heroui logo

Suspicious Named Error

Sigma Rules

View Source
Summary
The 'Suspicious Named Error' rule is designed to identify potential exploit attempts by monitoring DNS error messages for suspicious patterns that may suggest malicious activity. By analyzing syslog entries from Linux systems, the detection logic looks for specific keywords indicative of abnormal DNS behavior, such as errors related to source port manipulation (e.g., 'dropping source port zero packet from'), unauthorized zone transfers (e.g., 'denied AXFR from'), and critical shutdown issues (e.g., 'exiting (due to fatal error)'). Collectively, these patterns can signal an initial access vector being exploited by an attacker. The rule's high severity indicates the potential impact if an exploit is occurring; thus, it is essential for security teams to investigate any triggers immediately.
Categories
  • Linux
  • Network
Data Sources
  • Named Pipe
  • Logon Session
  • Network Traffic
  • Network Share
  • Process
Created: 2018-02-20