Hiding Information and Covering Tracks

Hiding Information and Covering Tracks (Windows/Mac)

The following out-of-the-box alert rules are assigned to the (Windows/Mac) Category: HIDING INFORMATION AND COVERING TRACKS.

ALERT RULE

Description

Clearing browsing history in IE or Firefox

An alert is triggered upon opening the settings window of Internet Explorer or Firefox to clear the browser history data. This action could indicate that the user has something to hide.

Copying Windows event log files

An alert is triggered upon copying to the clipboard Windows event log files. This action could indicate that the user plans to overwrite event log files to hide his actions that are documented in these log files.

Exporting Windows Registry data

An alert is triggered upon opening Windows Registry and invoking the Export command. This action could indicate that the user plans to manipulate Windows Registry data.

Hiding files by moving them into hidden directory

An alert is triggered when any file is moved into a hidden directory.

Importing Windows Registry data

An alert is triggered upon opening Windows Registry and invoking the Import command. This action could indicate that the user plans to manipulate Windows Registry data.

Password protecting a file in UltraEdit text editor

An alert is triggered when a file in the UltraEdit text editor has been password protected.

Running secured or encrypted email client

An alert is triggered upon running a secured or encrypted email client which could be used to bring in or send out information that cannot be monitored. This action could indicate that the user behind it has something to hide.

Running steganography tools

An alert is triggered upon running one of the predefined steganography tools that are usually used to conceal text information within images, and by that to block data ex-filtration tools to detect this data leak.

Zipping file with password

An alert is triggered upon running a compression solution and setting a password protection for the compressed file. This action could indicate that the user has something to hide.

Hiding Information and Covering Tracks (Unix/Linux)

The following out-of-the-box alert rules are assigned to the (Unix/Linux) Category: HIDING INFORMATION AND COVERING TRACKS.

ALERT RULE

Description

Audit log files tampering using almost any command

An alert is triggered upon running almost any commands (except for TAIL/CAT/SUDO) on audit log files which might prevent SIEM products from tracing hidden activity on this machine.

Audit log files tampering using specific commands

An alert is triggered upon running specific view/edit/delete/copy commands on audit log files which might prevent SIEM products from tracing hidden activity on this machine.

Editing audit log files using SUDO

An alert is triggered upon accessing audit log files using SUDO not for viewing purposes. An interactive user is allowed to access audit log files only for viewing them and not for editing.

Misusing SUDO-authorized text editor to run shell commands

An alert is triggered upon breaking out of a text editor executed via the SUDO command, by executing external commands.

Running the steganography tool CLOAKIFY

An alert is triggered upon executing CLOAKIFY.PY which is a text-based steganography tool that can be used to hide information from data leak scanning tools using list-based ciphers.