
Summary
The detection rule is designed to monitor for malicious use of the curl command on Linux systems, particularly when it involves uploading files that may contain sensitive AWS credentials or configuration files. This is accomplished through the analysis of endpoint telemetry from EDR agents that capture command-line executions. The rule specifically looks for the use of curl with various upload-related parameters, indicating potential exfiltration attempts. Furthermore, it connects these actions to known tactics from the TeamTNT group, which have been linked with AWS credential compromise. The rule is implemented within a Splunk environment and requires specific data ingestion and normalization in accordance with the Splunk CIM to function accurately.
Categories
- Endpoint
- Linux
Data Sources
- Pod
- Container
- File
- Command
ATT&CK Techniques
- T1105
Created: 2024-11-13