Skip to content

feat(rules): New UAC bypass via command handler hijacking rule#610

Merged
rabbitstack merged 1 commit intomasterfrom
privilege_escalation_uac_bypass_via_command_handler_hijacking
Mar 4, 2026
Merged

feat(rules): New UAC bypass via command handler hijacking rule#610
rabbitstack merged 1 commit intomasterfrom
privilege_escalation_uac_bypass_via_command_handler_hijacking

Conversation

@rabbitstack
Copy link
Owner

What is the purpose of this PR / why it is needed?

Detects attempts to bypass User Account Control (UAC) by hijacking command handler registry keys associated with auto-elevated system components. Attackers abuse this technique to redirect execution flow and spawn elevated processes without user consent.

What type of change does this PR introduce?


Uncomment one or more /kind <> lines:

/kind feature (non-breaking change which adds functionality)

/kind bug-fix (non-breaking change which fixes an issue)

/kind refactor (non-breaking change that restructures the code, while not changing the original functionality)

/kind breaking (fix or feature that would cause existing functionality to not work as expected

/kind cleanup

/kind improvement

/kind design

/kind documentation

/kind other (change that doesn't pertain to any of the above categories)

Any specific area of the project related to this PR?


Uncomment one or more /area <> lines:

/area instrumentation

/area telemetry

/area rule-engine

/area filters

/area yara

/area event

/area captures

/area alertsenders

/area outputs

/area rules

/area filaments

/area config

/area cli

/area tests

/area ci

/area build

/area docs

/area deps

/area evasion

/area other

Special notes for the reviewer


Does this PR introduce a user-facing change?


Detects attempts to bypass User Account Control (UAC) by hijacking command handler registry keys associated with auto-elevated system components.
Attackers abuse this technique to redirect execution flow and spawn elevated processes without user consent.
@rabbitstack rabbitstack added the rules Anything related to detection rules label Feb 10, 2026
@rabbitstack rabbitstack added the rules: uac bypass Anything related to UAC bypass detection rules label Feb 26, 2026
@rabbitstack rabbitstack merged commit dfddc6a into master Mar 4, 2026
10 of 11 checks passed
@rabbitstack rabbitstack deleted the privilege_escalation_uac_bypass_via_command_handler_hijacking branch March 4, 2026 17:36
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

rules: uac bypass Anything related to UAC bypass detection rules rules Anything related to detection rules

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant