heroui logo

Powershell DNSExfiltration

Sigma Rules

View Source
Summary
The Powershell DNSExfiltration detection rule is designed to identify and mitigate the risk of DNS-based data exfiltration via PowerShell scripts. This type of attack utilizes the DNS protocol to stealthily transfer files from an affected host to an external entity, often bypassing traditional security controls. The detection rule specifically targets script blocks that include the cmdlet 'Invoke-DNSExfiltrator' or specific parameters indicative of the DNS exfiltration technique. Requirements for the detection to function correctly include the prerequisite of Script Block Logging being enabled within the Windows environment. False positives may occur, particularly from legitimate scripts that utilize similar cmdlets or argument patterns, necessitating careful tuning of alerts. The rule leverages script block contents to ascertain potential data leaks and is categorized under high severity due to the critical nature of data exfiltration. This rule aims to enhance endpoint security by providing visibility into potentially malicious activities associated with PowerShell capabilities.
Categories
  • Windows
  • Endpoint
Data Sources
  • Script
  • Process
ATT&CK Techniques
  • T1048
Created: 2022-01-07