Skip to content

Analytic for Signal Desktop sensitive data access #5220

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Open
wants to merge 2 commits into
base: master
Choose a base branch
from

Conversation

netgrain
Copy link
Contributor

@netgrain netgrain commented Mar 3, 2025

Summary of the Pull Request

Adds analytic for detecting access of Signal Desktops sensitive files containing message data, and key material used for encrypting- and decrypting said data. Multiple threat actors have targeted locally stored data in Signal, WhatsApp and Telegram in recent years.

See also: https://cloud.google.com/blog/topics/threat-intelligence/russia-targeting-signal-messenger/

Changelog

  • new: File Access Of Signal Desktops Sensitive Data

Example Log Event

- System 
  - Provider 
   [ Name]  Microsoft-Windows-Security-Auditing 
   EventID 4663  
  - Execution 
   [ ProcessID]  4 
   [ ThreadID]  112 
   Channel Security 

- EventData 
  SubjectUserSid S-1-5-21-..
  SubjectUserName user1
  SubjectDomainName DOMAIN 
  ObjectServer Security 
  ObjectType File 
  ObjectName C:\Users\user1\AppData\Roaming\Signal\sql\db.sqlite 
  HandleId 0xa44 
  AccessList %%4416  
  AccessMask 0x1 
  ProcessId 0x2818
  ProcessName C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
  ResourceAttributes S:AI 

@github-actions github-actions bot added Rules Windows Pull request add/update windows related rules labels Mar 3, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Rules Windows Pull request add/update windows related rules
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant