
Summary
This detection rule identifies suspicious usage of the Dropbox API by executables that are not part of the legitimate Dropbox client. The rule triggers when a connection is initiated to specific Dropbox API endpoints (api.dropboxapi.com or content.dropboxapi.com) from a non-Dropbox executable. The intention is to reveal potential command-and-control (C2) activity where malicious software mimics or hijacks legitimate API usage to exfiltrate data or communicate with external servers. It specifically filters out legitimate connections made by the Dropbox software itself, focusing instead on identifying unauthorized applications that might attempt to use the Dropbox service for nefarious purposes. The potential false positives include scenarios where authorized software utilizes the Dropbox API without the author's knowledge, necessitating an investigation to differentiate between legitimate and malicious use cases.
Categories
- Cloud
- Endpoint
- Windows
Data Sources
- Network Traffic
- Process
Created: 2022-04-20