Skip to content

Conversation

@rabbitstack
Copy link
Owner

What is the purpose of this PR / why it is needed?

Identifies the execution of the process via the Run command dialog box followed by a network connection. This could be indicative of the ClickFix deceptive tactic used by attackers to lure victims into executing malicious commands under the guise of meeting pages or CAPTCHAs.

What type of change does this PR introduce?


Uncomment one or more /kind <> lines:

/kind feature (non-breaking change which adds functionality)

/kind bug-fix (non-breaking change which fixes an issue)

/kind refactor (non-breaking change that restructures the code, while not changing the original functionality)

/kind breaking (fix or feature that would cause existing functionality to not work as expected

/kind cleanup

/kind improvement

/kind design

/kind documentation

/kind other (change that doesn't pertain to any of the above categories)

Any specific area of the project related to this PR?


Uncomment one or more /area <> lines:

/area instrumentation

/area telemetry

/area rule-engine

/area filters

/area yara

/area event

/area captures

/area alertsenders

/area outputs

/area rules

/area filaments

/area config

/area cli

/area tests

/area ci

/area build

/area docs

/area deps

/area other

Special notes for the reviewer


Does this PR introduce a user-facing change?


@rabbitstack rabbitstack added the rules Anything related to detection rules label Mar 24, 2025
@rabbitstack rabbitstack force-pushed the potential-clickfix-infection-via-run-dialog branch from 6cebc6a to 0ec7b03 Compare March 24, 2025 20:27
@rabbitstack rabbitstack changed the title feat(rules): Potential ClickFix infection via Run dialog feat(rules): New Potential ClickFix infection via Run dialog rule Mar 24, 2025
@rabbitstack rabbitstack force-pushed the potential-clickfix-infection-via-run-dialog branch from 0ec7b03 to c3bcf27 Compare March 25, 2025 17:39
@rabbitstack rabbitstack changed the title feat(rules): New Potential ClickFix infection via Run dialog rule feat(rules): New Potential ClickFix infection chain via Run window rule Mar 25, 2025
@rabbitstack rabbitstack force-pushed the potential-clickfix-infection-via-run-dialog branch from c3bcf27 to 2596e38 Compare March 25, 2025 19:03
Identifies the execution of the process via the Run command dialog box followed by a network connection. This could be indicative of the ClickFix deceptive tactic used by attackers to lure victims into executing malicious commands under the guise of meeting pages or CAPTCHAs.
@rabbitstack rabbitstack merged commit d87f913 into master Apr 4, 2025
15 of 17 checks passed
@rabbitstack rabbitstack deleted the potential-clickfix-infection-via-run-dialog branch April 4, 2025 19:27
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

rules Anything related to detection rules

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants