It's Day 11 of #100DaysofLC, and today's detection draws from some threat intelligence from Proofpoint, found here: https://www.proofpoint.com/us/blog/threat-insight/ta422s-dedicated-exploitation-loop-same-week-after-week They report on a multi-step attack from TA422; I focused on the LNK and DOCX files created on disk. We can utilize LimaCharlie's NEW_DOCUMENT to monitor these files and pivot on a common keyword.

I used the keyword "SEDE-PV-2023". This might be legitimate, but the extensions should help with the rule fidelity.

#limacharlie #detectionengineering #dfir

TA422’s Dedicated Exploitation Loop—the Same Week After Week  | Proofpoint US

Key takeaways  Since March 2023, Proofpoint researchers have observed regular TA422 (APT28) phishing activity, in which the threat actor leveraged patched vulnerabilities to send, at times, high-vo...

Proofpoint