Release date: 8 September, 2025Change typeChangesAdded 2 new Low Analytics BIOCsEmail attachment with Right-to-Left Override Unicode characterUncommon sensitive registry hive dumpAdded a new Low Analytics AlertA compromised process accessed a rare external hostAdded 9 new Informational Analytics BIOCsAn EBS snapshot block was downloadedAn unknown account was invited to the AWS organizationAn unusual cloud identity was granted permissions to a BigQuery resourceBigQuery table or query results exfiltrated to a foreign projectEmail contains URL delivering high-risk file typeEmail with file-sharing link containing auto-download parameterSending unusual file(s) to an external addressSuspicious SPF ResultUnusual Kubernetes secret accessAdded 2 new Informational Analytics AlertsNumerous emails sent by a single sender to multiple internal recipientsUnusual attachment volume in outbound emailsImproved logic of 7 High Analytics BIOCsCopy a process memory fileMemory dumping with comsvcs.dllMimikatz command-line argumentsSuspicious API call from a Tor exit nodeSuspicious usage of File Server Remote VSS Protocol (FSRVP)Uncommon remote scheduled task creationUnicode RTL Override CharacterImproved logic of a High Analytics AlertSuspicious objects encryption in an AWS bucketImproved logic of 41 Medium Analytics BIOCsA Kubernetes API operation was successfully invoked by an anonymous userA TCP stream was created directly in a shellA cloud storage object was copied to a foreign cloud accountA process was executed with a command line obfuscated by Unicode character substitutionAutorun.inf created in root C driveCloud snapshot of a database or storage instance was publicly sharedCommonly abused AutoIT script connects to an external domainEncoded information using Windows certificate management toolExecutable created to disk by lsass.exeExecution of the Hydra Linux password brute-force toolFodhelper.exe UAC bypassIndirect command execution using the Program Compatibility AssistantInteractive at.exe privilege escalation methodKerberos Traffic from Non-Standard ProcessKubernetes vulnerability scanning tool usageLSASS dump file written to diskMicrosoft Office Process Spawning a Suspicious One-LinerPenetration testing tool activityPhantom DLL LoadingPossible Persistence via group policy Registry keysPossible RDP session hijacking using tscon.exePossible code downloading from a remote host by Regsvr32Possible collection of screen captures with Windows Problem Steps RecorderPossible malicious .NET compilation started by a commonly abused processPowerShell runs suspicious base64-encoded commandsPowerShell suspicious flagsProcdump executed from an atypical directoryRemote WMI process executionRundll32.exe running with no command-line argumentsRundll32.exe spawns conhost.exeSuspicious .NET process loads an MSBuild DLLSuspicious PowerSploit's recon module (PowerView) net function was executedSuspicious PowerSploit's recon module (PowerView) used to search for exposed hostsSuspicious certutil command lineSuspicious heavy allocation of compute resources - possible mining activitySuspicious usage of EC2 tokenUncommon DLL-sideloading from a logical CD-ROM (ISO) deviceUncommon SetWindowsHookEx API invocation of a possible keyloggerUnsigned process injecting into a Windows system binary with no command lineUnusual process access to ld.so.preload fileWindows LOLBIN executable connected to a rare external hostImproved logic of 135 Low Analytics BIOCsA Backup vault policy was modifiedA Command Line Interface (CLI) command was executed from an AWS serverless compute serviceA cloud function was created with an unusual runtimeA commonly abused process connected to a rare cloud resourceA commonly abused process connected to a rare external hostA process queried the ADFS database decryption key via LDAPA rare file path was added to the AppInit_DLLs registry valueA remote service was created via RPC over SMBA suspicious direct syscall was executedA suspicious process enrolled for a certificateAWS Guard-Duty detector deletionAWS S3 bucket was exposed to public accessAWS data asset shared publicAWS web ACL deletionAn Azure Firewall policy deletionAn RDS snapshot was exported to an unknown S3 bucketAn uncommon service was startedAn unpopular process accessed the microphone on the hostAttempt to execute a command on a remote host using PsExec.exeAzure Event Hub DeletionAzure Network Watcher DeletionAzure account deletion by a non-standard accountBilling admin role was removedCached credentials discovery with cmdkeyChange of sudo caching configurationCloud Trail logging deletionCompressing data using pythonConhost.exe spawned a suspicious cmd processCopy a user's GnuPG directory with rsyncDisable encryption operationsDownload a script using the python requests moduleElevation