heroui logo

Cisco NVM - Outbound Connection to Suspicious Port

Splunk Security Content

View Source
Summary
The detection rule titled 'Cisco NVM - Outbound Connection to Suspicious Port' is designed to identify HTTP outbound connections from endpoint processes to known suspicious or non-standard ports, which could signify malicious activity. It leverages flow data from the Cisco Network Visibility Module (NVM) to monitor network traffic for connections on ports such as 4444, 2222, and 51820, which are commonly associated with remote access tools, penetration testing frameworks, and malware. The rule triggers alerts when these connections are established by non-standard binaries or processes, prompting further investigation. The search implementation in Splunk uses a macro to filter and aggregate connections while excluding local and private IP ranges, delivering a structured view of potential anomalies, complete with contextual metadata regarding the processes involved.
Categories
  • Network
  • Endpoint
Data Sources
  • Cloud Service
  • Network Traffic
ATT&CK Techniques
  • T1571
Created: 2025-07-01