← Back to SOC feed Coverage →

PUA - TruffleHog Execution - Linux

sigma MEDIUM SigmaHQ
T1083T1552.001
imProcessCreate
This rule was pulled from an open-source repository and enriched with AI. Validate in a test environment before deploying to production.
View original rule at SigmaHQ →
Retrieved: 2026-03-25T02:50:08Z · Confidence: low

Hunt Hypothesis

Adversaries may use TruffleHog to exfiltrate secrets from compromised systems by leveraging its ability to search for sensitive data across multiple platforms. SOC teams should proactively hunt for this behavior in Azure Sentinel to identify potential credential theft or data exfiltration attempts using a legitimate tool with malicious intent.

Detection Rule

Sigma (Original)

title: PUA - TruffleHog Execution - Linux
id: d7a650c4-226c-451e-948f-cc490db506aa
related:
    - id: 44030449-b0df-4c94-aae1-502359ab28ee
      type: similar
status: experimental
description: |
    Detects execution of TruffleHog, a tool used to search for secrets in different platforms like Git, Jira, Slack, SharePoint, etc. that could be used maliciously.
    While it is a legitimate tool, intended for use in CI pipelines and security assessments,
    It was observed in the Shai-Hulud malware campaign targeting npm packages to steal sensitive information.
references:
    - https://github.com/trufflesecurity/trufflehog
    - https://www.getsafety.com/blog-posts/shai-hulud-npm-attack
author: Swachchhanda Shrawan Poudel (Nextron Systems)
date: 2025-09-24
tags:
    - attack.discovery
    - attack.credential-access
    - attack.t1083
    - attack.t1552.001
logsource:
    category: process_creation
    product: linux
detection:
    selection_img:
        Image|endswith: '/trufflehog'
    selection_cli_platform:
        CommandLine|contains:
            - ' docker --image '
            - ' Git '
            - ' GitHub '
            - ' Jira '
            - ' Slack '
            - ' Confluence '
            - ' SharePoint '
            - ' s3 '
            - ' gcs '
    selection_cli_verified:
        CommandLine|contains: ' --results=verified'
    condition: selection_img or all of selection_cli_*
falsepositives:
    - Legitimate use of TruffleHog by security teams or developers.
level: medium

KQL (Azure Sentinel)

imProcessCreate
| where TargetProcessName endswith "/trufflehog" or ((TargetProcessCommandLine contains " docker --image " or TargetProcessCommandLine contains " Git " or TargetProcessCommandLine contains " GitHub " or TargetProcessCommandLine contains " Jira " or TargetProcessCommandLine contains " Slack " or TargetProcessCommandLine contains " Confluence " or TargetProcessCommandLine contains " SharePoint " or TargetProcessCommandLine contains " s3 " or TargetProcessCommandLine contains " gcs ") and TargetProcessCommandLine contains " --results=verified")

False Positive Guidance

MITRE ATT&CK Context

Original source: https://github.com/SigmaHQ/sigma/blob/master/rules/linux/process_creation/proc_creation_lnx_pua_trufflehog.yml