heroui logo

Web Server Spawned via Python

Elastic Detection Rules

View Source
Summary
This detection rule, authored by Elastic, identifies instances when a web server is spawned using Python on Linux systems, a behavior that may signal potential malicious activity. Attackers may leverage this technique to exfiltrate data or facilitate lateral movement across networks by utilizing Python's built-in HTTP server capabilities. The rule is set to examine process events and looks for processes that execute the command for starting a web server, specifically focusing on those that either contain 'http.server' or 'SimpleHTTPServer' in the command arguments. It captures events from various sources, including Elastic Defend, CrowdStrike, and SentinelOne, making it applicable in production environments with varying integration capabilities. With a risk score of 21, it falls under the low severity category, stressing the need for proactive monitoring and investigation of alerts generated by this rule. The associated investigation guide details how to confirm the legitimacy of processes, correlate logs, and respond to potential threats, including isolating affected hosts and terminating unauthorized processes. This framework adheres to the MITRE ATT&CK Tactics related to Execution and Lateral Movement, pinpointing specific techniques that adversaries might exploit using Python as part of their attack vectors.
Categories
  • Endpoint
  • Linux
Data Sources
  • Process
  • Script
  • Application Log
ATT&CK Techniques
  • T1059
  • T1059.006
  • T1570
Created: 2024-11-04