
Summary
The rule "Linux Proxy Socks Curl" is designed to detect malicious use of the `curl` command with proxy-related functionalities on Linux systems. Specifically, it focuses on the execution of `curl` with options such as `-x`, `socks`, `--preproxy`, and `--proxy`, which may signify an attempt by attackers to obfuscate their network traffic by routing communications through a proxy. This detection relies on telemetry from Endpoint Detection and Response (EDR) agents, effectively monitoring command-line executions and associated process details. By capturing instances where these proxies are invoked, security teams can identify potentially unauthorized activities that could lead to data exfiltration or other malicious actions. To implement this detection effectively, organizations must ensure they are ingesting the appropriate logs and leveraging the Splunk Common Information Model to normalize data for swift analysis.
Categories
- Endpoint
Data Sources
- Process
- File
ATT&CK Techniques
- T1090
- T1095
- T1105
Created: 2024-11-13