Query Details
// Detect Power Pwn (aka LOLCopilot) Red Team Tool // DefenderXDR custom detection and isolation of machine if caught running LOLCopilot 😉 // Running at NRT (near-realtime) DeviceNetworkEvents | where InitiatingProcessVersionInfoProductName == "Node.js" | where RemoteUrl startswith "https://www.office.com" or RemoteUrl startswith "https://teams.microsoft.com" // Sentinel detection on Entra Signin for possible LOLCopilot usage on non MDE endpoints SigninLogs | where TimeGenerated > ago(1h) | where UserAgent contains "headless" // Note: The above will no longer work if threat actor changes the Power Pwn Puppeteer script's setUserAgent value // Reference: https://www.wired.com/story/microsoft-copilot-phishing-data-extraction/
This query is designed to detect the use of a Red Team tool called Power Pwn (also known as LOLCopilot) and take action if it is found. Here's a simplified summary:
Detection in Near Real-Time (NRT):
Isolation of Machine:
Sentinel Detection on Entra Sign-in Logs:
Note:
Reference:
In essence, this query helps identify and respond to potential malicious activity involving LOLCopilot by monitoring specific network events and sign-in logs.

Steven Lim
Released: August 12, 2024
Tables
Keywords
Operators