December 4,2025 – Content Update

We are committed to continuously strengthening security operations for our customers through our innovative DARC Vault monthly releases. Much like Microsoft’s Patch Tuesday, the DARC Vault acts as a consistent and reliable source of enhanced security content, empowering users to stay ahead of evolving threats with fresh detections every month.
Each month, we deliver the latest Out-Of-The-Box (OOTB) content that not only introduces brand-new capabilities but also enhances existing detections. This fortnight, we are excited to announce a significant update focused on VMware ESXi, Windows and Linux.

Below is a summary of the new additions and improvements:

Summary of Fortnightly Improvements

Content TypeActionsCount
DetectionsNew27
Enhanced
DashboardsNew
ReportsNew

New Detections

#NameDescription
1Binary File Modification Detected in System PathsInvestigating suspicious binary file changes involving critical commands.
2User account exposed to KerberoastingUser account exposed to Kerberoasting under investigation.
3Potential NTLM Relay Attack against a Computer AccountPotential NTLM Relay Attack against a Computer Account under investigation.
4Suspicious Named Pipe Coercion Attempt
5Potential Credential Access via DCSyncPotential Credential Access via DCSync attack under investigation.
6MsiExec Service Child Process With Network Connection_ep-dnsMsiExec Service Child Process With Network Connection under investigation.
7MsiExec Service Child Process With Network ConnectionMsiExec Service Child Process With Network Connection under investigation.
8Suspicious Microsoft Antimalware Service ExecutionSuspicious Microsoft Antimalware Service Execution detected on Windows platforms.
9Potential Shellcode Injection into Verclsid Target ProcessPotential Shellcode Injection into Verclsid Target Process under investigation.
10Suspicious Communication App Child ProcessDetects suspicious child processes spawned by communication apps.
11Rare Connection to WebDAV TargetInvestigating rare connection to WebDAV target using rundll32.exe and davsetcookie.
12Kerberos Network Logon Using a Computer AccountKerberos Network Logon Using a Computer Account under investigation.
13Potential Computer Account Relay ActivityInvestigating potential computer account relay activity on Windows systems.
14Exfiltration via AWS EventBridgeExfiltration via AWS EventBridge under investigation.
15ESXi System Users Enumerated via ESXCLIESXi System Users Enumerated via ESXCLI under investigation. Attack involves listing system accounts.
16ESXi VM IDs Enumerated via ESXCLI or VIM-CMDESXi VM IDs enumerated via ESXCLI or VIM-CMD under investigation.
17ESXi VM Powered Off via VIM-CMDESXi VM powered off via VIM-CMD command execution detected. Investigating potential system shutdown/reboot.
18ESXi Syslog Configuration Changed via ESXCLIESXi Syslog Configuration Changed via ESXCLI attack modifies syslog settings.
19ESXi Firewall Disabled via ESXCLIESXi Firewall Disabled via ESXCLI attack under investigation.
20ESXi VM Autostart Disabled via VIM-CMDESXi VM Autostart Disabled via VIM-CMD detected. Investigating command execution disabling autostart.
21ESXi VIB Acceptance Level Set to Community Supported via ESXCLIESXi VIB Acceptance Level Set to Community Supported via ESXCLI command detected.
22ESXi VM Snapshots Deleted via VIM-CMDESXi VM Snapshots Deleted via VIM-CMD under investigation.
23ESXi Coredump Generation Disabled via ESXCLIESXi Coredump Generation Disabled via ESXCLI attack under investigation.
24ESXi Firewall Default Action Set to PassESXi Firewall Default Action Set to Pass under investigation.
25ESXi System Storage Enumerated via ESXCLESXi System Storage Enumerated via ESXCLne under investigation.
26ESXi System Information Discovery via VIM-CMDESXi System Information Discovery via VIM-CMD under investigation.
27ESXi Welcome Message Changed via ESXCLIESXi Welcome Message Changed via ESXCLI under investigation. Platforms: Linux, Windows, macOS.