
Summary
This detection rule, titled "Cisco Network Interface Modifications," is designed to identify anomalous behavior regarding the creation or modification of network interfaces on Cisco devices, a potential indicator of unauthorized access or persistence mechanisms employed by threat actors. In particular, the rule is triggered by events that indicate configuration changes to interfaces, including the addition of new interfaces, changes to the state of existing interfaces, and the assignment of IP addresses. Since threat actors can establish covert channels through new interfaces, especially loopback interfaces, it's critical to monitor for unusual interface names or suspicious descriptions during these events. The detection rule utilizes data sourced from Cisco IOS logs, employing queries related to interface commands and state changes to capture relevant activities. Implementation requires proper logging configuration on Cisco devices to ensure that pertinent log messages are sent to a Splunk environment for analysis.
Categories
- Network
- Endpoint
- Infrastructure
Data Sources
- Pod
- Container
- User Account
- Network Traffic
- File
ATT&CK Techniques
- T1556
- T1021
- T1133
- T1190
Created: 2025-08-21