Implementation Model
Detection must be operationalized as identity-centric, correlation-driven workflows that prioritize credential misuse and multi-stage attack progression over isolated event detection.
· Detection workflows must trigger on identity anomalies, specifically authentication events that deviate from established user behavior baselines
· Email interaction, authentication activity, endpoint behavior, and network communication must be correlated within defined time windows to establish attack sequence continuity
· Detection logic must require multi-event validation, ensuring that alerts are generated only when activity forms a coherent progression rather than isolated anomalies
· Identity telemetry must serve as the primary correlation anchor, linking user activity across email, endpoint, and network layers
· Detection pipelines must enrich events with user identity, device association, domain intelligence, and historical behavioral context prior to alert generation
Detection effectiveness is dependent on enforcing sequence-based validation of identity misuse rather than relying on single-event detection models.
SOC Triage and Investigation Workflow
SOC triage must validate whether correlated activity represents credential compromise by confirming linkage between user interaction, authentication anomalies, and subsequent system access.
· Triage must first determine whether phishing interaction events are temporally linked to authentication anomalies for the same user identity
· Analysts must validate whether authentication events originate from unfamiliar IP addresses, geolocations, or device contexts
· Endpoint investigation must confirm whether browser activity or session initiation aligns with the authentication event timeline
· Network analysis must determine whether accessed domains are previously unseen, low-prevalence, or consistent with credential harvesting infrastructure
· Escalation must occur when multiple correlated signals are observed within a constrained timeframe and tied to a single identity
Accurate triage requires identity-linked correlation across telemetry sources to distinguish malicious activity from legitimate user behavior.
Detection Prioritization and Alerting Strategy
Alerting must prioritize high-confidence identity compromise scenarios and suppress alerts generated from isolated or low-signal events.
· Alerts must be generated only when phishing interaction, authentication anomaly, and supporting endpoint or network activity are correlated
· Single-source detections, including standalone DNS queries or isolated authentication anomalies, must be treated as enrichment or hunt signals rather than alert conditions
· Identity-based detections must be prioritized over infrastructure-based detections due to higher reliability and earlier detection value
· Alert severity must increase when activity includes first-time device usage, abnormal access timing, or access to sensitive systems or services
· Detection logic must suppress activity associated with known benign domains, trusted applications, and established user behavior patterns
Effective alerting requires enforcing multi-signal validation and suppressing non-correlated events to reduce false positives and analyst fatigue.
Correlation and Detection Engineering Guidance
Detection engineering must enforce identity-linked, time-bound correlation logic that prevents standalone signal alerting and ensures multi-stage validation.
· Correlation logic must link phishing interaction events to authentication anomalies using user identity as the primary correlation key
· Detection rules must enforce time-bound constraints to ensure events represent a valid attack sequence
· Network activity must be enriched with domain intelligence to identify previously unseen or low-prevalence domains associated with credential harvesting
· Endpoint telemetry must be correlated with identity events to confirm user-driven access and session establishment
· Detection workflows must explicitly prevent alert generation from single telemetry sources without supporting correlated activity
Correlation enforcement is required to ensure detection accuracy and prevent false positives from isolated events.
Operational Constraints and Implementation Considerations
Detection capability is directly constrained by telemetry coverage, data quality, and correlation capability across systems.
· Environments without email interaction telemetry lack visibility into initial phishing activity and user targeting behavior
· Limited endpoint visibility prevents confirmation of user-driven activity and session establishment following authentication events
· Absence of DNS or web proxy logging eliminates visibility into communication with adversary-controlled infrastructure
· Lack of identity baselining reduces the ability to detect anomalous authentication behavior and increases false positive rates
· Absence of centralized correlation capability prevents identification of multi-stage attack progression and delays detection
Detection effectiveness is contingent on complete telemetry coverage, identity context, and cross-source correlation capability.
S29 Detection Coverage Summary
Detected Behaviors
These behaviors are reliably detectable using available telemetry and correlation logic defined in S21–S28, with high confidence when multi-pillar signals are present.
· Phishing delivery and user interaction events observable through email security gateway telemetry, including link clicks and attachment access (T1566 – Phishing)
· Authentication anomalies indicating credential misuse, including logins from unfamiliar IP addresses, geolocations, or devices (T1078 – Valid Accounts)
· First-time device usage and session establishment following anomalous authentication events
· DNS and web proxy activity involving newly registered or low-prevalence domains associated with credential harvesting infrastructure
· Correlated multi-stage activity linking phishing interaction, authentication anomalies, and endpoint or network behavior within a constrained timeframe
Partially Detected Behaviors
These behaviors are observable but may not be consistently or fully detected depending on correlation maturity, baselining, and environmental visibility.
