PUA - TruffleHog Execution - Linux
Detects execution of TruffleHog, a tool used to search for secrets in different platforms like Git, Jira, Slack, SharePoint, etc. that could be used maliciously. While it is a legitimate tool, intended for use in CI pipelines and security assessments, It was observed in the Shai-Hulud malware campaign targeting npm packages to steal sensitive information.
Sigma rule (View on GitHub)
1title: PUA - TruffleHog Execution - Linux
2id: d7a650c4-226c-451e-948f-cc490db506aa
3related:
4 - id: 44030449-b0df-4c94-aae1-502359ab28ee
5 type: similar
6status: experimental
7description: |
8 Detects execution of TruffleHog, a tool used to search for secrets in different platforms like Git, Jira, Slack, SharePoint, etc. that could be used maliciously.
9 While it is a legitimate tool, intended for use in CI pipelines and security assessments,
10 It was observed in the Shai-Hulud malware campaign targeting npm packages to steal sensitive information.
11references:
12 - https://github.com/trufflesecurity/trufflehog
13 - https://www.getsafety.com/blog-posts/shai-hulud-npm-attack
14author: Swachchhanda Shrawan Poudel (Nextron Systems)
15date: 2025-09-24
16tags:
17 - attack.discovery
18 - attack.t1083
19 - attack.t1552.001
20logsource:
21 category: process_creation
22 product: linux
23detection:
24 selection_img:
25 Image|endswith: '/trufflehog'
26 selection_cli_platform:
27 CommandLine|contains:
28 - ' docker --image '
29 - ' Git '
30 - ' GitHub '
31 - ' Jira '
32 - ' Slack '
33 - ' Confluence '
34 - ' SharePoint '
35 - ' s3 '
36 - ' gcs '
37 selection_cli_verified:
38 CommandLine|contains: ' --results=verified'
39 condition: selection_img or all of selection_cli_*
40falsepositives:
41 - Legitimate use of TruffleHog by security teams or developers.
42level: medium
References
Related rules
- PUA - TruffleHog Execution
- WannaCry Ransomware Activity
- Capabilities Discovery - Linux
- Shell Execution GCC - Linux
- Shell Execution via Find - Linux