Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Added Fake CAPTCHA Campaign new rules #5058

Open
wants to merge 2 commits into
base: master
Choose a base branch
from

Conversation

ahmedfarou22
Copy link
Contributor

Summary of the Pull Request

Many threat actors have been using the Fake CAPTCHA to trick their victims into pasting malicious PowerShell command in the windows run dialog.

I added 2 new rules:

  1. A detection rule that looks for suspicious PowerShell commands in the RunMru registry key. this key stores execution from the run dialog.

  2. A threat hunting rule that looks for any suspicous commands in the runmru key this is to detect if the threat actor is not using powershell or used the same teqnique capitcha but with diffrent approach this rule has a high false postive becouse it is a hunting rule.

More detailes are mentioned in my blog

Changelog

new: Suspicious PowerShell Commands in RunMRU key
new: Suspicious Commands in RunMRU key (Threat hunting)

Example Log Event

Fixed Issues

SigmaHQ Rule Creation Conventions

  • If your PR adds new rules, please consider following and applying these conventions

@github-actions github-actions bot added Rules Windows Pull request add/update windows related rules labels Oct 21, 2024
@ahmedfarou22
Copy link
Contributor Author

Quick side note:
In Red Canary's latest blog post, Intelligence Insights: October 2024, they referred to this technique as "Paste and run".

Summary from their latest blog (paste and run):
The "paste and run" technique, often called "ClickFix" (coined by Proofpoint), is a malicious tactic observed since early 2024. Attackers use it to trick users into copying and executing PowerShell code by disguising it as a "fix" to access content. Lures include phishing prompts for access fixes or fake CAPTCHAs on compromised websites. For example, a fake CAPTCHA instructs users to click an “I’m not a robot” button, which silently copies malicious code to their clipboard, followed by steps to paste and run it, unknowingly executing the attack.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Rules Windows Pull request add/update windows related rules
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant