
Summary
The Windows Multi-hop Proxy TOR Website Query detection rule is designed to identify DNS queries targeting known TOR proxy websites, specifically filtering for domains like '*.torproject.org' and 'www.theonionrouter.com'. This rule utilizes Sysmon EventCode 22, which specifically tracks DNS query events from endpoints. Detection of DNS queries to TOR proxy sites is critical because malicious actors often employ TOR to mask their network traffic, complicating forensic visibility and response actions. By confirming a malicious indication of this behavior, security teams can respond to potential data exfiltration attempts or communication with command and control infrastructures. The rule aggregates event data and reports on query status alongside the processes involved, allowing analysts to make informed decisions on responding to potential threats.
Categories
- Endpoint
Data Sources
- Pod
ATT&CK Techniques
- T1071.003
- T1071
Created: 2024-11-13