to SYSTEM via servicesEmail was received from an unknown sender using a disposable domainExecutable or Script file written by a web server processExecution of an uncommon process at an early startup stage by Windows system binaryExecution of an uncommon process with a local/domain user SID at an early startup stage by Windows system binaryExecution of dllhost.exe with an empty command lineExecution of renamed lolbinExternal email display name impersonation of internal personnelExtracting credentials from Unix filesFirst Azure AD PowerShell operation for a userGCP Logging Sink DeletionGCP data asset shared publicGlobally uncommon root domain from a signed processGlobally uncommon root-domain port combination from a signed processImage file execution options (IFEO) registry key setInstallation of a new System-V serviceKeylogging using system commandsKnown service display name with uncommon image-pathKnown service name with an uncommon image-pathLOLBIN process executed with a high integrity levelLinux system firewall was modifiedMFA was disabled for an Azure identityMasquerading as a default local accountMasquerading as the Linux crond processMicrosoft Office adds a value to autostart Registry keyMicrosoft Office injects code into a processMicrosoft Office process spawns a commonly abused processNTDS.dit file written by an uncommon executableNew FTP ServerNew addition to Windows Defender exclusion listOffice process accessed an unusual .LNK fileOffice process spawned with suspicious command-line argumentsPossible DLL Hijack into a Microsoft processPossible DLL Search Order HijackingPossible Microsoft process masqueradingPossible network sniffing attempt via tcpdump or tsharkPossible webshell file written by a web server processPotential SCCM credential harvesting using WMI detectedRDP connections enabled remotely via RegistryRare binary connected to a rare cloud resourceRare binary connected to a rare external hostRare process created an SSH session to an uncommon cloud resourceRare process created an SSH session to an uncommon external hostRare process executed by an AppleScriptRare process with VNC server capabilities startedRare scheduled task createdRare service DLL was added to the registryReading bash command history fileRecurring rare domain access from an unsigned processRemote DCOM command executionRemote command execution via wmic.exeRemote service start from an uncommon sourceRemote usage of an AWS service tokenRundll32.exe executes a rare unsigned moduleSUID/GUID permission discoveryScheduled Task hidden by registry modificationScreensaver process executed from Users or temporary folderScripting engine connected to a rare external hostSensitive browser credential files accessed by a rare non browser processSetuid and Setgid file bit manipulationStored credentials exported using credwiz.exeSuspicious Certutil AD CS contactSuspicious DotNet log file createdSuspicious Print System Remote Protocol usage by a processSuspicious Udev driver rule execution manipulationSuspicious container orchestration jobSuspicious data encryptionSuspicious disablement of the Windows FirewallSuspicious module load using direct syscallSuspicious process accessed certificate filesSuspicious process modified RC script fileSuspicious sshpass command executionSuspicious systemd timer activitySvchost.exe loads a rare unsigned moduleThe Linux system firewall was disabledUncommon AT task-job creation by userUncommon NtWriteVirtualMemoryRemote API invocation with a PE header bufferUncommon PowerShell commands used to create or alter scheduled task parametersUncommon access to Microsoft Teams credential filesUncommon creation or access operation of sensitive shadow copyUncommon execution of ODBCConfUncommon local scheduled task creation via schtasks.exeUncommon msiexec execution of an arbitrary file from a remote locationUncommon remote monitoring and management toolUncommon reverse SSH tunnel to external domain/ipUnprivileged process opened a registry hiveUnsigned and unpopular process performed a DLL injectionUnsigned and unpopular process performed an injectionUnsigned process creates a scheduled task via file accessUnusual AWS credentials creationUnusual AWS user added to groupUnusual Azure AD sync module loadUnusual CIM repository file accessUnusual Process Spawned by Nginx in Ingress-Nginx podUnusual compressed file password protectionUnusual cross projects activityUnusual process accessed FTP Client credentialsUnusual process accessed a crypto wallet's filesUnusual process accessed a messaging app's filesUnusual process accessed a web browser history fileWindows Event Log was cleared using wevtutil.exeWindows event logs were cleared with PowerShellWmiPrvSe.exe Rare Child Command LineWsmprovhost.exe Rare Child ProcessImproved logic of 