-
Notifications
You must be signed in to change notification settings - Fork 433
detection Lateral Movement via BitLocker COM Hijacking #3801
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: develop
Are you sure you want to change the base?
Conversation
|
Hey @AAtashGar before reviewing this. Just wanted to ask any particular reason you want this as experimental instead of production. From your screenshot it looks like you have the data already. Simply export it as raw and then upload it to https://github.com/splunk/attack_data as LFS with a corresponding yaml definition. (See old PRs for reference). Or if you want you could upload the raw logs here and we will take care of it, if we deem the rule ineteresting. |
|
Dear @nasbench Should I change status to production after adding the data? Happy to upload raw logs here if needed. Let me know if there's anything else! |
|
@AAtashGar in this repo context. Production means tested rules aka with logs and experimental means untested. So yes once you upload the data to attack data and Link it you can switch the status and I can start reviewing it. Cheers |
|
@nasbench Perfect, thanks for clarifying! Got it |
|
@nasbench Done! attack_data PR created with LFS logs and YAML definition: Status changed to Ready for review — thanks! |
Add detection for BitLocker COM Hijacking Lateral Movement (T1546.015)
What does this PR do?
Adds a new experimental ESCU detection + analytic story for the novel BitLocker Network Unlock COM Object Hijacking technique published in August 2025.
This living-off-the-land lateral movement method:
HKCU\Software\Classes\CLSID\{A7A63E5C-3877-4840-8727-C1EA9D7A4D50}\InprocServer32baaupdate.exe(from explorer.exe) orBdeUISrv.exe(from svchost.exe)This is the first public detection covering this advanced technique.
Files added:
detections/endpoint/lateral_movement_bitlocker_com_hijacking.ymlmacros/lateral_movement_bitlocker_com_hijacking_filter.ymlstories/bitlocker_com_hijacking_lateral_movement.ymlScreenshots
Checklist
<platform>_<mitre att&ck technique>_<short description>nomenclaturecontentctl validate --path .→ No issues)Testing Performed
→ Validation Completed - No issues detected!
→ All files valid