
Summary
This detection rule identifies the activity associated with the rclone command-line tool when it makes requests via a proxy server. Rclone is often used for managing and transferring files to and from cloud storage services. The rule specifically targets instances where the User-Agent string of requests starts with 'rclone/v', indicating the use of rclone. Such detection is significant because while rclone can be utilized for legitimate purposes, it may also be exploited for unauthorized data exfiltration or other malicious activities in environments where cloud services are involved. The presence of rclone usage can indicate potential data theft or unusual behavioral patterns that warrant further investigation. It's important to correlate this detection with additional context, such as user permissions and operational behavior, to assess the legitimacy of the detected activity.
Categories
- Cloud
- Network
- Endpoint
Data Sources
- User Account
- Web Credential
- Network Traffic
Created: 2022-10-18