9 Low Analytics AlertsAn identity dumped multiple secrets from a projectFailed ConnectionsLarge Upload (HTTPS)Multiple Rare LOLBIN Process Executions by UserMultiple discovery commandsMultiple discovery commands on a Windows host by the same processOutlook files accessed by an unsigned processRisk indicators detected in emailSuspicious identity downloaded multiple objects from a bucketImproved logic of 281 Informational Analytics BIOCsA Kubernetes ConfigMap was created or deletedA Kubernetes Cronjob was createdA Kubernetes cluster role binding was created or deletedA Kubernetes cluster was created or deletedA Kubernetes ephemeral container was createdA Kubernetes namespace was created or deletedA Kubernetes role binding was created or deletedA Kubernetes secret was created or deletedA Kubernetes service account was created or deletedA Kubernetes service was created or deletedA LOLBIN was copied to a different locationA New Server was Added to an Azure Active Directory Hybrid Health ADFS EnvironmentA Service Principal was created in AzureA Service Principal was removed from AzureA browser extension was installed or loaded in an uncommon wayA cloud identity created or modified a security groupA cloud identity executed an API call from an unusual countryA cloud identity had escalated its permissionsA cloud identity invoked IAM related persistence operationsA cloud instance was stoppedA cloud snapshot of AWS database or storage was modified or sharedA cloud storage configuration was modifiedA compressed file was exfiltrated over SSHA compute-attached identity executed API calls outside the instance's regionA container registry was created or deletedA new Azure email domain verification was requestedA non-browser process accessed a website UIA process connected to a rare cloud resourceA process connected to a rare external hostA process connected to rare external hostA process modified an SSH authorized_keys fileA service was disabledA user logged in to the AWS console for the first timeAWS Cloud Trail log trail modificationAWS CloudWatch log group deletionAWS CloudWatch log stream deletionAWS Config Recorder stoppedAWS EC2 instance exported into S3AWS Flow Logs deletionAWS IAM resource group deletionAWS RDS cluster deletionAWS Root account activityAWS SES account sending settings modifiedAWS STS temporary credentials were generatedAWS SecurityHub findings were modifiedAWS Transfer Family server createdAWS config resource deletionAWS network ACL rule creationAWS network ACL rule deletionAWS user creationAbnormal Communication to a Rare DomainAccess to Kubernetes configuration fileActivity in a dormant region of a cloud projectAdding execution privilegesAn AWS EFS File-share mount was deletedAn AWS EFS file-share was deletedAn AWS EKS cluster was created or deletedAn AWS GuardDuty IP set was createdAn AWS Lambda Function was createdAn AWS Lambda function was modifiedAn AWS RDS Global Cluster DeletionAn AWS RDS instance was created from a snapshotAn AWS Route 53 domain was transferred to another AWS accountAn AWS S3 bucket configuration was modifiedAn AWS SAML provider was modifiedAn AWS SES identity was deletedAn AWS database service master user password was changedAn Azure DNS Zone was modifiedAn Azure Firewall rule collection group was modified or deletedAn Azure Firewall was modifiedAn Azure Key Vault key was modifiedAn Azure Key Vault was modifiedAn Azure Kubernetes Cluster was created or deletedAn Azure Kubernetes Role or Cluster-Role was modifiedAn Azure Kubernetes Role-Binding or Cluster-Role-Binding was modified or deletedAn Azure Kubernetes Service Account was modified or deletedAn Azure Network Security Group was modifiedAn Azure Point-to-Site VPN was modifiedAn Azure Suppression Rule was createdAn Azure VPN Connection was modifiedAn Azure firewall rule group was modifiedAn Azure virtual network Device was modifiedAn Azure virtual network was modifiedAn Email address was added to AWS SESAn IAM group was createdAn identity accessed Azure Kubernetes SecretsAn identity attached an administrative policy to an IAM user or roleAn identity created or updated password for an IAM userAn identity disabled bucket loggingAn identity started an AWS SSM sessionAn identity was granted permissions to manage user access to Azure resourcesAn operation was performed by an identity from a domain that was not seen in the organizationAn uncommon file added to startup-related Registry keysAn uncommon file was created in the startup folderAppleScript executed a shell scriptAppleScript interpreter dynamic library loaded into a processAppleScript process executed with a rare command lineAurora DB cluster stoppedAuthentication method added to an Azure accountAzure AD account unlock/password reset attemptAzure Automation Account CreationAzure