
Summary
The 'Linux Ingress Tool Transfer Hunting' analytic rule is designed to identify the usage of 'curl' and 'wget' commands in a Linux environment. These commands are commonly utilized for downloading files but can also signal potentially malicious activities, indicating the ingress of unauthorized tools or scripts. By leveraging data from Endpoint Detection and Response (EDR) agents, the rule monitors critical aspects such as process names, user activities, and command-line executions. Its primary goal is to capture potentially harmful behaviors that could lead to issues like unauthorized code execution or data exfiltration. The rule is implemented through a Splunk search that aggregates event data from the Endpoint Processes data model, filtering for the specified commands and correlating them with user and process information. This proactive monitoring method enables security teams to differentiate between normal command usage and potentially risky behaviors, thereby enhancing security posture against tool transfer incidents.
Categories
- Linux
- Endpoint
Data Sources
- Pod
- Container
- Process
ATT&CK Techniques
- T1105
Created: 2024-12-19