· Password spraying and distributed brute force attempts across multiple systems or authentication endpoints (T1110 – Brute Force)
· User access to credential harvesting portals through browser-based interaction
· Session persistence or token reuse activity following successful authentication
· Interaction with adversary-controlled infrastructure using disposable or short-lived domains
· Distributed scanning or low-volume exploitation attempts targeting internet-facing services (T1190 – Exploit Public-Facing Application)
Conditional Post-Exploitation Behaviors
Not observed in currently available reporting; may occur during post-exploitation depending on attacker objectives and target environment.
· Lateral movement using valid credentials across internal systems or services (T1021 – Remote Services)
· Privilege escalation through misuse of existing account permissions or access rights (T1068 – Exploitation for Privilege Escalation)
· Data exfiltration via application-layer protocols or cloud services following successful account compromise (T1041 – Exfiltration Over C2 Channel)
· Persistence through continued use of compromised credentials, authentication tokens, or session hijacking (T1078 – Valid Accounts)
· Internal reconnaissance activity, including enumeration of services, users, or network resources (T1087 – Account Discovery)
S30 Intelligence Maturity Assessment
Detection Maturity
Detection maturity reflects the organization’s ability to identify credential misuse, phishing-driven access, and multi-stage attack progression using correlated behavioral signals.
· Low Maturity
Detection relies on isolated alerts such as phishing indicators or authentication anomalies without enforced correlation across telemetry sources
Credential misuse is typically undetected unless accompanied by obvious indicators such as repeated authentication failures or known malicious infrastructure
· Moderate Maturity
Detection incorporates correlation between authentication anomalies and selected endpoint or network signals
Behavioral baselining is partially implemented, resulting in inconsistent detection across users, devices, and access patterns
· High Maturity
Detection enforces identity-centric, multi-pillar correlation linking phishing interaction, authentication anomalies, endpoint activity, and network communication
Detection logic consistently identifies multi-stage attack progression and minimizes reliance on static indicators
Higher detection maturity enables earlier identification of credential misuse and reduces attacker dwell time.
Telemetry Maturity
Telemetry maturity reflects the completeness, quality, and accessibility of data required to detect phishing, credential misuse, and adversary-controlled infrastructure interaction.
· Low Maturity
Limited visibility into email interaction, endpoint activity, or DNS and web traffic
Authentication logs lack sufficient detail or enrichment to support anomaly detection
· Moderate Maturity
Core telemetry sources are present, including email, endpoint, and authentication logs
Visibility gaps remain in DNS logging, session context, or encrypted traffic inspection
· High Maturity
Comprehensive telemetry coverage across email, endpoint, identity, and network layers
Data is enriched with domain intelligence, user context, device association, and historical baselines
Higher telemetry maturity enables consistent detection across multiple attack vectors and reduces dependence on single-source visibility.
Correlation and Analytical Maturity
Correlation maturity reflects the organization’s ability to link events across telemetry sources and identify multi-stage attack behavior.
· Low Maturity
Events are analyzed in isolation with no consistent cross-source correlation
Detection depends on standalone alerts rather than sequence-based analysis
· Moderate Maturity
Correlation exists between selected telemetry sources, such as authentication and endpoint activity
Time-bound correlation and identity mapping are inconsistently applied
· High Maturity
Correlation logic links email interaction, authentication anomalies, endpoint activity, and network communication using identity as the primary anchor
Detection consistently identifies attack sequences rather than individual events
High correlation maturity significantly improves detection accuracy and reduces false positives.
SOC Operational Maturity
SOC maturity reflects the organization’s ability to triage, investigate, and respond to correlated detection events in a timely and consistent manner.
· Low Maturity
Triage is manual and reactive, with limited ability to correlate signals across telemetry sources
Investigation workflows are inconsistent and dependent on individual analyst interpretation
· Moderate Maturity
Defined triage workflows exist for phishing and authentication anomalies
Analysts can perform correlation across systems, but processes remain partially manual
· High Maturity
SOC workflows are structured around identity-centric correlation and multi-stage attack validation
Triage, investigation, and escalation are standardized and supported by automated enrichment
Higher SOC maturity enables faster detection, consistent investigation, and reduced response time.
Security Hardening and Preventive Control Maturity
Security hardening maturity reflects the organization’s ability to reduce exposure to credential-based attacks through preventive controls and configuration management.