Automation Runbook Creation/ModificationAzure Automation Runbook DeletionAzure Automation Webhook creationAzure Blob Container Access Level ModificationAzure Event Hub Authorization rule creation/modificationAzure Key Vault Secrets were modifiedAzure Key Vault modificationAzure Kubernetes events were deletedAzure Resource Group DeletionAzure Storage Account key generatedAzure account creation by a non-standard accountAzure application removedAzure device code authentication flow usedAzure diagnostic configuration deletionAzure permission delegation grantedAzure storage account blob anonymous access is enabledAzure storage account was publicly sharedAzure virtual machine commands executionBrowser bookmark files accessed by a rare non-browser processCloud Trail Logging has been stopped/suspendedCloud Unusual Instance Metadata Service (IMDS) accessCloud Watch alarm deletionCloud access key creationCloud compute instance user data script modificationCloud compute serial console accessCloud email sending was enabledCloud email service activityCloud identity reached a throttling API rateCloud impersonation attempt by unusual identity typeCloud resource logging was disabledCloud snapshot created or modifiedCommand execution via wmiexecCommonly abused AutoIT script drops an executable file to diskCreation or modification of the default command executed when opening an applicationData encryption was disabledDiscovery of host users via WMICEC2 snapshot attribute has been modifiedEmail Punycode characters in URL(s)Email attachment with a potentially malicious file extensionEmail attachment with multiple extensionsEmail attachment(s) with potentially malicious MIME typeEmail containing a link with an IP address convention was detectedEmail containing a redirected linkEmail has a short body or subject and was sent from an external sourceEmail marked as spam and bulk based on Spam Confidence Level and Bulk Complaint Level valuesEmail mimics replies or forwards without an actual ongoing conversationEmail suspicious Moniker link detectedEmail was received from an unknown address using a public provider domainEmail was received from an unknown sender using a recognized domainEmail with URL shortener detectedExecution of an uncommon process at an early startup stageExecution of an uncommon process with a local/domain user SID at an early startup stageGCP Firewall Rule ModificationGCP Firewall Rule creationGCP IAM Role DeletionGCP IAM Service Account Key DeletionGCP Logging Bucket DeletionGCP Logging Sink ModificationGCP Pub/Sub Subscription DeletionGCP Pub/Sub Topic DeletionGCP Service Account DisableGCP Service Account creationGCP Service Account deletionGCP Service Account key creationGCP Storage Bucket Configuration ModificationGCP Storage Bucket Permissions ModificationGCP Storage Bucket deletionGCP VPC Firewall Rule DeletionGCP Virtual Private Cloud (VPC) Network DeletionGCP Virtual Private Network Route CreationGCP Virtual Private Network Route DeletionGlobally uncommon IP address connection from a signed processGlobally uncommon high entropy process was executedGlobally uncommon image load from a signed processGlobally uncommon injection from a signed processGlobally uncommon process execution from a signed processGranting Access to an AccountIAM User added to an IAM groupIAM role trust policy modificationIAM role was createdIdentity assigned an Azure AD Administrator RoleIndicator blockingInjection into rundll32.exeKubernetes cluster events deletionKubernetes network policy modificationKubernetes secret enumeration activityLOLBAS executable injects into another processLOLBIN created a PSScriptPolicyTest PowerShell script fileLinux network share discoveryLocal account discoveryMFA device was removed/deactivated from an IAM userModification of PAMModification or Deletion of an Azure Application Gateway DetectedMsiexec execution of an executable from an uncommon remote locationNetwork sniffing detected in Cloud environmentPIM privilege member removalPenetration testing tool activity attemptPenetration testing tool attemptPermission Groups discovery commandsPossible DLL Side-LoadingPossible Email collection using Outlook RPCPossible binary padding using ddPossible data obfuscationPsExec was executed with a suspicious command linePython HTTP server startedRare LOLBIN Process Execution by UserRare Unix process divided files by sizeRare connection to external IP address or host by an application using RMI-IIOP or LDAP protocolRare process accessed a Keychain fileRare signature signed executable executed in the networkRarely seen URL(s) within a well-known domain detected in your organization's emailRemote PsExec-like command executionRemote code execution into Kubernetes PodRemote usage of AWS Lambda's roleRemote usage of an App engine Service