heroui logo

Possible FIN7 DGA Command and Control Behavior

Elastic Detection Rules

View Source
Summary
This detection rule is aimed at identifying potential command and control (C2) communications associated with the FIN7 threat group, which is notorious for its sophisticated cyber attacks and use of Domain Generation Algorithms (DGAs). By monitoring network traffic for specific patterns, this rule utilizes queries on multiple datasets to detect anomalous behavior consistent with known C2 techniques. The main query checks for network events matching certain domain patterns and excludes known benign domains to reduce false positives. Given the high-risk score, alerts generated by this rule indicate a significant security concern requiring immediate investigation by analysts.
Categories
  • Network
  • Endpoint
Data Sources
  • Network Traffic
  • Application Log
ATT&CK Techniques
  • T1071
  • T1568
  • T1568.002
Created: 2020-07-06