· Low Maturity
Multi-factor authentication is inconsistently applied or absent across systems
Identity and device controls are weak or not enforced
· Moderate Maturity
Multi-factor authentication is implemented for critical systems with partial enforcement of access controls
Device and identity restrictions are applied inconsistently
· High Maturity
Strong enforcement of identity-based access controls, including consistent multi-factor authentication and device validation
Access policies are aligned with behavioral baselines and risk-based authentication models
Higher hardening maturity reduces the likelihood of successful credential compromise and limits attack surface.
Variant Resilience Maturity
Variant resilience reflects the organization’s ability to detect alternate forms of credential misuse, phishing delivery, and infrastructure interaction independent of specific tools or delivery methods.
· Low Maturity
Detection depends on specific indicators or known patterns
Variants such as token-based authentication, API access, or non-email phishing delivery are not consistently detected
· Moderate Maturity
Detection covers multiple variants of phishing and authentication activity but remains dependent on specific telemetry sources
Alternate access methods are partially detectable but inconsistent across environments
· High Maturity
Detection is behavior-driven and independent of delivery method, authentication mechanism, or protocol
Variants including token reuse, API-based access, and alternate phishing channels are detected through identity-centric correlation
High variant resilience ensures detection remains effective even when adversaries change tooling, infrastructure, or delivery mechanisms.
S31 Defensive Architecture Overview
The defensive architecture required to mitigate this threat must prioritize identity-centric security controls, behavioral detection, and cross-telemetry correlation to address credential-based intrusion and authentication abuse.
Traditional perimeter and vulnerability-focused defenses are insufficient, as adversaries operate within legitimate authentication pathways and do not rely on exploit-based access.
Effective defense requires integrated visibility across:
· Email security gateway telemetry
· Endpoint and EDR process telemetry
· DNS and web proxy network telemetry
Defensive architecture must enable correlation across these telemetry pillars to detect transitions from phishing interaction to credential misuse and post-authentication activity.
Identity systems and authentication services must be treated as primary security control boundaries, with enforcement and monitoring applied directly at the identity layer.
S32 Defensive Control Implementation
Defensive controls must be implemented as enforceable mechanisms that directly disrupt identity-based intrusion and authentication abuse observed in this campaign.
Identity Protection and Authentication Enforcement
Enforce multi-factor authentication across all externally exposed identity services and block legacy authentication protocols that bypass MFA. Apply conditional access policies that restrict authentication based on device trust, geolocation, and risk signals.
Phishing Detection and Interaction Control
Deploy email security controls that actively block credential harvesting attempts, including domain impersonation, lookalike domains, and malicious link delivery targeting privileged and access-bearing users.
Behavioral Detection and Identity Monitoring
Implement detection logic that identifies deviations in authentication behavior, including abnormal login timing, device usage, session patterns, and geographic anomalies, and enforce alerting or access restriction based on risk thresholds.
Privileged Access Enforcement
Restrict privileged account usage to controlled environments, enforce just-in-time access where possible, and continuously monitor privileged authentication activity for anomalous behavior.
Service Availability Protection
Apply rate limiting, traffic filtering, and service resilience controls to internet-facing systems to mitigate disruption attempts during escalation conditions.
S33 Defensive Control and Hardening Strategy
Organizations must align defensive improvements directly to the identity-based intrusion model and conflict-driven attack stages observed in this campaign.
· Implement identity baselining to detect deviations during authentication and post-authentication activity
· Deploy phishing-resistant authentication mechanisms such as hardware-based MFA to prevent credential harvesting success
· Integrate telemetry across email, endpoint, and network systems to enable detection of attack progression
· Harden externally exposed authentication services through access controls and monitoring
· Strengthen resilience of internet-facing services to withstand disruption activity
Control Impact Mapping
· Phishing Stage (T1566 – Phishing)
Phishing-resistant authentication and email security controls reduce credential harvesting success
· Credential Abuse Stage (T1078 – Valid Accounts, T1110 – Brute Force)
MFA enforcement, conditional access, and identity monitoring prevent unauthorized authentication and limit account misuse
· Post-Authentication Stage (T1087 – Account Discovery)
Behavioral detection and identity baselining identify abnormal activity following successful authentication
· Disruption Stage (T1498 – Network Denial of Service)
Traffic filtering and resilience controls reduce service degradation and maintain availability during escalation
S34 Incident Response and Recovery Strategy
Incident response must prioritize rapid containment of credential compromise and authentication abuse, recognizing that access may already exist within legitimate identity workflows at the time of detection.
