Agent Spoofing - Multiple Hosts Using Same Agentedit

Detects when multiple hosts are using the same agent ID. This could occur in the event of an agent being taken over and used to inject illegitimate documents into an instance as an attempt to spoof events in order to masquerade actual activity to evade detection.

Rule type: threshold

Rule indices:

  • logs-*
  • metrics-*
  • traces-*

Severity: high

Risk score: 73

Runs every: 5 minutes

Searches indices from: now-9m (Date Math format, see also Additional look-back time)

Maximum alerts per execution: 100

Tags:

  • Elastic
  • Threat Detection
  • Defense Evasion

Version: 1

Added (Elastic Stack release): 7.14.0

Rule authors: Elastic

Rule license: Elastic License v2

Potential false positivesedit

This is meant to run only on datasources using agents v7.14+ since versions prior to that will be missing the necessary field, resulting in false positives.

Rule queryedit

event.agent_id_status:*

Threat mappingedit

Framework: MITRE ATT&CKTM