T1552.008

Chat Messages

Adversaries may directly collect unsecured credentials stored or passed through user communication services. Corporate chat tools including Slack, Microsoft Teams, Jira, Confluence, and email frequently contain credentials shared between employees — API keys, passwords, database connection strings, SSH keys, and authentication tokens. LAPSUS$ specifically targeted Slack, Teams, JIRA, and Confluence to hunt for exposed credentials supporting privilege escalation and lateral movement. Adversaries may access stored chat logs on endpoints, query chat APIs with compromised tokens, compromise Slack integrations/bots, or search through message history for sensitive content.

Microsoft Sentinel / Defender
kusto
// Detect suspicious access to chat application data and credential search
DeviceFileEvents
| where Timestamp > ago(24h)
// Pattern 1: Access to Slack desktop app local data
| where (
    FolderPath has_any ("Slack\\storage", "Slack\\logs", "slack-store", "Slack\\Cache")
    or FolderPath has_any ("Teams\\LocalDb", "Teams\\Blob_storage",
                           "Microsoft\\Teams\\Local Storage",
                           "Microsoft\\Teams\\databases")
  )
| where ActionType in ("FileRead", "FileAccessed")
| where InitiatingProcessFileName !in~ ("Slack.exe", "Teams.exe", "msedgewebview2.exe",
                                         "chrome.exe", "slack", "teams", "electron")
| extend Platform = case(
    FolderPath has "Slack", "Slack",
    FolderPath has "Teams", "Teams",
    "Unknown"
  )
| project Timestamp, DeviceName, InitiatingProcessAccountName, FolderPath, FileName,
         InitiatingProcessFileName, Platform
| union (
    // Pattern 2: Chat app token/session file access
    DeviceFileEvents
    | where Timestamp > ago(24h)
    | where FileName has_any ("token", "session", "cookies")
        and FolderPath has_any ("Slack", "Teams", "Discord", "Zoom")
    | where ActionType in ("FileRead", "FileAccessed")
    | where InitiatingProcessFileName !in~ ("Slack.exe", "Teams.exe", "Discord.exe",
                                            "Zoom.exe", "slack", "teams", "discord")
    | project Timestamp, DeviceName, InitiatingProcessAccountName, FolderPath, FileName,
             InitiatingProcessFileName
)
| union (
    // Pattern 3: Slack/Teams API token usage via curl or PowerShell
    DeviceProcessEvents
    | where Timestamp > ago(24h)
    | where ProcessCommandLine has_any (
        "slack.com/api", "graph.microsoft.com/v1.0/chats",
        "teams.microsoft.com", "api.slack.com"
      )
    | where ProcessCommandLine has_any ("token", "Bearer", "xoxb", "xoxp", "xoxa")
    | project Timestamp, DeviceName, AccountName, FileName, ProcessCommandLine
)
| sort by Timestamp desc
high severity medium confidence

Data Sources

File: File Access Process: Process Creation Command: Command Execution Network Traffic: Network Connection Creation

Required Tables

DeviceFileEvents DeviceProcessEvents

False Positives

  • Backup agents reading chat application local storage as part of user data backup
  • Enterprise compliance and DLP tools scanning chat application data for sensitive information
  • IT support tools that access Teams/Slack logs for troubleshooting purposes
  • Browser extensions or third-party integrations that legitimately access Slack/Teams local storage
  • Automated testing frameworks that access chat application data during end-to-end testing

Unlock Pro Content

Get the full detection package for T1552.008 including response playbook, investigation guide, and atomic red team tests.

Response PlaybookInvestigation GuideHunting QueriesAtomic Red Team TestsTuning Guidance

Related Detections