- Product
Product Overview
Sophisticated security with unmatched simplicityCloud SIEM
Pre-configured detections across your environmentHoneypots
Deception technology to detect lateral movementEndpoint Visibility
Real-time monitoring with added detection & responseSecurity Reports
Data visualizations, compliance reports, and executive summariesAutomated Response
Detect, prioritize, and neutralize threats around the clockIntegrations
Cloud, on-prem, and open API connectionsXDR Platform
A complete view to identify risk, and things operational
- Pricing
- Why Blumira
Why Blumira
The Security Operations platform IT teams loveWatch A Demo
See Blumira in action and how it builds operational resilienceUse Cases
A unified security solution for every challengePricing
Unlimited data and predictable pricing structureCompany
Our human-centered approach to cybersecurityCompare Blumira
Find out how Blumira stacks up to similar security toolsIntegrations
Cloud, on-prem, and open API connectionsCustomer Stories
Learn how others like you found success with Blumira
- Solutions
- Partners
- Resources
This month's releases include new detections across macOS, Windows, Microsoft 365, and Linux to help identify supply chain attack techniques, credential reconnaissance, remote access tool abuse, and AI agent exploitation. Highlights include detections for malicious npm postinstall hooks, Fscan network scanning, ClickFix campaign activity, and the widely exploited OpenClaw AI agent. We also improved detection accuracy and reduced false positives across several existing rules, and we delivered targeted bug fixes to the MSP Portal, ConnectWise PSA integration, and agent isolation workflows. Lastly, we added more granular control to the M365 ITDR with separate disable user and revoke session response actions.
Detection Updates
| Log Type | Details |
|---|---|
| macOS | NEW - macOS: Node.js Process Spawning osascript via nohup This new detection rule identifies when someone is using nohupto launchosascriptin a detached context, which is a technique malicious node package manager (npm) post-install hooks use to escape the process tree and establish persistence.Default state: Enabled |
| macOS | NEW - macOS: osascript Spawning Curl to Download Remote Payload This new detection rule identifies osascriptspawning a shell that invokes curl to download a remote payload, which is a technique seen in the recent Axios npm supply chain compromise.Default state: Enabled |
| macOS | NEW - macOS: Suspicious Binary Execution from Library Caches This new detection rule identifies commands referencing a binary masquerading as a system process in /Library/Caches/, a technique used by the Axios supply chain RAT to blend in with legitimate macOS system activity.Default state: Enabled |
| Microsoft 365 |
NEW - Microsoft 365: External Account Accessing Personal SharePoint Site This new detection rule identifies file operations on personal SharePoint sites by external or guest accounts, which may indicate unauthorized access to sensitive user files. Default state: Disabled |
| Windows |
NEW - Cmdkey Credential Listing Reconnaissance This new detection rule monitors for cmdkeyexecutions that include stored credentials, which may indicate credential reconnaissance during post-compromise activity.Default state: Enabled |
| Windows |
NEW - Fscan Network Scanning Tool Execution This new detection rule identifies execution of Fscan, which is an open-source offensive network scanning tool frequently used by threat actors for post-exploitation reconnaissance and lateral movement discovery. Default state: Enabled |
| Windows |
NEW - NT Path Prefix: Shell Execution of Executable This new detection rule identifies command interpreters executing files via NT path prefixes (e.g., \??\,\\?\, or\\.\), a technique bad actors use to bypass security tools that rely on standard path-based detection rules.Default state: Enabled |
| Windows |
NEW - PowerShell Remove and Insert Method Obfuscation This new detection rule identifies PowerShell scripts containing heavy string method obfuscation, where strings are constructed character-by-character through chained .Remove()and.Insert()method calls to evade static string-based detections.Default state: Enabled |
| Windows |
NEW - Recursive where.EXE Command Wildcard Executable Resolution This new detection rule identifies the use of where /rwith wildcards to recursively search Windows system directories for executable files, a technique observed in ClickFix campaigns to resolve binary paths without using their literal names.Default state: Enabled |
| Windows |
NEW - Remote Access Tool: Net Monitor for Employees This new detection rule monitors for execution of Net Monitor for Employees software and related msiexeccommands, which may indicate unauthorized remote access tool installation.Default state: Enabled |