Account tokenRemoval of an Azure Owner from an Application or Service PrincipalRun downloaded script using pipeS3 configuration deletionSSO with abnormal user agentService execution via sc.exeSigned process performed an unpopular DLL injectionSigned process performed an unpopular injectionSoft delete of cloud storage configuration was disabledSpace after filenameSuspicious AMSI decode attemptSuspicious Unicode character detected in emailSuspicious access to shadow fileSuspicious active setup registeredSuspicious cloud compute instance SSH keys modification attemptSuspicious container runtime connection from within a Kubernetes PodSuspicious curl user agentSuspicious process executed with a high integrity levelSuspicious process execution from tmp folderSuspicious proxy environment variable settingSuspicious usage of Microsoft's Active Directory PowerShell module remote discovery cmdletTampering with Internet Explorer Protected Mode configurationTampering with the Windows User Account Controls (UAC) configurationUncommon DotNet module load relationshipUncommon GetClipboardData API function invocation of a possible information stealerUncommon Linux remote shell command executionUncommon Linux shell command executionUncommon SQL like command lineUncommon access to cloud platforms' sensitive files by a scripting engineUncommon cloud CLI tool usageUncommon communication to an instant messaging serverUncommon kernel module loadUncommon macOS shell command executionUncommon net group command executionUncommon net localgroup command executionUncommon network tunnel creationUncommon sensitive filesystem registry hive accessUncommon service stop operationUnpopular URL domain(s) in your organization detected in emailUnpopular URL(s) detected in emailUnpopular domains detected in email URLs for a recipientUnpopular rsync process executionUnrecognized internal address (AAD mismatch)Unusual ADConnect database file accessUnusual AWS systems manager activityUnusual DB process spawning a shellUnusual IAM enumeration activity by a non-user IdentityUnusual Identity and Access Management (IAM) activityUnusual Kubernetes service account file readUnusual access to the AD Sync credential filesUnusual access to the Windows Internal Database on an ADFS serverUnusual certificate management activityUnusual cloud identity impersonationUnusual key management activityUnusual process accessed a macOS notes DB fileUnusual process accessed web browser cookiesUnusual process accessed web browser credentialsUnusual resource modification by newly seen IAM userUnusual resource modification/creationUnusual secret management activityUnusual use of a 'SysInternals' toolUsage of homograph characters detected in an emailUsage of homograph characters detected in an email's from headerVM Detection attempt on LinuxWeb server CGO executed an uncommon processX-Forefront-Antispam-Report has flagged this email as a potential threatImproved logic of 21 Informational Analytics AlertsAbnormal Allocation of compute resources in multiple regionsAn identity performed a suspicious download of multiple cloud storage objectsCloud email infrastructure enumeration activityCloud infrastructure enumeration activityCloud user performed multiple actions that were deniedDeletion of multiple cloud resourcesIAM Enumeration sequenceInternal Login Password SprayKubernetes enumeration activityMassive file activity abnormal to processMulti region enumeration activityMultiple cloud snapshots exportMultiple discovery commands on a Linux host by the same processMultiple discovery-like commandsMultiple failed logins from a single IPPort ScanPossible data exfiltration over a USB storage deviceStorage enumeration activitySuspicious access to cloud credential filesSuspicious container reconnaissance activity in a Kubernetes podSuspicious theme and sentiment in emailIncreased the severity to Low for an Analytics BIOCUncommon driver loadedDecreased the severity to Informational for 2 Analytics BIOCsModification of NTLM restrictions in the RegistryUnusual hostname for the sending mail server in the email headersChanged metadata of a High Analytics BIOCCollection errorChanged metadata of 3 Medium Analytics BIOCsCorrelation rule errorError in event forwardingParsing Rule ErrorChanged metadata of a Low Analytics BIOCOkta FastPass reported phishing attack suspectedChanged metadata of a Low Analytics AlertLogs were not collected from a data source for an abnormally long timeChanged metadata of an Informational Analytics BIOCA possible risky login to AzureChanged metadata of an Informational Analytics AlertA user accessed multiple unusual resources via SSORemoved an old Medium Analytics BIOCVulnerable driver loadedTemporarily removed a Informational Analytics Alert for improvementSSH brute force attempt