Response actions include:
· Immediate revocation of compromised credentials and active authentication sessions
· Forced password resets and mandatory MFA re-enrollment for affected identities
· Rapid analysis of authentication logs to identify unauthorized access patterns and scope of compromise
· Isolation of affected systems or accounts to prevent continued access
Response planning must account for conflict-aligned escalation scenarios, where adversaries may maintain access while simultaneously initiating disruption activity against internet-facing services.
Recovery efforts must validate identity integrity, confirm removal of unauthorized access, and ensure that no persistent authentication pathways remain available to adversaries.
S35 Security Hardening Recommendations
Security hardening must focus on reducing exposure at the identity and authentication layer.
· Eliminate legacy authentication mechanisms that bypass MFA enforcement
· Enforce conditional access policies based on device, location, and behavioral risk signals
· Reduce external exposure of authentication services where possible
· Apply segmentation to limit the impact of compromised accounts
· Conduct regular audits of privileged access and authentication pathways
S36 Intelligence Maturity Assessment
Current maturity for defending against this threat is constrained by limited identity-layer visibility and insufficient cross-telemetry correlation.
Detection Capability Maturity
Moderate, with reliance on isolated telemetry rather than integrated behavioral detection
Telemetry Coverage Maturity
Variable, with gaps between email, endpoint, and network visibility
Detection Engineering Maturity
Moderate, with limited behavioral detection for identity abuse
Response Readiness Maturity
Moderate, with response processes focused on endpoint compromise rather than identity compromise
Security Hardening Maturity
Variable, with inconsistent enforcement of identity protection controls
Control Effectiveness Score
Moderate
Audit Evidence Statement
Organizations with integrated telemetry and identity-centric detection demonstrate improved detection speed and reduced adversary dwell time
Security Program Integration Note
Enhancing identity-centric detection and cross-telemetry correlation strengthens alignment with identity security, access control, and incident response requirements across regulatory frameworks.
S37 Strategic Security Recommendations
Organizations must align security strategy with identity-based intrusion and conflict-driven targeting.
· Prioritize identity security as the primary control boundary for detection and prevention
· Implement cross-telemetry correlation across email, endpoint, and network systems
· Enforce strong authentication controls and eliminate weak or legacy access methods
· Enhance detection of authentication anomalies and post-authentication behavior
· Prepare for escalation-driven threat activity involving both persistent access and disruption
S38 Strategic Assessment and Conclusion
This campaign represents a conflict-aligned cyber operation in which Iranian state-affiliated actors leverage identity-based intrusion to impose strategic pressure against U.S. and allied interests.
The use of credential harvesting and authentication abuse enables adversaries to bypass traditional security controls and operate within legitimate identity workflows, significantly increasing the likelihood of delayed detection and sustained access.
Targeting is deliberate and globally distributed, with priority placed on organizations that provide operational, technological, or infrastructure support to U.S. and allied systems, including critical infrastructure and defense-adjacent environments.
The combination of scalable credential acquisition and escalation-driven disruption capability creates a dual-impact threat model, allowing adversaries to maintain persistent access while degrading service availability during periods of heightened geopolitical tension.
Organizations that do not implement identity-centric security controls, behavioral detection, and cross-telemetry correlation remain exposed to prolonged adversary presence and increased operational impact.
S39 Key Takeaways for Executive Leadership
· Identity systems represent the primary attack surface and must be treated as core security control boundaries
· Credential compromise enables adversaries to operate within legitimate workflows and bypass traditional defenses
· Targeting is strategically aligned to U.S. and allied interests rather than opportunistic
· Organizations may experience simultaneous access and disruption activity during escalation conditions
· Detection requires correlation across email, endpoint, and network telemetry rather than reliance on single-source alerts
· Strong authentication enforcement and identity monitoring are critical to reducing risk
S40 References
Vendor Advisory
· Cybersecurity and Infrastructure Security Agency (CISA) advisory on Iranian cyber actors targeting U.S. networks
· hxxps[:]//www[.]cisa[.]gov/resources-tools/resources/iranian-cyber-actors-may-target-vulnerable-us-networks-and-entities-interest
Security Vendor Analysis
· SecurityScorecard analysis of Iran conflict cyber activity and global targeting expansion
· hxxps[:]//securityscorecard[.]com/blog/iran-conflict-and-the-expanding-cyber-front-what-government-leaders-need-to-know/
· Center for Strategic and International Studies (CSIS) analysis on Iranian cyber threats to U.S. energy infrastructure
· hxxps[:]//www[.]csis[.]org/analysis/iran-conflict-heightens-cyber-threats-us-energy-infrastructure
Analytical Framework
· MITRE ATT&CK Enterprise Framework
· hxxps[:]//attack[.]mitre[.]org/