
Summary
This rule detects when an executable on a Linux system initiates a network connection to specified LocaltoNet tunneling sub-domains (specifically, those ending in .localto.net or .localtonet.com). LocaltoNet is known to operate as a reverse proxy service. Attackers may exploit this service to create command-and-control (C2) channels that can bypass traditional security measures, including Multi-Factor Authentication (MFA) and perimeter defenses. The detection focuses on instances where the connection is explicitly initiated by an executable, indicating a potential malicious operation aiming to expose localhost services to the internet. In response to the threat landscape, this rule functions to identify potential misuse of the LocaltoNet service by monitoring specific outbound network activities related to this tunneling service.
Categories
- Linux
- Network
Data Sources
- Process
- Network Traffic
Created: 2024-06-17