heroui logo

Network Connection Initiated To DevTunnels Domain

Sigma Rules

View Source
Summary
This rule detects network connections initiated by processes on a system specifically targeting domains that end with '.devtunnels.ms'. This detection is critical as attackers may exploit DevTunnels to create reverse shells or establish persistence mechanisms on compromised machines. The rule operates in a Windows environment and utilizes network connection logs to monitor for specific behaviors that signal potential misuse of DevTunnels. The current status of the rule is in test phase, indicating that it has not yet been fully deployed in production environments, but it raises alerts when the specified conditions are met. False positives may occur due to legitimate usage of DevTunnels; hence, organizations must carefully evaluate alerts generated by this detection rule. The sources referenced provide additional context on the implications of DevTunnels in security scenarios and their legitimate uses.
Categories
  • Network
  • Endpoint
  • Windows
Data Sources
  • Network Traffic
Created: 2023-11-20