Query Details
// MDE KQL to detect TA571 socialengineering abuse // https://www.linkedin.com/posts/activity-7208705552833478656-8xUz/ DeviceEvents | where ActionType == "GetClipboardData" | where InitiatingProcessFileName == "powershell.exe"
This KQL (Kusto Query Language) query is designed to detect potential social engineering abuse by a threat actor known as TA571. Here's a simple summary of what the query does:
DeviceEvents, which is a log of various events happening on devices.GetClipboardData, meaning it checks for events where data is being accessed from the clipboard.powershell.exe.In essence, this query is looking for instances where PowerShell is accessing clipboard data, which could be an indicator of malicious activity related to social engineering attacks.

Steven Lim
Released: August 2, 2024
Tables
Keywords
Operators