heroui logo

Potential Reverse Shell via UDP

Elastic Detection Rules

View Source
Summary
This detection rule identifies suspicious network traffic patterns that may indicate the use of a UDP reverse shell on Linux systems. It monitors for a specific sequence of system calls, notably `execve` for process execution, `socket`, and `connect`, which are all critical to establishing a reverse shell. The rule analyzes audit events from the Linux Audit Framework, primarily focusing on processes that utilize common shell interpreters and network tools like `bash`, `nc`, `netcat`, and `python`. By looking for outgoing (`egress`) network connections made to external IP addresses, the rule aims to flag potential malicious activity. This rule is crucial for organizations, as adversaries can use UDP reverse shells to evade traditional firewall protections and gain covert access to systems. When ingested from compatible data sources like Auditbeat and Auditd Manager, it provides valuable detection capabilities for security teams to investigate and respond to potential threats.
Categories
  • Endpoint
  • Linux
Data Sources
  • User Account
  • Network Traffic
  • Process
  • Kernel
  • Application Log
ATT&CK Techniques
  • T1059
  • T1059.004
  • T1071
Created: 2023-07-04