Detection Ideas

All detection suggestions across threat briefs. Library-matched detections have ready-to-deploy Vega rules.

Want these detections running in your environment?

Enable detections with Vega →
84 detection ideas
Vega detection available

Detect browser redirects from ad networks to exploit kits or malware delivery pages

Vega detection available

Detect SEO-poisoned results by monitoring for sponsored ad clicks leading to newly registered or typosquatted domains

Vega detection available

Detect clipboard-to-terminal paste operations containing encoded or obfuscated commands

Vega detection available

Track user clicks on URLs that redirect through multiple domains before payload delivery

Vega detection available

Detect AppleScript execution spawned by non-standard parent processes

Vega detection available

Alert on command-line arguments using character substitution, escape sequences, or encoding

Vega detection available

Flag mshta.exe executing content from remote URLs or with obfuscated arguments

Vega detection available

Alert on processes accessing browser credential stores, cookies, or session databases

Vega detection available

Flag processes decoding or deobfuscating data using certutil, base64, or XOR operations

Vega detection available

Detect reconnaissance phishing emails that solicit credentials or technical information without delivering payloads

Vega detection available

Alert on reported vishing attempts impersonating IT help desks — correlate with subsequent password resets

Vega detection available

Monitor third-party vendor access for unusual activity patterns or access outside normal business hours

Vega detection available

Alert on domain account usage from unexpected hosts or concurrent sessions in different geolocations

Vega detection available

Monitor for user-initiated execution of untrusted content from email or web downloads

Vega detection available

Monitor for new MFA device registrations, especially shortly after password resets or from untrusted devices

Vega detection available

Detect forged SAML tokens or web credentials used from IPs not associated with the identity provider

Vega detection available

Alert on creation of new accounts, especially those immediately granted privileged roles

Vega detection available

Monitor for modifications to domain trust relationships or federation configurations in identity providers

Vega detection available

Detect rapid MFA push notification generation — high-frequency prompts indicate push bombing attacks

Vega detection available

Alert on processes reading credential files, environment variables, or configuration stores

Vega detection available

Monitor for unauthorized access to SSH keys, certificates, and private key material

Vega detection available

Detect traffic routing through proxy services, VPNs, or residential proxy networks not sanctioned by the organization

Vega detection available

Monitor access to cloud service dashboards from unusual IPs or newly provisioned accounts

Vega detection available

Alert on creation of new cloud compute instances, especially in regions not typically used by the organization

Vega detection available

Detect lateral movement via cloud services — unusual API calls or console logins across accounts

Vega detection available

Monitor for enumeration of Active Directory, DNS, or cloud resource inventory from non-admin workstations

Vega detection available

Detect broad file system enumeration or searching across SharePoint, code repos, and internal wikis

Vega detection available

Alert on bulk extraction of browser bookmarks, history, or saved passwords from endpoints

Vega detection available

Monitor for mass download or enumeration of SharePoint documents and site collections

Vega detection available

Detect cloning or bulk access to internal code repositories from unfamiliar hosts or service accounts

Vega detection available

Alert on creation of staging directories or archives consolidating data before exfiltration

Vega detection available

Monitor for unusual access patterns to cloud storage — bulk downloads, new access keys, or cross-account access

Vega detection available

Detect mass email exports, mailbox delegation changes, or forwarding rules to external addresses

Vega detection available

Monitor for large outbound data transfers to web services such as MEGA, Dropbox, or cloud storage APIs

Vega detection available

Alert on uploads to cloud storage services from servers or workstations that typically do not perform such transfers

Vega detection available

Detect tampered release artifacts, force-pushed tags, or unauthorized package publications in CI/CD

Vega detection available

Detect data exfiltration to code repositories via automated commits or release uploads

Vega detection available

Identify suspicious archive creation before potential exfiltration

Detect executables masquerading as legitimate system files in non-standard directories

Vega detection available

Detect reflective DLL injection or in-memory assembly loading without disk writes

Monitor cmd.exe for obfuscated commands or unusual parent-child process chains

Vega detection available

Alert on deletion of log files, scripts, or artifacts immediately after execution

Vega detection available

Alert on remote WMI execution or WMI event subscriptions from non-admin accounts

Vega detection available

Detect DNS queries to algorithmically generated domain names

Vega detection available

Alert when users execute files downloaded from the internet lacking Mark-of-the-Web

Vega detection available

Monitor for sandbox evasion checks — VM detection, timing analysis, environment fingerprinting

Vega detection available

Monitor signed Windows binaries used to proxy execution of untrusted code (LOLBins)

Vega detection available

Alert on execution that checks for specific environment conditions before proceeding

Vega detection available

Monitor for tampering with security tools — service stops, driver unloads, or config changes

Vega detection available

Detect encrypted C2 channels using non-standard certificates or pinned connections

Vega detection available

Detect payloads hidden in image files via steganography — look for image downloads followed by script execution

Vega detection available

Flag network traffic using protocol impersonation to disguise C2 communications

Vega detection available

Detect malware resolving C2 addresses from public web services (pastebins, calendars, DNS TXT)

Vega detection available

Alert on credential dumping via LSASS access, SAM registry reads, or DCSync

Vega detection available

Monitor critical registry modifications that weaken security controls

Vega detection available

Detect deletion of volume shadow copies or disabling of backup services

Vega detection available

Flag enumeration of domain accounts, groups, or trust relationships

Vega detection available

Flag outbound data transfers to webhook endpoints from servers or CI runners

Vega detection available

Detect traffic routing through multiple proxy hops or anonymization networks

Monitor software supply chain for unauthorized modifications to build pipelines or package registries

Vega detection available

Monitor for services created or modified to execute payloads

Vega detection available

Detect clearing of Windows Event Logs or selective event deletion

Vega detection available

Detect enumeration of attached peripheral devices or removable media

Vega detection available

Alert on ESXi administrative commands executed outside of normal change windows

Vega detection available

Detect Python scripts executing from non-standard locations or with network activity

Monitor for creation of scheduled tasks or cron jobs by non-administrative users

Monitor for files that bypass Mark-of-the-Web protections via container formats or ADS manipulation

Flag suspicious links in messages that impersonate legitimate services or internal tools

Scan inbound emails for malicious attachments using sandboxing and content analysis

Monitor for JavaScript execution outside of browsers, particularly via wscript or cscript

Detect compiled HTML files (.chm) executing scripts or spawning child processes