Unusual process accessed a messaging app's files

Cortex XDR Analytics Alert Reference by Alert name

Product
Cortex XDR
Last date published
2024-10-08
Category
Analytics Alert Reference
Order
Alert name

Synopsis

Activation Period

14 Days

Training Period

30 Days

Test Period

N/A (single event)

Deduplication Period

1 Day

Required Data

  • Requires:
    • XDR Agent with eXtended Threat Hunting (XTH)

Detection Modules

Detector Tags

Sensitive Information Stealing Analytics

ATT&CK Tactic

ATT&CK Technique

Severity

Low

Description

An unusual process has accessed files belonging to a messaging app.

Attacker's Goals

Obtain access to the user's message history and steal their contents.

Investigative actions

  • Determine whether it is legitimate for the process to access such files.
  • Analyze the process/application that accessed the file.
  • Check for any other suspicious actions that were performed by the process.
  • Look for unusual access of resources using credentials that may have been associated with the above messaging app.