Skip to content

Commit a56b0d9

Browse files
[New Rule] Azure Recovery Services Deletion (#5214)
Fixes #5213
1 parent f58e833 commit a56b0d9

File tree

1 file changed

+60
-0
lines changed

1 file changed

+60
-0
lines changed
Lines changed: 60 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,60 @@
1+
[metadata]
2+
bypass_bbr_timing = true
3+
creation_date = "2025/10/13"
4+
integration = ["azure"]
5+
maturity = "production"
6+
updated_date = "2025/10/13"
7+
8+
[rule]
9+
author = ["Elastic"]
10+
building_block_type = "default"
11+
description = """
12+
Identifies the deletion of Azure Recovery Services resources. Azure Recovery Services vaults contain data for copies of
13+
VMs, workloads, servers, and other resources regarding Infrastructure as a Service (IaaS). Adversaries may delete these
14+
recovery services to impact backup capabilities during stable operations or to inhibit disaster recovery services during
15+
ransom-based attacks or operational disruptions.
16+
"""
17+
from = "now-9m"
18+
index = ["logs-azure.activitylogs-*", "filebeat-*"]
19+
language = "kuery"
20+
license = "Elastic License v2"
21+
name = "Azure Recovery Services Resource Deleted"
22+
references = [
23+
"https://www.microsoft.com/en-us/security/blog/2023/07/25/storm-0501-ransomware-attacks-expanding-to-hybrid-cloud-environments/",
24+
]
25+
risk_score = 47
26+
rule_id = "b8c3e5d0-8a1a-11ef-9b4a-f661ea17fbce"
27+
severity = "medium"
28+
tags = [
29+
"Domain: Cloud",
30+
"Domain: Storage",
31+
"Data Source: Azure",
32+
"Data Source: Azure Activity Logs",
33+
"Use Case: Threat Detection",
34+
"Tactic: Impact",
35+
"Resources: Investigation Guide",
36+
"Rule Type: BBR",
37+
]
38+
timestamp_override = "event.ingested"
39+
type = "query"
40+
41+
query = '''
42+
event.dataset:azure.activitylogs and
43+
azure.activitylogs.operation_name:MICROSOFT.RECOVERYSERVICES/*/DELETE and
44+
event.outcome:(Success or success)
45+
'''
46+
47+
48+
[[rule.threat]]
49+
framework = "MITRE ATT&CK"
50+
[[rule.threat.technique]]
51+
id = "T1490"
52+
name = "Inhibit System Recovery"
53+
reference = "https://attack.mitre.org/techniques/T1490/"
54+
55+
56+
[rule.threat.tactic]
57+
id = "TA0040"
58+
name = "Impact"
59+
reference = "https://attack.mitre.org/tactics/TA0040/"
60+

0 commit comments

Comments
 (0)