You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: detections/endpoint/detect_remote_access_software_usage_process.yml
+39-30Lines changed: 39 additions & 30 deletions
Original file line number
Diff line number
Diff line change
@@ -1,17 +1,20 @@
1
1
name: Detect Remote Access Software Usage Process
2
2
id: ffd5e001-2e34-48f4-97a2-26dc4bb08178
3
-
version: 9
4
-
date: '2025-05-02'
3
+
version: 10
4
+
date: '2025-07-28'
5
5
author: Steven Dick, Sebastian Wurl, Splunk Community
6
6
status: production
7
7
type: Anomaly
8
-
description: The following analytic detects the execution of known remote access software
9
-
within the environment. It leverages data from Endpoint Detection and Response (EDR)
10
-
agents, focusing on process names and parent processes mapped to the Endpoint data
11
-
model. We then compare with with a list of known remote access software shipped as a lookup file - remote_access_software. This activity is significant as adversaries often use remote access tools like AnyDesk, GoToMyPC, LogMeIn, and TeamViewer to maintain unauthorized access.
12
-
If confirmed malicious, this could allow attackers to control systems remotely,
13
-
exfiltrate data, or deploy additional malware, posing a severe threat to the organization's
14
-
security.
8
+
description: The following analytic detects the execution of known remote access
9
+
software within the environment. It leverages data from Endpoint Detection and
10
+
Response (EDR) agents, focusing on process names and parent processes mapped
11
+
to the Endpoint data model. We then compare with with a list of known remote
12
+
access software shipped as a lookup file - remote_access_software. This
13
+
activity is significant as adversaries often use remote access tools like
14
+
AnyDesk, GoToMyPC, LogMeIn, and TeamViewer to maintain unauthorized access. If
15
+
confirmed malicious, this could allow attackers to control systems remotely,
16
+
exfiltrate data, or deploy additional malware, posing a severe threat to the
0 commit comments