| Windows |
NEW - Remote Access Tool: SimpleHelp This new detection rule identifies process creation events for SimpleHelp remote access software. While legitimate, SimpleHelp has been exploited by threat actors to maintain unauthorized access to compromised systems. Default state: Disabled |
| Windows |
NEW - Runas Binary Usage This new detection rule identifies use of the runasutility to execute commands under a different user context, a technique associated with privilege escalation during post-compromise activity.Default state: Disabled |
| Windows | NEW - Unicode Path Masquerading in Trusted Directory This new detection rule identifies process execution from paths containing Unicode characters that visually mimic trusted Windows directory names, a technique used to bypass EDR solutions that whitelist processes from trusted directories. Default state: Enabled |
| Windows |
NEW - Whoami All Execution This new detection rule identifies execution of whoami /all, a discovery command used to enumerate user identity, privileges, and group memberships commonly observed during post-exploitation reconnaissance.Default state: Disabled |
| Windows / macOS / Linux |
NEW - OpenClaw AI Agent Process Execution This new detection rule identifies process creation events for OpenClaw (formerly Clawdbot, Moltbot), an AI agent that grants full OS-level shell access and has been widely exploited via malicious skills and exposed gateways. Default state: Disabled |
| Windows / macOS / Linux |
NEW - OpenClaw Installation or Persistence Artifact This new detection rule identifies OpenClaw installation commands and persistence artifacts including systemd services, macOS launch agents, and configuration directory files that indicate the AI agent has been installed on a system. Default state: Enabled |
| Fortigate |
UPDATE - Fortigate: Successful Admin Login from External IP Address We improved detection logic to reduce false positives in certain FortiGate management login scenarios. |
| HTTP Access / Windows |
UPDATE - ConnectWise ScreenConnect CVE Detections (CVE-2024-1708, CVE-2024-1709) We rewrote the analysis text for all three ConnectWise ScreenConnect CVE detections with improved investigation guidance, CVE context, and better field coverage in matched evidence. |
| Sophos Central |
UPDATE - Sophos Central: Threat Event We refined detection logic to reduce false positives from routine Sophos protection activity. |
| Windows | UPDATE - Decimal Character Encoded Command We expanded detection coverage to identify additional PowerShell obfuscation variants used by threat actors to evade detection. |
| Windows | UPDATE - Potential EDR-Freeze Isolation Pattern We improved query performance and refined detection logic to reduce false positives. |
| Windows | UPDATE - Reconnaissance via Net Commands We refined detection logic to reduce false positives from legitimate administrative tool activity. |
| Windows | UPDATE - Webshells by File Write We refined detection logic to reduce false positives from legitimate application activity. |
Bug Fixes and Improvements
Bug Fixes
- MSP Portal - Admin Bulk Action Scope: We fixed a security issue where "Bulk Actions > Add Administrator role to all" in the MSP Portal was incorrectly applying to admins scoped to unrelated sub-accounts, not just users of the current sub-account.
- ConnectWise PSA Integration - Note and Status Sync: We fixed an issue where the CW PSA integration would create tickets but fail to sync notes or status updates for some MSP customers.
- Workflows with Blocklist - Steps Disappearing: We fixed an issue where workflow steps for "Connection from Public IP" findings tied to the blocklist would disappear when the finding was resolved, affecting customers without automated blocking enabled.
- Agent Isolation - Offline State: We fixed a condition where Blumira-isolated endpoints could get stuck in an offline state that required a full reboot to restore connectivity.
Improvements
- M365 ITDR - Granular Disable and Revoke Actions: Based on user feedback, the M365 ITDR "Disable user and revoke sessions" response button now offers three distinct options: "Disable & Revoke Sessions" (combined, unchanged), "Disable User" only, and "Revoke Sessions" only. Responders can now trigger these actions independently.
March 2026 Release Notes
In case you missed the March updates, you can find and review those notes here.
Eric Pitt
Eric is a Product Marketing Manager at Blumira focusing on customer research and positioning to continuously improve the Blumira platform.
More from the blog
View All PostsSubscribe to email updates
Stay up-to-date on what's happening at this blog and get additional content about the benefits of subscribing.